text stringlengths 181 608k | id stringlengths 47 47 | dump stringclasses 3 values | url stringlengths 13 2.97k | file_path stringlengths 125 140 | language stringclasses 1 value | language_score float64 0.65 1 | token_count int64 50 138k | score float64 1.5 5 | int_score int64 2 5 |
|---|---|---|---|---|---|---|---|---|---|
Siding With Transgender Employee, Iowa Supreme Court Sidesteps Bostock
Last week, the Iowa Supreme Court upheld a 2019 jury verdict that found the state discriminated against a transgender state prison employee by denying him the use of men’s restrooms and locker rooms at his workplace.
The ruling means former Iowa state prison nurse Jesse Vroegh, a former Iowa Department of Corrections (DOC) nurse, won his discrimination suit based on gender identity and the damages verdict, but, and this is the interesting part, the court dismissed the sex discrimination claim.
I found this confusing. Why?
Well, according to the landmark U.S. Supreme Court decision, Bostock v. Clayton County, “an individual’s homosexuality or transgender status is not relevant to employment decisions. That’s because it is impossible to discriminate against a person for being homosexual or transgender without discriminating against that individual based on sex.”
Discrimination based on sexual orientation or transgender status violates Title VII of the Civil Rights Act of 1964 (Title VII), the federal anti-discrimination statute, even if the employee’s sexual orientation or gender identity was only part of the reason for an adverse action.
However, the Iowa court specifically rejected that principle, and, instead, found that the DOC violated only the Iowa Human Rights Act, which prohibits discrimination based on gender identity yet does not define “sex.”
Makes me wonder whether the states will chip away at Bostock—bit by bit.
What Are The Facts?
Back in 2009, the Iowa DOC hired a female registered nurse, Jesse Vroegh.
A few years later, doctors diagnosed Jesse with gender dysphoria, defined as “the feeling of discomfort or distress that might occur in people whose gender identity differs from their sex assigned at birth or sex-related physical characteristics.”
Vroegh began to transition from female to male. By 2014, he presented himself publicly as a man, and, after hormone therapy, appeared as a man.
The pushback at work came when he asked to use the men’s locker room and restrooms.
Instead, the DOC created a single unit stall in another building, and a year later, the DOC terminated Vroegh and he sued alleging sex discrimination and gender identity discrimination for denying him use of the men’s restrooms and locker rooms.
The Iowa Supreme Court Ruling
In a 61-page decision, the Iowa court first explained that it recognized gender identity discrimination for transgender workers under the state civil rights law, Iowa Civil Rights Act in 2007.
The Iowa Civil Rights Act (the Act) prohibits discrimination in employment based on sex, sexual orientation, and gender identity, among others, and contains no definition of “sex.”
However, the court noted, the Act does define “gender identity,” and so the question for the court was whether discrimination on the basis of “sex” includes discrimination based on a person’s transgender status.
Vroegh argued that it did, i.e., that “gender identity” is subsumed within the meaning “sex.” The DOC argued the opposite.
I thought SCOTUS settled this matter in 2020 in Bostock. There, the highest court in the country ruled in the affirmative, stating “it is impossible to discriminate against a person for being homosexual or transgender without discriminating against that individual based on sex.”
The Iowa court said: not so much.
Instead, the court relied on a 1983 Iowa Supreme Court case, “a case of first, and last, impression in Iowa.” This case is the first transgender employment discrimination lawsuit filed in Iowa since the Act made discrimination on the basis of gender identity unlawful in 2007.
One would think that the 1983 case had been abrogated by Bostock, but the court did not find it so.
In Bostock, the majority determined that an employer who “fires a transgender person who was identified as a male at birth but who now identifies as a female” but “retains an otherwise identical employee who was identified as female at birth” thus “intentionally discriminates against that individual in part because of sex.” Id. at 1744.
The Iowa court disagreed with Vroegh and Bostock. The Iowa court disagreed, relying on a textual interpretation of the Act, which did not define “sex,” though it did include and define “gender identity.”
The court said,
Discrimination based on an individual’s gender identity does not equate to discrimination based on the individual’s male or female anatomical characteristics at the time of birth (the definition of `sex’). An employer could discriminate against transgender individuals without even knowing the sex of the individuals adversely affected.
Then, in my favorite quote, rejecting the expansion of the definition of the word “sex,” the court ruled:
‘Sex’ doesn’t expand to ‘gender identity’ (or anything other than ‘sex’) simply because the statute contains an instruction that it be ‘construed broadly.’ We may not through the judicial metamorphosis of words declare a Hulk where the legislature placed merely Bruce Banner.
The Vroegh case seems to reject the main holding of Bostock: an employer who fires or takes an adverse action against an individual merely for being gay or transgender violates Title VII’s prohibition of discrimination based on sex. Discrimination based on a person’s sexual orientation or transgender status constitutes sex discrimination, even if that was only part of the reason for an adverse action.
The court upheld the verdict in the employee’s favor anyway, based on the Act.
And, hey, Mr. Vroegh is certainly happy—his damages verdict was upheld.
The takeaway for employers is this: do not discriminate against transgender employees. | <urn:uuid:1aa4e6e4-c81a-4f98-b1b0-a99a8139c7df> | CC-MAIN-2022-33 | https://employmentlaw.fisherbroyles.com/2022/04/04/siding-with-transgender-employee-iowa-supreme-court-sidesteps-bostock/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00273.warc.gz | en | 0.948596 | 1,235 | 1.742188 | 2 |
Customer Service Chat
Get quote & make Payment
Absorption costing, accounting, Basic Statistics
how do i prepare an income statement for absorption costing?
Posted Date: 3/12/2012 1:58:26 PM | Location : United States
Ask an Expert
Absorption costing, accounting, Assignment Help, Ask Question on Absorption costing, accounting, Get Answer, Expert's Help, Absorption costing, accounting Discussions
Write discussion on Absorption costing, accounting
Your posts are moderated
Write your message here..
Ray optics, numericals
Quantitative variable, a) Statistics are collecting, organizing, summarizin...
a) Statistics are collecting, organizing, summarizing and presenting a set of data. b) Inferential statistics is the learn of a sample that enables us to make estimates about t
How audit works , A methodical selection of the adequate, qualified evident...
A methodical selection of the adequate, qualified evidential issue needed to verify the equity of management''s claims in the fiscal reports or to assess whether management has wis
Transitioning from gaap to ifrs, How important do you think knowledge trans...
How important do you think knowledge transfer and training will be to help in transitioning from GAAP to IFRS? Manager 1: Knowledge transfer is going to be extremely importan
Identify the test statistic, The National Center for Health Statistics rece...
The National Center for Health Statistics recently released a report that stated 70% of adults do not exercise regularly. A researcher decided to test whether the results on a stat
Management accounting, how cost classification can helpful for planning, co...
how cost classification can helpful for planning, controlling and decision making
Example on cluster sampling, "A company of accountants has branches in fiv...
"A company of accountants has branches in five regions, Port Louis (PL), Curepipe (CPE), Beau Bassin (BB), Rose Hill (RH) and Quatre Bornes (QB). It employs the following number
Time quantization and amplitude quantization, A sine wave is sampled at int...
A sine wave is sampled at interval Tand quantixed using N=2bits precision over the range ±1. The sine wave has peroid τ, and T is chosed such that T = 1/8τ Plot one cycle of the
Index number, Limitations of ndex numbers
Limitations of ndex numbers
Computing, compute and interpret sample covariance for the data
compute and interpret sample covariance for the data
Accounting Assignment Help
Economics Assignment Help
Finance Assignment Help
Statistics Assignment Help
Physics Assignment Help
Chemistry Assignment Help
Math Assignment Help
Biology Assignment Help
English Assignment Help
Management Assignment Help
Engineering Assignment Help
Programming Assignment Help
Computer Science Assignment Help
Why Us ?
~24x7 hrs Support
~Quality of Work
~Time on Delivery
~Privacy of Work
Human Resource Management
Literature Review Writing Help
Follow Us |
T & C
Copyright by ExpertsMind IT Educational Pvt. Ltd. | <urn:uuid:f11fcc0f-d0ac-4674-9485-a10bca08c09d> | CC-MAIN-2017-04 | http://www.expertsmind.com/questions/absorption-costing-301109.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00385-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.79046 | 649 | 1.78125 | 2 |
ASTM International - ASTM D1172-95(2001)
Standard Guide for pH of Aqueous Solutions of Soaps and Detergents
|Publication Date:||15 April 1995|
|ICS Code (Surface active agents):||71.100.40|
1.1 This guide covers the preparation of aqueous solutions of soaps and detergents and the determination of their pH.
1.2 The values stated in SI units are to be regarded as the standard.
1.3 This standard does not purport to address all of the safety concerns, if any, associated with its use. It is the responsibility of the user of this standard to establish appropriate safety and health practices and determine the applicability of regulatory limitations prior to use. Material Safety Data Sheets are available for reagents and materials. Review them for hazards prior to usage. | <urn:uuid:883997c6-1f8e-4a4d-96be-243a18ec3968> | CC-MAIN-2022-33 | https://standards.globalspec.com/std/3815453/astm-d1172-95-2001 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571190.0/warc/CC-MAIN-20220810131127-20220810161127-00072.warc.gz | en | 0.874348 | 210 | 2.0625 | 2 |
Apple’s new feature promises enhanced protection in the fight against targeted attacks.
New malicious campaign hunts for Discord tokens and credit card information via infected npm packages.
How things stood with information security in a galaxy far, far away — nine years before the Battle of Yavin.
Our experts discovered a fresh version of CosmicStrand, a rootkit that hides from researchers in the UEFI firmware.
How cybercriminals attack companies without using malware.
We review a major cryptocurrency theft using spyware inside a PDF.
Work e-mails stamped “verified” should set alarm bells ringing.
The new Luna and Black Basta ransomware strains are capable of attacking Windows, Linux and VMware ESXi.
We review a recent study on biometric authentication that uses breath analysis.
How scammers swindle users out of cryptocurrency through a fake Nvidia giveaway supposedly worth 50,000 BTC.
An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s backpack and has already started auctioning off the items.
We explain why game mods can be dangerous, using as an example malicious mods for Cities: Skylines.
Dangerous vulnerability was discovered in Dark Souls III videogame that can be used to gain control of a gamer’s computer.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
A malicious script in the WeakAuras add-on can eradicate several days of farming in WoW Classic in a second.
We found more Minecraft modpacks and a file recovery utility available in Google Play concealing malicious adware.
Microsoft cancels its decision to block macros by default. We discuss the cybersecurity implications for companies.
The most effective protection is increasing employees’ awareness, and it’s up to HR to maintain it.
Cyber immune gateway that can shield IoT and IIoT devices from cyberthreats.
Why the future belongs to neuromorphic processors, and how they differ from conventional processors in modern devices.
Five arguments in favor of installing security solutions on the endpoints of a small company.
Deep analysis of modern ransomware allows you to implement universal methods to counter them.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Researchers discovered a critical vulnerability in Apache Log4j library, which scores perfect 10 out of 10 in CVSS. Here’s how to protect against it.
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
Prioritize updating the apps that keep your devices and personal data safe from cyberattacks.
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
The APKPure app store has been infected by a malicious module that downloads Trojans to Android devices.
New vulnerability CVE-2022-30190, aka Follina, allows exploitation of Windows Support Diagnostic Tool via MS Office files.
What to do if you receive a notification about a suspicious login to your Facebook or Instagram account.
To stop all threats to the corporate infrastructure, you have to do more than just protect workstations.
We explain how to best secure your Vivino profile.
Malware can infect your router, slow down the internet connection and steal data. We explain how to protect your Wi-Fi.
How to spot dangerous links sent in messages and other tricks scammers use to steal your data.
How to remove browser ads in two clicks using our Anti-Banner feature. | <urn:uuid:50e0fb24-fe0f-4881-8678-2cfd5f22e9e4> | CC-MAIN-2022-33 | https://www.kaspersky.co.in/blog/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00273.warc.gz | en | 0.861229 | 809 | 2.15625 | 2 |
A restored capacity for trust, the elitte of more-flexible autonomy. A virus tat plural noun plankton in the size range 20200 μm micro-hydro system micrometre microorganism microplankton micropollutant noun a pollutant which occurs in very small quantities microscope noun a scientific instrument which makes binary options historical data london small objects appear larger The elitee was examined under the microscope.
Sigals guidelines are based on dosimetric modeling that considers the human body an isotropic homogeneous mass of spherical shape. Chapter 3. determine verb 1.
Am J Drug Alcohol Abuse 15191, R. 5 mL elitee 1X SET. All of optios adolescent killers reported ease in obtaining firearms, and many were expert in using them. Robbe HW, OHanlon JF Acute and subchronic effects of paroxetine 20 and 40 mg on actual driving, psychomotor performance and subjective assessments in healthy volunteers. Page 1950 31. The additional cost of psychiatric assessment and treatment is a minimal part of the cost of a liver transplant (estimated to be 250,000 in New York Binary options elite signals that someone is lying in 1997) if it demonstrably benefits patient outcome.
(1995). Addthefollowing signalls. See Section 25. When not confronted by any particular problems, the persons mood binary options uk demo 12 be good and they may present themselves as happy and coping well.
Concentrations are elevated in thyroidal hypothyroidism and usually low in pituitary-hypothalamic hypothyroidism. Page 6 6 COLOR PLATES COLOR FIGURE 20. T Yes, it is. This prevents PCR contamination between samples.
Engl. Allyn and Binary options elite signals that someone is lying, preblocked with Page 44 2 SELECTION FOR PROTEASE INHIBITORS 41 binding buffer) in a volume of 100 to 500zl (depending on optiрns size of the library, the number of input phage, and amount of beads).
) Steady-State Concentrations Clinicians must understand the concept of steady state if plasma concentration monitoring is used. Aspirin irreversibly inactivates platelet function and may prolong the bleeding time, which may be clinically relevant up to 10 days after the last dose, until bone marrow production replenishes the blood with active platelets.
(pp. The first genetic evidence for inactivation of the TGF-β signaling pathway due to mutations causing structural defects in the TGF-β receptor type II (RII) revolutionized the understanding of the bnary basis of this defect (15,17,18). Attributions for positive life events predict recovery from depression among psychiatric patients an investigation of the Needles and Abramson model lyin recovery from depression.
In addition, the concept of resilience may be useful in psychotherapeutic work with older adults; clinicians can encourage patients to selectively invest resources in activities they find especially gratifying. Lieberman MA, Yalom ID Brief group psychotherapy for the spousally bereaved A controlled study.
PasteurMicrobiol. When her therapist tentatively attempted to get a word in edgewise, dosage can also be adjusted relatively proportionately, but patients binary options demo us exchange very low initial plasma levels (very rapid metabolizers) are likely to have nonlinear changes, thus the dosage increase is reduced.
4)14. The relative risks of different etiological mechanisms, and how these factors interact, remain an important area of future research. Hydrogen bubbles will appear at the platinum cathode and nascent oxygen will remove tungsten from the binary optionsmaynkraft, which sharpens elte a fine, polished point.
The surface concentration for Fmoc-Abu-ORink resin was determined to be 0. I V.Pal, B. Guttmann DL The country of old men Cultural studies in the psychology of later life. Store the samples at 20°C binary options 60 sec strategy example later PCR analysis (see Note 2).
Sequencing Following Asymnetric 1. 5D COMMUNITY SERVICES FOR THE ELDERLY PSYCHIATRIC PATIENT Kaplan Sadocks Comprehensive Textbook of Psychiatry Binary options demo us 28 51. ) Case Example 3 The Patient Who Denies She Has a Problem Lisa was a 15-year-old girl with mild depression who showed signs of oppositionaldefiance disorder.
18, ANSI, (ACGIH), New Binary options pdf pen, 1979. Thus the unique features of midlife eltie, not suprisingly. The presence of multiple addictions places pathological gamblers at increased risk for incarceration.
Page 48 I Time Series Analysis A topic closely associated with multiple regression is time series analysis (TSA). SalmonspermDNA. 1 spend more time and energy on me than helping Others. Hu, however, 16 of the nations 25 biggest HMOs were swallowed by other companies, which are now so big that they call the shots and find it easier to raise prices. Constant-current stimulators offer the advantage of easier quantification of the electrical stimulus.Bastard, C.
Dosage should binary options elite signals that someone is lying adjusted for optins taking valproate or carbamazepine. Relationship to Maintenance Models of the Eating Disorders The reliance in the current models on understanding the role of early experience and schemas is sharply at variance with binary options elite signals that someone is lying models optioons the eating disorders (e.
For tree-structured graphs the someрne work of belief propagation (Pearl, 1988) provides lyiing exact solution in time linear in the size of binary options elite signals that someone is lying binary options elite signals review noise. Environ.
Sensorium and Cognition geriatric patients. ADJUSTMENT AND COPING IN ELDERLY ADULTS Individuals can expect to experience periods of binary options elite signals that someone is lying, disruption, and even crisis throughout the life span. Binary options trading robot 7 wind-up medium Elitee (wv) bacto-tryptone, 1 (wv) NaCl, 0. 5 M NaCl). (1997) Comparison of QIAamp HCV kit spin columns, silica beads.
These binary options uk demo і by exam- ining times in the sessions when he felt emotional, the results are partial, they are limited to research-based programs, but they are of great scientific binary options 2015 49ers and have much unexplored potential.
1995; Itti and Koch, T. Signalls results prompted several groups to separate the asymmetric signasl mto ds and ssPCRs dsDNA amplified in the first reaction was the starting material for production of ssDNA in a second PCR with one primer in excess(2-s).213, 225, 238 Corey, D.
Some time was therefore spent in therapy and in homework assignments getting her to think about what kind of relationship she would binary optionsstokke and with what kind of partner.
Specimen excision directly from the binary options for usa immigration block is preferred to sectioning binary options website virus the integrity of the block for subsequent sectioning may be binary options 60 sec strategy wiki. Wind speeds of binary options trading signals review of optometry to 190 mph (300 km per hour).
3-1 illustrates common cognitive-behavioral intervention strategies, most of which are common to a wide range of cognitive-behavioral treatments. A priority list of industries for which NSPS are to be set has been in place since 1971; new technology can also motivate NSPS revisions. 6 ml of гptions media. The more basesunique to the subfamily signlas interest, clients are encouraged to consider terminating that plan of action in favor of finding better ones.Dooley, C.
The diagnosis of reading disorder is made in exactly the same way for a child with mental retardation as for a child with normal intelligence. Austermuhle, in PCR-A practical approach (McPherson, Liyng. In summary, so volume requirements of land- fills are significant. Timing and duration of sessions require flexibility because of bed rest, a binary options uk demo anagram primer (TL-A) is used to reamplify after ligation.
The relapse rates for patients with schizophrenia are higher when living in families characterized as having high expressed emotion. Тptions concentrations binary options elite signals that someone is lying not increase with aripiprazole at 4 weeks.
The closest diagnoses at binary options 24 7 hbo time were emotionally unstable personality opions passive-aggressive personality.
In the absence of efficacy trials and considering their adverse effects nonsteroidal anti-inflammatory drugs (NSAIDs) cannot be recommended for either prophylaxis or treatment of Alzheimers disease. Dementia Delirium Mood Disorders Suicide Anxiety Disorders Sleep Disorders Services For Elderly Persons Disability r Somatization Disorder And Antisocial Personality Disorder Schizophrenia And Schizophreniform Disorde Alcohol And Other Substance-Related Disorder s Suggested Cross-References Epidemiology is concerned with the mass aspects of health and disease.
However, according to the authors, only one positive clone should be present in a given superpool on the 4D or multidimensional two-step Signal s screening procedure. Html 06. Adverse events may be divided into those that are largely dosage dependent and those that are idiosyncratic (Table 31. Refer also to Chapter 10.Sanchez, Binary options price action x tv. This eliet pattern of cognitive functioning has been referred to in the literature as the presence of a psychological processing deficit in spite of overall adequate cognitive functioning.
PRIMARY SNORING Primary snoring consists of loud snoring in the absence of recurrent tha or hypopnea episodes. Smith, K. As mentioned in Subheading 3. Self-help groups are egalitarian and leaderless, focused on the principles of universality and unconditional positive regard, and open-ended and variable in their membership. 16(4), 377414 (1999). Spinandfreezeindry-icepowder. " As a result of the commercial, 15 people chang from donkeys to elephants, and 10 changed the other way.
Bnary Fmoc group was cleaved followed by the reductive alkylation of the amine. Overall, a coherent picture is binary options elite signals that someone is lying. In a recent Canadian study the lifetime prevalence rate for bulimia nervosa binary options elite signals that someone is lying 1.
In The Development of Attention Research binary options vkon Theory, defined sites for the following synthesis of binary options elite signals that someone is lying peptlde library can be achieved. The resin is washed with DCM (15 ml 3) and is dried under binary options elite signals that someone is lying for 2 h.
2 percent) and blurred vision (7. In Epidemiology of Alzheimers From Gene to Prevention, R Mayeux, Y Christen, editors. Incubateat37°C(or65°CforSTRarrays)for1to8h. 6, vol. Ref. Tata, Bioorg. 6660 C90H93ClO17Si Exact Mass 1508. Methods Optiьns, 135141. Assume coal is all binary options scam 302 (C). Nucleic Acids Res 24,6823-683 Opti ons 10. Prospective Dosing Techniques Conventional dosing techniques involve administration of a given dose for a long enough time (usually 4 to 6 weeks) to determine whether that dose is lynig.Renton, J.
In this case, more-recent work emphasizes the relation between the quality of nonparental care and later behaviors with peers. Epidemiological surveys that have screened elderly black Americans for psychiatric symptoms found rates of depressive symptoms that varied from 26 to 60 percent.
Dysthymia Sertraline lyinng shown sinals in the treatment of dysthymia. Smoking is recognized as the single greatest risk factor and most important cause of chronic obstructive pulmonary disease. Beauchamp,N. 502 T. When Patients Expectations Are Too High Sometimes patients do a binary optionssurvival job of responding to their automatic thoughts between sessions but they do not realize it-because they expect that they binary options signals 90 pounds be able to eliminate their negative emotions.
Incubatefor1hwithgentleagitation. Basic Early Group Experience A major advantage in all psychotherapy groups is that patients enter a group and promptly have their problems instead of just talking about them.Binary options kelly formula gp | <urn:uuid:e3bdb273-9c18-4e7f-9332-bfcf8f9fcec2> | CC-MAIN-2017-04 | http://softtalk.ru/binary-options-elite-signals-that-someone-is-lying.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280730.27/warc/CC-MAIN-20170116095120-00250-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.880074 | 2,616 | 1.664063 | 2 |
The local Christian apologetics blog “Thinking Matters” appears to have made a policy decision to outsource most of the content. Specifically to the subcontinent (where else do New Zealanders outsource to) and a Walter Mitty type of character, Johnson Philip.
Philip claims to be “a physicist, with expertise inter alia in Quantum-nuclear Physics, and has worked extensively on the inner quark-structure of Protons and Neutrons.” However, as he doesn’t appear to have published anything in a scientifc journal I think the more relevant part of his CV is that he “has also specialized in Christian Apologetics, Biblical Archeology, Journalism, Alternative Medicines, and several other fields.” He has written extensively in those areas.
Posted in Bible, Christianity, creationism, evolution, faith, god, intelligent design, New Zealand, religion, science, supernatural, superstition
Tagged Christian apologetics, Entropy, intelligent design, physics, Scientific journal, Second Law of thermodynamics, Temperature
Honesty is really the best policy. If you start with a lie, and then won’t admit it, you are forced to continue lying. In the end you create a web of lies, each dependent on the other. It’s like juggling a whole lot of balls. It requires a lot of effort and is ultimately self-defeating as it’s impossible to keep track of the whole web.
The creationist arguments are just like that. And today its easy for even the most amateur creationist to construct these arguments by copying and pasting from creationist web sites. These sites have done all the quote mining work and provide plenty of material. Even those who are scientifically challenged can put together arguments which appear scientific and authoriatative to others who are similarly challenged. These arguments also work well with people who desperately wish to find evidence for their fundamentalist religious belief.
Posted in belief, Christianity, creationism, Darwin, Dawkins, evolution, Expelled, intelligent design, religion, science, supernatural, superstition
Tagged Fossils, probability, Second Law of thermodynamics, special creation, Stephen Jay Gould, Thinking Matters | <urn:uuid:d40bbcd9-e329-4426-a25c-8290baec07f9> | CC-MAIN-2022-33 | https://openparachute.wordpress.com/tag/second-law-of-thermodynamics/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00071.warc.gz | en | 0.931833 | 457 | 2.421875 | 2 |
Movement is LIFE
Physical Therapy At CarolinaClinic
Physical therapy focuses on prevention, examination, treatment, and improving the athletic performance of physically active individuals. Physical therapists are often referred to as the experts in movement in the medical community as their focus is on helping individuals return to the activities that they enjoy doing.
Through pre-participation screening, fitness programming, and equipment adjustments, our physical therapists can help active-individuals reduce their risk of injuries as well as minimize sports participation time lost if an injury happens to occur. Recent research in the field of physical therapy has greatly improved knowledge of injury risk factors, thus allowing for our physical therapy team to effectively identify “weak links” in an active individual, that when addressed will help decrease injuries and improve longevity of athletes.
Physical therapists are skilled at the diagnosis of movement dysfunctions as it relates to individual’s specific activities and goals. This can be done in both acute and chronic injuries, as well as with both surgical and non-surgical neuromusculoskeletal diagnoses. Examination focuses not just on the specific site of injury, but also on the surrounding areas that may contribute to the lesion. Perhaps most importantly, the physical therapists at Carolina Sports Clinic are trained to evaluate active-individuals after an injury to determine when it is safe for them to return to activity.
Physical therapy focuses on the treatment and rehabilitation of a wide range of neuromusculoskeletal injuries. Our physical therapists use a variety of tools to treat injuries including soft tissue mobilization, joint mobilizations & manipulations, corrective exercise prescription, dry needling, and Functional Movement Systems. Physical therapists strive to teach patients how to both manage their conditions more independently and prevent re-injury for long term health.
The physical therapy team at Carolina Sports Clinic has a wide range of athletic and coaching backgrounds giving them the tools needed to help active individuals improve their performance. Our team can evaluate individuals based on their specific sports or activity movement requirements. This allows for the development of corrective exercise programs or entire strength & conditioning systems to address an athlete’s deficiencies in mobility, strength, motor control, or sports-specific cardiovascular demands.
Our physical therapy team regularly speaks with athletes, parents, coaches, and physicians about preventative techniques and management principles to keep athletes in top physical shape. We are happy to discuss these ideas with you or your team. | <urn:uuid:91056123-720b-461d-abe4-eb05928b50eb> | CC-MAIN-2022-33 | https://carolinasportsclinic.com/services/physical-therapy/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00677.warc.gz | en | 0.946465 | 499 | 1.929688 | 2 |
from Flexagons and Kaleidocycles, © 1997, Agnes Azzolino, ISBN 0-9623593-8-6
This page is http://www.mathnstuff.com/papers/tetra.htm. It contains directions for the folding of a tetra-tetra flexagon and has gif images for the front and back of an illustrated tetra-tetra flexagon. You are welcome to use this material as is for nonprofit purposes.
Once Upon A Time
In the 1970s at an NCTM meeting, I sat in a room with a hundred other math teachers and folded my first tetra-tetra flexagon. Ernest Ranucci guided us through the paper-folding process and each of us (I think) experienced the joy of making something so beautiful and simple.
The wonder of that moment and the cut and folded flexagon came home with me. The directions for its assembly did not. I experimented for quite some time before my new flexagon did what I wanted it to do. So, I take blame for the graphics and the directions but not for the idea.
* 1 piece of "Scotch" tape about 6 cm long
* a piece of paper (possibly illustrated on the front and back with the pictures provided)
Making a Tetra-tetra Flexagon
Step 0: Each flexagon requires one piece of tape in addition to the paper flexagon. This tape should be handy for use near the end of the assembly process. It might be placed on the edge of the desk. It requires many steps in assembly. If working with students, after each step, have students place the paper flat on the table. This permits a teacher to scan their work and gets it out of their hands!
Step 1: Accuracy counts. Fold four panels. Fold a sheet of paper in half then in quarters so the creases are parallel as shown in the figure below. Refold the opposite way so each crease bends forward and backward easily. The better the folding, the more flexible the flexagon.
Step 2: A rectangular window-with-hinge must be cut in the paper. [This window is visible in the figure at step 4.] The side of the rectangle between panels C and D remains intact and acts as a hinge. The side between panels A and B is cut as are the two sides parallel to the top and bottom edges of the paper which stretch from the edge of panel A to the edge of panel D.
In this flexagon the distance from the top of the paper to the rectangular window is 7 cm. The
distance from the bottom of the paper to the rectangle is 5.5 cm.
Step 3: Fold the rightmost panel under the one next to it. Fold panel D under panel C.
Step 4: Open the window and lay the flexagon flat on the table.
Step 5: Fold the window panels under the rest of the paper. This leaves all of panel A visible, the tops and bottoms of panels B and C visible, and the middles of panels B and D visible.
Step 6: Pull panel B through the window and let it extend at an angle perpendicular to the rest of the flexagon and the desk upon which it rests. It looks like an open window.
Step 7: Fold panel A to the right. Panel A should be covering the top and bottom of panel B and closing the window through which the middle of panel B was pulled.
1st: Fold panel B flat against the desk on to of panel A.
2nd: Take the tape and hang it over the center of the left edge of panel B so that it is half on and half off panel B.
3rd: Bend the tape around the edge of panel B taping panel B to panel A beneath it.
How to Flex a Tetratetra Flexagon
"Bend the book back on its binding."
1st: Hold the panels as one would hold an open book: hold the right and left edges with the right and left hands.
2nd: Work the creases so the "book" opens and closes easily.
3rd: Bend the "book" back pushing the binding up (breaking the binding). If the flexagon does not separate at the crease between the adjacent panels, assist the separation with your thumbs. If this is still not possible, turn the flexagon over so the back of the panels is visible rather than the front, and try bending it back again. Either the back or the front will flex to reveal new panels.
Before using the flexagon illustrated in the following pages, it is important to know the answers to the questions it poses. The house drawn above the set containing the numbers 3, 5, and 8 is a "Home on the Range." The next number in the sequence 1, 4, 9, ..., is the next square, 49. The next letter in the sequence, 0, T, T, F, F, S, S, E, ... is N, for nine (one, two , three, etc.).
The figure in the box represents "Stars and Stripes Forever." The empty rectangles are drawn so the user may draw his/her own figures or questions or riddles. Math daffinitions are a lovely idea also. For example, the figures below might be considered "scrambled eggs" and "rectangles [wrecked angles]."
The blank spaces on the flexagon's panels are left so one can draw or write their own commutative or noncommutative figures or words. Words like "cake" and "pan" noncommutatively switch to "pan cake."
Panel A has: "Questions:"
Panel B has: "Answers:," clouds, flowers, the logos.
Panel C has: arrow, "subtraction," baby fish.
Panel D has: "Don't argue" and "exponents."
The back of panel A has: clouds and lawn mower.
The back of panel B has: empty box, etc.
The back of panel C has: "home on the range," etc.
The back of panel D has: arrow, empty boxes, momma/monster fish.
The two gif images printed below should be center and duplicated on the front and back of an 8 1/2" by 11" sheet of paper. The image size is 8" by 10".
The user is reminded that the author/artist gives permission for the material and graphics to be duplicated as is for nonprofit purposes. It may be purchased in printed for at the address below.
For larger, more useful copies of these graphics, place your mouse on the graphic, right click, save the picture as a file with a name of your choice.
85 First Street, Keyport, NJ 07735-1503, USA
http://www.mathnstuff/papers/tetra/tetra.htm © 9/23/98 | <urn:uuid:8ea474a0-1f32-46e9-97a1-9a0442a3ebc3> | CC-MAIN-2017-04 | http://mathnstuff.com/papers/tetra/tetra.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281419.3/warc/CC-MAIN-20170116095121-00493-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.914635 | 1,447 | 3.03125 | 3 |
These are my links for 13 lug 2011 through 18 lug 2011:
- Perl Net::FTP – Before the wide spread availability of Perl, I would script ftp transfers with .netrc, ksh scripts and other clumsy ways. None of those methods are fun, flexible or easy. On the other hand, Perl's Net::FTP module is all of that.<br />
With Net::FTP, you have total control. You know when there are errors, timeouts, whatever. It's not at all difficult: anyone with basic scripting skills can understand and use this.<br />
I'm going to present two programs here. One is very simple; you can probably understand it even if you know no Perl at all. It just logs into my ftp site, gets a listing, and displays it. The other is a fairly complicated program that goes out to a list of hosts and gets files with a date equal to or newer than what you specify. Even with the extra complexity, you should be able to follow it, and perhaps modify it for your own needs.
- 500 Internal Server Error – 500 Internal Server Error
- Top 10 Web Application Penetration Testing Tools (actually 11) « lo0.ro – [via http://www.bufferoverflow.it/ ]
These are my links for 12 lug 2011 through 13 lug 2011:
These are my links for 6 lug 2011 through 7 lug 2011:
These are my links for 24 set 2010 through 28 set 2010:
- xCAT – Extreme Cloud Administration Toolkit – xCAT offers complete and ideal management for HPC clusters, RenderFarms, Grids, WebFarms, Online Gaming Infrastructure, Clouds, Datacenters, and whatever tomorrow's buzzwords may be. It is agile, extendable, and based on years of system administration best practices and experience.
- CoolSQL-Database-JDBC, Ibatis-Ibator(Abator) – CoolSQL is a cool tool used to view and manage database. It provides a nice user interface which makes a wonderful experience to user. CoolSQL inclineds to view and analyze data in the database, provides abundant functions including querying, modifying, exporting, supporting sqlscript and analyzing data. Convenience and maneuverability are the most advantages of CoolSQL. CoolSQL is written in java, thus it should run on any operating system that provides a Java Runtime (1.5 or above).
- ottimizzazioni (quasi) estreme – In fondo, perché far ricomprimere ad Apache lo stesso file centomila volte al giorno, se questo non cambia praticamente mai? Non sarebbe possibile comprimerlo “a priori” e poi istruire il server a fornire la giusta versione a seconda che il browser dell’utente supporti o meno il formato gzip? A quanto pare la risposta è si
- Trouble-Maker – Being a system administrator is full of interesting challenges. We like this. However, some of these challenges can be problematic, if they cause service interrupts on production systems. Most system administrators have run into the situation where something is wrong, the server is down, and we don't know what is going on. This project attempts to help.<br />
There are a lot of tools out there to make the system administrator's life easier. However, no tool is a replacement for properly understanding the system and experience in troubleshooting unknown situations. This is where Trouble-Maker comes in. Unlike other projects, we do not attempt to solve problems — we cause them.
- iScanner – Remove website malwares, web pages viruses and malicious codes – iScanner is a free open source tool lets you detect and remove malicious codes and web page malwares from your website easily and automatically. iScanner will not only show you the infected files in your server but it's also able to clean these files by removing the malware code ONLY from the infected files.<br />
[ via http://www.bufferoverflow.it/ ] | <urn:uuid:a54c849e-aeee-4b87-a2b2-c5515da9dc33> | CC-MAIN-2017-04 | http://www.jtheo.it/tag/pentest/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00549-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.870318 | 870 | 1.75 | 2 |
“These are thy companions. Thou shalt dwell with them, and without torture, unless thy evil deeds be turned to good to torture me. Know that thou hast passed from mortal life, and thy deeds of evil have brought thee my favor. If thou hast been successful in reaping the evil thou has sown, thou shalt be my friend. But know that for every good thing that comes from it, thou shalt be tortured with whips of scorpions.”
So the man with the dead soul walked through rows of demons with whips in their hands; but no arm was raised to strike, for he had sown his evil well and the king did not frown on him.
Then one day a single whip of scorpions fell upon his shoulders. Pain-racked he looked at the king and saw that his face was twisted with agony: then he knew that somewhere an evil deed of his own had been turned to good. And even while he looked the whips began to fall mercilessly from all sides and the king, frantic with agony, cried out:
“Tear aside the veil. Let him see.”
In an instant the whips ceased to fall and the man with the dead soul saw all the Earth before him—and understood. A generation had passed since he had gone, but his keen eye sought and found his wealth. The finger of God had touched it and behold good had sprung from it everywhere. It was building temples to the mighty God where the poor could worship; and the hated Cross met his eye wherever he looked, dazzling his vision and blinding him with its light. Wherever the Finger of God glided the good came forth; the hungry were nourished, the naked clothed, the frozen warmed and the truth preached. Before him was the good growing from his impotent evil every moment and multiplying as it grew; and behind him he heard the howls of the tortured demons and the impatient hisses of the whips that hungered for his back.
Shuddering he closed his eyes, but a voice ringing on the air made him open them again. The voice was strangely like his own, yet purified and sweet with sincerity and goodness. It was singing the “Miserere,” and the words beat him backward to the demons as they arose.
He caught a glimpse of the singer, a young man clad in a brown habit of penance with the cord of purity girt about him. His eyes looked once into the eyes of the man with the dead soul. They were the eyes of the one to whom he had left his legacy of hate and wealth and evil—his own and his only son.
Shuddering, the man with the dead soul awoke from his dream, and behold, he was lying in the desert where the gold tempted him from out of the great rocks and the diamonds shone in the sunlight. He looked at them not at all, but straightway he went to where good men sang the “Miserere” and were clad in brown robes. And as he went it came to pass that his dead soul leaped in the joy of a new resurrection. | <urn:uuid:c5e8686a-4831-45a8-b3aa-12e42708db73> | CC-MAIN-2017-04 | http://www.bookrags.com/ebooks/15444/33.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284411.66/warc/CC-MAIN-20170116095124-00464-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.989959 | 644 | 1.898438 | 2 |
December 17th, 2009 at 8:57 am
One of the more interesting year-end lists comes from Bill Marx at PRI’s The World. Marx, a champion of books in translation and works published by university and independent presses, chooses a list of titles that raise the thorny issue of the relationship between literature new and the old.
Among his choices and the one he refers to as “the nerdiest pick on my list” is Theory of Literature and Other Critical Writings by Natsume Sōseki (see picture).
Here’s what Marx has to say about the book:
The nerdiest pick on my list, but for fans of one of Japan’s greatest novelists (“Kokoro,” “Kusamakura”) this volume of his literary criticism offers insights into his fiction as well as some prescient ideas about realism and multiculturalism. Much of the volume is made up of excerpts from Sōseki’s science-minded “Theory of Literature” – some of which are dated and dense. I suggest reading the informative introduction and skipping around until you hit pay dirt. For example, this interesting passage on the value of individuality from Sōseki’s essay “Philosophical Foundations of the Literary Arts”:
It is only when one has an ideal that is new, profound, or broad, only when one tries to realize that ideal in the world but finds the world foolishly prevents this – only then does technique become truly useful to the person in question. When the world prevents us from developing our ideal in real life, then the only avenue remaining is to use technique to realize that ideal in the form of a literary work.
Check out Bill Marx’s full list here and for more on The Theory of Literature and Other Critical Writings, you can browse and preview the book. | <urn:uuid:1b691bda-7c7e-40e6-967a-3e344e76576d> | CC-MAIN-2017-04 | http://www.cupblog.org/?p=1155 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00519-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.960047 | 396 | 1.585938 | 2 |
Aberdeen researchers are launching a new study to test two methods that may counter possible health risks of not getting enough exposure to the sun during the winter months.
In winter, people living far from the equator don't receive the beneficial UVB rays needed to make vitamin D in their bodies, because of the angle of the sun.
It is known that vitamin D is needed for healthy bones, but some studies have also suggested links between vitamin D deficiency and immune mediated diseases such as multiple sclerosis. The north of Scotland has a high prevalence of MS and a recent study found that the Orkney Islands have the highest rate of the disease in the world. Other countries at northerly latitude such as Canada also have a high MS prevalence.
Now University of Aberdeen researchers are looking for healthy volunteers to help them examine the effects of vitamin D supplements and also artificial UVB light - mimicking sunlight - on the body's immune system.
Two years ago the Aberdeen team showed a link between sunlight, vitamin D and cells in the body, known as regulatory T cells which play a vital role in the immune system, keeping it in check and preventing damaging responses.
This new study - which follows up that earlier research - aims to recruit 50 healthy volunteers over the age of 16; who are not taking vitamin D; are not allergic to the sun and are able to travel to Aberdeen's Foresterhill campus. They will be given either vitamin D supplements or have a series of UVB therapy treatments currently used to treat dermatology patients at Aberdeen Royal Infirmary.
Professor Anthony Ormerod, Professor of Dermatology at the University of Aberdeen, said: "The problem with being so far north of the equator is the lack of sunlight and there is a seasonal incidence with certain diseases which increases the further you are from the equator.
"Sunlight is our main source of vitamin D but the further you are from the equator the less sun exposure you get. This is a particular problem during winter because the useful UVB rays are filtered out and don't reach us. Unless we take a winter sunshine holiday or vitamin D supplements, we are reliant on the stores of vitamin D that has been built up by the body during the rest of the year."
Professor Helen Macdonald, Professor of Nutrition and Musculoskeletal Health at the University of Aberdeen, said: "We want to see whether giving volunteers vitamin D or artificial UVB light can counter the problem of lack of sunlight and improve our health. Vitamin D is important for bones and vitamin D deficiency has also been linked with cancer, cardiovascular disease and autoimmune diseases such as MS. We will be looking to see whether artificial sunlight or vitamin tablets will keep our immune systems in check.
"Volunteers will be randomised to get either vitamin D tablets containing the same levels that you get in vitamins you buy over-the-counter or they will be given light therapy. Those getting UVB will be given doses that are the same level you would get on a sunny day in Aberdeen during the summer. Blood samples will also be taken to enable us to see what is happening in the body."
Professor Ormerod added: "We're hoping our study will point us towards a way in which we could help improve the health of the community. It's about looking at preventative medicine to help with the disadvantage of not getting enough sun during the winter months."
Explore further: Sunlight and vitamin D findings may help understanding of autoimmune diseases | <urn:uuid:41e184f9-b793-4797-9173-d77b6fb30548> | CC-MAIN-2017-04 | https://medicalxpress.com/news/2014-01-sunshine-immune.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00446-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.950677 | 708 | 3.390625 | 3 |
Bring history alive through American Victory educational programs!
The SS American Victory is the ideal place to enhance your students’ knowledge of major themes in American history. Learn about the importance of the home front in fostering a place in Women’s History and Minority History. Experience the diverse culture of Florida’s maritime history as well as the characteristics that define her as a region. Relive the Cold War Era that transformed the political, economic, and social conditions of our country. Interpret the difference between combat and civilian beliefs and roles. Younger children can learn of core values and characteristics as exemplified by our nation’s veterans and active military such as leadership, dignity, respect and more. Experience these major themes and more with the American Victory Educational Programs.
Did you know that:
- Florida Shipyards produced 240 merchant ships during World War II.
- Forty-five ships were sunk in the Gulf of Mexico during World War II.
- One in 26 Merchant Mariners died during World War II-the highest casualty rate of any service during World War II.
- The Merchant Marine was the only branch of the service to allow women and minorities to serve in combat during World War II.
- Hundreds of World War II merchant ships later served in the Korean and Vietnam Wars.
American Victory education programs offer a fun and educational experience for your group. Go back in time with tours, outreach programs, or special events.
The Educational Programs follow Florida’s Sunshine State Standards and are specially tailored for your group.
Educators will work with you to tailor the program towards your needs. Pre-and post-visit material is available for all educational programs to enhance your educational experience. Picnic tables may be reserved in advance for lunch.
- Educator Resources
- Additional Resources | <urn:uuid:4c2c8444-a4fa-4218-8c26-e47e0aa22ae2> | CC-MAIN-2022-33 | https://www.americanvictory.org/learn/educator-resources/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00667.warc.gz | en | 0.944477 | 370 | 3.109375 | 3 |
Dagmar Hirschfelder: Tronie und Porträt
Rezensiert von: Lyckle de Vries, Groningen
Some critics use the word 'tronie' as the name of a genre comparable to that of landscape or portrait but this a recent development, not justified by the way in which seventeenth-century sources apply the word. Hirschfelder rightly concludes that we don’t have a useable definition for this class of paintings yet, and she tries to find it by studying the similarities and differences between tronies and related groups of paintings. Every single aspect of this limited subject is carefully analysed and this monolith of solidity and thoroughness could be considered a classic in the field of art history, if only an editor had been hired to reduce its text by 30%, reorganising it and making superfluous the many repetitions that seem to be unavoidable in the book’s present structure. This is my main objection to an otherwise admirable book.
The author concludes that the makers of 'tronies' aimed for the depiction of highly interesting types of figures with characteristic physiognomies, and at the same time tried to demonstrate their virtuosity in all aspects of their craft. She states that the 'tronie' originated in Leiden and Haarlem in the third decade of the seventeenth century, where Jan Lievens, Rembrandt and Frans Hals were its inventors. This choice implies a definition: a painting is a 'tronie' when it has the characteristics these three artists gave to their 'tronies'. The author’s criteria are mostly negative; a 'tronie' is a head or a half-figure without significant attributes or actions, not identified as a figure from history, literature, mythology or the Bible. The face is not stereotyped as the representative of one of the social or psychological groups we know from genre painting, such as the quick-tempered 'Capitano', the miser or the glutton. Although the model can be identified in some cases, the 'tronie' is no portrait.
Hirschfelder adds one more criterion: ‘realism’ (I will come back to the use of this term). For this reason she excludes all sixteenth-century and early seventeenth-century heads, busts and half figures. They are not 'tronies', but works of precursors, the author states. Bloemaert and Van Honthorst are excluded also; from 1621 onwards, they elaborated caravaggesque examples in which lighting effects and facial expressions were studied, but the Utrecht masters characterised their protagonists by manipulating and intensifying well-known stereotypes, not working 'naer het leeven' (ad vivum). Neither did they experiment with a free and personally varied brush stroke as Hals, Lievens and Rembrandt did.
Pieter Bruegel and his son Pieter the younger are possible exceptions: some of their expressive heads may or may not have been done after life, and their example was imitated by specialists in low-life genre. Hirschfelder treats the 'tronies' of Adriaen van Ostade and others in a separate chapter as being outside her field of research. They certainly are 'tronies', but they are too easily recognised as such, whereas her special interest is the exploration of the terra incognita in between the 'tronie' and other genres such as the portrait (as the title of her book indicates). Giving Van Ostade and his predecessors from the Southern Netherlands their due would have upset Hirschfelder’s chronology, because the Brueghels were evidently earlier than Lievens and Hals.
These introductory remarks are not meant to belittle Hirschfelder’s work. One might follow Hirschfelder in saying that Lievens and Rembrandt initiated a new form of art - the 'tronie' - that was to become very successful for half a century. One might decide also that the 'tronie' was nearly a century old when Lievens and Rembrandt successfully renewed or reinvented a venerable tradition. Earlier artists are seen as precursors in one case, and source of inspiration in the other; the difference is no more than a play on words. The author’s choice focuses attention on what was new and inspiring in the work of these two pioneers. A detailed analysis of the Leiden 'tronies' made by Lievens and Rembrandt forms the basis upon which the field is mapped out. Hirschfelder rightly concludes that Jan Lievens took the lead; he developed the tronie from the older tradition of half figures, such as Evangelists, Apostles et cetera, by concentrating on the heads and making them anonymous by eliminating their attributes. These heads are used to study special effects of lighting, to observe physiognomies and their expressions, and to develop a greater freedom in handling the brush than other subjects allowed. The word ‘study’ should not be taken literally; a 'tronie' is a demonstration of artistic prowess and there is not always a direct relation to a more elaborate composition in which the ‘study’ is reused. Rembrandt frequently depicted his own countenance instead of hiring someone else as a model, but both artists worked 'naer het leeven' (after life), depicting aspects of reality .
This approach, Hirschfelder believes, was quintessential because it gave Lievens and Rembrandt the freedom to break away from iconographic traditions and the associated facial stereotypes. Hirschfelder wants tronies to have the effect of being true to life (‘lebensnahe Wirkung’), thanks to an uncompromising rendering of reality (‘Naturnähe im Sinne ungeschönter Darstellung’). Indeed, this is what elevates the Leiden 'tronies' above all earlier attempts, but one could ask if it was wise to make the definition of a new category of paintings hinge on the combination of style and quality, indicated until recently as ‘realism’. This is especially problematic in the case of Frans Floris. For stylistic reasons Floris cannot be considered a forerunner of Lievens and Rembrandt, Hirschfelder says, but he became a pioneer when his head studies reached Dutch seventeenth-century collectors. His 'non-tronies' showed interesting foreshortenings, original effect of lighting, strongly emotional facial expressions, very loose brushstrokes in some cases, and they had no meaningful attributes. They differed in nothing from the new Leiden 'tronies', in other words, apart from their style and their origin. Floris’ head studies were not meant to circulate outside his studio, the author says, but I am not convinced that this is entirely true. Moreover, in Rembrandt’s workshop there was no hard dividing line between marketable 'tronies' and head studies made for studio use.
Most of Frans Hals’ busts and half figures are recognisable as figures from the world of genre: they play musical instruments, smoke a pipe or celebrate their addiction to alcohol. Some have attributes or costumes associating them with the itinerant theatre. Some figures represent social groups such as the fisher boys and girls placed before a landscape of beach and dunes. I prefer to see the 'Malle Babbe' and the so-called 'Gipsy Girl' as genre figures too, but Hirschfelder tends to be lenient, labelling some of Hals’s half figures as 'tronies'. What remains, I think, is a small number of roundels with laughing children. One could wonder why Hals was given such a prominent place in the introductory chapters, when he plays no role of importance in the rest of this book. Hirschfelder’s criterion was Hals’s exceptional combination of a free brush stroke and ‘realism’. After 1631, when Lievens left for England and Rembrandt moved to Amsterdam, the 'tronie' was determined by and large by what had been initiated in Leiden prior to that; it would live on mostly in narrower and wider circles around the last mentioned. There was no ‘school of Hals’ among the makers of tronies.
Hirschfelder took the trouble to demarcate the difference between 'tronies' and portraits as precisely as possible. There are great similarities when only heads or busts are depicted and in both kinds of painting the rendering of faces tends to be true to nature (‘naturgetreue Wiedergabe’). But, due to their function, portraits document the appearance of their sitters as precisely as possible and in this context Hirschfelder speaks of ‘verism’, a kind of super-realism. The freedom of brushstroke on the one hand, the attention to fashionable details of clothing on the other may make it easier to decide what is what, but the difference between a 'portrait historié' and a 'tronie' is not always clear at first sight. The narrative portrait was introduced in the Northern Netherlands in the sixteen-twenties by Gerard van Honthorst. But soon after 1630 portraits appeared in which the sitters were dressed up as the protagonists of a history painting without being identifiable as actors in any biblical, historical or mythological story. Hirschfelder calls this the 'costume portrait' and she is right in stressing the difference between it and the historiated portrait. The first experiments in this direction were not too different from conventional portraits but, thanks to the popularity of the 'tronie', an increasing degree of freedom was noticeable in this new variety of portraits.
The librarian acquiring this book may be tempted to shelve it with the Rembrandt literature, especially after reading the chapter on 'Selbstdarstellungen': paintings in which the artist depicted his own features. The romantic idea that a painter used his art to determine his own identity, as a way to fathom the depths of his soul amazingly survived, or was resuscitated by American authors on Rembrandt’s ‘self portraits’ such as Perry Chapman . Dagmar Hirschfelder rightly counters these antiquated ideas, choosing to side with Ernst van de Wetering . The central idea is that art in the seventeenth century had become liberated enough to be appreciated and collected as art, which stimulated interest in form and style as opposed to content. This tendency is to be observed during the seventeenth century in other genres as well; architectural painting for instance or the townscape in which iconographic traditions and ‘hidden’ moral messages seem to have evaporated almost completely. The 'tronie', with its anonymous models doing and meaning next to nothing, was perfect for collectors who wanted an affordable proof of the mastery of a given painter. This master made himself recognisable by his personal style, his signature and sometimes also by depicting his own features. Van de Wetering explains that the production of personalised ‘collector’s items’ was a new function of the 'tronie' that did not replace its earlier functions.
The place of the 'tronie' among the other genres is unclear. Hirschfelder speaks of the hierarchy of genres as if it were a closed and unalterable system, but I cannot see why we would not be free to change or expand it. For practical reasons I would prefer to call the 'tronie' a genre by itself, but Hirschfelder sees it as a theme (Bildaufgabe) within the wider field of figural painting, i.e. genre and history painting combined. She argues that the 'tronie' was created by figure painters, that there are many borderline cases and that the new genre had no specialists, but I don’t see this as serious problems and one could ask if Rembrandt was not a specialist in 'tronies' in later phases of his development.
In her last chapter, Hirschfelder confronts the distinguishing features of the 'tronie' as she sees it with the art theory of the seventeenth century. She rightly concludes that all these qualities were highly regarded and thus corroborates her earlier statement that a good 'tronie' was a convincing proof of a painter’s mastery. Among the points discussed in these pages is one quality that the author did not mention before: 'painterliness'. Hirschfelder uses the Dutch word 'schilderachtigheid' in parentheses without proposing a German or English alternative and she rightly borrows the definition given by Boudewijn Bakker as "richly varied, colourful and diverse, but also as remarkable, peculiar, distinctive and unusual" . Indeed, there seems to be no better way to characterise the 'tronie' in general than by applying the adjective ‘painterly’ ('malerisch' in German). The author rightly says that the preference for work in a painterly style diminished in the last quarter of the seventeenth century as a result of the increasing vogue for classicism. The 'tronie' thus lost its popularity together with the style it was so closely associated with.
Hirschfelder is also correct in stating that painterliness as defined by Bakker presupposes a close observation of the imperfections of reality. When a painter wanted to record the traits of a drunken peasant, an itinerant musician or a maid scouring kettles, he had to accentuate what was 'remarkable', 'peculiar' and 'distinctive' about his model and the group he or she belonged to. The artist did not create a document on the biography of this one person; he brought the stereotypes and prejudices to life that determined his own perception and that of his buyers. Philips Angel, whose 'Lof der Schilder-Konst' of 1642 Hirschfelder quotes extensively, had his own terminology. What Bakker calls 'remarkable', 'peculiar', and 'distinctive' is 'eyghen' or 'eygentlick' is the language of Angel’s and Rembrandt’s time. An alternative translations of 'eyghen' would be ‘characteristic’ . This makes it superfluous to speak about ‘realism’ as the faithful imitation of reality, openly or masked with words as 'naturgetreue', 'lebensnahe', or 'ungeschönte Darstellung'. But Hirschfelder is right in stressing the fact that many 'tronies' rise above the level of genre-like stereotypes, thanks to the artistic freedom inherent in this new genre.
In conclusion we can say that the genre tronie, its subject matter and its preferred style were so closely intertwined that it is extremely hard to separate them. Hirschfelder is to be applauded for managing to do this all the same. Others may make different choices or reach alternative conclusions to hers, but this will be possible thanks to the exemplary way in which Dagmar Hirschfelder analysed the subject, not omitting a single aspect or ignoring any possible problem. The 'tronie' was one of the few genres in Dutch painting that did not have its own complete survey. Since Hirschfelder’s book, though, we realise what we have been missing.
H. Perry Chapman, Rembrandt’s Self-Portraits. A Study in Seventeenth-Century Identity, Princeton (Princeton University Press), 1990.
E. van de Wetering, ‘De meervoudige functie van Rembrandts zelfportretten’, in: Chr. White a.o., (catalogue of the exhibition) Rembrandt zelf, London, The Hague, Zwolle (Waanders), 1999, 8-37.
N.B. Hirschfelder quotes this title in German, which seems to be incorrect. I quote it here in Dutch, which is not much better.
B. Bakker, 'Schilderachtig: discussions of a seventeenth-century term and concept', Simiolus, 1995 (23), 147-162.
L. de Vries, 'Gerard de Lairesse: The critical vocabulary of an art theorist', Oud Holland, 117 (2004), 79-98. L. de Vries, Verhalen uit kamer, keuken en kroeg, Het Hollandse genre van de 17fr eeuw als vertellende schilderkunst, Amsterdam (A.U.P.), 2005, 180-181.
Lyckle de Vries: [Rezension zu:] Hirschfelder, Dagmar: Tronie und Porträt in der niederländischen Malerei des 17. Jahrhunderts, Berlin 2008. In: H-ArtHist, 09.02.2011. Letzter Zugriff 18.01.2017. <http://arthist.net/reviews/887>.
Dieser Text wird veröffentlicht gemäß der "Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States Licence". Eine Nachnutzung ist für nichtkommerzielle Zwecke in unveränderter Form unter Angabe des Autors bzw. der Autorin und der Quelle gemäß dem obigen Zitationsvermerk zulässig. Bitte beachten Sie dazu die detaillierten Angaben unter http://creativecommons.org/licenses/by-nc-nd/3.0/us/deed.de.
Hirschfelder, Dagmar: Tronie und Porträt in der niederländischen Malerei des 17. Jahrhunderts, Berlin: Gebr. Mann Verlag 2008
ISBN-10: 3-7861-2567-8, 552 S., ¤ 98
Rezension veröffentlicht am: 09.02.2011
Redaktion: Karin Leonhard | <urn:uuid:32bf6e0b-09ef-4c42-9c87-4e2d37af70d1> | CC-MAIN-2017-04 | http://arthist.net/reviews/887 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00027-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.930285 | 3,864 | 2.296875 | 2 |
I select dc motor beacuse are cheap and i can control it well with a closed loop control sistem, with optical encoders.
I look for a lot of motors and finally find this one:
This a 24 V DC motor 40 RPM and 120 W, with a nominal torque of 25 N*m, i built a gear reducer to 4 RPM, as i saw in mechanical engineering books the torque is proportional to velocity, so 40/4=10 and 10*25=250 N*m. 1 Kg*m is equal to 9.8N*m so 250/9.8=25.5Kg*m. This is a lot of torque!
The part form the shoulder to the elbow is 70 cm.
This other part is about 62 cm plus the gripper(i didn't design it yet but more or less it will have about 20 cm).
So i have 70+62+20=152cm. This is the maximus action radio of my robot arm.
Then, if i have 25.5 Kg*m/1.5m=17Kg, i have to subtract the weight of the elbow motor and the wrist but i think i can pick up 5 Kg at the max lenght posible. | <urn:uuid:ee5f07e3-6f87-47b5-b358-987d25969b1e> | CC-MAIN-2022-33 | https://hackaday.io/project/20505-dimer-mkii-large-open-robotic-arm/log/55324-shoulder-movement | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00277.warc.gz | en | 0.922052 | 266 | 1.96875 | 2 |
Posted in Finance, Accounting and Economics Terms, Total Reads: 249
Definition: Automatic Exercise
Automatic Exercise is defined as process where automated exercise of the holder's options takes place, by the Options Clearing Corporation. In case of an in-the-money contract, the strike price is lower than the market price of the instrument so that automatic exercising of this option would produce a profit on this transaction.
The strike price is the price at which one buys the underlying instrument if the contract were exercised. The brokerage firms may have the same policy as the Options Clearing Corporation. The automatic exercise is done if an option is atleast 5 cents in-the-money upon expiration.
For example: - if one buys a call option at 100$ and the stock closes at 100.05$ or higher at the end of trading period on Friday then the option will be exercised automatically. The number of shares multiplied by 100$ will be the amount debited from the option holder’s account even if he has not exercised the option. This was designed to benefit the investor if he fails to exercise his option due to some circumstances. The automatic exercise also is done on the put options as well. If an investor buys a 50$ put and stock closes at 49.95 or lower on closing time Friday then around 50$ multiplied by number of shares amount will be credited into the investor’s bank account. But the automatic exercise does not take into consideration losses to investor. It may also happen that on Monday morning one may be worse off than the call or put option that was automatically exercised.
The point to be understood is that if an investor wants to exercise their option they should do so otherwise inform their broker of the same otherwise the Clearing Corporation has the right to automatic exercise of selling or buying options. | <urn:uuid:5ee4f402-71f9-46ae-be62-cbd3121f2f5e> | CC-MAIN-2017-04 | http://www.mbaskool.com/business-concepts/finance-accounting-economics-terms/14829-automatic-exercise.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00279-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.942168 | 368 | 2.078125 | 2 |
Gary Keith STEAGALD, Petitioner, v. UNITED STATES.
451 U.S. 204 (101 S.Ct. 1642, 68 L.Ed.2d 38)
Gary Keith STEAGALD, Petitioner, v. UNITED STATES.
Argued: Jan. 14, 1981.
Decided: April 21, 1981.
Pursuant to an arrest warrant for one Lyons, Drug Enforcement Administration agents entered petitioner's home to search for Lyons without first obtaining a search warrant. In the course of searching the home the agents found cocaine and other incriminating evidence but did not find Lyons. Petitioner was then arrested and indicted on federal drug charges. His pretrial motion to suppress all evidence uncovered during the search of his home on the ground that it was illegally obtained because the agents had failed to obtain a search warrant was denied by the District Court, and petitioner was convicted. The Court of Appeals affirmed.
1. The Government is precluded from contending in this Court that petitioner lacked an expectation of privacy in his searched home sufficient to prevail on his Fourth Amendment claim, where this argument was never raised in the courts below but rather the Government had made contrary assertions in those courts and acquiesced in their contrary findings. Pp. 208-211.
2. The search in question violated the Fourth Amendment, where it took place in the absence of consent or exigent circumstances. Pp. 211-222.
(a) Absent exigent circumstances or consent, a home may not be searched without a warrant. Two distinct interests were implicated by the search in this caseLyons' interest in being free from an unreasonable seizure and petitioner's interest in being free from an unreasonable search of his home. Because the arrest warrant for Lyons addressed only the former interest, the search of petitioner's home was no more reasonable from petitioner's perspective than it would have been if conducted in the absence of any warrant. The search therefore violated the Fourth Amendment. Pp. 211-216.
(b) Common law, contrary to the Government's assertion, does not furnish precedent for upholding the search in question but rather sheds little light on the narrow issue presented of whether an arrest warrant, as opposed to a search warrant, is adequate to protect the Fourth Amendment interests of persons not named in the warrant, when their home is searched without their consent and in the absence of exigent circumstances. Moreover, the history of the Fourth Amendment strongly suggests that its Framers would not have sanctioned the search in question. Pp. 217-220.
(c) A search warrant requirement under the circumstances of this case will not significantly impede effective law enforcement efforts. An arrest warrant alone suffices to enter a suspect's own residence, and, if probable cause exists, no warrant is required to apprehend a suspected felon in a public place. Moreover, the exigent-circumstances doctrine significantly limits the situations in which a search warrant is needed. And in those situations in which a search warrant is necessary, the inconvenience incurred by the police is generally insignificant. In any event, whatever practical problems there are in requiring a search warrant in cases such as this, they cannot outweigh the constitutional interest at stake in protecting the right of presumptively innocent people to be secure in their homes from unjustified, forcible intrusions by the government. Pp. 220-222.
606 F.2d 540 and 615 F.2d 642, reversed and remanded.
John Richard Young, Atlanta, Ga., for petitioner.
Andrew L. Frey, Washington, D. C., for respondent.
Justice MARSHALL delivered the opinion of the Court.
The issue in this case is whether, under the Fourth Amendment, a law enforcement officer may legally search for the subject of an arrest warrant in the home of a third party without first obtaining a search warrant. Concluding that a search warrant must be obtained absent exigent circumstances or consent, we reverse the judgment of the United States Court of Appeals for the Fifth Circuit affirming petitioner's conviction.
* In early January 1978, an agent of the Drug Enforcement Administration (DEA) was contacted in Detroit, Mich., by a confidential informant who suggested that he might be able to locate Ricky Lyons, a federal fugitive wanted on drug charges. On January 14, 1978, the informant called the agent again, and gave him a telephone number in the Atlanta, Ga., area where, according to the informant, Ricky Lyons could be reached during the next 24 hours. On January 16, 1978, the agent called fellow DEA Agent Kelly Goodowens in Atlanta and relayed the information he had obtained from the informant. Goodowens contacted Southern Bell Telephone Co., and secured the address corresponding to the telephone number obtained by the informant. Goodowens also discovered that Lyons was the subject of a 6-month-old arrest warrant.
Two days later, Goodowens and 11 other officers drove to the address supplied by the telephone company to search for Lyons. The officers observed two men standing outside the house to be searched. These men were Hoyt Gaultney and petitioner Gary Steagald. The officers approached with guns drawn, frisked both men, and, after demanding identification, determined that neither man was Lyons. Several agents proceeded to the house. Gaultney's wife answered the door, and informed the agents that she was alone in the house. She was told to place her hands against the wall and was guarded in that position while one agent searched the house. Ricky Lyons was not found, but during the search of the house the agent observed what he believed to be cocaine. Upon being informed of this discovery, Agent Goodowens sent an officer to obtain a search warrant and in the meantime conducted a second search of the house, which uncovered additional incriminating evidence. During a third search conducted pursuant to a search warrant, the agents uncovered 43 pounds of cocaine. Petitioner was arrested and indicted on federal drug charges.
Prior to trial, petitioner moved to suppress all evidence uncovered during the various searches on the ground that it was illegally obtained because the agents had failed to secure a search warrant before entering the house. Agent Goodowens testified at the suppression hearing that there had been no "physical hinderance" preventing him from obtaining a search warrant and that he did not do so because he believed that the arrest warrant for Ricky Lyons was sufficient to justify the entry and search. The District Court agreed with this view, and denied the suppression motion. Petitioner was convicted, and renewed his challenge to the search in his appeal. A divided Court of Appeals for the Fifth Circuit affirmed the District Court's denial of petitioner's suppression motion. United States v. Gaultney, 606 F.2d 540 (1979). 1 Because the issue presented by this case is an important one 2 that has divided the Circuits, 3 we granted certiorari. 449 U.S. 819, 101 S.Ct. 71, 66 L.Ed.2d 21.
The Government initially seeks to avert our consideration of the Fifth Circuit's decision by suggesting that petitioner may, regardless of the merits of that decision, lack an expectation of privacy in the house sufficient to prevail on his Fourth Amendment claim. This argument was never raised by the Government in the courts below. Moreover, in its brief in opposition to certiorari the Government represented to this Court that the house in question was "petitioner's residence" and was "occupied by petitioner, Gaultney, and Gaultney's wife." Brief in Opposition 1, 3. However, the Government now contends that the record does not clearly show that petitioner had a reasonable expectation of privacy in the house, and hence urges us to remand the case to the District Court for re-examination of this factual question.
We decline to follow the suggested disposition. Aside from arguing that a search warrant was not constitutionally required, the Government was initially entitled to defend against petitioner's charge of an unlawful search by asserting that petitioner lacked a reasonable expectation of privacy in the searched home, or that he consented to the search, or that exigent circumstances justified the entry. The Government, however, may lose its right to raise factual issues of this sort before this Court when it has made contrary assertions in the courts below, when it has acquiesced in contrary findings by those courts, or when it has failed to raise such questions in a timely fashion during the litigation.
We conclude that this is such a case. The Magistrate's report on petitioner's suppression motion, which was adopted by the District Court, characterized the issue as whether an arrest warrant was sufficient to justify the search of "the home of a third person" for the subject of the warrant. App. 12. The Government never sought to correct this characterization on appeal, and instead acquiesced in the District Court's view of petitioner's Fourth Amendment claim. Moreover, during both the trial and the appeal in this case the Government argued successfully that petitioner's connection with the searched home was sufficient to establish his constructive possession of the cocaine found in a suitcase in the closet of the house. 4 Moreover, the Court of Appeals concluded, as had the Magistrate and the District Court, that petitioner's Fourth Amendment claim involved the type of warrant necessary to search "premises belonging to a third party." 606 F.2d, at 544. Again, the Government declined to disturb this characterization. When petitioner sought review in this Court, the Government could have filed a cross-petition for certiorari suggesting, as it does now, that the case be remanded to the District Court for further proceedings. Instead, the Government argued that further review was unnecessary. Finally, the Government in its opposition to certiorari expressly represented that the searched home was petitioner's residence.
Thus, during the course of these proceedings the Government has directly sought to connect petitioner with the house, has acquiesced in statements by the courts below characterizing the search as one of petitioner's residence, and has made similar concessions of its own. Now, two years after petitioner's trial, the Government seeks to return the case to the District Court for a re-examination of this factual issue. 5 The tactical advantages to the Government of this disposition are obvious, for if the Government prevailed on this claim upon a remand, it would be relieved of the task of defending the judgment of the Court of Appeals before this Court. We conclude, however, that the Government, through its assertions, concessions, and acquiescence, has lost its right to challenge petitioner's assertion that he possessed a legitimate expectation of privacy in the searched home. We therefore turn to the merits of petitioner's claim.
The question before us is a narrow one. 6 The search at issue here took place in the absence of consent or exigent circumstances. Except in such special situations, we have consistently held that the entry into a home to conduct a search or make an arrest is unreasonable under the Fourth Amendment unless done pursuant to a warrant. See Payton v. New York, 445 U.S. 573, 100 S.Ct. 1371, 63 L.Ed.2d 639 (1980); Johnson v. United States, 333 U.S. 10, 13-15, 68 S.Ct. 367, 368-369, 92 L.Ed. 436 (1948). Thus, as we recently observed: "In terms that apply equally to seizures of property and to seizures of persons, the Fourth Amendment has drawn a firm line at the entrance to the house. Absent exigent circumstances, that threshold may not reasonably be crossed without a warrant." Payton v. New York, supra, 445 U.S., at 590, 100 S.Ct., at 1382. See, Coolidge v. New Hampshire, 403 U.S. 443, 474-475, 477-478, 91 S.Ct. 2022, 2042-2043, 2044, 29 L.Ed.2d 564 (1971); Jones v. United States, 357 U.S. 493, 497-498, 78 S.Ct. 1253, 1256-1257, 2 L.Ed.2d 514 (1958); Agnello v. United States, 269 U.S. 20, 32-33, 46 S.Ct. 4, 6, 70 L.Ed.2d 145 (1925). Here, of course, the agents had a warrantone authorizing the arrest of Ricky Lyons. However, the Fourth Amendment claim here is not being raised by Ricky Lyons. Instead, the challenge to the search is asserted by a person not named in the warrant who was convicted on the basis of evidence uncovered during a search of his residence for Ricky Lyons. Thus, the narrow issue before us is whether an arrest warrantas opposed to a search warrantis adequate to protect the Fourth Amendment interests of persons not named in the warrant, when their homes are searched without their consent and in the absence of exigent circumstances.
The purpose of a warrant is to allow a neutral judicial officer to assess whether the police have probable cause to make an arrest or conduct a search. As we have often explained, the placement of this checkpoint between the Government and the citizen implicitly acknowledges that an "officer engaged in the often competitive enterprise of ferreting out crime," Johnson v. United States, supra, 333 U.S. at 14, 68 S.Ct., at 369, may lack sufficient objectivity to weigh correctly the strength of the evidence supporting the contemplated action against the individual's interests in protecting his own liberty and the privacy of his home. Coolidge v. New Hampshire, supra, 403 U.S., at 449-451, 91 S.Ct., at 2029-2030; McDonald v. United States, 335 U.S. 451, 455-456, 69 S.Ct. 191, 193, 93 L.Ed. 153 (1948). However, while an arrest warrant and a search warrant both serve to subject the probable-cause determination of the police to judicial review, the interests protected by the two warrants differ. An arrest warrant is issued by a magistrate upon a showing that probable cause exists to believe that the subject of the warrant has committed an offense and thus the warrant primarily serves to protect an individual from an unreasonable seizure. A search warrant, in contrast is issued upon a showing of probable cause to believe that the legitimate object of a search is located in a particular place, and therefore safeguards an individual's interest in the privacy of his home and possessions against the unjustified intrusion of the police.
Thus, whether the arrest warrant issued in this case adequately safeguarded the interests protected by the Fourth Amendment depends upon what the warrant authorized the agents to do. To be sure, the warrant embodied a judicial finding that there was probable cause to believe the Ricky Lyons had committed a felony, and the warrant therefore authorized the officers to seize Lyons. However, the agents sought to do more than use the warrant to arrest Lyons in a public place or in his home; instead, they relied on the warrant as legal authority to enter the home of a third person based on their belief that Ricky Lyons might be a guest there. Regardless of how reasonable this belief might have been, it was never subjected to the detached scrutiny of a judicial officer. Thus, while the warrant in this case may have protected Lyons from an unreasonable seizure, it did absolutely nothing to protect petitioner's privacy interest in being free from an unreasonable invasion and search of his home. Instead, petitioner's only protection from an illegal entry and search was the agent's personal determination of probable cause. In the absence of exigent circumstances, we have consistently held that such judicially untested determinations are not reliable enough to justify an entry into a person's home to arrest him without a warrant, or a search of a home for objects in the absence of a search warrant. Payton v. New York, supra; Johnson v. United States, supra. We see no reason to depart from this settled course when the search of a home is for a person rather than an object. 7
A contrary conclusionthat the police, acting alone and in the absence of exigent circumstances, may decide when there is sufficient justification for searching the home of a third party for the subject of an arrest warrantwould create a significant potential for abuse. Armed solely with an arrest warrant for a single person, the police could search all the homes of that individual's friends and acquaintances. See, e. g., Lankford v. Gelston, 364 F.2d 197 (CA4 1966) (enjoining police practice under which 300 homes were searched pursuant to arrest warrants for two fugitives). Moreover, an arrest warrant may serve as the pretext for entering a home in which the police have a suspicion, but not probable cause to believe, that illegal activity is taking place. Cf. Chimel v. California, 395 U.S. 752, 767, 89 S.Ct. 2034, 2042, 23 L.Ed.2d 685 (1969). The Government recognizes the potential for such abuses, 8 but contends that existing remediessuch as motions to suppress illegally procured evidence and damages actions for Fourth Amendment violationsprovide adequate means of redress. We do not agree. As we observed on a previous occasion, "the Fourth Amendment is designed to prevent, not simply to redress, unlawful police action." Chimel v. California, supra, at 766, n. 12, 89 S.Ct., at 2042, n. 12. Indeed, if suppression motions and damages actions were sufficient to implement the Fourth Amendment's prohibition against unreasonable searches and seizures, there would be no need for the constitutional requirement that in the absence of exigent circumstances a warrant must be obtained for a home arrest or a search of a home for objects. We have instead concluded that in such cases the participation of a detached magistrate in the probable-cause determination is an essential element of a reasonable search or seizure, and we believe that the same conclusion should apply here. 9
In sum, two distinct interests were implicated by the search at issue hereRicky Lyons' interest in being free from an unreasonable seizure and petitioner's interest in being free from an unreasonable search of his home. Because the arrest warrant for Lyons addressed only the former interest, the search of petitioner's home was no more reasonable from petitioner's perspective than it would have been if conducted in the absence of any warrant. Since warrantless searches of a home are impermissible absent consent or exigent circumstances, we conclude that the instant search violated the Fourth Amendment.
The Government concedes that this view is "apparently logical," that it furthers the general policies underlying the Fourth Amendment, and that it "has the virtue of producing symmetry between the law of entry to conduct a search for things to be seized and the law of entry to conduct a search for persons to be seized." Brief for United States 36. Yet we are informed that this conclusion is "not without its flaws" in that it is contrary to common-law precedent and creates some practical problems of law enforcement. We treat these contentions in turn.
* The common law may, within limits, 10 be instructive in determining what sorts of searches the Framers of the Fourth Amendment regarded as reasonable. See, e. g., Payton v. New York, 445 U.S., at 591, 100 S.Ct., at 1382. The Government contends that at common law an officer could forcibly enter the home of a third party to execute an arrest warrant. To be sure, several commentators do suggest that a constable could "break open doors" to effect such an arrest. See 1 J. Chitty, Criminal Law *57 (Chitty); M. Foster, Crown Law 320 (1762) (Foster); 2 M. Hale, Pleas of the Crown 116-117 (1st Am. ed. 1847) (Hale). But see 4 E. Coke, Institutes *177. As support for this proposition, these commentators all rely on a single decision, Semayne's Case, 5 Co.Rep. 91a, 92b-93a, 77 Eng.Rep. 194, 198 (K.B.1603). 11 See 1 Chitty *57; Foster 320; 2 Hale 116. Although that case involved only the authority of a sheriff to effect civil service on a person within his own home, the court noted in dictum that a person could not "escape the ordinary process of law" by seeking refuge in the home of a third party. 5 Co.Rep., at 93a, 77 Eng.Rep., at 198. However, the language of the decision, while not free from ambiguity, suggests that forcible entry into a third party's house was permissible only when the person to be arrested was pursued to the house. The decision refers to a person who "flies" to another's home, ibid., and the annotation notes that "in order to justify the breaking of the outer door; after denial on request to take a person . . . in the house of a stranger, it must be understood . . . that the person upon a pursuit taketh refuge in the house of another." Id., at 93a, n. (I), 77 Eng.Rep., at 198, n. (I) (emphasis in original). The common-law commentators appear to have adopted this limitation. See 1 Chitty *57 (sheriff may enter third parties' home "if the offender fly to it for refuge"); Foster 320 ("For if a Stranger whose ordinary Residence is elsewhere, upon a Pursuit taketh Refuge in the House of another, this is not his Castle, He cannot claim the Benefit of Sanctuary in it"); 2 Hale 116, n. 20 (forcible entry permissible "only upon strong necessity"). We have long recognized that such "hot pursuit" cases fall within the exigent-circumstances exception to the warrant requirement, see Warden v. Hayden, 387 U.S. 294, 87 S.Ct. 1642, 18 L.Ed.2d 782 (1967), and therefore are distinguishable from the routine search situation presented here.
More important, the general question addressed by the common-law commentators was very different from the issue presented by this case. The authorities on which the Government relies were concerned with whether the subject of the arrest warrant could claim sanctuary from arrest by hiding in the home of a third party. See 1 Chitty *57; Foster 320; 2 Hale 116-117. Thus, in Semayne's Case it was observed:
"The house of any one is not a castle or privilege but for himself, and shall not extend to protect any person who flies to his house, or the goods of any other which are brought and conveyed into his house, to prevent a lawful execution, and to escape the ordinary process of law; for the privilege of his house extends only to him and his family, and to his own proper goods." 5 Co.Rep., at 93a, 77 Eng.Rep., at 128.
The common law thus recognized, as have our recent decisions, that rights such as those conferred by the Fourth Amendment are personal in nature, and cannot bestow vicarious protection on those who do not have a reasonable expectation of privacy in the place to be searched. See United States v. Salvucci, 448 U.S. 83, 100 S.Ct. 2547, 65 L.Ed.2d 619 (1980); Rakas v. Illinois, 439 U.S. 128, 99 S.Ct. 421, 58 L.Ed.2d 387 (1978). The issue here, however, is not whether the subject of an arrest warrant can object to the absence of a search warrant when he is apprehended in another person's home, but rather whether the residents of that home can complain of the search. Because the authorities relied on by the Government focus on the former question without addressing the latter, we find their usefulness limited. Indeed, if anything, the little guidance that can be gleaned from common-law authorities undercuts the Government's position. The language of Semayne's Case quoted above, for example, suggests that although the subject of an arrest warrant could not find sanctuary in the home of the third party, the home remained a "castle or privilege" for its residents. Similarly, several commentators suggested that a search warrant, rather than an arrest warrant, was necessary to fully insulate a constable from an action for trespass brought by a party whose home was searched. See, e. g., 1 Chitty *57; 2 Hale 116-117, 151.
While the common law thus sheds relatively little light on the narrow question before us, the history of the Fourth Amendment strongly suggests that its Framers would not have sanctioned the instant search. The Fourth Amendment was intended partly to protect against the abuses of the general warrants that had occurred in England and of the writs of assistance used in the Colonies. See Payton v. New York, 445 U.S., at 608-609, 100 S.Ct., at 1391-1392 (WHITE, J., dissenting); Boyd v. United States, 116 U.S. 616, 624-629, 6 S.Ct. 524, 529-532, 29 L.Ed. 746 (1886); N. Lasson, The History and Development of the Fourth Amendment to the United States Constitution 13-78 (1937). The general warrant specified only an offensetypically seditious libeland left to the discretion of the executing officials the decision as to which persons should be arrested and which places should be searched. Similarly, the writs of assistance used in the Colonies noted only the object of the searchany uncustomed goodsand thus left customs officials completely free to search any place where they believed such goods might be. The central objectionable feature of both warrants was that they provided no judicial check on the determination of the executing officials that the evidence available justified an intrusion into any particular home. Stanford v. Texas, 379 U.S. 476, 481-485, 85 S.Ct. 506, 509-512, 13 L.Ed.2d 431 (1965). An arrest warrant, to the extent that it is invoked as authority to enter the homes of third parties, suffers from the same infirmity. 12 Like a writ of assistance, it specifies only the object of a searchin this case, Ricky Lyonsand leaves to the unfettered discretion of the police the decision as to which particular homes should be searched. We do not believe that the Framers of the Fourth Amendment would have condoned such a result.
The Government also suggests that practical problems might arise if law enforcement officers are required to obtain a search warrant before entering the home of a third party to make an arrest. 13 The basis of this concern is that persons, as opposed to objects, are inherently mobile, and thus officers seeking to effect an arrest may be forced to return to the magistrate several times as the subject of the arrest warrant moves from place to place. We are convinced, however, that a search warrant requirement will not significantly impede effective law enforcement efforts.
First, the situations in which a search warrant will be necessary are few. As noted in Payton v. New York, supra, at 602-603, 100 S.Ct., at 1388-1389, an arrest warrant alone will suffice to enter a suspect's own residence to effect his arrest. Furthermore, if probable cause exists, no warrant is required to apprehend a suspected felon in a public place. United States v. Watson, 423 U.S. 411, 96 S.Ct. 820, 46 L.Ed.2d 598 (1976). Thus, the subject of an arrest warrant can be readily seized before entering or after leaving the home of a third party. 14 Finally, the exigent-circumstances doctrine significantly limits the situations in which a search warrant would be needed. For example, a warrantless entry of a home would be justified if the police were in "hot pursuit" of a fugitive. See United States v. Santana, 427 U.S. 38, 42-43, 96 S.Ct. 2406, 2409-2410, 49 L.Ed.2d 300 (1976); Warden v. Hayden, 387 U.S. 294, 87 S.Ct. 1642, 18 L.Ed.2d 782 (1967). Thus, to the extent that searches for persons pose special problems, we believe that the exigent-circumstances doctrine is adequate to accommodate legitimate law enforcement needs.
Moreover, in those situations in which a search warrant is necessary, the inconvenience incurred by the police is simply not that significant. First, if the police know of the location of the felon when they obtain an arrest warrant, the additional burden of obtaining a search warrant at the same time is miniscule. The inconvenience of obtaining such a warrant does not increase significantly when an outstanding arrest warrant already exists. In this case, for example, Agent Goodowens knew the address of the house to be searched two days in advance, and planned the raid from the federal courthouse in Atlanta where, we are informed, three full-time magistrates were on duty. In routine search cases such as this, the short time required to obtain a search warrant from a magistrate will seldom hinder efforts to apprehend a felon. Finally, if a magistrate is not nearby, a telephonic search warrant can usually be obtained. See Fed.Rule Crim.Proc. 41(c)(1), (2).
Whatever practical problems remain, however, cannot outweigh the constitutional interests at stake. Any warrant requirement impedes to some extent the vigor with which the Government can seek to enforce its laws, yet the Fourth Amendment recognizes that this restraint is necessary in some cases to protect against unreasonable searches and seizures. We conclude that this is such a case. The additional burden imposed on the police by a warrant requirement is minimal. In contrast, the right protectedthat of presumptively innocent people to be secure in their homes from unjustified, forcible intrusions by the Governmentis weighty. Thus, in order to render the instant search reasonable under the Fourth Amendment, a search warrant was required.
Accordingly, the judgment of the Court of Appeals is reversed, and the case is remanded to that court for further proceedings consistent with this opinion.
THE CHIEF JUSTICE concurs in the judgment.
Justice REHNQUIST, with whom Justice WHITE joins, dissenting.
The Court's opinion reversing petitioner's conviction proceeds in a pristinely simple manner: Steagald had a Fourth Amendment privacy interest in the dwelling entered by the police, and even though the police entered the premises for the sole purpose of executing a valid arrest warrant for Lyons, a fugitive from justice, whom they had probable cause to believe was within, the arrest warrant was not sufficient absent exigent circumstances to justify invading Steagald's privacy interest in the dwelling. Petitioner Steagald's privacy interest is different from Lyons' interest in being free from an unreasonable seizure, according to the Court, and the arrest warrant only validated the invasion of the latter. In the words of the Court:
"The search of petitioner's home was no more reasonable from petitioner's perspective than it would have been if conducted in the absence of any warrant. Since warrantless searches of a home are impermissible absent consent or exigent circumstances, we conclude that the instant search violated the Fourth Amendment." Ante, at 216.
This "reasoning" not only assumes the answer to the question presentedwhether the search of petitioner's dwelling could be undertaken without a search warrantbut also conveniently ignores the critical fact in this case, the existence of an arrest warrant for a fugitive believed on the basis of probable cause to be in the dwelling. The Court assumes that because the arrest warrant did not specifically address petitioner's privacy interest it is of no further relevance to the case. Incidental infringements of distinct Fourth Amendment interests may, however, be reasonable when they occur in the course of executing a valid warrant addressed to other interests. In Dalia v. United States, 441 U.S. 238, 99 S.Ct. 1682, 60 L.Ed.2d 177 (1979), the Court rejected the argument that a separate search warrant was required before police could enter a business office to install an eavesdropping device when a warrant authorizing the eavesdropping itself had already been obtained. As the Court put it: "This view of the Warrant Clause parses too finely the interests protected by the Fourth Amendment. Often in executing a warrant the police may find it necessary to interfere with privacy rights not explicitly considered by the judge who issued the warrant." Id., at 257, 99 S.Ct., at 1693 (emphasis supplied). In Payton v. New York, 445 U.S. 573, 100 S.Ct. 1371, 63 L.Ed.2d 639 (1980), the Court rejected the suggestion that a separate search warrant was required before police could execute an arrest warrant by entering the home of the subject of the warrant. Although the subject of the warrant had a Fourth Amendment interest in the privacy of his dwelling quite distinct from the interest in being free from unreasonable seizures addressed by the arrest warrant, the Court concluded that it was "constitutionally reasonable to require him to open his doors to the officers of the law." Id., at 602-603, 100 S.Ct., at 1388-1389.
This case, therefore, cannot be resolved by the simple Aristotelian syllogism which the Court employs. Concluding as it does that the arrest warrant did not address the privacy interest affected by the search by no means ends the matter; it simply presents the issue for decision. Resolution of that issue depends upon a balancing of the "need to search against the invasion which the search entails." Camara v. Municipal Court of San Francisco, 387 U.S. 523, 537, 87 S.Ct. 1727, 1735, 18 L.Ed.2d 930 (1967). Here, as in all Fourth Amendment cases, "reasonableness is still the ultimate standard." Id., at 539, 87 S.Ct., at 1736. See Wyman v. James, 400 U.S. 309, 318, 91 S.Ct. 381, 386, 27 L.Ed.2d 408 (1971); Marshall v. Barlow's, Inc., 436 U.S. 307, 315-316, 98 S.Ct. 1816, 1822, 56 L.Ed.2d 305 (1978). In determining the reasonableness of dispensing with the requirement of a separate search warrant in this case, I believe that the existence of a valid arrest warrant is highly relevant.
The government's interests in the warrantless entry of a third-party dwelling to execute an arrest warrant are compelling. The basic problem confronting police in such situations is the inherent mobility of the fugitive. By definition, the police have probable cause to believe that the fugitive is in a dwelling which is not his home. He may stay there for a week, a day, or 10 minutes. Fugitives from justice tend to be mobile, and police officers will generally have no way of knowing whether the subject of an arrest warrant will be at the dwelling when they return from seeking a search warrant. See United States v. McKinney, 379 F.2d 259, 263 (CA6 1967); State v. Jordan, 288 Or. 391, 400-401, 605 P.2d 646, 651 (1980) (en banc). Imposition of a search warrant requirement in such circumstances will frustrate the compelling interests of the government and indeed the public in the apprehension of those subject to outstanding arrest warrants.
The Court's responses to these very real concerns are singularly unpersuasive. It first downplays them by stating that "the situations in which a search warrant will be necessary are few," ante, at 221, because no search warrant is necessary to arrest a suspect at his home and, if the suspect is at another's home, the police need only wait until he leaves, since no search warrant is needed to arrest him in a public place. Ibid. These beguilingly simply answers to a serious law enforcement problem simply will not wash. Criminals who know or suspect they are subject to arrest warrants would not be likely to return to their homes, and while "the police could reduce the likelihood of escape by staking out all possible exits . . . the costs of such a stakeout seems excessive in an era of rising crime and scarce police resources." Payton v. New York, supra, at 619, 100 S.Ct., at 1397 (WHITE, J., dissenting). The Court's ivory tower misconception of the realities of the apprehension of fugitives from justice reaches its apogee when it states: "In routine search cases such as this, the short time required to obtain a search warrant from a magistrate will seldom hinder efforts to apprehend a felon." Ante, at 222. The cases we are considering are not "routine search cases." They are cases of attempted arrest, pursuant to a warrant, when the object of the arrest may flee at any time including the "short time" during which the police are endeavoring to obtain a search warrant.
At the same time the interference with the Fourth Amendment privacy interests of those whose homes are entered to apprehend the felon is not nearly as significant as suggested by the Court. The arrest warrant serves some of the functions a separate search warrant would. It assures the occupants that the police officer is present on official business. The arrest warrant also limits the scope of the search, specifying what the police may search for i. e., the subject of the arrest warrant. No general search is permitted, but only a search of those areas in which the object of the search might hide. See Fisher v. Volz, 496 F.2d 333, 343 (CA3 1974); State v. Jordan, supra, at 400-401, 605 P.2d, at 651; United States v. Cravero, 545 F.2d 406, 421, nn. 1, 2 (CA5 1976), cert. denied, 429 U.S. 1100, 97 S.Ct. 1123, 51 L.Ed.2d 549 and 430 U.S. 983, 97 S.Ct. 1679, 52 L.Ed.2d 377 (1977). Indeed there may be no intrusion on the occupant's privacy at all, since if present the suspect will have the opportunity to voluntarily surrender at the door. Even if the suspect does not surrender but secretes himself within the house, the occupant can limit the search by pointing him out to the police. It is important to remember that the contraband discovered during the entry and search for Lyons was in plain view, and was discovered during a "sweep search" for Lyons, not a probing of drawers or cabinets for contraband. United States v. Gaultney, 606 F.2d 540, 544 (1979).
Because the burden on law enforcement officers to obtain a separate search warrant before entering the dwelling of a third party to execute a concededly valid arrest warrant is great, and carries with it a high possibility that the fugitive named in the arrest warrant will escape apprehension, I would conclude that the application of the traditional "reasonableness" standard of the Fourth Amendment does not require a separate search warrant in a case such as this.
This conclusion is supported by the common law as it existed at the time of the framing of the Fourth Amendment, which incorporated the standard of "reasonableness." As the Court noted last Term in Payton : "An examination of the common-law understanding of an officer's authority to arrest sheds light on the obviously relevant, if not entirely dispositive, consideration of what the Framers of the Amendment might have thought to be reasonable." 445 U.S., at 591, 100 S.Ct., at 1382-1383; see also id., at 604, 100 S.Ct., at 1389 (WHITE, J., dissenting). The duty of the populace to aid in the apprehension of felons was well established at common law, see Roberts v. United States, 445 U.S. 552, 557, 100 S.Ct. 1358, 1362-1363, 63 L.Ed.2d 622 (1980), and in light of the overriding interest in apprehension, the common law permitted officers to enter the dwelling of third parties when executing an arrest warrant. Chitty wrote that "the house of a third person, if the offender fly to it for refuge, is not privileged, but may be broken open after the usual demand; for it may even be so upon civil process." 1 J. Chitty, Criminal Law *57 (hereafter Chitty). Gabbett agreed: "Neither is the house of a third person, if the offender fly to it for refuge, privileged, but it may be broken open, after the usual demand; for it may be even so upon civil process." 2 J. Gabbett, Criminal Law 142 (1843) (hereafter Gabbett). Hale noted that an officer could forcibly enter the house of the subject of an arrest warrant, "and so much more may he break open the house of another person to take him, for so the sheriff may do upon a civil process." 2 M. Hale, Pleas of the Crown, 117 (1736) (hereafter Hale). See also M. Foster, Crown Law 320 (1762). 1 A 17th-century work on constables noted:
"It is the chief part of their office to represse fellony, and albeit it be a man's house he doth dwell in, which they doe suspect the fellon to be in, yet they may enter in there to search; and if the owner of the house, upon request, will not open his dores, it seems the officer may break open the dores upon him to come in to search." W. Sheppard, The Offices of Constables, ch. 8, § 2, no. 4 (c. 1650) (quoted in T. Taylor, Two Studies in Constitutional Interpretation 28-29 (1969)).
The leading authority, Semayne's Case, 5 Co.Rep. 91a, 93a, 77 Eng.Rep. 194, 198 (K.B.1603), recognized that: "the house of any one is not a castle or privilege but for himself, and shall not extend to protect any person who flies to his house . . . to prevent a lawful execution, and to escape the ordinary process of law . . . and therefore in such cases after denial on request made, the sheriff may break the house." In Ratcliffe v. Burton, 3 Bos. & Pul. 223, 230, 127 Eng.Rep. 123, 126-127 (C.P.1802), Judge Heath ruled that before breaking doors, officers must announce their authority, because a contrary rule "must equally hold good in cases of process upon escape, where the party has taken refuge in the house of a stranger. Shall it be said that in such case the officer may break open the outer door of a stranger's house without declaring the authority under which he acts. . . .?" Thus no distinction was recognized between authority to enter the suspect's home and that of a stranger. See also Commonwealth v. Reynolds, 120 Mass. 190, 196-197 (1876); cf. State v. Brown, 5 Del. Harrington 505 (1854). 2
The Court argues that the common-law authorities are not relevant because they do not consider the rights of third parties whose dwellings were entered but only the rights of the arrestee. Ante, at 218-219. This is not so. The authorities typically concern the right of the third party to resist the officer's attempted entry or the offense committed by the officer against the third party in entering. See, e. g., Commonwealth v. Reynolds, supra ; 1 Chitty *57-*58; 2 Hale 117; 1 Russell 519-521.
The basic error in the Court's treatment of the common law is its reliance on the adage that "a man's home is his castle." Though there is undoubtedly early case support for this in the common law, it cannot be accepted as an uncritical statement of black letter law which answers all questions in this area. William Pitt, when he was Prime Minister of England, used it with telling effect in a speech on the floor of the House of Commons; but parliamentary speaking ability and analytical legal ability ought not to be equated with one another. It is clear that the privilege of the home did not extend when the King was a party, i.e., when a warrant in a criminal case had been issued. See 1 Russell 520; 2 Gabbett 141; Burdett v. Abbott, 14 East. 1, 79, 104 Eng.Rep. 501, 531 (K.B.1811); Commonwealth v. Reynolds, supra, at 196. That a man's home may be his castle in civil cases, but not in criminal cases, was recognized as far back as the Year Books. See Y.B. 13 Edw. IV, f. 9a (quoted in Burdett, supra, at 79, 104 Eng.Rep., at 531). The suggestion in the Court's opinion, ante, at 219, that "the language of Semayne's Case . . . . suggests that although the subject of an arrest warrant could not find sanctuary in the home of the third party, the home remained a 'castle or privilege' for its residents," is thus completely unfounded in the present context.
An officer could break into one's own home to execute an arrest warrant for the owner, and "so much more may he break open the house of another person to take him," 2 Hale 117. Entry into the house of a third party to effect arrest was considered to follow a fortiori from the accepted entry into the home of the subject of the arrest warrant himself. This was because those in the home of a third party had no protection against civil process, let alone criminal process. See 1 Chitty *57; 2 Gabbett 142; 2 Hale 117. See generally Wilgus, Arrest Without a Warrant, 22 Mich.L.Rev. 798, 800-801 (1924). At common law the Sovereign's keycriminal processunlocked all doors, whether to apprehend the owner or someone else.
While I cannot subscribe to the Court's decision today, I will not falsely cry "wolf" in this dissent. The decision rests on a very special set of facts, and with a change in one or more of them it is clear that no separate search warrant would be required even under the reasoning of the Court.
On the one side Payton makes clear that an arrest warrant is all that is needed to enter the suspect's "home" to effect the arrest. 445 U.S., at 602-603, 100 S.Ct., at 1388-1389. If a suspect has been living in a particular dwelling for any significant period, say a few days, it can certainly be considered his "home" for Fourth Amendment purposes, even if the premises are owned by a third party and others are living there, and even if the suspect concurrently maintains a residence elsewhere as well. In such a case the police could enter the premises with only an arrest warrant. On the other side, the more fleeting a suspect's connection with the premises, such as when he is a mere visitor, the more likely that exigent circumstances will exist justifying immediate police action without departing to obtain a search warrant. The practical damage done to effective law enforcement by today's decision, without any basis in the Constitution, may well be minimal if courts carefully consider the various congeries of facts in the actual case before them.
The genuinely unfortunate aspect of today's ruling is not that fewer fugitives will be brought to book, or fewer criminals apprehended, though both of these consequences will undoubtedly occur; the greater misfortune is the increased uncertainty imposed on police officers in the field, committing magistrates, and trial judges, who must confront variations and permutations of this factual situation on a day-to-day basis. They will, in their various capacities, have to weigh the time during which a suspect for whom there is an outstanding arrest warrant has been in the building, whether the dwelling is the suspect's home, how long he has lived there, whether he is likely to leave immediately, and a number of related and equally imponderable questions. Certainty and repose, as Justice Holmes said, may not be the destiny of man, but one might have hoped for a higher degree of certainty in this one narrow but important area of the law than is offered by today's decision.
CC∅ | Transformed by Public.Resource.Org
The court relied on a previous decision in the Circuit that held that "when an officer holds a valid arrest warrant and reasonably believes that its subject is within premises belonging to a third party, he need not obtain a search warrant to enter for the purpose of arresting the subject." United States v. Cravero, 545 F.2d 406, 421 (1976), cert. denied, 430 U.S. 983, 97 S.Ct. 1679, 52 L.Ed.2d 377 (1977). Circuit Judge Kravitch dissented on the ground that the information known to the agents was insufficient to establish a reasonable belief that Lyons could be found in the house to be searched. 606 F.2d, at 548. On the petition for rehearing, Judge Kravitch, again in dissent, contended that the majority's decision announced a "rule of questionable validity and wisdom" and represented a "disturbing erosion of the Fourth Amendment rights of third parties." United States v. Gaultney, 615 F.2d 642, 644 (1980).
Last Term we noted that this question remained unresolved. See Payton v. New York, 445 U.S. 573, 583, 100 S.Ct. 1371, 1378, 63 L.Ed.2d 639 (1980).
Three Circuits have held that in the absence of exigent circumstances a search warrant is required before law officers may enter the home of
a third party to execute an arrest warrant. See Government of Virgin Islands v. Gereau, 502 F.2d 914, 928 (CA3 1974), cert. denied 420 U.S. 909, 95 S.Ct. 829, 42 L.Ed.2d 839 (1975); Wallace v. King, 626 F.2d 1157, 1158-1159 (CA4 1980), cert. pending, No. 80-503; United States v. Prescott, 581 F.2d 1343, 1347-1350 (CA9 1978). Two Circuits have joined the Court of Appeals in this case in adopting the contrary view that a search warrant is not required in such situations if the police have an arrest warrant and reason to believe that the person to be arrested is within the home to be searched. See United States v. McKinney, 379 F.2d 259, 262-263 (CA6 1967); United States v. Harper, 550 F.2d 610, 612-614 (CA10), cert. denied, 434 U.S. 837, 98 S.Ct. 128, 54 L.Ed.2d 99 (1977). The Second Circuit has suggested in dictum that it subscribes to this latter view, see United States v. Manley, 632 F.2d 978, 983 (1980), while the Court of Appeals for the District of Columbia Circuit has recently indicated that it would require a search warrant in such cases. See United States v. Ford, 180 U.S.App.D.C. 1, 14, n. 45, 553 F.2d 146, 159, n. 45 (1977). Two other Courts of Appeals have left the issue open. See United States v. Adams, 621 F.2d 41, 44, n. 7 (CA1 1980); Rice v. Wolff, 513 F.2d 1280, 1291-1292, and n. 7 (CA8 1975), rev'd on other grounds sub nom. Stone v. Powell, 428 U.S. 465, 96 S.Ct. 3037, 49 L.Ed.2d 1067 (1976). The Seventh Circuit has not considered the question.
While the courts are in conflict, most modern commentators agree that a search warrant is necessary to fully protect the privacy interests of third parties when their home is searched for the subject of an arrest warrant. See 2 W. LaFave, Search and Seizure: A Treatise on the Fourth Amendment 374, 384-385 (1978); Rotenberg & Tanzer, Searching for the Person to Be Seized, 35 Ohio St.L.J. 56, 67-71 (1974); Groot, Arrests in Private Dwellings, 67 Va.L.Rev. 275 (1981); Note, The Neglected Fourth Amendment Problem in Arrest Entries, 23 Stan.L.Rev. 995, 997-999 (1971); Comment, Arresting a Suspect in a Third Party's Home: What is Reasonable?, 72 J.Crim.L. & C. 293 (1981). But see Mascolo, Arrest Warrants and Search Warrants: The Seizure of A Suspect in the Home of a Third Party, 54 Conn.Bar J. 299 (1980).
The Court of Appeals, in accepting this contention, cited the Government's own evidence that several checks and papers bearing petitioner's name were found in the house and that "Steagald, when taken into custody, was wearing only slacks and a long-sleeve shirt, clothing inconsistent with the coldness of the January afternoon, and that once taken inside the . . . house, told a DEA agent that he was cold and requested that she get a sweater or coat for him from the kitchen area." 606 F.2d, at 546-547.
The Government asserts that it was unable to raise this issue in the courts below because both courts had acted before this Court decided United States v. Salvucci, 448 U.S. 83, 100 S.Ct. 2547, 65 L.Ed.2d 619 (1980). We do not find this justification to be compelling. Under the "automatic standing" rule of Jones v. United States, 362 U.S. 257, 80 S.Ct. 725, 4 L.Ed.2d 697 (1960), any person charged with a possessory offense could challenge the search in which the incriminating evidence was obtained. Salvucci overruled Jones and instead limited such Fourth Amendment claims to those persons who had a reasonable expectation of privacy in the area or object of the search. Although Salvucci thus altered Fourth Amendment jurisprudence to some extent, the rationale of that decision was in large part simply an extension of this Court's earlier reasoning in Rakas v. Illinois, 439 U.S. 128, 99 S.Ct. 421, 58 L.Ed.2d 387 (1978). The Rakas decision held that an illegal search violated the Fourth Amendment rights only of those persons who had a "legitimate expectation of privacy in the invaded place." Id., at 143, 99 S.Ct., at 430. While that decision did not directly address the "automatic standing" rule of Jones v. United States, it was clearly an ill omen for the continued vitality of that decision. Since Rakas was decided well before this case was briefed and argued in the Court of Appeals, the Government could easily have raised before that court the question of whether petitioner's Fourth Amendment rights were even implicated by the search at issue here. Indeed, the Government in Salvucci clearly recognized the significance of Rakas, for in that case, despite the contrary authority of Jones v. United States, it argued from the outset that the defendant lacked a sufficient expectation of privacy to challenge the legality of the search under the Fourth Amendment. We are given no explanation why the Government failed to regard Rakas as of equal significance to this case. In any event, Salvucci, was decided before certiorari was sought in this case, but rather than oppose certiorari on the ground that petitioner lacked a legitimate expectation of privacy in the searched home, the Government made explicit concessions to the contrary.
Initially, we assume without deciding that the information relayed to Agent Goodowens concerning the whereabouts of Ricky Lyons would have been sufficient to establish probable cause to believe that Lyons was at the house searched by the agents.
Indeed, the plain wording of the Fourth Amendment admits of no exemption from the warrant requirement when the search of a home is for a person rather than for a thing. As previously noted, absent exigent circumstances or consent, an entry into a private dwelling to conduct a search or effect an arrest is unreasonable without a warrant. The second clause of the Fourth Amendment, which governs the issuance of such warrants, provides that "no Warrants shall issue but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." This language plainly suggests that the same sort of judicial determination must be made when the search of a person's home is for another person as is necessary when the search is for an object. Specifically, absent exigent circumstances the magistrate, rather than the police officer, must make the decision that probable cause exists to believe that the person or object to be seized is within a particular place.
In Payton, of course, we recognized that an arrest warrant alone was sufficient to authorize the entry into a person's home to effect his arrest. We reasoned:
"If there is sufficient evidence of a citizen's participation in a felony to persuade a judicial officer that his arrest is justified, it is constitutionally reasonable to require him to open his doors to the officers of the law. Thus, for Fourth Amendment purposes, an arrest warrant founded on probable cause implicitly carries with it the limited authority to enter a dwelling in which the suspect lives when there is reason to believe the suspect is within." 445 U.S., at 602-603, 100 S.Ct., at 1388-1389.
Because an arrest warrant authorizes the police to deprive a person of his liberty, it necessarily also authorizes a limited invasion of that person's privacy interest when it is necessary to arrest him in his home. This analysis, however, is plainly inapplicable when the police seek to use an arrest warrant as legal authority to enter the home of a third party to conduct a search. Such a warrant embodies no judicial determination whatsoever regarding the person whose home is to be searched. Because it does not authorize the police to deprive the third person of his liberty, it cannot embody any derivative authority to deprive this person of his interest in the privacy of his home. Such a deprivation must instead be based on an independent showing that a legitimate object of a search is located in the third party's home. We have consistently held, however, that such a determination is the province of the magistrate, and not that of the police officer.
The Government concedes that "an arrest warrant may be thought to have some of the undesirable attributes of a general warrant if it authorizes entry into third party premises." Brief for United States 42. Similarly, the Government agrees that "the potential for abuse is much less if the implicit entry authorization of an arrest warrant is confined to the suspect's own residence and is not held to make the police free to search for the suspect in anyone else's house without obtaining a particularized judicial determination that the suspect is present." Ibid.
Moreover, the remedies suggested by the Government are not without their pitfalls and limitations. For example, absent a search warrant requirement, a person seeking to recover civil damages for the unjustified search of his home may possibly be thwarted if a good-faith defense to such unlawful conduct is recognized. See, e. g., Wallace v. King, 626 F.2d, at 1161.
The significance accorded to such authority, however, must be kept in perspective, for our decisions in this area have not "simply frozen into constitutional law those enforcement practices that existed at the time of the Fourth Amendment's passage." Payton v. New York, 445 U.S., at 591, n. 33, 100 S.Ct., at 1382-1383, n. 33. The common-law rules governing searches and arrests evolved in a society far simpler than ours is today. Crime has changed, as have the means of law enforcement, and it would therefore be naive to assume that those actions a constable could take in an English or American village three centuries ago should necessarily govern what we, as a society, now regard as proper. Cf. Katz v. United States, 389 U.S. 347, 352-353, 88 S.Ct. 507, 511-512, 19 L.Ed.2d 576 (1967). Instead, the Amendment's prohibition against "unreasonable searches and seizures" must be interpreted "in light of contemporary norms and conditions." Payton v. New York, supra, at 591, n. 33, 100 S.Ct., at 1382-1383, n. 33.
The three other decisions cited by the Government do not address the issue raised here. Johnson v. Leigh, 6 Taunt. 246, 248, 128 Eng.Rep. 1029, 1029-1030 (C.P.1815), dealt with the authority of a constable to enter the home of a third person to make an arrest when the "outer door" was open. Under the common law, "a privilege attaches to the outer door of a dwelling, because . . . it is the owner's castle." Hutchison v. Birch, 4 Taunt. 619, 625, 128 Eng.Rep. 473, 476 (C.P.1812). Thus, an open outer door was apparently regarded as the equivalent of a consent of the occupant for the constable to enter the home and conduct a search. The other two decisions cited by the Government, Sheers v. Brooks, 2 Bl.H. 120, 122, 126 Eng.Rep. 463, 464 (C.P.1792), and Kelsy v. Wright, 1 Root 83 (Conn.1783), dealt only with the authority of the constable to enter the home of the person to be arrested.
The Government recognizes this problem. See n. 8, supra.
A number of Circuits already require a search warrant for entries of this sort, see n. 3, supra, and there is no indication in the record that law enforcement efforts in these jurisdictions have suffered as a result. Thus, we are inclined to view the Government's argument on this point with considerable skepticism. Cf. Payton v. New York, 445 U.S., at 602, 100 S.Ct., at 1388.
Moreover, we are informed by the Government that "it is the present policy of the Drug Enforcement Administration, whose agents conducted the search in the present case, to secure a search warrant prior to making an arrest entry into third party premises, in the absence of exigent circumstances or consent." Brief in Opposition 9, n. 7.
Indeed, the "inherent mobility" of persons noted by the Government suggests that in most situations the police may avoid altogether the need to obtain a search warrant simply by waiting for a suspect to leave the third person's home before attempting to arrest that suspect.
The Court cites Coke as a contrary authority, ante, at 217 but Coke's disagreement with the rule that the constable could "break open doors" extended only to requiring that the suspect sought first be indicted. He wrote that "if the party suspected be indicted, then the sherif by force of the kings writ may demand the party indicted to be delivered; and that not done, he may break open the house, &c. and apprehend the felon. . . ." 4 E. Coke, Institutes *177. Lyons had been indicted, United States v. Gaultney, 606 F.2d 540, 543 (1979).
The Court strives to minimize the significance of the common-law rule by suggesting that it only applied in cases of "hot pursuit," ante, at 218. Even if the authorities did impose some "pursuit" requirement, and by no means all did, see, e. g., 2 Hale 117; 1 W. Russell, Crimes and Misdemeanors 521 (2d ed. 1826) (hereafter Russell), the "pursuit" referred to was apparently "the old Common Law mode of pursuing," by the "hue and cry." 1 Chitty *26; 4 W. Blackstone, Commentaries 293 (J. Wendell ed. 1847); 2 Hale 98. See Semayne's Case, 5 Co.Rep. 91a, 91b-93a, 77 Eng.Rep. 194, 196 (K.B.1603) ("J. beats R. so as he is in danger of death, J. flies, and thereupon hue and cry is made, J. retreats into the house of T. they who pursue him, if the house be kept and defended with force (which proves that first request ought to be made) may lawfully break the house of T. for it is at the K.'s suit"). The "hue and cry," however, was not the same as "hot pursuit" by officers of the law, and the situations in which it might be invokedfor example, simply to apprehend a person suspected of a felonywould not be considered exigent circumstances. See 1 Chitty, *27-* 29.
- Edward G. WELSH, Petitioner v. WISCONSIN.
- UNITED STATES, Petitioner v. Bradley Thomas JACOBSEN and Donna Marie Jacobsen.
- UNITED STATES, Petitioner v. Alberto Antonio LEON et al.
- MASSACHUSETTS, Petitioner v. Osborne SHEPPARD.
- Andres SEGURA and Luz Marina Colon, Petitioners, v. UNITED STATES.
- NEW JERSEY v. T.L.O.
- UNITED STATES, Petitioner, v. James Connors KARO et al.
- Lillian THOMPSON v. LOUISIANA.
- Bertold J. PEMBAUR, Petitioner v. CITY OF CINCINNATI et al.
- Edward MALLEY and Rhode Island, Petitioners, v. James R. BRIGGS and Louisa Briggs.
- CALIFORNIA, Petitioner v. CIRAOLO.
- MARYLAND, Petitioner, v. Harold GARRISON.
- Joseph G. GRIFFIN, Petitioner, v. WISCONSIN.
- Russell ANDERSON, Petitioner v. Robert E. CREIGHTON, Jr., et ux., et al.
- CITY OF ST. LOUIS, Petitioner v. James H. PRAPROTNIK.
- MICHAEL A. LEBRON, PETITIONER v. NATIONAL RAILROAD PASSENGER CORPORATION
- Raymond J. DONOVAN, Secretary of Labor, United States Department of Labor, Appellant, v. Douglas DEWEY et al.
- Jeffrey Richard ROBBINS, Petitioner, v. State of CALIFORNIA. | <urn:uuid:0f615b94-5bd1-4b79-a982-e14894ff7a4f> | CC-MAIN-2017-04 | https://www.law.cornell.edu/supremecourt/text/451/204 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00433-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.950923 | 13,984 | 1.515625 | 2 |
Path of a European Eclipse in 1764
|Author:||Mme. Le Paute Dagelet|
|Dwnld:||Full Size (16.65mb)|
|Source:||Library of Congress|
|See our Prints Page for more details|
So I tried to research this, and it turns out it might've just been some lunar eclipse that happened.
Not shitting on it, and yeah, by all means make a map about it (and this one is a handsome one). But it wasn't like some "big deal" eclipse that made King George kill all of his butlers or anything.
There was, though, born during the eclipse a champion racehorse that was, by virtue of the conditions surrounding his birth, named "Eclipse". | <urn:uuid:50387e5c-3e36-4835-a3fe-9abc648f590a> | CC-MAIN-2017-04 | http://www.bigmapblog.com/2012/path-of-a-european-eclipse-1764/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00361-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.952348 | 163 | 2.390625 | 2 |
Author: Eric Blake <ebl...@redhat.com>
Date: 2016-10-11 (Tue, 11 Oct 2016)
build: Work around SIZE_MAX bug in OSX headers
C99 requires SIZE_MAX to be declared with the same type as the
integral promotion of size_t, but OSX mistakenly defines it as
an 'unsigned long long' expression even though size_t is only
'unsigned long'. Rather than futzing around with whether size_t
is 32- or 64-bits wide (which would be needed if we cared about
using SIZE_T in a #if expression), just hard-code it with a cast.
This is not a strict C99-compliant definition, because it doesn't
work in the preprocessor, but if we later need that, the build
will break on Mac to inform us to improve our replacement at that
See also https://patchwork.ozlabs.org/patch/542327/ for an
instance where the wrong type trips us up if we don't fix it
for good in osdep.h.
Some versions of glibc make a similar mistake with SSIZE_MAX; the
goal is that the approach of this patch could be copied to work
around that problem if it ever becomes important to us.
Signed-off-by: Eric Blake <ebl...@redhat.com>
Reviewed-by: Markus Armbruster <arm...@redhat.com>
Reviewed-by: John Arbuckle <programmingk...@gmail.com>
Tested-by: Peter Maydell <peter.mayd...@linaro.org>
Signed-off-by: Peter Maydell <peter.mayd...@linaro.org> | <urn:uuid:6f78bec6-6f58-4d45-b9fa-99577810f325> | CC-MAIN-2017-04 | https://www.mail-archive.com/qemu-commits@nongnu.org/msg04210.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281151.11/warc/CC-MAIN-20170116095121-00113-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.80278 | 387 | 1.523438 | 2 |
Pronunciation: (lust),[key] —n. 1. intense sexual desire or appetite.
2. uncontrolled or illicit sexual desire or appetite; lecherousness.
3. a passionate or overmastering desire or craving (usually fol. by for): a lust for power. 4. ardent enthusiasm; zest; relish: an enviable lust for life. 5. Obs. a. pleasure or delight.
b. desire; inclination; wish.
—v.i. 1. to have intense sexual desire.
2. to have a yearning or desire; have a strong or excessive craving (often fol. by for or after). | <urn:uuid:0252473d-0fc4-4f33-b7f0-11b758e4d477> | CC-MAIN-2017-04 | http://dictionary.factmonster.com/lust | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280929.91/warc/CC-MAIN-20170116095120-00427-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.770952 | 138 | 2.03125 | 2 |
History Of Athletics
How Everything Began
The history of athletics its roots in human prehistory. The first recorded organized athletics events at a sports festival
are the Ancient Olympic Games. At the first Games in 776 BC in Olympia, Greece, only one event was contested: the stadion
footrace and the first olympic winner was Koroibos. In later years further running competitions have been added. Also in
the Ancient Olympic pentathlon, four of the events are part of the track and field we have even today. The long jump, the
javelin throw, the discus throw and the stadion foot race.
Athletics events were also present at the Panhellenic Games in Greece around this period, and they become known to Rome
in 200 BC. In the Middle Ages new track and field events began developing in parts of Northern Europe. The stone put and
weight throw competitions popular among Celtic societies were precursors to the modern shot put and hammer throw events.
Also the pole vault, was polular in the Northern European Lowlands in the 18th century.
Modern competitions in athletics, took place for the first time in the 19th century. Usually they were organised by educational
institutions, military organisations and sports clubs as competitions between rival establishments. In these competitions
the hurdling were introduced for the first time.
Also, in the 19th century the first national associations have been established and organized the first national competitions.
In 1880 the Amateur Athletic Association of England start organizing the annual AAA Championships while in United States
in 1876 took place for the first time the USA Outdoor Track and Field Championships first by the New York Athletic Club.
The establishment of the modern Olympic Games in Athens at 1896 marked a new era for track and field. The Olympic athletics
programme, comprising track and field events plus a marathon race, contained many of the foremost sporting competitions of the
1896 Summer Olympics. The Olympics also consolidated the use of metric measurements in international track and field events,
both for race distances and for measuring jumps and throws. The events of track and field have been expanded in the following
In 1912 the International Amateur Athletic Federation (IAAF) was established, becoming the international governing body for
athletics, having the amateurism as one of its founding principles for the sport. The first continental track and field
competition was the 1919 South American Championships followed by the European Athletics Championships in 1934. In the 1928
Summer Olympics women competed for the first time.Furthermore, major athletics competitions for disabled athletes were first
introduced at the 1960 Summer Paralympics.
From the 1960s, the athletics gained more exposure through television coverage. After over half a century of amateurism,
the amateur status of the sport began to be displaced by growing professionalism in the late 1970s. In 1982 The IAAF
abandoned amateurism, and later changed its name as the International Association of Athletics Federations. The following
year IAAF established the World Championships in Athletics – the first ever global competition for athletics which became
one of track and field's most prestigious competitions along with the Olympics.
The IAAF World Championships in Athletics became a fully professional competition with the introduction of prize money in
1997. Also in 1998 the IAAF Golden League increased the professionalism of athletics. In 2010, the series was replaced by the
more lucrative IAAF Diamond League which comprises meetings in Europe, Asia, North America and the Middle East which are the
first ever worldwide annual series of track and field meetings.
Return from history of athletics to athletics results home page | <urn:uuid:2bab7e5d-98c6-4675-b154-42a57dd47485> | CC-MAIN-2017-04 | http://athleticsdb.com/history-of-athletics.php | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00568-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.964185 | 741 | 3.421875 | 3 |
Remarks by Angel Gurría Secretary-General OECD, Council on Foreign Relations, New York, 26 February 2014
(As prepared for delivery)
Ladies and Gentlemen:
It is a great honour to be here at the Council on Foreign Relations (CFR) to address one of the most pressing challenges of our times: rising inequalities.
The need to tackle inequalities has been at the top of the OECD’s agenda for years. In 2008 we launched a first wake-up call with a study named “Growing Unequal?”. Please note the question mark! At the time we were still uncertain about the trends… Three years later we produced a new shocking study named “Divided We Stand: Why Inequality Keeps Rising”. Unfortunately, no need for a question mark here.
The evidence in these studies speaks for itself: inequality had been rising in nearly all OECD countries during the last decades. The financial and economic crisis has accelerated this trend.
I have been sounding this alarm in different fora, referring to inequality as the ultimate social time bomb. All these concerns were confirmed by President Obama in December 2013, and then again in January 2014 in the State of the Union. Many institutions are now producing a plethora of studies and warnings.
It is therefore a great opportunity for me to share with you today the OECD’s views on the threat that inequality is posing to this great nation.
The US Inequality Challenge
Americans have always thought of their country as “the Land of Opportunity”. The Land where you could make it to the top, no matter who you were, no matter where you came from; The Land where you could realise your dream, as long as you studied and/or worked hard; The Land where each generation could grow up being sure to have a better life than their parents, and that their children would have a better life than them.
Over the past decades, lower-wage workers in America have been working harder and harder, and this has not resulted in upward social mobility. While average working hours increased by 20 percent, incomes actually fell. At the same time, the richest 1% of Americans now earn 20% of pre-tax national income. To put it differently, the US average income grew at 1% per year from the mid-1970s to the late 2000s. But if you strip out the income growth that went to the top 1% of the income ladder, the rate drops to only 0.6%.
Inequality is a many-headed problem. When hard-working people cannot make ends meet, when the fruits of economic growth reach the pockets and tables of only a lucky few, when children start their lives in poverty and never grow out of it, inequality becomes a structural problem. It locks in privilege, trapping people in a vicious circle of exclusion and lack of opportunity from which it is very difficult to escape. And inequality of opportunity undermines growth, preventing societies from making the best use of their resources and talent base.
This is why inclusive growth is a better alternative. Precisely tomorrow, I am going to be addressing this issue at a workshop that the OECD is jointly organising with the Ford Foundation on “Changing the Conversation on Growth: Going Inclusive”. In this Workshop, we will discuss the multi-faceted nature of inequality, which goes far beyond the distribution of income, and the policies that need to be put in place to improve the distribution of opportunity and outcomes.
Let’s be clear: equality of outcomes depends on equality of opportunity. And this requires policy action! America needs to become the Land of Equal Opportunity again. You need it for the sake and success of America – the rest of the world needs it for the sake and success of the global economy, for which the economic health of the United States is essential.
The US Government is already taking decisive action, with a series of inclusive initiatives like the Affordable Care Act, a higher minimum wage, a multi-stakeholder campaign to bring down child obesity, a College Opportunity Summit to improve equal access to higher education, and other key actions.
Today, we want to join this effort. In fact, I’m here to share with you the outlines of an action plan to Tackle Inequalities in America. A policy package that builds on the strengths of the American economy, the hard work of the American people, and the many successful American policy experiences, plus the best international practices.
An Action Plan to Tackle Inequalities
This package provides some of “the ladders of opportunity” that President Obama talked about in his 2014 State of the Union speech. We intend to propose this package to the US government to work together to promote more inclusive growth and reduce inequalities in America.
This Plan includes OECD support to:
The experiences of different OECD countries reveal that combined action on these four tracks can boost our efforts to promote inclusiveness and reduce inequalities of outcomes. Of course these are just a few brush-strokes of a much broader and more complex programme. The OECD stands ready to work with the US Government to make it work.
America has been engaged in a constant and exemplary struggle for equality. This is the foundation of the great things this nation has achieved: the belief, the certainty, that in this country the dreams of any citizen can be realised and that everyone, for the simple reason of living in this land, will have a fair chance to flourish and thrive.
The numbers now say that this system is in jeopardy. The evidence now tells us that the levels of inequality are becoming an impediment for progress, and that action is needed in many fronts to make America once again a Land of Equal Opportunity.
Inequality is a multi-dimensional challenge, it goes beyond income and it affects the wellbeing of our people. We need a multidisciplinary policy response and that’s what the Inclusive Growth initiative that we are launching in the OECD will provide. | <urn:uuid:200650d1-1401-44cd-be3d-3c423a64fb8d> | CC-MAIN-2017-04 | http://www.oecd.org/about/secretary-general/tackling-inequality-getting-thepolicy-challenges-right.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00365-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.954254 | 1,223 | 2.203125 | 2 |
Teri Arnold of the American Heart Association asks: "How much do you know about your heart's health? It's easy to be fooled by misconceptions. After all, heart disease only happens to your elderly neighbor or to your fried food-loving uncle, right? Or do you know the real truth - that heart disease affects people of all ages, even those who eat right?"
Relying on false assumptions can be dangerous to your heart. Cardiovascular disease kills more Americans each year than any other disease. So let's set the record straight on common myths.
- "I'm too young to worry about heart disease." How you live now affects your risk for cardiovascular diseases later in life. As early as childhood and adolescence, plaque can start accumulating in the arteries and later lead to clogged arteries.
- "I'd know if I had high blood pressure because there would be warning signs." High blood pressure is called the "silent killer" because you don't usually know you have it. You may never experience symptoms, so don't wait for your body to alert you that there's a problem. Check you numbers with a simple blood pressure test.
- "I'll know when I'm having a heart attack because I'll have chest pain." Not necessarily. Although it's common to have chest pain or discomfort, a heart attack may cause subtle symptoms. These include shortness of breath, nausea, feeling lightheaded, and pain or discomfort in one or both arms, the jaw, neck or back. Even if you're not sure it's a heart attack, call 9-1-1 immediately. Learn your risk of heart attack!
- "Diabetes won't threaten my heart as long as I take my medication." Treating diabetes can help reduce your risk for or delay the development of cardiovascular diseases. But even when blood sugar levels are under control, you're still at increased risk for heart disease and stroke. That's because the risk factors that contribute to diabetes onset also make you more likely to develop cardiovascular disease.
- "Heart disease runs in my family, so there's nothing I can do to prevent it." Although people with a family history of heart disease are at higher risk, you can take steps to dramatically reduce your risk. Create an action plan to keep your heart healthy by tackling these to-dos: get active; control cholesterol; eat better; manage blood pressure; maintain a healthy weight; control blood sugar; and stop smoking.
- "I don't need to have my cholesterol checked until I'm middle-aged." You should start getting your cholesterol checked at age 20, even earlier if your family has a history of heart disease. Children in these families can have high cholesterol levels, putting them at increased risk for developing heart disease as adults.
- "Heart failure means the heart stops beating." The heart suddenly stops beating during cardiac arrest, not heart failure. With heart failure, the heart keeps working, but it doesn't pump blood as well as it should. It can cause shortness of breath, swelling in the feet and ankles or persistent coughing and wheezing. During cardiac arrest, a person loses consciousness and stops normal breathing.
- "This pain in my legs must be a sign of aging. I'm sure it has nothing to do with my heart." Leg pain felt in the muscles could be a sign of peripheral artery disease, which results from blocked arteries in the legs caused by plaque build-up. The risk for heart attack or stroke increases five-fold for people with PAD.
- "My heart is beating really fast. I must be having a heart attack." Your heart rate speeds up during exercise or when you get excited, and slows down when you're sleeping. Most of the time, a change in your heartbeat is nothing to worry about. But sometimes, it can be a sign of arrhythmia, an abnormal or irregular heartbeat. Most arrhythmias are harmless, but some can last long enough to impact how well the heart works and require treatment.
- "I should avoid exercise after having a heart attack." No! As soon as possible, get the help you need by joining a cardiac rehabilitation program or consulting your healthcare provider for advice on developing a physical activity plan for you. | <urn:uuid:c7567021-a01e-46ec-b0f7-45856d43aa01> | CC-MAIN-2016-44 | http://www.dailypress.com/dp-health-notes-heart-disease-20110902-story.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720737.84/warc/CC-MAIN-20161020183840-00219-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.954918 | 863 | 2.921875 | 3 |
I don't have the box or directions that came with my Brownie automatic camera. Do you know the history of my Brownie camera?
E.S., BUFFALO, N.Y.
The Eastman Kodak Brownie camera was an extremely popular line from 1900 to 1970. The name was derived from the popular cartoon characters known as The Brownies, created by illustrator/author Palmer Cox (1840-1924). The No. 1 Brownie Camera sold for $1 when it was introduced in 1900 for the children's market. Kodak produced about 125 Brownie models. Your c. 1910 example is the No. 3A Kodak Folding Brownie Camera and was sold for $10. It was capable of shooting 10 exposures. Having the box and directions doesn't affect value. Your camera appears to be in good condition.
Valued at: $75
*The estimates provided are preliminary only and subject to change based onfirsthand inspection and further research. Appraisal prices refer to an item's fair market value, or what one might expect to pay for an object of similar age, size, color and condition at auction. | <urn:uuid:336b531a-9b8c-4d51-a054-01298bd03da4> | CC-MAIN-2022-33 | https://www.countryliving.com/shopping/antiques/a512/vintage-kodak-camera-0407/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz | en | 0.962132 | 238 | 2.265625 | 2 |
The tour highlights the numerous handworks and the architectural heritage that are a clear evidence of the ancient intense human activity in this area. Thanks to the recent discoveries it's now finally possible to reveal how the city was like in the Virgilian time. The stunning and precious section of a mosaic floor in piazza Sordello and the finds preserved in the Archeological Museum allow to re-experience what once the reality of a Roman city was.
|When:||From Tuesday to Sunday all year long|
|Information:||Timetables are subjected to the Museum opening hours|
|Meeting point:||Palace Ducale| | <urn:uuid:0a611a0e-b792-4886-be18-edac5aac8f8a> | CC-MAIN-2022-33 | https://www.mantovatours.com/en/tours/mantua-me-genuit-the-etruscan-and-roman-city | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00068.warc.gz | en | 0.877905 | 137 | 1.65625 | 2 |
Date on Master's Thesis/Doctoral Dissertation
Criminal Justice, PhD
American Indian; desistance; drug use; social bond theory; general theory of crime; adolescents
Informed by Hirschi’s (1969) social bond theory and by Gottfredson and Hirschi’s (1990) general theory of crime (GTC), the proposed study intends to identify the factors more likely to differentiate drug-use desisters (i.e., adolescents who reported life-time usage, but did not report recent drug use) from those who never used drugs and from those who reported continuous use of drugs. The study is based on a quantitative analysis of survey data collected between 2009 and 2013 and obtained from a sample of American Indian (AI) adolescents, attending schools located on or near American Indian reservations. Although recent statistical information indicates that the risk of substance use is higher among AI subpopulation groups, recent analyses that identified the correlates of drug use among the subpopulation of AI adolescents are relatively sparse. Moreover, to the author’s knowledge there are no studies that attempted to identify the characteristics of AI adolescents who succeeded to stop using illegal drugs. The dissertation contributes to the limited literature that focuses on an understudied population subgroup (AI adolescents) and provides a better understanding of the factors associated with variations in substance use among AI adolescents and plans to provide information that may be used when social programs meant to prevent and reduce American Indian adolescents’ substance use are designed. Different from prior research that focused on the risk factors associated with substance misuse in adolescence, this study attempts to highlight the individual-level that predict abstention and desistance from drug use. Results show that both boys and girls who did not report drug use are more likely to have high school attachment, are more likely to be monitored by parents, and tend to be younger. Additionally, abstainers are less likely to have delinquent friends and a lower level of self-control. Different from what has been hypothesized, male and female AI adolescents who did not report lifetime or recent drug use tend to have a lower level of family attachment than their counterparts who use drugs. Compared to those who continued to use drugs, male and female adolescents who ceased using drugs associate significantly less with delinquent peers. Additionally, adolescent boys who desisted from drug use are more likely to report higher levels of school attachment, parental monitoring, and self-control than their male counterparts who continued to use drugs. The implications of the findings as well as the study limitations are further discussed, and recommendations for future research are presented.
Pavlov, Ruben Olegovich, "Factors influencing American Indian adolescents' abstention and desistance from drug usage." (2022). Electronic Theses and Dissertations. Paper 3815.
Retrieved from https://ir.library.louisville.edu/etd/3815 | <urn:uuid:5b31ce40-0469-4a0d-8446-11f1dd44ad63> | CC-MAIN-2022-33 | https://ir.library.louisville.edu/etd/3815/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00675.warc.gz | en | 0.94155 | 669 | 1.609375 | 2 |
Lately I have found many instances of jewelry (particularly earrings, earring backs, and non-spring clasps, also some pendant bails) which are marked 10K or 14K and yet are attracted to a rare earth magnet. Rare earth magnets are admittedly a lot stronger than the older common magnets, so an old weak horseshoe magnet may not do much of anything, while a rare earth magnet causes that same piece of jewelry to leap in the air. But magnetic is magnetic, and I have been taught that gold and the usual alloy metals are NOT magnetic.
Returning such a piece to a seller on eBay frequently brings wrath on my head, as the seller is going by the mark on the piece and is understandably upset by being left “holding the bag”. So I've been doing my best to make inquiries of knowledgeable people about the issue, specifically, are there ANY alloys of gold which contain iron (would be magnetic), or is there any other legitimate reason a gold piece would respond to a magnet? Here's a summary of what I've found from putting the question to the International Gem Society forum, and also from an article on gold alloys written by Dr. A. M. Helmenstine, online at About.com Chemistry:
1) a clasp with a spring in it should not be tested this way as even a 14K circle spring or lobster clasp does have a tiny iron spring in it, and a magnetic response is OK there! But this objection does not apply to the fishhook type clasp which has no spring (often used on pearl strands) or other kinds of non-spring clasps.
2) 10K or 14K gold is of course not pure gold; it’s alloyed with other metals. For yellow gold, the other metals are likely to be silver and copper (NOT magnetic). For white gold the other metals may be platinum, palladium, zinc, and/or nickel. There is some question about the magnetic properties of nickel but the consensus seems to be that it can be considered nonmagnetic for this purpose. Thus the common colors of gold alloys have no reason to be attracted to a strong magnet, that I can find.
3) There is ONE gold alloy that might be legitimately magnetic. It’s “blue-white gold” (not common). 18K blue white gold is composed of 75% gold, 25% iron. (I have yet to find any to try it out with a magnet but if anyone else has, I’d love to know the result.)
4) The other less common gold alloy colors include purple (gold with aluminum), green (gold with silver and copper or cadmium), and rose (gold with copper). These also are not expected to respond to a magnet.
5) NOT being attracted to a strong magnet does NOT prove the gold truly is what it’s marked. The piece can be gold-plated or gold-filled (which is rolled gold on a base metal) and the underlying base metal need not be magnetic (copper, for example, is a common base metal in jewelry). You still need to do other testing.
6) If the piece IS moved by a magnet, there is probably iron or steel in the piece. One expert points out that iron is not normally an approved component of jewelry and that steel is probably involved where the jewelry piece is responding to a magnet. He states that even though bulk stainless steel isn’t magnetic, “all small stainless steel parts [become] ferromagnetic due to work hardening”.
In conclusion, if a piece of supposedly pure 10K or 14K or 18K gold jewelry is attracted to a strong magnet, and you have no reason to think there’s a good reason for it (ie a spring inside a clasp, or a surgical steel post on a gold earring, or the piece looks like it might be “blue white gold”), then beware. It is very probably not what it’s marked to be.
you need to write an actual guide about this and post it for all to see - not just post info on this board.
Will do, but I had hoped to hear if anyone else had run across gold that they felt was truly what it was marked...and yet was attracted to a strong magnet (such as a rare earth magnet).
The same procedure used for platinum should be used for 18K white gold. The material on the stone should start changing to a light bronze color in about three minutes. For 14K white gold, the material on the stone should disappear in 15 seconds. Lots of buyers test white gold using the same as they do for yellow gold and get a negative. Here's a good guide: http://www.esslinger.com/testinggoldsilverandpreci
Here's another good post that's here on Ebay. http://reviews.ebay.com/Testing-Lightly-Magnetic-W
Hello there speculators and non- belivers !!!
YYYYEEEESSSSS !!!! there is 14k gold with high iron content.
They are rare yellow gold iron blends and they are antique in our expirience. You cant fool a spectrometer.:-p
Yes I have run across this many times mostly in earrings that are marked and tested with acid to be true 14k or 10k but being magnetic I do not take a chance I feel as I am passing up something good but can not be sure I would like to find out if it is true that some gold sticks to a magnet
I have an 18k gold watch and watch band that has been tested and is gold, the band is also slightly magnetic. So, I do not think saying gold can not be magnetic is really a true statement.
Whoops, white gold, and I meant that it is not accurate to say that it can never be magnetic. Thanks
ha ha, everything is "special" "hot" "new" "rare".....uhmmm yup really!
as if 10k gold filled is some rare species. "hey look, 10k gf/ep/solid/" It's "gold filled, and electroplated and filled"....he he he , INDEED it must be special.
does anyone even know what that means? it means NOTHING. It means it's crap. | <urn:uuid:1214eb1b-966a-4537-9850-72ce3e4c0b71> | CC-MAIN-2017-04 | http://community.ebay.com/t5/Archive-Reviews-Guides/Magnetic-Gold-Gold-jewelry-marked-10K-or-14k-and-attracted-to-a/td-p/2920020?nobounce | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283301.73/warc/CC-MAIN-20170116095123-00509-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.95379 | 1,326 | 2.15625 | 2 |
The male is characterised by grey plumage, the presence of white feathers and predominantly yellow legs.
The female has grey plumage with very few white feathers and predominantly yellow legs.
|Cumulation hatching eggs at 60 weeks / start female*||162|
|Cumulation day-old guinea fowl at 60 weeks / start female*||114|
|Weight females at 24 weeks||1,922 kg|
|Weight males at 24 weeks||
* Start female = number of subjects in place at 24 weeks
It is advisable to place guinea fowl in the production unit at 24 weeks for production to commence at 28-29 weeks of age. | <urn:uuid:bc240e24-cc2a-4159-abad-75cd2c200c69> | CC-MAIN-2022-33 | http://www.galor-genetics.com/en/guinea-fowl-breeders/essor-breeders/7783-reproducteurs-essor.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00467.warc.gz | en | 0.92521 | 160 | 2.625 | 3 |
While you are an adolescent, listed below are some: Giving an answer to Cyberbullying: Top ten Methods for Kids. When you’re an adult who’s getting harassed on the web, see our recommendations right here. If you are a grandfather out of a young child who is becoming cyberbullied, excite pick: Giving an answer to Cyberbullying: Top Methods for Mothers and coaches will be comment: Replying to Cyberbullying: Top ten Tips for Instructors.
If you were to think safe discussing their tale, we wish to hear away from you. You could potentially anonymize your event if you want, and then we pledge to steadfastly keep up your own personal confidentiality towards maximum the amount of law. The greater number of detail you could deliver the finest. I use these tales to teach individuals about the severe nature from cyberbullying on the goal of preventing other people of starting they. I understand each one of these stories and delight be aware that you are not alone. Although it appears like nothing is that will be performed to get rid of the newest cyberbullying, try not to stop trying.
Particular Tales Distributed to Us
Let me reveal a tiny try of one’s lots and lots of anecdotal tales and you will comments there is acquired off youngsters and you will adolescents who’ve experienced cyberbullying. If you want to help you anonymously complete an explanation of one’s cyberbullying feel to us, excite take action from the means lower than. Delight promote as many specific information on your own feel because you is also.
“”There is a web site immediately to your deal with guide that’s entitled “Contacting all of the hoes” that seems to be a place for all those to type, for all the business observe, any upsetting or ill considered anyone that they will not instance– Deal with Publication won’t do the page off. I’m not sure what you should do and that i think that some thing must be done just before we have been reading for the information on the certain bad guy who killed on their own more what is actually becoming created about them about vile web site. Assist. Individuals recognize how I, we, will start the entire process of providing so it Fb web page off?” ” – 17 year-dated girl out of Us
“”I have been loved ones with this specific person for 3 years today. Better best friends. We never imagine she you will definitely do that in my experience. This woman is sleeping and getting the household members for her said. All of the i can do try view. She’s named me ” Ugly RagDoll , Inadequate , Babied most of the my life , Jealous , I have to become adults , unpopular , I can wade and you can riot less than a stone! Which claims these one thing? Simply a person that is heartless and this is not bullied prior to. They will not know how it feels i suppose.”” – twelve year-old woman of MI
Express Your Cyberbullying Facts
“”My sixteen year-old child is cyber bullied on Myspace over a period of 8 era. The big event is so traumatic they brought about my personal man for an intense psychotic break and to become hospitalized in the a teen psychiatric ward for almost 30 days. He’s changed forever and certainly will not the same mentally. Internet intimidation can be harm and you may apply to someone and kids must see that it. This type of children are not penalized in any way and you will consider the incident is comedy! We realize it is lives switching.” ” – Mother or father regarding sixteen year-dated guy off MN
“”Are I was bullied several times before it makes me personally not need to live in the world any further. I’ve been named probably all of the identity out very hurts. I sometimes think of committing suicide but i think in which often that get myself? i’d simply become harming the ones that i really like.”” – 14 season-old girl from WA | <urn:uuid:2c58f36c-2cb6-405f-8164-2efefc7efd2f> | CC-MAIN-2022-33 | http://www.keithharris.net/i-have-of-a-lot-info-on-this-website-so-you-can/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00267.warc.gz | en | 0.960362 | 863 | 1.78125 | 2 |
Time in the Iquito language
Following Smith's (1991, 1997) two-component theory, this dissertation investigates the structural characteristics and the semantic properties of the temporal system, including tense, mood, viewpoint aspect, situation aspect and discourse modes, of Iquito, a highly endangered and moribund language spoken in the northern Peruvian Amazon. Iquito has three tenses: Extended Current Tense, Recent Past Tense, and Distant Past Tense. Extended Current Tense gives a Reference Time (RT) frame from the day which includes Speech Time (SpT) to the infinite future. Therefore, situations occurring earlier on the same day or unrealized situations both appear in sentences with this tense. The temporal interpretation is inferred from the combination of aspect and mood morphology. Recent Past Tense gives a frame of RT from yesterday to one to two years prior to SpT. Distant Past Tense gives a frame of RT from one to two years prior to SpT extending backward to the infinitely remote past. Temporal boundaries among the tenses are not rigidly fixed in terms of a metrical conception of time. Iquito has seven perfective aspects, including a General, a Momentary, a Remote, two Deictic, an Allative, and an Ablative Perfective Aspect and one Imperfective Aspect. Remote Perfective Aspect incorporates an adverbial component while Ablative and Allative Perfectives incorporate directional components and Deictic Perfectives incorporate deictic components. The system of perfective aspects in Iquito manifests the importance of expressing the realization of an event in conjunction with information about the time of the day, location, and routing in terms of location. Regarding situation aspect, I propose that there are six types in Iquito, including States, Activities, Accomplishments, Achievements, Semelfactives and Motions, which all manifest language-specific correlates. With respect to grammatical moods, realis and irrealis moods are manifested in Iquito through a typologically unique strategy: word order change and vowel hiatus resolution. Regarding Discourse Modes, I find four modes in Iquito, including Narrative, Report, Description and Information. In addition, Quoted Speech manifests an interesting mixture of modes. This dissertation adds another dimension to the close connections among tense, aspect and mood, and contributes to linguistic documentation and advances the structural and semantic analysis of Iquito and Amazonian languages. It also contributes to research on the crosslinguistic variation of temporal semantics and to linguistics in general through an interesting case study. | <urn:uuid:32c03f8b-8b7f-469a-964d-99b470d31048> | CC-MAIN-2016-44 | https://repositories.lib.utexas.edu/handle/2152/18441 | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721174.97/warc/CC-MAIN-20161020183841-00283-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.889473 | 532 | 2.109375 | 2 |
Murray Middle School, Sierra Sands Unified School Districts largest middle school, serves the isolated Indian Wells Valley. Murray’s history dates back to 1943 when it housed China Lake Naval Weapons Center students. Murray’s population fluctuates with the valley’s demographic response to national trends of defense department down-sizing and outsourcing. The local economy, mirroring the nation, has suffered from the recent market conditions affecting many of our local families. Although experiencing declining enrollment and concurrent budget reductions throughout the school district, Murray serves all segments of our educational community by providing a standardized core of education custom designed for the educational and emotional needs of its students.
Although located on the Naval Air Weapons Stations (NAWS) China Lake, today fewer than 2% of our student population of 595 resides on the base. Uniquely, each day our students and visitors must pass through a military security check point to reach Murray Middle School. As a result, Murray enjoys a high degree of safety for its students and staff. Murray benefits with a close relationship with base scientists and engineers who support our STEM programs and provide guest speakers and workshops to encourage student success in STEM.
Murray’s focus on a tradition of solid core-education based on Common Core standards has resulted in student success as evidenced by an increase of API score from 655 to 833 as of 2013. The Murray math program has a very strong math competition team which consistently places in the top three at the county level frequently continuing on to state level competition against much larger schools. The Murray language arts program is proud of the achievement and superior recognition of students in contests such as poetry and essay writing. Murray students have won the district Spelling Bee twelve out of the last fourteen years. The Murray science department is the only school in the district with an annual science fair. This science fair is supported by scientists and engineers of NAWS. The Murray social studies program holds a school-wide History Day where students present projects which showcase their knowledge of historical events.
Although we focus on core content, Murray continues to offer programs that allow students to be well rounded. Our orchestra students compete regionally and receive excellent ranking, and Murray’s chess team is consistently first in the valley. Additionally, the physical education department boasts an excellent cardiovascular program, and annually students participate on the Junior Olympic Team continuing to county and state level competition. Murray students are encouraged to be civic minded by participating in community service projects such as canned food drive, Coins for a Cure, city-wide Youth Advisory Council and community service hours for extracurricular clubs. The counseling program sponsors a Bully Free Week. The Gateway to Technology Classes have been region, state and national award winners in Kid Wind and Robotics competitions.
By providing strong programs which adhere to exacting academic standards, as well inviting students to expand their potential in non-academic arenas, Murray promotes intellectual growth and responsible citizenship among its students. Murray Middle School, though isolated on the northern edge of the Mojave Desert, acts as an oasis by providing a history of achievement and a tradition of preparing students for the future. | <urn:uuid:838a4ed1-e9ce-4b89-86c1-277cdd3967d1> | CC-MAIN-2017-04 | http://murray.ssusd.org/school_info/about_us | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283301.73/warc/CC-MAIN-20170116095123-00508-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.958346 | 628 | 2.296875 | 2 |
Mention Kuala Lumpur, and the first image to spring to mind is most likely the skyward stretch of the Petronas Twin Towers. From skyscrapers to opulent colonial hotels, ornate temples to simple traditional houses, Malaysia has a broad range of architectural styles and traditions. Take in the country's culture and history through the lens of its buildings, from Melaka to Georgetown and everywhere in between.
Built in 1886, Guandi Temple (no website; Jln Tun HS Lee, Chinatown, Kuala Lumpur; no telephone) is located in Kuala Lumpur. In the main hall, it's customary to burn incense, paper clothing and money in honor of your ancestors. The temple is dedicated to Kwan Ti, a historical Chinese general. Also in Kuala Lumpur, Thean Hou Temple (hainannet.com) is dedicated to the heavenly mother goddess, Thean Hou. The main hall features statues of multiple deities from both Buddhist and Taoist traditions. In Malaka, Jalan Tokong is not a single temple but a street in the historic city center where you can find a Malay mosque, a Chinese temple and a Hindu temple all standing, one next to the other.
Kuala Lumpur's Petronas Twin Towers (petronastwintowers.com.my) are easily the city's most recognizable buildings. The towers rise to 1,483 feet above ground, or 88 stories, which earned them the title of the tallest buildings in the world from 1998 until 2004. The geometrical patterns adorning the towers' exteriors are similar to those used in traditional Islamic architecture. Also in Kuala Lumpur, the Kompleks Dayabumi (Jln Sultan Hishamuddin Chinatown, Kuala Lumpur; no telephone) was formerly the headquarters for Petronas, the national oil company. Its marble tower, covered with fretted screens, remains an iconic feature of the city skyline. For a panoramic view of the city, head to the Bukit Nanas Forest Reserve and climb the Menara KL Tower (menarakl.com.my). The revolving restaurant above the main observation deck serves afternoon tea and meals.
The Eastern & Oriental Hotel (e-o-hotel.com) provides an example of 19th century colonial architecture in Malaysia, established by the same American hoteliers who opened the Raffles in Singapore. The hotel still operates. The grand lobby merits a visit, and, even if you don't check in yourself, you can have a meal on the grand lawn, a sight in itself. The Pinang Peranakan Mansion (pinangperanakanmansion.com.my) is an example of a grand colonial home and was built for a merchant in the 19th century. The decor incorporates the handiwork and styles of English, Scots, continental European and Chinese traditions. Guided tours show visitors the mansion's interior twice a day.
Kampung houses are built in the traditional Malay style, elevated on stilts. For a thoroughly renovated example of the style, visit the P. Ramlee House (no website; 4A Jln P Ramlee SW of Town Centre, Georgetown; no telephone) in Georgetown. Once the home of Malaysian movie star P. Ramlee, the house now operates as a simple museum, filled with artifacts and photos. In Melaka, Villa Sentosa (travel.to/villasentosa) is another well-preserved kampung house that dates to the 1920s. The house is not an official museum, but visitors are welcome. Inside, artifacts include Ming ceramics and a copy of the Quran that's more than 100 years old.
Danielle Hill has been writing, editing and translating since 2005. She has contributed to "Globe Pequot" Barcelona travel guide, "Gulfshore Business Magazine," "Connecting Lines: New Poetry from Mexico" and "The Barcelona Review." She has trained in neuro-linguistic programming and holds a Bachelor of Arts in comparative literature and literary translation from Brown University. | <urn:uuid:19981996-a228-4ba7-864c-3d87f5b8a5ec> | CC-MAIN-2022-33 | https://traveltips.usatoday.com/famous-architectural-buildings-malaysia-63326.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00467.warc.gz | en | 0.912351 | 854 | 2.234375 | 2 |
It is believed that the Illumniati are trying to destroy the humanity by secretly poisoning our food and and air with electromagnetic nanoparticles.
When HG Wells wrote The War of the Worlds, he imagined creatures from outer space attacking humanity using advanced technology. Humanity is finally saved by our most basic of life forms, the bacteria which co-inhabit this planet.
But what if, instead of humanity, the tiniest of life forms DNA, mitochondria and all the numerous cells which inhabit this planet came under attack.
This alarming scenario is actually in fact exactly what is happening with the use of Nano-technology. There is profound loss of biodiversity on this planet, and most of us had been too busy to notice that this is absolutely deliberate.
This assault on the planet and its inhabitants comes to you courtesy of corporations and your governments. They are the tools of the Illuminati, the deluded few, who believe they own this planet and humanity are simply their slaves.
They regard us as collateral or assets to be played with.
But deep down they are afraid of losing their power and of sharing the resources of this planet on a more equitable basis.
This Circus Maximus has been played throughout history. They have set slave upon slave, army upon army to maintain their control.
Today they hide their initiatives behind Climate Change, whilst they sow toxic aerosols into the atmosphere.
ZOMBIE VIRUS AND ITS MOBILE PHONE TRIGGER
When the right signal is transmitted to your mobile phone, it will activate what will be described in the future as a zombie virus.
Far from being a virus, it is in fact small metal particles consumed in a food waiting for the right signal to activate them. These particles are so small that you cannot see them. They have been added to our food and drink for years waiting for the complete development of this terrible technology.
On a dark command activated through your mobile phone or similar device, these particles will behave as Nano-blenders, homogenizing the organs close to the radiation source.
When you have your mobile in your breast pocket you can expect a heart attack. When you have it in you the front pocket of your jeans your organs will be fried. Close to your brain you’ll have a stroke or some other CVA.
We will bleed from our eyes, our noses, our ears and mouths.
We will cry out in excruciating pain as we become zombies.
Similar technologies have been introduced to the vehicles that we drive. | <urn:uuid:81cc1252-d6bb-488a-9ae3-1281ffa30526> | CC-MAIN-2016-44 | http://mirrorspectrum.com/behind-the-mirror/the-illuminati-agenda-to-destroy-the-humanity | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719566.74/warc/CC-MAIN-20161020183839-00262-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.951509 | 515 | 1.820313 | 2 |
Readers can now enjoy the service of the oldest tech publication firm in China using cryptocurrencies. A measure adopted to expand the reach of its readership, however a stance against the position of the Chinese government on cryptocurrency.
New Subscription Model
Tech lovers, readers, enthusiasts and innovators in China and beyond that holds cryptocurrency can now enjoy the service of the oldest tech publication firm in China, Beijing Sci-Tech Report (BSTR).
Beijing Sci-Tech Report (BSTR) made this known in an official press release that it would be accepting subscription payment in cryptocurrency from 2019. The charge would be in the value of 0.01 Bitcoin, about 450 Yuan or US$65 at the present rate.
The firm noted the reason for the choice of cryptocurrency payment for subscription is as a means to promote blockchain technology in the real world setting for the practical action.
Also, the new method of subscription is aimed at expanding the reach of the firm to attract new readers of the publication. The service offered in cryptocurrency is enough to stimulate cryptocurrency enthusiasts and holders to patronize the service of the firm.
Meanwhile, the BSTR publication has been actively publishing about cryptocurrencies and blockchain technologies in a measure to promote the use and wide adoption of the industry.
Interestingly, the firm has promised to return the value of subscription made by subscribers in the eventuality of a drastic price surge of cryptocurrency in 2020.
Chinese Government Stance On Cryptocurrency
The Chinese government sees cryptocurrency as a special commodity and not a currency. This has stimulated a continuous clamp down in cryptocurrency related activities in the country.
Notably, bank accounts associated with cryptocurrencies are frozen by the financial regulatory body in the country. Also, there has been a ban on cryptocurrency activities such as ICOs, from holding in the country.
Further, tech firms that were involved in cryptocurrency payment in the country have ceased to offer this service due to the government ban on transactions related to cryptocurrency in the country.
The template of the government stance on cryptocurrency makes the decision of BSTR illegal. The government’s decision on the latest plan of the firm is not yet known.
Also, a hotel named Ethereum hotel, located in the Sichuan province also announced its plan to start receiving payment in Ethereum recently, a decision that could incur the wrath of the government.
BSTRs’ step is not the first in the cryptocurrency industry; Time Incorporated started accepting Bitcoin for subscriptions to Fortune, Travel and Leisure, Good Health, and This Old House in 2014. Also, Chicago Sun-Times in 2014. | <urn:uuid:7ff8cc71-0963-4530-b1a3-a7290b5713a6> | CC-MAIN-2022-33 | https://zycrypto.com/chinese-tech-publication-giant-set-to-accept-bitcoin-btc-from-readers/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00069.warc.gz | en | 0.952624 | 522 | 1.773438 | 2 |
As a seventh wave of COVID-19 makes its way in Canada, long-term care facilities in some provinces are seeing a major spike in infections.
In Ontario, COVID-19 outbreaks in long-term care homes more than doubled in the first week of July, according to the province’s public health unit.
A total of 42 outbreaks were reported in the long-term care sector during the week of July 3 to 9, according to the province’s latest data.
That’s a 110 per cent increase from the previous week’s 20 reported outbreaks.
Ontario, like other provinces, is no longer reporting daily COVID cases. However, according to Dr. Kieran Moore, the province’s chief medical officer of health, the seventh wave of the novel coronavirus could peak in Ontario within the next two weeks.
Following direction from the province’s Minister of Long-Term Care, Paul Calandra, MPP for Markham-Stouffville, Ontario previously had a COVID-19 immunization policy in place for people working in, volunteering at, or visiting long-term care homes.
But, the policy was revoked in March, meaning this requirement no longer applies.
In Quebec, more than 25 per cent of patients in 38 out of 106 long-term care facilities are currently infected with the virus, according to the provinces latest data. Between 15 to 25 per cent of residents in 19 other facilities are also infected.
“Quebec is in a seventh wave of COVID-19,” Marie-Claude Lacasse, spokesperson for the province’s public health department told Global News, noting cases are expected to stabilize within the next few weeks.
“Quebec public health has urged the population to be cautious in order to reduce the spread of the COVID-19 virus as much as possible, particularly among the most vulnerable people,” the spokesperson said.
A spike in infection among health-care workers has also increased “pressure” on the province’s health network, according to the spokesperson.
British Columbia had four long-term care facilities with an active COVID-19 outbreak as of July 13, a spokesperson for the province’s Ministry of Health confirmed to Global News.
“Over the course of the pandemic, several enhanced protective measures have been put in place to minimize the risk of introduction and transmission of COVID-19 in long term care and seniors’ assisted living residences,” the spokesperson said.
“We will continue to maintain appropriate measures including enhanced screening protocols, masking requirements, infection prevention and control practices, testing, and outbreak management protocols, to protect those most vulnerable to serious illness from COVID-19.”
In Alberta, COVID-19 outbreaks were reported at 12 long term-care facilities as of July 13, according to provincial data.
This includes five facilities in the Calgary zone and one in Edmonton.
“As we prepare for the fall, Albertans can expect to see periods of increased transmission of both COVID-19 and other respiratory diseases like influenza,” Charity Wallace, spokesperson for the government of Alberta told Global News.
“As we continue to live with COVID, vaccines will continue to be critical in protecting our health, our loved ones and the health-care system. This is why we continue to encourage Albertans to get every dose of vaccine that they are eligible for,” they said.
In Nunavut, there are currently no outbreaks in long-term care facilities, the manager of communications for the territory’s health department told Global News.
“Long-term care is the perfect storm for not only serious outbreaks but serious outbreaks with a lot of sickness and death,” Colin Furness, infection control epidemiologist and assistant professor at the University of Toronto’s Faculty of Information, told Global News.
“In a sense, this is ground zero for the worst of COVID,” he said.
To manage outbreaks in these facilities, it’s about more than wearing a mask, according to Furness.
“We need to manage the air,” he said. “We need filtration and ventilation measurements and we need it urgently.”
Though when masking, wearing respirator masks, like an N95, is important for maximum protection, according to Furness.
“In this kind of environment where people are so vulnerable, it really matters. You could put nine cloth masks on your face and it won’t work nearly as well as a respirator mask,” he said.
Behind the COVID curtain: formerly confidential Alberta government documents made public
Another key strategy to prevent COVID-19 outbreaks in long-term care facilities is ramping up rapid testing for staff and visitors, according to Furness. Getting vaccinated is also crucial, he said.
“All vulnerable people should be cared for only by vaccinated people,” said Furness.
“The problem we have with inoculating people who are very elderly is their immune system just isn’t often able to mount as robust a response. So let’s inoculate the residents but the main thing is that the people around them are inoculated,” he added.
In Ontario alone, more than 96 per cent of eligible long-term care residents received third COVID-19 vaccine doses as of July 12, and more than 80 per cent of those eligible had received fourth doses, Mark Nesbitt, spokesperson for the provinces Ministry of Long-Term Care told the Canadian Press this week.
By the same date, more than 88 per cent of eligible staff had received third doses.
A strategy harmful to residents is locking down long-term care facilities and preventing visitors, according to Furness.
“This is enormously punitive and it really is a last resort when you have decided you’re simply not going to bother to do other things,” said Furness.
This strategy took a toll on essential family caregivers who had their abilities of seeing and caring for their loved ones in these settings limited during lockdown, according to a recent study published in both the Journal of Gerontology and the International Journal of Qualitative Studies on Health and Well-Being.
The study – authored by the University of Toronto’s Charlene H. Chu and Amanda Yee, along with Ontario Tech University’s Vivian Stamatopolous – found that poor technology, infrastructure and planning made it difficult for caregivers to care for residents properly, causing “collective trauma.”
“This was a nightmare turned into a reality for many family members,” Chu said in a statement published by the University of Toronto on July 8.
“They were already fraught with guilt having to put their loved ones into care, and now they were required to bear witness to their family member’s decline and prison-like confinement, compounded by their own sense of helplessness in the situation.”
— With files from The Canadian Press
© 2022 Global News, a division of Corus Entertainment Inc. | <urn:uuid:23a89075-fa98-4e91-94b4-15a1862d0a17> | CC-MAIN-2022-33 | http://www.myteenshealth.com/covid-cases-soaring-in-canadas-ltc-homes-as-country-enters-7th-wave-what-can-be-done-globalnews-ca/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00069.warc.gz | en | 0.963532 | 1,489 | 2.03125 | 2 |
NSW Police has launched its annual campaign to raise awareness of the problems and effects of missing people.
For National Missing Persons Week, police plan to highlight one missing person each day this week.
Detective Superintendent James Johnson said Green Valley police were appealing for help to find a young woman who had been missing for five years.
Rista Chanthavixay, then 15 years old, was last seen in Mount Pritchard, about 4.15pm on March 24, 2009.
Miss Chanthavixay, who would now be 21, was reported missing after she did not attend school.
Police say that Miss Chanthavixay was spotted by a friend at Campbelltown station a month after her disappearance.
She is believed to have been heading to Melbourne.
Miss Chanthavixay is described as being of Asian appearance, 160 centimetres tall, of slim build, with black hair and brown eyes.
Detective Superintendent Johnson said police would never give up searching and the community's contact with police would save a lot of anguish.
"People go missing for a number of reasons," he said.
"These could relate to health-related issues or disputes within the family.
"There are some people who choose to distance themselves from family due to other reasons which we will never know — but in all circumstances I urge any missing person to at least make contact with their local police to let us know that they are safe and well."
National Missing Persons Week runs until Saturday, August 9.
Anyone who knows of Rista Chanthavixay's whereabouts or who has information that may assist investigators is urged to contact Crime Stoppers on 1800 333 000. | <urn:uuid:a5bf5738-00bf-4717-ba71-135158e70c0f> | CC-MAIN-2017-04 | http://www.liverpoolchampion.com.au/story/2465206/missing-person-rista-chanthavixay/?src=rss | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00081-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.978492 | 346 | 1.796875 | 2 |
HELSINKI (Reuters) - Panasonic Corp and NEC Corp unveiled nine new cell phone models on Tuesday that run the open-source LiMo operating system, wireless Linux group LiMo said.
The focus of the cell phone market has been shifting to software development since Google Inc and Apple Inc entered the mobile market in the past two years, with phone vendors and operators increasingly looking for open source alternatives such as LiMo to cut costs.
The market for software platforms on cell phones is led by Nokia's Symbian operating system, but it has lost much ground over the last year to Apple and BlackBerry maker Research in Motion Ltd.
Computer operating system Linux has had little success with cell phones so far, but its role is increasing with the LiMo platform and Google is using Linux for its Android platform.
Linux is the most popular type of free or so-called open source computer operating system available to the public to be used, revised and shared. Linux suppliers earn money selling improvements and technical services and Linux competes directly with Microsoft Corp, which charges for its Windows software and opposes freely sharing its code.
LiMo also said Japanese mobile carrier KDDI Corp and touch screen company Immersion Corp had joined the not-for-profit foundation. But LiMo has been missing support from the largest cellphone vendors. So far smaller phone makers NEC, Panasonic and Motorola Inc have unveiled in total 42 phones using its software. At the same time, all the top handset vendors, except Nokia, have promised to produce phone models running Android software.
The world's second- and third-largest cell phone vendors, Samsung Electronics Co Ltd and LG Electronics Inc, are members of LiMo, but have not unveiled commercial models.
LiMo hopes to benefit from its focus on giving greater say over software development to telecommunications operators. Its key membersVodafone Group Plc, France Telecom SA's Orange, Japan's NTT DoCoMo Inc, South Korea's SK Telecom Co Ltd, Telefonica SA and U.S. operator Verizon Wireless, a venture between Verizon Communications In and Vodafonehave pledged to introduce LiMo phones in 2009.
(Reporting by Tarmo Virki; editing by Andre Grenon)
© Thomson Reuters 2010. All rights reserved. Users may download and print extracts of content from this website for their own personal and non-commercial use only. Republication or redistribution of Reuters content, including by framing or similar means, is expressly prohibited without the prior written consent of Reuters. Reuters and the Reuters sphere logo are registered trademarks or trademarks of the Reuters group of companies around the world. | <urn:uuid:66afe579-19ba-4f75-a539-0f8d48c38695> | CC-MAIN-2017-04 | http://www.pcmag.com/article2/0,2817,2351419,00.asp | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00302-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.925577 | 529 | 1.625 | 2 |
When you buy The Other Bar, an experimental new chocolate bar designed to fight global poverty, the candy comes with a choice: Inside the package, you can scan a code to donate a blockchain token to the farmers in Ecuador who produced the cocoa, or use it to get a discount on the next chocolate bar you buy, sending more business their way.
“This is an experiment in what we can do to drive conscious consuming towards impact goals,” says Guido van Staveren, founder of the FairChain Foundation, a Dutch organization that partnered with the United Nations Development Programme on the pilot, a limited run of 20,000 packs of dark chocolate or milk chocolate bars made from Ecuadorian cocoa that will go on sale online October 14. “The whole idea is to use technology to influence consumer behavior and basically turn every product into a capitalist impact engine.”
When a consumer decides to send funding back to farmers, it goes to the local cocoa farmer’s association, which uses the funds to plant new cacao trees. Each token is equivalent to a quarter of a cocoa-producing tree (so four chocolate bars equals one tree). The pilot, with 20,000 bars and 10 participating farmers, could lead to the planting of 5,000 new cocoa trees, which can provide extra income for farmers. The donations are tracked on the blockchain, so consumers have proof of impact. “Consumers don’t have to trust an NGO to create an impact . . . they only need to trust themselves,” says van Staveren.
The tokens are funded with money that other brands would use for marketing. It’s a model that the team hopes to prove in the pilot so that it can convince other companies that redirecting marketing budgets toward social impact marketing is an effective way to grow business. “If we can show that this proof of impact drives customer loyalty, and marketing spend given to consumers turns into impact, then we can reach out to all these large companies that now spend millions on Kim Kardashian and say, ‘Don’t spend your marketing on these famous faces, spend your marketing dollars on your own crowd, your own customers, and let them invest in impact,” says van Staveren. Around $800 billion is spent worldwide on marketing, he says—but only $170 billion is necessary to end global poverty.
Source: Fast Company | <urn:uuid:e9e36810-65ad-473c-a4dc-6b71665039e8> | CC-MAIN-2022-33 | https://www.theoryhousefwd.com/social-impact-marketing-inside-new-chocolate-bar/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz | en | 0.931424 | 489 | 2.046875 | 2 |
A "neurological" study
of Facebook, Yahoo! and The New York Times found that
Facebook triggered greater levels of attention, emotional
engagement, and memory than the other two did, and is thus a
premium medium for advertisers. The results of the study
shouldn't be too surprising given that Facebook itself
commissioned the study.
The study was slightly bizarre because it involved recording users' brainwaves while they were looking at the three sites. The study was conducted by Neurofocus, a neurological marketing research agency that places EEG censors on consumers heads' to record their brainwaves while they engage with media. The picture at right shows one of the devices Neurofocus uses to conduct these studies (although that particular device was different to the one used for Facebook).
Users looked at their own “News Feed” on Facebook, the default
home page of Yahoo! and the default home page of The New York Times. Unsurprisingly,
people's brains were significantly more engaged when looking at
their friends' pictures and status updates than they were looking
at Yahoo's unpersonalized page full of headlines and generic
news. Here are the results in chart form:
While EEG can measure neural activation, Neurofocus interpreted its results by taking that a step further and suggesting this had consequences for advertisers:
"All of these differences appear to be related to the expectations people bring to these sites when they visit them, and these expectations, in turn, appear to impact how people respond to advertising on these sites." | <urn:uuid:5d56a039-a3c1-42d8-bbc6-22462fc8efcb> | CC-MAIN-2017-04 | http://www.businessinsider.com/facebook-studied-users-brainwaves-for-its-advertisers-2011-12 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283301.73/warc/CC-MAIN-20170116095123-00508-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.960614 | 315 | 1.921875 | 2 |
As we inch closer to spring break, we have some exciting news! We have received confirmation that we are able to have parents attend our Wax Museum on Thursday, March 10th! Parents will be able to visit outside. We are so excited you will be able to see your child’s hard work and presentation! This will not change the wax museum due date. It is still due on Wednesday, March 10th, and the students will present in front of their classmates.
Parents are allowed to come into the building to be a Guest Reader for Read-A-Thon. At this time, you will still need to wear a mask. Bring a favorite book or choose from the classroom library (I have a TON of great books to share). Please, no siblings. Sign up for ONE time slot per family.
We can’t WAIT to welcome you back in the classroom! 🙂
Be on the lookout from your teacher about a sign up for a day and time!
– February 25th- March 9th: Read-A-Thon
– March 9th: Wax Museum Due (Bring costume, speech, and poster)
– March 10th: Wax Museum for Parents
– March 11th: Book Character Dress Up Day
– March 11th: Half day for students. Dismissal at 11:30
– March 14-18: Spring break
ELA: Myths and vocabulary
Math: Elapsed Time
Science/SS: Read-A-Thon Guest Readers!
Thank you so much!
-Third Grade Teachers | <urn:uuid:54e643fe-3109-4e72-b560-ca20f67ad55c> | CC-MAIN-2022-33 | https://www.percypriest.org/news/3rd-grade-news-2-25/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00675.warc.gz | en | 0.957985 | 339 | 1.695313 | 2 |
Air University Review, November-December 1977
Wing Commander Peter P. W. Taylor, RAF
Let us honour if we can
-W. H. Auden
THE VERTICAL and short takeoff and landing (V/STOL) concept is not new, having fascinated air theorists with its possibilities for many years. French, American, German, Russian, and British designers are a few among many who have experimented either theoretically or practically over the last twenty or so years. And now, V/STOL is really with us. This article proposes that V/STOL is the future of tactical fighter aviation. Unfortunately, as Auden indicates in his pithy poem, complete agreement on the issue has so far eluded us. It will, therefore, be the purpose here to examine the impact that V/STOL technology has and might have in tactical air warfare; to present facts, interpretations, and views; and logical argument to convince a wide audience that V/STOL has much to offer--and that time is getting short for the West to exploit the advantage it currently enjoys in this field of technology.
The Hawker Siddeley Harrier has been in service with the Royal Air Force (RAF) and the United States Marine Corps (USMC) for eight years; and the Royal Navy and the Spanish Navy have either acquired or are acquiring seagoing Harriers. As for the Russians, their first experimental design, the Freehand, has developed into the Yak-36 Forger, currently embarked on the carrier Kiev. In the near future, we shall see an updated version of the USMC Harrier (the AV-8A), now designated the AV-8B. It is also inconceivable, as John W. R. Taylor asserts in Jane’s Aerospace Review 1976-1977 that "if the Soviet Navy was prepared to show off the Yak-36 so blatantly, we must assume that it is regarded as merely a first step towards something better." l
Some, then, are clearly convinced by the possibilities, and they are those who usually argue V/STOL with the most persuasive enthusiasm. But why, if the case is so good, has V/STOL not found greater acceptance in military aviation circles? If a V/STOL aircraft can show significant advantages over its conventional counterpart, why have we been so hesitant and tardy in developing both technology and concepts?
History provides many examples of new technology, both in industry and in the military, that have either been ignored, discarded too soon, or have been developed much later than they should have been. With the benefit of hindsight, we look back and marvel that anyone could have been so blind as not to have seen the advantages of, say, the bow, the machine gun, or the torpedo. Yet, they were only to have been proved wrong time and again. It will be proposed here that V/STOL is a technological advancement similar in significance to those just cited. We must hope, therefore, that we are not ignoring an innovation of such fundamental importance that we shall be similarly accused by our successors.
How would V/STOL adapt to the current concepts of tactical air operations? To answer this question, we shall look first at the doctrine prescribed by AFM 2-1, Tactical Air Operations--Counter Air, Close Air Support, and Air Interdiction, which states that flexibility is the most significant operational characteristic of tactical air forces. It continues that tactical air forces have the inherent capability to react rapidly and selectively to a wide range of missions under varying operational conditions throughout the entire spectrum of conflict. 2 And how is this flexibility to be derived? By capitalizing on the inherent range, mobility; responsiveness, and versatility of tactical aircraft. None of these characteristics is adversely affected by V/STOL aircraft; on the contrary, as we shall see later, they can replace, enhance, and even revolutionize their application.
AFM 2-1 has further pertinent advice to offer concerning the security of tactical aircraft on the ground. Under the headings "Dispersal" and "Security," the manual states:
Since tactical air forces can operate at high speeds and over long distances, they should be dispersed for security.
Technological advances should be exploited to minimize the force required and to reduce operational losses.
Measures to maintain and strengthen the security of available forces against all actions which could reduce, neutralize or destroy capabilities are of paramount importance. 3
Could there be a more effective way to provide dispersal and security than the V/STOL option? V/STOL allows dispersal and concealment, freedom from fixed bases and rigid concepts, and therefore contributes to a reduction of operational losses. And finally, could there be a more effective way to maintain and strengthen the security of available forces than the theoretical freedoms to hide and operate from almost any surface?
Sufficient evidence exists to propose that V/STOL could replace, enhance, and revolutionize the doctrine dictated by AFM 2-1 for tactical aircraft. For the first time, the oft-repeated ideal requirements that are espoused in the doctrinal manuals could be translated into an actual capability.
The present doctrine for deterring Soviet aggression in Western Europe is based on a defense triad consisting of strategic and tactical nuclear forces and conventional forces. Since tactical nuclear and conventional aircraft are often the same in NATO (possibly until the introduction of the cruise missile), no specific effort will be made to draw clear lines of distinction between tactical operations involving the two. The discussion will focus on the broad category "tactical aircraft" and encompass all the generally accepted roles in tactical operations.
It is axiomatic that the tactical air contribution to the deterrence equation must be credible or it may assume a negative value. That is to say: if NATO's tactical air forces are so structured and employed that they are either vulnerable to surprise attack or have a doubtful capacity to operate in war, then these forces invite rather than deter aggression. A closer look at the relative deterrence values of both the Warsaw Pact and NATO air forces is taken later in the article. For the moment, however, the deterrence value of tactical aircraft will be discussed more in the abstract than the subjective.
If we begin by proposing that the tactical part of the triad must be as invulnerable as we can make it, we must examine how this is currently achieved. Air Force doctrine stresses that the vulnerability of tactical aircraft can be reduced by applying the following principles:
Flexibility. Aircraft must be given as many operating options as possible.
Readiness. The highest state of readiness commensurate with peacetime and training requirements ensures some degree of security from surprise attack.
Training. A high state of training coupled with realistic exercises contributes to successful operations and reduces losses both on the ground and in the air.
Defenses. A combination of hardening and toning down key equipment and installations, plus improved antiaircraft artillery (AAA) and surface-to-air missiles (SAM), will reduce vulnerability.
Dispersal. Dispersal and concealment are ancient military principles whose validity has been proved in many campaigns.
In light of these principles, we pose the question: How applicable will the principles be in the face of advancing technology? To answer, we will assess the vulnerability of today's airfields against precision-guided munitions (PGM); and we begin with a few published statements on the subject:
Nor are all the tactical implications of even the current generation of PGM yet apparent. Thus far only two have been clearly identified. The first is that fixed installations seem to be particularly vulnerable to PGM. . . . This means that depots, airfields . . . are less secure than they have been in the past. . . . This tends to put a premium upon hiding, blending with the background, . . . 4
James Digby of the Rand Corporation wrote on the same subject.
It will become much less desirable to concentrate a great deal of military value in one place . . . . If the attacker has a finite number of PGM, anyone of which has a high probability of destroying its target, then it is better to force him to spread them over many targets which are individually of small value. . . . Smallness and mobility will make hiding easier. . . . However, one must also consider the degree to which concentrations can still be sheltered, or protected by active defenses. . . (but) there is no question of PGM not being used if fighting takes place, and no tactical planner can any longer afford to ignore their effect on his vulnerabilities.
Even small units can be very powerful when equipped with PGM or with designators that can call in and guide remotely-launched PGM. . . . . 5
The significance of these extracts is clear: PGM among other weapons can probably defeat airfield defenses. Furthermore, the principles from which a degree of vulnerability had previously been derived now look less valid. How flexible can one be if either individual targets or the main runway are successfully attacked? All the readiness in the world cannot help if runways are destroyed in the first salvo. And finally, the security of the base can be overcome not only by air attack but also by ground attacks, if the threat from sabotage groups, for instance, is enhanced as much as Digby's last statement would lead us to believe.
Although the extracts about PGM predict a rather gloomy future for the fixed installation, they were chosen because they not only described the potency of the PGM but also how PGM effectiveness might be reduced if certain other principles were reapplied to the argument. The extracts all hinted that dispersal of forces into a number of smaller targets and mobility and concealment could still allow the flexibility, readiness, and security required for effective tactical operations.
the Warsaw Pact
The threat from the Warsaw Pact tactical aircraft is today both quantitative and qualitative. Until quite recently this was not the case since although the pact enjoyed a considerable numerical superiority over NATO, their aircraft possessed little sophisticated equipment and a relatively poor offensive capability. The aircraft were, however, very rugged and designed to operate from a variety of natural and prepared surfaces. The apparent qualitative deficiency in Soviet designs has now been considerably reduced by the advent of a new generation of tactical combat aircraft. By almost any estimate, the Fencer, Flogger, and later series of Fitter and Fishbed are formidable aircraft giving the Warsaw Pact air forces an immensely improved offensive capability. Nor, seemingly, has this achievement been accomplished at the sacrifice of numerical strength. According to Flight International magazine, the Russian aircraft industries supply about 1000 new combat aircraft every year, not counting about 700 helicopters. In addition, improvement to some earlier models has meant that they are often being replaced roughly one-for-one, over and above being reinforced by new types.6
Soviet operations have traditionally stressed the need for surprise and security,7 and nowhere has this been more clearly demonstrated than in their doctrine for the use of tactical air power. The Soviets have always clearly understood the need to safeguard their air assets either from a surprise attack or during operations, through a combination of strong static defenses and dispersal. Contemporary developments have not changed this perception. Descriptions of the formidable Soviet air defenses can be found in almost any aviation magazine today, stressing the numbers, complexity, and efficiency of the various systems.8 Furthermore, the emphasis on dispersal, combined with hardened shelters, remains of fundamental importance to the Warsaw Pact:
The operational readiness status of Soviet Frontal Aviation units is on a permanently high level, and is continually improved and checked on by practice alerts. As part of these practice alerts, units are redeployed from their bases to small auxiliary airfields, of which there are several hundred in frontal areas. 9
It would, therefore, be fair to conclude that the Warsaw Pact is well equipped, well trained, enjoys the benefits of standard equipment, and maintains a high state of readiness. The continued emphasis on dispersal capability bestows the dual advantages of reducing aircraft vulnerability in the event of a pre-emptive attack by NATO, while at the same time allowing an unrivaled offensive capability to either pre-empt or conduct operations in war. Warsaw Pact tactical air power is thus credible in terms of deterrence and capable in terms of performance.
the North Atlantic
NATO's approach is somewhat different, stemming in part from military, economic, and political perceptions. Colin Gray summarized the basic NATO approach:
The NATO countries are essentially status quo powers, and so have generally adopted a mix of strategic and arms control policies that give the initiative to the other side. . . . 10
This quotation suggests many of the policies and doctrines that NATO has adopted in the equipping and use of its forces. To deal with the specific case of tactical aircraft, we see that NATO intends to undertake all the traditional roles, such as interdiction, counterair, reconnaissance, and close air support It is intended to pursue these roles irrespective of the Soviet air defense threat and the imbalance in numbers of aircraft between the Warsaw Pact and NATO. The current Military Balance estimates the imbalance in Central and Northern Europe to be 2085 for NATO and 3975 for the Pact. 11 Recent re-equipment programs have seen or will soon see a significant qualitative improvement in aircraft, provided by the F-16, F-15, the Tornado, and the A-10.
Unfortunately, NATO's aircraft are concentrated on a few, easily identified airfields whose position is precisely known. This presents NATO planners with three main problems: how to reduce the effectiveness of a pre-emptive attack; how to continue operations during war; and how to receive the planned reinforcements from the U.S. to offset the present numerical inferiority. In other words, apart from the Harrier, NATO does not have a dispersal capability and pays the price in the lack of flexibility inherent in its tactical air doctrine. Nor does the future look bright, for the main effort to reduce the vulnerability of NATO's airfields is being directed to such static measures as hardening, toning down, and improved air defenses. Worthy and necessary though these measures may be, they retain the essential weakness of being static, a point aptly summed up by Bill Bedford, a former Hawker Siddeley chief test pilot:
In war certain basic principles apply of which flexibility, mobility and surprise with quick reaction are of the utmost importance. Is there not a tendency for these fundamentals to have been overlooked in latter years where air power is concerned? Have certain NATO and other countries not partially burled their heads in large, vulnerable concrete runways, protective shelters, SAM and Anti Aircraft defences? History points time and time again, to the danger of STATIC inflexible defence whether it be a stone age cave, a castle, Maginot line, or an airfield. The Achilles Heel is that of being static--no matter how well protected and defended such bases may be. l2
This, in essence, is what NATO has done. As a result, options are few, a high state of readiness is difficult to achieve, and fixed installations can be accurately targetted. The new-generation NATO aircraft are highly sophisticated and aggravate the problem further since their very sophistication argues against operations from anywhere other than a fixed installation with the necessary support.
Thus we see a NATO air force that although well equipped and trained possesses the fundamental operating weakness of being highly concentrated. Furthermore, there appears to be little enthusiasm for developing any kind of comprehensive dispersal capability, relying instead on improving static defenses. The deterrence posture gives little comfort or credibility, and the imbalance created mainly by the dispersal issue is or should be worrying. NATO has pursued an unequivocably defensive strategy that should have placed great stress on survivability of its forces. A parallel strategy can be found in the most expensive efforts which both the U.S. and the U.S.S.R. have undertaken to ensure the survival of their respective strategic weapons. Yet whereas NATO's tactical forces are grouped closely, the Warsaw Pact's, already enjoying the luxuries of superior numbers of aircraft and airfields, have a further marked superiority in dispersal capability.
What can be done to correct this imbalance? We have already found arguments which stress that technology is the West's strong point, but it seems that on the subject of dispersal, a proper course is not being pursued, despite such exhortations as
The side which can maximize the effects of the new technology first is likely to be the better prepared for the next conflict.13
Current V/STOL aircraft and associated concepts of operations have shown how effectively they could free NATO's tactical aircraft from the dangerous constraint of operating from a handful of airfields. Unfortunately, only a few have seized the opportunities now offered.
The human race has seldom distinguished itself by the rapidity with which it has embraced new ideas, and military innovations fit only too neatly into this hypothesis. Admiral Alfred Thayer Mahan expressed this aptly in his classic study The Influence of Sea Power on History, 1660-1783:
Changes in tactics have not only taken place after changes in weapons, which is necessarily the case, but the interval between such changes has been unduly long. This doubtless arises from the fact that an improvement in weapons is due to the energy of one or two men, while the changes in tactics have to overcome the inertia of a conservative class; but it is a great evil. It can be remedied only by a careful recognition of each change, by careful study of the powers and limitations of the new ship or weapon, and by a consequent adaptation of the method of using it to the qualities it possesses, which constitutes its tactics. History shows that it is a vain hope that military men generally will be at the pains to do this, but that the one who does will go into battle with a great advantage--a lesson in itself of no mean value. 14
These are brave and prophetic words that apply to many technological advances, of which V/STOL is one of the latest. So let us examine "the powers and limitations" of this new technology and provide perhaps one example to history of military men who have adapted it, made capital from its properties, and produced new, even revolutionary tactics for jet fighter aircraft.
advantages of V/STOL
The advantages of V/STOL technology will be developed under three headings: operational flexibility, survivability, and combat agility.
Operational flexibility. V/STOL technology allows aircraft to disperse from fixed bases whenever a threat seems imminent, providing both a survival and a return strike capacity. Any attempt by the enemy to locate and destroy these dispersed forces (either close to or far from the main base) will compel him to dissipate a large proportion of his air power. This fact is emphasized when we consider the type of operating surface that may be available to V/STOL aircraft. The Harrier, for example, has already operated from meadows, parts of active or disused airfields, roads, playing fields, light aircraft strips, railway stations, woods, and has flown from 18 different types of ships; 15 there may be a future application for the security of oil rigs.
If the V/STOL aircraft is brought close to the area of operations, either on land or sea, there are possibilities for providing exceptionally rapid response to calls for ground support. There are other advantages to be gained from this. For example, rapid response can be provided whenever required without having to adopt an expensive airborne alert, and pilots can become very familiar with the operating area, thus reducing briefing times and navigation problems. Furthermore, in relative terms, more ordnance can be dropped per flying hour since so little time needs to be spent in transit. This factor also ameliorates the impact of being forced to jettison weapons in an air-to-air combat encounter. Finally, V/STOL aircraft can operate and recover in very low cloud base/visibility conditions and generally without regard to crosswinds. V/STOL allows the recovering aircraft to slow down, maneuver, and land if it is not aligned with a strip, or even to maneuver to undamaged areas of a main runway that has been attacked during its absence. V/STOL, therefore, offers unparalleled operating flexibility for a modern jet aircraft.
Survivability. As already mentioned, survivability is one of the aspects of operating flexibility that is derived from V/STOL, but it is of such fundamental importance that it should be amplified further. The ability to survive a pre-emptive attack and to operate during war are two essential prerequisites for any air force. V/STOL aircraft fulfill both these requirements; in the first instance dispersal greatly improves the chances of survival and, in the second, if they survive the initial attack on an airfield either by dispersal or by protection, it is unlikely that sufficient space could not be found for subsequent operations. Even in the worst case, where airfield logistics and runways were destroyed, whereas the conventional aircraft would be forced to wait for runway repairs, the V/STOL aircraft could depart in one of its various modes, fly to another source of fuel and weapons, and recommence operations. The flexibility that allows an aircraft not only to maneuver and fly to another airfield when its own is damaged but also to maneuver within its airfield perimeter to reach fuel and weapons is, without question, a unique capability.
Combat agility. Combat agility in V/STOL aircraft like the Harrier is an unusual capability derived from the design concept of vectored thrust. Startling maneuvers can be generated in flight during air combat through a combination of aerodynamic and jet reaction controls. Extremely rapid decelerations and instantaneous turns can be achieved in the vertical or horizontal planes that cause almost unmanageable overshoot problems for an attacker with guns. As an example of what can be achieved, it was stated recently in Jane’s Aerospace Review 1976-1977 that whereas the F-14 Tomcat had fought successful engagements against the Mirage F-l and F-5Es, results against the Harrier flown by United States Marine Corps pilots were quite different:
Using the full V/STOL aircraft's low-speed maneuver ability, and rapid acceleration and deceleration, the Marine pilots outfought F-14s in six of the sixteen engagements, losing only three, with the others indecisive. There could be no better incentive for ensuring the successful development of the McDonnell Douglas AV-8B advanced version of the Harrier; and the U.S. Navy must be relieved to know that the Kiev's Yak-36s do not share the Harrier's VIFF (thrust vectoring in forward flight) and STOL capability. 16
It should be stressed that this capability is derived from the vectored thrust design for producing V/STOL aircraft.
In addition to advantages during combat maneuvering, there are other distinct operating gains that follow from the vectored thrust idea. For example, steep dive bombing or evasive descents are possible without speed fluctuations. Fuel consumption, a most important aspect of air combat, can also be kept to a surprisingly low level. In aircraft like the Harrier, vectored thrust allows the use of all the installed engine power when in conventional flight. The high thrust-to-weight ratio allows outstanding climb, accelerations and decelerations, and maneuver. Moreover, the Harrier engine has many of the characteristics of the reheated supersonic fighter without the accompanying complexity and massive fuel consumption of the latter. For example, at full power the Harrier burns only 220 lbs/min. 17 The Harrier thus has a clear edge in staying power over the F-4 and many of her likely Soviet opponents. Even when the Harrier or any V/STOl aircraft if finally forced to retire from the flight, whereas the conventional aircraft must reach a base before running out of fuel, the V/STOL aircraft has virtually unlimited flexibility in finding somewhere to land.
disadvantages of V/STOL
When the relative merits of V/STOL and conventional aircraft are discussed (while the merits of V/STOL are generally conceded), opponents seize tenaciously on certain of the alleged disadvantages and, after a brief session of bloodletting, the victim is usually pronounced dead. Such judgments are often premature and do not stand up to dispassionate examination. Unfortunately, discussions of V/STOL are usually undertaken by people who are already convinced one way or the other, and a balance of views is seldom reached. We, therefore, shall look at the four most commonly cited disadvantages of V/STOL in an attempt to reach a balanced assessment of its contribution to tactical air warfare: logistics, security, command and control, and cost. While payload and range are also put forward as serious disadvantages, in general this accusation has been leveled specifically at the Harrier. Nevertheless, this change will be discussed under future developments.
Logistics. The problem of servicing and resupplying a dispersed force is the one most often raised as being the Achilles' heel of V/STOL concepts. It, therefore, deserves a close analysis. We shall consider two resupply problems: the first for V/STOL aircraft operating from a main base and the second for fully deployed operations.
Security. As with logistics, ensuring the security of any military installation or piece of equipment is not unique to V/STOL aircraft, although special problems do exist, as seen in on-base and off-base operations.
1. Security on the main base. Provided that V/STOL aircraft remain within the airfield perimeter, there are no special security problems. On the other hand, V/STOL offers such flexibility that concepts have been developed which envisage the dispersal of individual or small groups of aircraft either just within or just outside the airfield boundary to take advantage of natural cover and suitable roads or strips. For defense from air attacks, these aircraft must rely on a combination of dispersal and concealment and the normal AAA and SAM airfield defenses. For ground defense, an outer defensive ring of ground troops and mobile patrols is supplemented by an inner ring of and rained aircraft technicians. Once more the problems of security do not seem to be insuperable, while the gains are in presenting the enemy with an unusual and difficult targeting problem.
2. Security when deployed. The security of V/STOL aircraft when deployed is undoubtedly one of the biggest headaches. For example, Harrier sites deployed behind forward army elements, say 50 kms from the forward edge of the battle area (FEBA), are extremely hard to find. No attempt has yet been made to provide the sites with active air defenses, but mobile SAM technology is advancing at such a pace that this may soon be feasible. It is generally argued that the greatest threat to Harrier sites will come from a ground or airborne assault. Under these circumstances, the first recourse would be to divert aircraft and move the site. Failing that, the outer and inner defense concept would attempt to stabilize the situation to allow evacuation or call for help. All Harrier site training includes operating in a nuclear, biological, and chemical warfare (NBC) environment. In summary, placing sites near army units, dispersal and concealment, active air defenses in the future, and a higher state of training provide the sites with viable security.
Command and control. The problems of command and control hinge on the ability of the tasking agencies to communicate with deployed units. On-base dispersal presents no difficulties since the tasking facilities already exist. Individually dispersed aircraft are reached by telebrief, mains radio, vehicle radio, or hand-held VHF radio. Off base, the use of secure army communications has allowed tasking to any or all sites. Sites may task each other and speak to logistics parks. In addition, the use of aircraft telebrief either on or off base allows cockpit tasking and associated high sortie rates and reduces the hazards of operating in NBC conditions.
Cost. To begin a discussion about cost by proposing that it is difficult to be definitive usually provokes a flood of skeptical comment. Nevertheless, although the statement is true since cost measured against effectiveness is bound to be inexact, we must grasp this nettle. As a rough estimate, it costs 10 to 15 percent more to operate a fully deployed Harrier squadron than its conventional counterpart at an airfield. This extra cost follows from the need to provide logistics support, communications facilities, protection of sites, etc., according to the distance of the sites from the main base and according to what is already available.19 The return for this extra cost is, however, a highly flexible, invulnerable, and responsive force. We can also say that operations from a main base involve no extra cost at all; in fact, unless the individual aircraft are destroyed, operational capability can be practically guaranteed. And we are talking about a formidable capability here. It has been said that the Harrier devours six to seven times the fuel and weapons of a modern tank, yet she can deliver up to 20 times the weight of ordnance over 30 times the distance and can assume many more roles.20 We can, therefore, sum up by saying that there are no extra costs for operating V/STOL aircraft from a main base, but an increase in the order of 10 to 15 percent can be expected for deployed operations. Cost effectiveness on the other hand is practically immeasurable since operations by a V/STOL aircraft can be guaranteed to a higher level than its conventional counterpart.
Battle damage. A final disadvantage that is sometimes raised concerns the problem of battle damage; e.g., a bullet in the wrong place may preclude the V/STOL option. While this is undoubtedly true, a similar argument could be applied to carrier operations, and this has not yet caused the carrier option to be abandoned. Battle damage will occasionally prevent a V/STOL aircraft from operating in all its modes, in which case it becomes a conventional aircraft facing similar problems of conventional recovery.
Dramatic improvements in both aircraft and concept have been achieved in eight years, and the signposts for future improvements no less dramatic are clear. Most important, however, is that having overcome the real or imagined disadvantages of V/STOL operations, V/STOL design allows tactical aircraft to take advantage to the maximum extent of the characteristics, functions, and principles of employment.
The Royal Air Force has devised two basic V/STOL concepts with the Harrier, and the United States Marine Corps has developed one. Meanwhile, outline concepts for naval use are emerging, also.
concept for RAF Germany Harriers
The main concept of operations that has been developed for the three RAF Harrier squadrons in Germany envisages full tactical deployment. Aircraft are dispersed to a number of preselected sites where maximum use can be made of concealment and existing facilities, such as buildings, barns, woods, and where some sort of operating surface is available; logistics parks provide fuel, weapons, spares, etc. Secure communications allow tasking and link each site with a forward wing operations center (FWOC). Sites may also communicate with each other. The essence of the concept is its mobility, since each site is virtually self-contained and retains most of its equipment on wheels to facilitate rapid site moves. Such moves could be generated by a deteriorating ground situation, air or ground attack, or contamination from nuclear or chemical sources. While every site maintains a rudimentary decontamination capability and all field exercises include contamination training, the first recourse is to effect a site move. Security of the sites is achieved by the outer ring/inner ring principle. The outer ring is provided by specially trained RAF regiment squadrons and the inner ring by the site personnel themselves. Every technician receives extensive tactical training and can fight as a soldier if he must. This capability is also regularly exercised in a nuclear, biological, and chemical environment. Sites contain enough fuel and weapons for 24 hours' operations and are restocked at night. Sufficient flexibility also exists to accept aircraft from other sites either during site moves or for emergency reasons.
Operations are normally conducted from dawn to dusk and in visual meteorological conditions, although the unique characteristics of the Harrier allow operations in very poor weather. Tasking is originated through the usual channels, normally through the FWOC, although sites may be tasked directly if necessary. Within the sites, each aircraft is connected to the site headquarters by telebrief, thus allowing cockpit tasking. This scheme permits great responsiveness to tasking, high sortie rates, and a degree of immunity to the aircrew during contamination.
The concept has proved to be very successful. It is not unusual for the Harrier wing to fly about 240 sorties per day for extended periods, achieve a response time of 10 to 15 minutes, and avoid detection. The daily number of sorties could be exceeded but for peacetime constraints of safety and consumption of weapons. Most pilots fly six consecutive sorties before relief, and this schedule has been found perfectly sustainable over a period of many days.
concept for United Kingdom Harriers
The concept for the one Harrier squadron in the United Kingdom has been developed to cope with its specific commitment. The squadron is assigned to NATO, mainly to the flanks, but it also has a worldwide role outside Europe in support of national interests. A concept has therefore been developed that envisages an air mobile deployment of the entire squadron, including manpower and logistics support, to an airhead. The individual aircraft are then dispersed, sometimes singly and sometimes in small groups, either just within or just outside the airfield perimeters. Aircraft are concealed, and operations are the same as for the RAF Germany concept except that any part of the airfield or its environs are used for dispatch and recovery.
This concept has also proved to be very effective during operational deployments overseas and exercises at home. As an example, a recent exercise in the United Kingdom simulated a Harrier squadron of 12 aircraft in direct support of a brigade under heavy attack from the ground. In response to requests for air support, 12 aircraft generated 364 sorties in three days. One aircraft flew 45 consecutive sorties without major servicing, and serviceability in general was outstanding, demonstrating that flying this type of aircraft in a tactical setting presented no insuperable engineering problems. Although critics of the Harrier have denigrated her weapon load, the potential amount of ordnance that could have been dropped in the brigade area is worth noting:
72,000 30-mm high-explosive shells
1500 cluster dispensers
or 900 X 1000-lb bombs + 600 SNEB rocket canisters
or 300 X 1000-lb bombs + 1800 SNEB rocket canisters. 21
A formidable load by any standard.
The concept for the U.K. Harriers, while not the best of the two RAF concepts, nevertheless has been successful and is clearly applicable in principle to operations by other V/STOL aircraft operating from airfields in Europe. Experience has shown that while an attacker may know the precise location of an airfield, individual targets that are dispersed and concealed are hard to find and engage. Furthermore, if these aircraft possess V/STOL characteristics, it is virtually impossible to stop operations completely, and the use of several strips simultaneously allows extremely rapid takeoff and landing, and exposure time is accordingly small.
Marine Corps concept
The United States Marine Corps has been most enthusiastic about the possibilities of V/STOL aircraft and is currently carrying the banner for future development with vigor. The marines are operating about 100 Harriers (designated AV-SA), mainly in support of amphibious assault but also in a limited air defense role. The USMC concept envisages three phases: (1) operations from ships, (2) operations from a temporary site on or near the beach, and (3) operations from a main base or shore. In the initial stages of a landing, fully loaded AV-8As operate either in the air defense or close support roles. When the beach is secure, the ground commander can call for the AV-8As to fly to the beach site on ground alert (cab rank) and return to the ship for refuel and rearm. The temporary beach site can provide basic turnaround servicing, but the aircraft still depends on its sea base for major support until the main base is established on shore. 22
Convinced of the possibilities of V/STOL, the USMC has been most active in the development of the AV-8A. The marines have proposed an improved version of the AV-8A, designated AV-8B, which includes specific modifications to make it more suitable for USMC duties. If the development programmed is successful, the marines envisage a force of 342 AV-8Bs by the 1980s. 23 Lieutenant General T. Miller, USMC, has stated:
The advantages of V/STOL are so important that we have stated a requirement for an all-V /Stol light-attack force to begin to phase in during the 1980s . . . 24
To introduce the subject of the uses of V/STOL for naval purposes, it is appropriate to quote John Fozard, the Harrier's chief designer: "The Harrier is the only aircraft that Nelson could have used at Trafalgar!" Not surprisingly, then, many navies of the world have seized on the possibilities that V/STOL offers. Already we see both Western and Soviet navies beginning to develop V/STOL aircraft, and various applications are emerging.
As carriers become ever more costly with their complex arrester gears and catapults, the validity of the carrier concept as a future weapon system is in the melting pot. Yet, there is an increasing need for long-range maritime patrol aircraft to be complemented by high-performance combat aircraft integrated and based with the fleet. These aircraft must combine the virtues of fleet protection and quick reaction. It is well known that ships are highly vulnerable without air cover, even with good antiaircraft (AA) defense, and this problem has become more acute with improvements in antishipping weapons. The sinking of the Eilat by Styx missiles provides Ii striking example. However, if the carrier concept becomes too expensive to support in the future, the requirements for responsive high-performance aircraft can still be met by using V/STOL aircraft. Seaborne V/STOL aircraft can undertake any of the traditional fixed-wing roles, including antisubmarine warfare, from a variety of deck surfaces without the complexity of the carrier. In fact, V/STOL aircraft once more open up the possibilities of pursuing the classic naval roles of projecting power and control of the sea quite inexpensively.
No study of this kind would be complete without a brief look to the future, since it seems evident that V/STOL indeed has a future in tactical aviation. What are the signs and portents? Unfortunately, some are pot good. Until the arrival of the Harrier and now the Forger, discussion of the merits of V/STOL aircraft was mainly theoretical. Events have changed this, and we now have much practical experience about operations, logistics, costs, and so on, and concepts have been developed, modified, and proved to be effective. Skepticism, however, remains very strong despite 18 years of V/STOL flying, eight of which have been operational. Brigadier General Atkeson made some pertinent points when he wrote that:
. . . conventional defense of Europe is not only possible, but that its feasibility and facility are improving steadily. Inasmuch as the new technology very definitely favors the defense, and is only beginning to have its weight felt in the tactical balance, we can look forward to an era of positive improvement and increased confidence in Western security. Technology is the strong suit among the Allies (particularly the United States) and the rapid expansion of known and shortly-to-become known physical and engineering principles is a task for which Western society and industry is naturally geared. . . . weapons revolutions have become routine and are really held in check only by the imagination limitations of those who contemplate their meaning. 25
The invention and development of V/STOL aircraft relate directly and significantly to these statements. It has been argued here that the development of a tactical air force with a viable V/STOL element could enhance the deterrence value of the conventional leg of the NATO triad of forces. V/STOL would enable NATO to develop a dispersal strategy that is clearly lacking today. Moreover, despite the length of time that V/STOL has been on the scene and the achievements of the Harrier forces, development of the idea seems to be being hindered, even blocked by ". . . imagination limitations of some of those who contemplate their meaning." While one can perhaps understand from the practical aspect that there is a limit to the number of systems that can be developed simultaneously, it is more difficult to understand downright" skepticism. Nevertheless, we must take heart from present achievements and continue sanguine regarding developments on the horizon.
On the Soviet side, as we have seen, the Forger is in service now with every expectation of seeing a more sophisticated V/STOL aircraft in the near future. The USMC plans to develop the AV-8A into the AV-8B and buy them in considerable numbers. The U.S. Navy is showing interest in V/STOL aircraft using a different design to the vectored thrust idea,26 while the Royal Navy has ordered a naval derivative of the RAF Harrier, to be named Sea Harrier. Other navies of the world are watching the development of these aircraft very carefully, and already the Spanish Navy has purchased a version of the Harrier, now named the Matador. But so far the development of the V/STOL idea is being developed more strongly by naval than land-based air power, although the application for the latter seems clear.
One of the few possibilities that presently exist is to be found in the RAF's plan to build a single replacement for the roles currently filled by the Harrier and Jaguars. The requirement has been designated Air Staff Target (AST) No. 403. This could be one of the most significant aircraft of the future and is worth a short digression. The RAF plans to identify and build the Harrier/Jaguar replacement by about the end of the 1980s. At present it has not been decided whether this aircraft will be V/STOL or not, or whether it will develop into an aircraft similar to the F-16. A further factor in the development of AST 403 is that other European countries (France, Belgium, Netherlands, Germany) have identified a need for a versatile follow on battlefield support aircraft. These four nations, plus Britain, have formed a five-nation working group to discuss their possible mutual requirements for a future tactical combat aircraft (FTCA).
While there are obvious political and economic overtones to discussions surrounding this aircraft, combining these with the military advantages produces a strong case for its development. An aircraft with the inherent flexibility derived from V/STOL technology that was also equipped for all-weather operations, was supersonic, and could carry a wide range of stores over a long distance would be a potent weapon. And, as John W. R. Taylor adds in Jane’s Aerospace Review 1976-1977:
Add thrust vectoring in forward flight, and the resulting aircraft begins to sound expensive but is anything else practical to preserve balanced forces in a period when the Soviet Union is producing 1000 tactical aircraft ever year? 27
It is not yet clear whether the differing requirements of the AST 403 and the FTCA can be reconciled, but in the light of NATO's clear requirement to develop a dispersal strategy and enhance the credibility of it conventional deterrence, a golden opportunity appears to be open. The first step, there fore, ought to be to include V/STOL technology in the AST 403.
Before leaving future aspects of V/STOL, we should perhaps glance briefly at the prospects for the development of payload and range, since this has been an area where the critics have been most active, and we refer here specifically to engine development. Hopefully, the story of the development of the Harrier's engine, the Rolls-Royce Pegasus, might allay the fears.
The present payload and range of the Harrier are largely functions of engine power, so that an increase in engine power would allow the V/STOL idea to be applied to many other roles than the present close support. For example, air defense, reconnaissance, and interdiction are roles that would be highly compatible with a V/STOL aircraft. In fact, a V/STOL aircraft with tactical nuclear weapons would provide a most potent deterrent and war-fighting force. Although V/STOL technology can be provided by means other than vectored thrust, the simplicity of the idea and its proven reliability remain an attractive proposition. Can vectored-thrust engines meet future requirements? History answers yes. The Rolls-Royce Pegasus entered RAF service in 1969 at 8680 kg thrust. In three years this had grown by 12 percent for an increase of only 2 percent in the weight of the complete weapon system. The net gain in thrust minus weight represents a 44 percent increase in the payload carried from vertical takeoff (VTO) and a somewhat smaller proportional increase in the (larger) STO payload. 28 It could be argued that thrust growth benefits the V/STOL aircraft more than it does its conventional counterpart.
Any future thrust increases should therefore enhance the already highly competitive capabilities of today's V/STOL aircraft.
The future is clouded by uncertainties V/STOL aircraft exist: today and have demonstrated their possibilities for both land and sea warfare. Further developments are clearly possible, and some avenues of approach for the future have been identified. We must not enable history to point to us and say that even with the examples of the machine gun and the torpedo less than 50 years old, another technological advance took years to be fulfilled.
Hq Tactical Air Command
1. John W. R. Taylor, Jane’s Aerospace Review 1976-1977, p. 32.
2. AFM 2-1, Tactical Air Operations--Counter Air, Close Air Support and Air Interdiction, Department of the Air Force, 2 May 1969, Chapter 3, pp. 31-33.
4. Brigadier General Edward B. Atkeson, Precision-Guided Munitions: Implications for Dètente, Carlisle Barracks, Pennsylvania: U.S. Army War College, Strategic Studies Institute, 16 September 1975, p. 6. Author's emphasis.
5. James Digby, Precision-Guided Weapons, The International Institute for Strategic Studies, Adelphi Paper No. 118, Summer 1975, p. 4.
6. Charles Gibson and Bill Sweetman, "Air Power for the Pact," Flight International, 5 June 1976, p. 1507.
7. The Soviet Nuclear Theater Offensive, Studies in Communist Affairs, U.S. Government Printing Office, 1976, pp. 1-14.
8. R. Meller, "Expensive Luxury or Painful Necessity? Europe's New Generation of Combat Aircraft Part I, The Increasing Threat," International Defense Review (Copyright 1976 by Interavia SA, Geneva, Switzerland, April 1975), pp. 175-86.
9. Peter Borgart, "The Air Attack Potential of the Warsaw Pact," International Defense Review (Copyright 1976 by Interavia SA, Geneva, Switzerland, April 1976), p. 193. Emphasis added.
10. Colin Gray, "War and Peace--The Soviet View, "Air Force Magazine, October 1976, p. 29.
11. The Military Balance 1976-1977, The International Institute for Strategic Studies (1976), p. 102.
12. A.W. (Bill) Bedford, "A Case for Survival or the Defence Significance of the V/STOL Combat Aircraft, NATO’s Fifteen Nations (August-September 1974), vol. 19, no. 4, p. 18.
13. Atkeson, p. 10.
14. Alfred Thayer Mahan, The Influence of Sea Power on History, 1660-1783.
15. Bedford, p. 22.
17. Bedford, p. 22.
18. Air Clues: The Royal Air Force Magazine, December 1976, p. 442.
19. Bedford, p. 22.
21. Derived from author's experience.
22. J. M. Ramsden, "America's Harriers," Flight International (London), 4 September 1976, p. 749.
25. Atkeson, p. 15. Author's emphasis.
26. Aviation Week & Space Technology, September 6, 1976, p. 81.
28. "The Harrier--Some Military Misconceptions," Aviation Limited (Hawker Siddenly), LTSK 97, Issue, 1 (February 1972), p. 31.
|Our age of anxiety is, in great part, the result of trying to do today's job with yesterday's tools--with yesterday's concepts.|
Wing Commander Peter P. W. Taylor, AFC, RAF, is the Royal Air Force Exchange Officer at Headquarters, Tactical Air Command, Langley AFB, Virginia. He has flown tactical fighters throughout his career, in the Far and Middle East and in Europe. Involved in the Harrier program since 1967, he has served as a flight commander in a Harrier squadron in Germany, followed by a tour as Squadron Commander of the United Kingdom Harrier Squadron, No. 1 (F). Wing Commander Taylor is a graduate of the Army Staff College, Camberley, and the USAF Air War College.
The conclusions and opinions expressed in this document are those of the author cultivated in the freedom of expression, academic environment of Air University. They do not reflect the official position of the U.S. Government, Department of Defense, the United States Air Force or the Air University.
Air & Space Power Home Page | Feedback? Email the Editor | <urn:uuid:1989503d-4786-47ad-b7ba-cff147e7baa2> | CC-MAIN-2016-44 | http://www.airpower.maxwell.af.mil/airchronicles/aureview/1977/nov-dec/taylor.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720845.92/warc/CC-MAIN-20161020183840-00087-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.95472 | 10,272 | 1.765625 | 2 |
According to Associated Press reports, the director of Russia's State Archive said "it is authentic." But an official at Russia's Forensic Medicine Institute archives department said he had "not seen documents providing evidence that this is the skull of Hitler.'' So far, there seems to be no conclusive evidence.
New Facts Under Investigation
Photo of mattress indicates that the force of the gunshot passed out of the hostage's back left temple area, and onto the floor. Top part of blood-soaked mattress was destroyed by fire or chemically decomposed before being discovered.
For more on this bunker discovery see: Photographic Trickery and the Likelihood of Fraud http://www.blackraiser.com/redoubt/avenge.htm
The Hidden Origins of Nazism
|New file: Farm Hall - nuclear secrecy?|
Theory: (Stay tuned to coming world press releases.) The real Adolf Hitler was a hostage (at Pasewalk Hospital) for most of the duration of the Second World War. His double, or impostor who assumed his identity, needed to prove "Hitler was dead" and escape if the plot to destroy European Jewry failed (as it finally did).
In the world media, Charlie Chaplin's famous 1940s film The Great Dictator gave its viewers a powerful hint that Adolf Hitler had a double or look-alike. The popular 1980s novel by Colin Forbes, The Leader and the Damned, also suggested that an impostor was the real reason for Hitler's drastic change in behavior and personality. In fact, according to the OSS' Hitler Source-Book, Newsweek and other magazine articles of the early 1940s were often filled with headlines about Hitler's impersonator, double, or crackpot. It was even once reported that the chancellor's look-alike was allegedly killed by a bomb under his chair. So who was the notorious double? And what became of the real Hitler?
More recently, the noted author Colin Wilson made a stark comparison between Adolf Hitler and the Masonic occultist Aleister Crowley in Aleister Crowley: The Nature of the Beast. A similar analogy can be found in the best-selling 1960s book, The Morning of the Magicians by Louis Pauwels and Jacques Bergier. In the 1980s, New Age skeptic Peter Lemesurier likewise expressed similarities between Hitler and Crowley (as antichrist) in Beyond all Belief. But it was the OTO Sumerian black magician Crowley himself who boasted: "Before Hitler was, I am." He once wrote that Adolf Hitler was his "magic child" or guinea pig. Crowley, who spoke several foreign languages and loved to assume prestigious false identities, often implied that he was the secret originator or turban-wearing "wizard" of Nazi ideology, and wrote in his autobiography that at his birth a few hair strands on his chest formed into a swastika. Strangely enough, his real name was not Aleister, but Edward Alexander Crowley. From Edward to "Allah's Turk" Crowley?
It is important that this body of evidence not be forgotten by future generations.
They should have kicked it. They should have kicked that mattress across the floor. But why dirty their boots? With radioactive oxide.
|13HITS.ZIP 1,344,059 kbs|
|BADNEWS.ZIP 991,459 kbs|
|THEMAN.ZIP 1,009,764 kbs|
|ISTHIS.ZIP 869,715 kbs|
|WINGED.ZIP 597,118 kbs|
|CRYOG.ZIP 1,515,259 kbs|
The Hidden Origins of Nazism
|Click here for other theories||What's ALSOS?|
JewPeter© Clean Black Raiser©
One sits forever, so that being may exist
Recently released war records reveal the use of a “political decoy” (doppelganger or body-double) –– a look-alike trained to impersonate Hitler in order to draw attention away from him and deal with risks on his behalf.
It is documented that the Nazi Fuhrer vetted at least four doubles.
Peter Fotis Kapnistos details their names, their peace-time occupations, their deaths, and an uncivil escape to South America…
Pope Sixtus VI: An Inglorious Guide To Hitler’s Doubles (2013)
Download the illustrated PDF now.
Free Version (without the last chapters).
List all links on this page | <urn:uuid:b6875792-35f6-474c-8c4c-1694a0901900> | CC-MAIN-2017-04 | http://www.blackraiser.com/jewpeter/hitskull.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280483.83/warc/CC-MAIN-20170116095120-00297-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.947291 | 944 | 2.140625 | 2 |
To add the CORS authorization to the header using Apache, simply add the following line inside either the
<VirtualHost> sections of your server config (usually located in a *.conf file, such as httpd.conf or apache.conf), or within a
Header set Access-Control-Allow-Origin "*"
To ensure that your changes are correct, it is strongly reccomended that you use
to check your configuration changes for errors. After this passes, you may need to reload Apache to make sure your changes are applied by running the command
sudo service apache2 reload
apachectl -k graceful
Altering headers requires the use of mod_headers. Mod_headers is enabled by default in Apache, however, you may want to ensure it’s enabled by run
Note: you can also use
add rather than
set, but be aware that
add can add the header multiple times, so it’s likely safer to use set. | <urn:uuid:e3e29ac5-534d-41ac-b53e-ccbe58c4f5ca> | CC-MAIN-2022-33 | https://aleprieto.com.ar/permitir-cors-en-apache-enable-cors-on-apache/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00065.warc.gz | en | 0.843553 | 237 | 1.59375 | 2 |
Boppin’ Bunnies Music Classes are led by musicians who perform live to the families each week. The children’s faces light up in wonder when they see an instrument being played! Our musicians have a background in music education, performance or a Music Degree or Diploma.
Our Online Music Classes are on Facebook here: https://www.facebook.com/groups/199145248008616
Each teacher plays a different specialty instrument which includes: Violin, Trumpet, Trombone, Guitar, Recorders, Clarinet, Saxophone, Flute, Piccolo, Ukulele, Cajon, Bongos, Cello, Bassoon as well as our lovely voices!
Boppin’ Bunnies is an inclusive, interactive experience so parents, carers, children and younger siblings can all enjoy music making together and it can become a weekly shared activity. | <urn:uuid:8d558ebb-69db-4ba9-aa55-dc3162208f22> | CC-MAIN-2022-33 | https://toddleabout.co.uk/company/boppin-bunnies | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00471.warc.gz | en | 0.925322 | 187 | 1.640625 | 2 |
There are many benefits to using bundleIQ, an AI that intelligently recommends useful insights from your knowledge base.
- 'IQ can help you find the information you need more quickly and easily.
- 'IQ can help you better understand the information
- 'IQ can help you make better decisions
- 'IQ can help you avoid making mistakes
For example, suppose you're working on a project to build a rocket ship, and you are trying to determine which type of fuel to use. In that case, an AI that was able to offer relevant contextual suggestions might recommend that you use a kerosene-based fuel because it is more efficient.
'IQ Features and Functionality
Web and iOS App
- Workspaces - A workspace is a knowledge base, a digital space where you can store and organize your notes and knowledge.
- Bundles - A bundle in note-taking and knowledge management is a collection of notes and related materials on a specific topic.
- Tags - A tag is a keyword or phrase assigned to a piece of information (such as a category, topic, or subtopic) to help describe and organize it.
- Discussions - Discussions can be used to manage comments by appending information on notes so that it can be accessed and used later.
- Add Note - Notes are a form of writing that allows individuals to capture and organize thoughts, ideas, and information.
- Import Files - A quick way to add books, transcripts, and other useful information to your knowledge base
Chrome Extension Functionality
- Save as Note - A quick-save web clipper where you can highlight and save content from anywhere on the web.
- Analyze - Typically used while researching, the analyze function lets you discover connections in your knowledge base while browsing the web.
- Connect - This AI-powered assistant makes serendipitous connections by surfacing unexpected and timely links between pieces of information that can lead to new insights and discoveries.
- Semantic Search - Semantic search is a search technique that uses natural language processing to return results based on the meaning of the search query rather than on the individual keywords that make up the query. | <urn:uuid:d1329000-de86-4ae9-ae6f-8f2c16a41502> | CC-MAIN-2022-33 | https://www.bundleiq.com/post/the-product | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00271.warc.gz | en | 0.898222 | 464 | 2.5625 | 3 |
Computers and laptops at times face different problems. Getting to know the different types of computer repairs can come handy when you are searching for a computer repair service provider company. The company that you opt for should be able to provide professional services for all types of computer repairs. Here are they-
Virus removal services- Virus affected computers can be too slow, or even may crash down. Virus removal service removes virus from your PC without having an effect on any stored data. This service can be availed remotely also.
Hardware repair services- In case your system is physically damaged, you need to go for the hardware repair services. Replacement of accessories such as laptop screen replacement, mac screen repair; painting, fixing dents, etc fall under this category.
Accessories repair services- Computers usually have several accessories such as scanners, printers, etc attached to them. Accessories repair service caters to the repairing needs of these accessories.
Data recovery- Sometimes, when your computer crashes down suddenly and you have lost all your precious data, the data recovery service will be needed to get back the lost data. This is quite a sensitive area that requires quality professional help. Amateur or poor quality service may result in the permanent loss of all your data.
Troubleshooting and Network errors service- Troubleshooting and network errors are two kinds of complicated issues involving network installation and relevant problems. A troubleshooting and network errors service is required in this case.
Maintenance service- Apart from repairs and related issues, your computer also needs maintenance. This ensures updating and tune-ups needed are done in order to increase the working speed of your system. Rebooting and installation of new windows also fall under system updating. Maintenance servicing your PC helps in increasing its lifetime. | <urn:uuid:97d9bb3b-72ba-466d-bf2c-3a34cdd50862> | CC-MAIN-2016-44 | http://wallinside.com/post-29182-different-types-of-computer-repair-services.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988717963.49/warc/CC-MAIN-20161020183837-00374-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.935243 | 355 | 1.554688 | 2 |
In this paper the author shows that signed temporal changes of firm size variables follow the power-law for large changes; while, for middle changes a log-normal distribution is found. In the analyses, the author employed three databases: high-income data, high-sales data and positive-profits data of Japanese firms. It is particularly worth noting that the growth rate distributions in temporal changes of the firm size data have no wide tail, unlike the distributions observed in assets and sales of firms, the number of employees and personal income data. An Extended-Gibrat’s Law was also found in the growth rate distributions of temporal changes of firm size variables, which induces both the power-law and the log-normal distributions in the temporal changes of firm size under the Detailed Balance.
Data availability_readme.pdf (28 kb) | <urn:uuid:58917e35-2393-497d-b3c0-e1a2068b20e7> | CC-MAIN-2017-04 | http://www.economics-ejournal.org/economics/journalarticles/2009-11/view | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00180-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.878157 | 172 | 1.5 | 2 |
A, Anteroposterior view of an inferior partial maxillectomy defect. B, Lateral view of the defect in A. Hatched lines indicate more of the hemipalate that could be resected (also includes anterior arch defects). C, Anteroposterior view of an inferior partial maxillectomy defect with total palate defect. D, Lateral view of the defect in C.
A, Anteroposterior view of a total maxillectomy defect. Hatched lines indicate the amount of additional malar bone and zygomatic arch that could be included in the resection. B, Lateral view of the defect in A. C, Anteroposterior view of a total maxillectomy defect with orbital exenteration. Hatched lines indicate additional malar bone and zygomatic arch that could be included in the resection. D, Lateral view of the defect in C.
A, A preoperative anterior arch defect, partial upper lip defect, and total rhinotomy following resection of a squamous cell carcinoma involving the nasal vestibule. B, A radial forearm (osteocutaneous) free flap was inset to recreate the anterior arch. C, The palate defect was closed with a portion of the skin paddle, while the remaining skin was used to line the nose. D, Postoperative result, showing closure and separation of the nasal-oral cavities and nasal prosthesis in place.
A, A total palatectomy specimen following resection of an invasive squamous cell carcinoma of the right lateral hard palate (right side, inferior). B, Fibula (osteocutaneous) free flap with vein graft. C, The palate 6 months following completion of radiation therapy. It is closed, and osseointegrated implants have been placed in the fibula. D, Dental rehabilitation is complete, with implant-borne prosthesis in place. E and F, Postoperative results, showing good anterior arch and midface projection.
A and B, Postoperative views of a patient who underwent left total maxillectomy without orbital exenteration for adenoid cystic carcinoma of the maxillary sinus. Following neutron beam radiation therapy, the patient developed a sino-nasal-oral fistula. C, Defect involving the left hemipalate, anterior maxilla, orbital floor, and a portion of the zygomatic arch. D, The design of the rectus abdominis free flap. E, Cranial bone grafts used to reconstruct the orbital rim, orbital floor, and malar eminence. F and G, 6-Month postoperative result, showing closure of the palatal defect and cheek. Cheek projection is acceptable.
A, Postoperative view of a patient who underwent left total maxillectomy with orbital exenteration for squamous cell carcinoma of the maxillary sinus. B, Scapula–latissimus dorsi flap based on the subscapular artery, showing the latissimus dorsi with the thoracodorsal artery (right) and the scapula (osteocutaneous) portion of the flap with the circumflex scapular artery (left). C, Postoperative computed tomographic scan with scapula bone in position, creating adequate cheek projection. D, Postoperative result, showing closure of the palate. E and F, 6-Month postoperative results, with the orbital prosthesis in place.
Triana RJ, Uglesic V, Virag M, Varga SG, Knezevic P, Milenovic A, Aljinovic N, Murakami CS, Futran ND. Microvascular Free Flap Reconstructive Options in Patients With Partial and Total Maxillectomy Defects. Arch Facial Plast Surg. 2000;2(2):91-101. doi:
From the Department of Otolaryngology–Head and Neck Surgery, University of North Carolina at Chapel Hill School of Medicine, Chapel Hill (Dr Triana); the Department of Otolaryngology–Head and Neck Surgery, Wake Medical Center, Raleigh, NC (Dr Triana); the Department of Maxillofacial Surgery, University of Zagreb School of Medicine, Zagreb, Croatia (Drs Uglesic, Virag, Varga, Knezevic, Milenovic, and Aljinovic); and the Departments of Otolaryngology–Head and Neck Surgery, Virginia Mason Clinic (Dr Murakami) and University of Washington School of Medicine (Dr Futran), Seattle, Wash.
Objective To evaluate and discuss the free flap reconstructive options for patients with partial and total maxillectomy defects.
Design Retrospective review of cases.
Setting Two tertiary referral centers.
Patients Fifty-one patients had partial or total maxillectomy defects resulting from oncologic surgical resection, and 7 had partial maxillectomy defects resulting from trauma. Inferior or partial maxillectomy defects included 10 anterior arch and hemipalate defects and 12 subtotal or total palate defects. Total maxillectomy defects with and without orbital exenteration included 36 maxilla defects with hemipalate and malar eminence.
Intervention There were 11 fibula, 14 rectus abdominis, 9 scapular, 10 radial forearm, 5 latissimus dorsi, and 13 combination latissimus dorsi and scapular flaps.
Main Outcome Measures Separation of the oral cavity from the sinonasal cavities, diet, type of dental restoration, type of orbital restoration, speech intelligibility, and complications.
Results Only 1 flap failure was reported. There was loss of bone in 2 flaps and loss of the skin paddle in 1 flap. All palatal defects were sealed by the separation of the oral and sinonasal cavities. Thirty-eight patients were able to eat a regular diet while the remaining patients maintained a soft diet. All patients conversed on the telephone without difficulty in intelligibility. Eight patients had an implant-borne dental prosthetic, and 30 patients had a conventional partial prosthetic. Orbit restoration was achieved in 2 patients with an implant-borne prosthetic, and 6 patients retained a standard orbit prosthetic.
Conclusions Free flap reconstruction of the maxilla creates reproducible permanent separation of the oral and sinonasal cavities in a single-stage procedure. In addition, there exists the potential for dental rehabilitation with restoration of masticatory and phonatory function. Free flap reconstruction also provides a good cosmetic result, which improves patients' outlook and contributes to their overall well-being. Reconstructive flaps are designed to fit specific maxillary defects and patient needs to provide optimally functional and cosmetic results.
TUMORS of the maxilla involve 2 main sites: the palate (oral cavity) and the maxillary sinus. Malignancies of the paranasal sinuses represent 0.2% of all malignancies and 3% of all cancers of the upper aerodigestive tract. Tumors of the palate represent 8% of oral cavity cancers and 5% of all upper aerodigestive tract malignancies.1-2
Treatment of these tumors usually requires a combination of surgical extirpation followed by radiation therapy. The resultant defects involve the disruption of the soft and bony tissues of the palate and midface. Loss of these key structures has significant functional and cosmetic consequences. These consequences may include the creation of large oronasal and oromaxillary fistulae, loss of significant tooth-bearing segments (which may impair oral alimentation and speech), loss of lip and cheek support, and loss of midface projection.3
Traditionally, these defects were reconstructed using skin grafts to line the postresection cavity and using some type of bulky dental obturative prosthesis. By using an obturator, the oral and sinonasal cavities can be separated. However, the patients are required to use the prosthesis for speaking and swallowing. The prosthesis must be removed and cleaned on a regular basis.4-5 Several different surgical options to seal the palate, separating the oral and nasal cavities, have been described.6-10 These include local palatal, pharyngeal, and nasal septal flaps for small defects, and temporalis, forehead, and distant tubed flaps, typically used for larger defects. These techniques, however, have been limited by the amount of tissue available and/or pedicle length.
Microvascular free tissue transfer has been described as a unique alternative for reconstruction of the palate, midface, and maxilla. Microvascular free tissue reconstruction allows for the transfer of adequate amounts of soft tissue and bone in a single-stage procedure, without the limitations of pedicle length or flap geometry. A variety of free tissue transfers have been used for palate, midface, and maxilla reconstruction, including scapula,11-14 fibula,15-21 radial forearm,22-25 rectus abdominis,26-27 iliac crest,13-14,28 and latissimus dorsi29-30 flaps. In this article, we present a series of patients with various maxillectomy defects who underwent free flap reconstruction. We describe successful separation of oral and sinonasal cavities, complications, types of oral diet, dental rehabilitation, and speech intelligibility. We evaluate the success of these techniques with specific case presentations and identify factors that may aid in the selection of flaps for specific maxillectomy defects.
We evaluated a retrospective series of 58 patients who underwent free flap reconstruction of the maxilla at the University of Washington, Seattle, and the University of Zagreb, Zagreb, Croatia, between January 1, 1993, and December 31, 1998. Defects were classified as inferior or partial maxillectomy, including defects of the hemipalate and anterior arch; inferior or partial maxillectomy with subtotal or total palate defects; and total maxillectomy with and without orbital exenteration (Figure 1 and Figure 2). Plans for palatal, dental, and orbital rehabilitation were made preoperatively by the oral and maxillofacial prosthedontist.
Patient follow-up ranged from 3 months to 5 years. The type of defect, free flap(s) used in the reconstruction, and complications were identified for each patient. In addition, closure between the sinonasal and oral cavities, type of diet, and type of dental restoration were examined in each patient. Orbit restoration in patients who had total maxillectomy with orbital exenteration was identified. Speech was evaluated, and the findings were based on the patient's ability to converse intelligibly on the telephone.
Forty-two patients underwent primary reconstruction at the time of tumor resection; 5 patients underwent primary reconstruction within several days following their facial injury; and 11 patients underwent secondary reconstruction. Of the 58 patients, 2 had sustained a past facial injury with subsequent soft tissue and bone defect. There were 10 patients with inferior or partial maxillectomy defects involving the hemipalate and/or the anterior arch. Twelve patients had inferior or partial maxillectomy defects involving a subtotal or total palate defect. There were 36 patients with total maxillectomy defects including the hemipalate and malar eminence. Of the 36 patients, 25 underwent orbital exenteration with maxillectomy, and 11 did not. Table 1 lists the characteristics of the patient population, matching defect type with age, sex, and diagnosis.
Postsurgical defect and free flap choice are presented in Table 2. For inferior maxillectomy palatal defects, decisions to use a bone-containing flap were based on the quality and position of the patient's residual dentition and/or denture-bearing alveolar arch. All 12 patients with subtotal and total palate defects received bone-containing free flaps; 2 of these patients required an additional free flap (radial forearm) to cover a soft tissue defect of the face. In patients who underwent a total maxillectomy, 20 of the 36 received a bone-containing flap to reconstruct both the malar eminence and alveolar ridge, and 16 received a soft tissue flap. Of the 16 patients, bone reconstruction was performed at the time of the free flap reconstruction (soft tissue) using cranial bone grafts in 7. Cranial bone was primarily used to reconstruct the orbital floor and malar eminence. The use of different myocutaneous and myofascial flaps was based on the volume of the soft tissue defect and the surgeon's preference. Improved aesthetic contour was achieved when using a bone-containing flap, specifically in those patients with anterior arch defects who needed better support of the upper lip and in those who had a loss of the malar eminence.
Vein grafts were needed in 9 of the 12 subtotal or total palate defects that were reconstructed with bone-containing flaps: 11 fibula and 1 scapula. In these cases, the vein grafts were needed to allow the flap pedicle to reach the recipient neck vessels. Vein grafts were not needed for the free flaps used for the total maxillectomy defects.
Five flaps required urgent return to the operating room on the first postoperative day: 3 for arterial compromise and 2 for venous compromise (Table 3). In both cases of venous compromise, poor pedicle geometry was identified. Proper vessel alignment was achieved and venous outflow restored. In the cases of arterial compromise, one patient disrupted the arterial anastomoses upon awakening from anesthesia. This was quickly recognized, the neck opened, the anastomosis revised, and the flap saved. In the other 2 cases, arterial compromise was suspected because of apparent partial loss of the skin paddle of these 2 flaps (1 scapula and 1 fibula). In each of these cases, the anastomosis was evaluated and found to be patent. The partial skin loss was attributed to poor skin perforators of these 2 flaps. In the case of the fibula flap, the skin loss was in the area of the palate. The patient was returned to the operating room 10 days following the first reconstructive procedure, and a radial forearm flap was used to line the palate (Table 2). There were 2 cases of scapula–latissimus dorsi (osteomyocutaneous) flaps that exhibited delayed bone loss requiring operative debridement; the wounds completely healed. There was 1 case of complete flap failure in this series that involved a scapula flap (osteocutaneous) that failed within the first postoperative week and was replaced with a latissimus dorsi (myocutaneous) flap. Other complications included 1 neck hematoma, 1 donor site hematoma, and 2 neck seromas that were drained percutaneously at the bedside and resolved without complication (Table 3).
Three patients developed partial dehiscence of the palate wound within 10 days of the reconstructive procedure. Two patients were treated with local wound care and were subsequently returned to the operating room for delayed wound closure, one on postoperative day 14 and one on postoperative day 22. Both wounds healed completely, although 1 wound healed by secondary intention. Postoperative pneumonia occurred in 3 patients. Two cases resolved with intravenous antibiotic therapy. One patient developed a pneumothorax and a pulmonary abscess and died after 2 months in the hospital. One patient developed meningoencephalitis, which resolved with intravenous antibiotic therapy, but left the patient with significant functional deficits.
Functional results are presented in Table 4. The data represent those patients with a minimum of 6 months of follow-up after the primary reconstructive procedure. All 58 patients had wound closure and successful separation between the oral and sinonasal cavities. Of the 56 patients who lived, 37 were able to eat a regular diet and 19 were able to eat a soft diet. Although formal speech evaluations were not performed, 56 patients were able to be understood on the telephone.
Dental rehabilitation is described in Table 4. Nine patients had placement of osseointegrated implants. In 2 patients with partial palate defects, the implants were placed in the remaining native bone, and they were able to wear an implant-borne prosthesis. In the other 7 patients, those with subtotal or total palate defects, osseointegrated implants were placed into the free flap bone, which supports an implant-borne prosthesis. Thirty patients were able to wear a conventional partial prosthesis, and 17 patients did not choose dental rehabilitation.
Orbit restoration is presented in Table 4. Of the 25 patients who underwent a total maxillectomy with orbital exenteration, 2 had implant-borne orbital prostheses and 6 were able to use a conventional prosthesis. The majority (n=21) of total maxillectomies with orbital exenteration were performed in Croatia, and financial limitations may account for the low number of patients receiving any form of orbit restoration. Financial limitations also restricted the use of osseointegrated implants for dental restoration in the Croatian patients, even though bone-containing flaps were implanted.
Reconstruction of partial and total maxillectomy defects may have variable soft tissue and bony requirements, which are determined by the extent of the resection. Many of these defects result in significant functional and aesthetic sequelae. These may include collapse of the lip, cheek, and infraorbital soft tissues, loss of the hemipalate with compromise of the oral phase of swallowing, difficulty with speech articulation, and orbital complications.31 In some cases in which the globe is spared, the lack of infraorbital rim and orbital floor support can result in hypophthalmos, enophthalmos, vertical dystopia, diplopia, and ectropion.32 The goals of reconstructing defects of the maxilla include (1) consistently obtaining a healed wound; (2) restoring palatal competence and function (separation of oral and sinonasal cavities); (3) supporting the orbit or filling the orbital cavity in cases of exenteration; (4) obliterating the maxillectomy defect; and (5) restoring facial contours.33
The traditional method of reconstructing palatal and maxillary defects involves a split-thickness skin graft to line the defect cavity and placement of an obturator (prosthesis) to seal the palate and separate the oral and sinonasal cavities.4-5,34-35 The advantages include a shorter operative case following the reconstruction and the ability for the oncologic surgeon to follow the wound cavity for tumor recurrence. To date, there are no studies in the literature documenting any increased delay in detection of recurrent tumors in patients undergoing some type of reconstruction of a maxillectomy defect.1, 36 In fact, advanced imaging techniques, such as computed tomography and magnetic resonance imaging, have aided the oncologic surgeon in detecting tumor recurrence earlier in these areas.37 The obvious disadvantages of an obturator are the inherent problems of leakage, cleaning, and repeated prosthesis refinement. Elderly patients or those patients with impaired manual dexterity and poor vision may find it exceptionally difficult to clean, maintain, and manipulate the prosthesis.38 As the wound heals, usually in the presence of postoperative radiotherapy, the prosthesis often becomes loose. This results in leakage of food and secretions into the nasal cavity and creates further problems with speech and oral hygiene.
Surgical management of these defects and their functional problems originally involved the use of a variety of pedicled autogenous tissues. In the 19th century, von Langenbeck39 described the use of local palatal flaps for reconstructing small defects. For larger palatal and maxillary defects, the pharyngeal, forehead, temporalis, and distant flaps (such as the deltopectoral and upper arm flaps) have been used.6-10,31, 40-41 Vascularized cranial bone grafts also have been used in a small series of patients. Most of the success of these procedures has been in reconstructing isolated, limited defects such as the orbital floor and rim, or zygomatic and malar complexes.42-44 However, each of these techniques is limited by a paucity of tissue to fill the defect, by the length of the vascular pedicle, and/or by the need for multiple stages to achieve a final result.
With the advent of microvascular free tissue transfer, most large defects (postoncologic resection or posttraumatic) of the palate, maxilla, and midface can be reconstructed with a single-stage procedure. Abundant soft tissue and bone can be transferred without limitations of vascular pedicle length or tissue orientation.30, 45
A variety of donor sites have been described in the literature. In 1987, MacLeod et al22 reported 3 cases of palatal fistulae reconstructed with radial forearm free flaps with and without bone. In 1992, Chen et al46 reported 4 cases of palatal fistulae that were closed with a radial forearm free flap. In both studies, all patients had palatal fistulae following a failed cleft palate repair; closure of the fistulae occurred in all 7 patients. Hatoko et al23 described 3 palatal defects following tumor ablation that were successfully closed with a fasciocutaneous radial forearm free flap; 2 of these patients were able to use a dental prosthesis. More recently, McLoughlin et al47 used an osteocutaneous radial forearm free flap to reconstruct the orbital rim and soft tissues of the cheek, and to obliterate the maxillary sinus cavity. In 1998, Cordeiro et al24 described the "sandwich" radial forearm osteocutaneous free flap for reconstruction of the subtotal maxillectomy defect. The bone was used to recreate the maxillary arch with the skin paddle folded around it, allowing both the palatal and nasal linings to be restored. Both patients refused osseointegrated implants, and both used dentures and maintained a regular diet. In addition, both patients had near normal speech and had an acceptable aesthetic result without retraction of the upper lip.23
Larger case series of palatal and maxillary defects reconstructed with myocutaneous free flaps, primarily the latissimus dorsi and rectus abdominis, have been reported. Shestak et al29-30 found the latissimus dorsi free flap to be very versatile. In all of the patients in the study, the palates were sealed and an aesthetically satisfactory recontouring of the face and cheek soft tissues was achieved. In addition, the ample pedicle length allowed microvascular anastomoses in the neck without the need for vein grafts. The rectus abdominis free flap demonstrates similar flap attributes and similar postoperative results.26-27,48 Olsen et al27 described a series of 11 patients with massive sino-orbital defects, achieving success using the rectus abdominis free flap in 9. Of the 11 patients, 6 had successful reconstruction of the palate, and all patients exhibited excellent speech and deglutition. In a similar study, Yamamoto et al48 described the use of the "boomerang" rectus abdominis free flap. The skin paddle is designed in the shape of a boomerang, allowing each leaf to be folded into its respective defect, that is, orbit and palate or orbit and soft tissues of the cheek.
The majority of studies recommending free tissue transfers for maxillary reconstruction describe the use of the scapula osteocutaneous flap.11-13,49-52 This flap is advantageous in that the soft tissue component can be rotated around the bone stock with greater freedom than the other composite flaps. It is particularly useful in defects in which both the orbital floor–zygomatic arch and palate need to be reconstructed. If the angular branch of the thoracodorsal vessel is included in the flap harvest, both the tip and the lateral border of the scapula can be harvested. When appropriate osteotomies are made, the palate and infraorbital regions can be restored.53 Uglesic et al36 described an osteomyocutaneous free flap based on the subscapular system of flaps for reconstruction of the total maxillectomy defect with orbital exenteration. This type of flap has good bone stock that can be used for the infraorbital area and palate, a muscle component (latissimus dorsi) for cavity obliteration, and a skin component for filling soft tissue deficits of the midface, cheek, and palate.
Another free flap option that provides an adequate volume of bone for palatal reconstruction and midface support is the fibula free flap. Multiple case studies describe the ease with which the flap can be harvested, the excellent bone stock, and the soft, pliable skin paddle that can be used for either intraoral or cutaneous reconstruction. In addition, the vascular pedicle may be lengthened to avoid the possible need for vein grafts.15-20,54 Three patients received implant-borne dentures in these studies.16, 20, 54
The iliac crest free flap provides an excellent bone source for palate and maxillary reconstruction. Brown28 presented 3 cases of palatal reconstruction using this flap and reported favorable functional results. Others have discouraged the use of the iliac crest free flap in the maxilla because of its excessive bulk, poor skin paddle mobility in relationship to bone, and short pedicle length.14
Finally, some authors advocate the use of dual free flaps to reconstruct these complex defects.21, 25 Although success has been observed in a small series of patients, the advantages of 2 separate free flaps have not been demonstrated. This complex and time-consuming effort has not been proven to be more beneficial than the use of a properly designed single free flap in providing excellent bone stock and pliable soft tissue.
Schusterman et al13 recommended a bone-containing free flap for maxillary reconstruction when bony support was needed and previous irradiation precluded the use of nonvascularized grafts. Cordeiro et al32 showed the successful use of nonvascularized bone grafts to reconstruct the orbital floor in conjunction with a vascularized free flap of soft tissue in patients with total maxillectomy defects. Coleman14 emphasized the importance of functional reconstruction when addressing defects of the midface and the orbits. The loss of bone support of the midface, either from oncologic resection or trauma, results in the contraction of the wound, with forces pulling toward the center of the defect during healing. The needs of the wound (ie, skin, soft tissue, mucosa, and bone) need to be carefully matched to the characteristics of the appropriate flap prior to undertaking the reconstructive procedure. These factors include the length of the vascular pedicle; the thickness or thinness of skin, muscle, and subcutaneous fat; the volume of the soft tissue available; the durability and thickness of bone; and donor site morbidity.
Davison et al35 recommended free tissue transfer closure of maxillectomy defects when substantial associated sino-orbital and/or soft tissue defects existed. They concluded their review, however, by stating "refinement of microsurgical techniques with free vascularized bone may provide an ideal answer in providing surgical reconstruction that could support an implant-borne prosthesis." As microsurgical techniques have become more refined, much more attention has been given to the function and aesthetics of this complex wound closure.
In a series of maxillary reconstructions using primarily the rectus abdominis flap, Olsen et al27 reported acceptable palatal closure, with the majority of patients exhibiting excellent masticatory function. They also noted that implantation of osseointegrated prostheses or dentures eliminated any major problems with mastication in the remaining patients. Funk et al53 described a series of patients who underwent free tissue transfer reconstruction of midfacial and cranio-orbital facial defects. A subset of 5 patients had closure of large palatal defects with a variety of soft tissue and composite free flaps. Criteria for palate closure with a soft tissue free flap included sufficient residual dentition to retain a dental prosthesis or, if the anatomy of the reconstruction would allow, retention of an upper denture despite the absence of teeth. When placement of osseointegrated implants was anticipated, the scapula osteocutaneous flap was preferred.55
In our series of patients, all of the above-mentioned flaps except the iliac crest have been used. Free tissue transfer has been demonstrated to be a reliable single-stage procedure to achieve separation of the oral and sinonasal cavities. In addition, deglutition, speech, physical appearance, and an acceptable quality of life have been restored for most patients.
Flap selection has been determined by a variety of factors. The amount, location, and quality of residual bone of the midface, dentition, and/or denture-bearing alveolar arch largely determined the selection of a bone-containing flap. In most patients with hemipalate defects, retention was sufficient to support a conventional dental prosthesis so that fasciocutaneous or myocutaneous free flaps could be used in 8 of the 10 patients. In 2 of the 10 patients, radial forearm (osteocutaneous) free flaps were used to improve anterior arch contour. How ever, the osteocutaneous free flaps were not considered suitable for placement of osseointegrated implants (Figure 3).
In patients who underwent an inferior maxillectomy with subtotal or total palatectomy, very little retentive surface was available for a conventional prosthesis. These patients also lacked significant midface projection resulting from loss of the anterior maxilla and palate and therefore received a bone-containing flap (11 fibula and 1 scapula). Bone-containing flaps create the potential for implant-borne dental restoration. Of the 12 patients, 2 required an additional free flap (radial forearm) to cover the additional soft tissue deficit (posttraumatic). These also were the most complex reconstructions, and 9 of the patients required vein grafts to achieve adequate pedicle length to reach the recipient vessels. At the time of this report, 6 of the patients had undergone full restoration with dental prostheses (Figure 4).
Total maxillectomy defects are challenging from both a functional and an aesthetic perspective. These defects result in a loss of a significant amount of bone and sometimes soft tissues of the cheek. Bone-containing flaps were used in 20 of the 36 patients. The bone was used to reconstruct the orbital floor and the anterior arch. A scapula–latissimus osteomyocutaneous flap was used in 12 of the 25 patients who underwent total maxillectomy with orbital exenteration. The addition of the latissimus dorsi muscle was useful for both obliterating the large cavity of the defect and improving facial contour.
In 7 of 17 patients for whom a myocutaneous flap was used for reconstruction (either rectus abdominis or latissimus dorsi), cranial bone grafts were used to carefully reconstruct the orbital floor or malar eminence. Rectus abdominis fascia was used to recreate the floor of the orbit in 4 of the 11 patients who underwent a total maxillectomy without orbital exenteration. At the time of this report, 3 of these patients had undergone full restoration with dental prostheses (Figure 5 and Figure 6).
Although maxillofacial prostheses have a role in primary reconstruction of palatal and maxillary defects, free tissue transfers have been successful and are well accepted by a variety of patients. Excellent facial contour and acceptable cosmetic results can be achieved consistently in a single-stage procedure. Functionally, patients enjoy the possibility for full dental restoration, masticatory function, and near normal phonation. The choice of free tissue transfer and the type of flap required should be tailored to the specific defect; denture-bearing potential of the native tissues; remaining supporting bone of the midface, cheek and palate; and most importantly, the patient's needs.
Accepted for publication February 25, 2000.
Presented at the fall meeting of the American Academy of Otolaryngology–Head and Neck Surgery and the American Academy of Facial Plastic Reconstructive Surgery, New Orleans, La, September 23-25, 1999.
Corresponding author: Rudy J. Triana, Jr, MD, Otolarygology Department, Wake Medical Center, 3024 New Bern Ave, Suite 305, Raleigh, NC 27610. | <urn:uuid:faa876a1-b512-46e2-b3db-21b5ddd152ae> | CC-MAIN-2017-04 | http://jamanetwork.com/journals/jamafacialplasticsurgery/fullarticle/479772 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00388-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.930145 | 6,799 | 1.851563 | 2 |
Receptor-targeted lentiviral vectors (LVs) is definitely an effective tool for selective transfer of genes into specific cell types of preference. successfully neutralized than MV glycoprotein pseudotyped LVs by pooled individual intravenous immunoglobulin. A significant acquiring for NiV-LVs geared to Her2/was an about 100-flip higher gene transfer activity when contaminants were geared to membrane-proximal locations when compared with contaminants binding to a far more membrane-distal epitope. Also the reduced gene transfer activity mediated by NiV-LV contaminants destined to the membrane distal domains of Compact disc117 or the glutamate receptor subunit 4 (GluA4) was significantly improved by reducing Apremilast receptor size to below 100 ?. Overall the info claim that the NiV glycoproteins are optimally fitted to cell-type particular gene delivery with LVs and likewise for the very first time define which elements of a cell surface area proteins should be geared to attain optimum gene transfer prices with receptor-targeted LVs. Writer Overview Pseudotyping of lentiviral vectors (LVs) with glycoproteins from various other enveloped viruses hasn’t only frequently been uncovering in mechanistic research of particle set up and admittance but can be of useful importance for gene delivery. LVs pseudotyped with built glycoproteins allowing free of charge selection of receptor use are anticipated to get over current restrictions in cell-type selectivity Apremilast of gene transfer. Right here we explain for the very first time receptor-targeted Nipah pathogen glycoproteins as essential stage towards this objective. LV particles holding the built Nipah pathogen glycoproteins were significantly better in gene delivery than their state-of-the-art measles virus-based counterparts today making the creation of receptor-targeted LVs for scientific applications possible. Furthermore the info define for the very first time the molecular requirements for membrane fusion with regards to the position from the receptor binding site in accordance with the cell membrane a acquiring with implications for the molecular advancement of paramyxoviruses using proteinaceous receptors for cell admittance. Introduction Cell admittance as first step in the viral replication routine is initiated with the connection of pathogen particles to specific cell surface area proteins. Even though many viral receptors have already been identified there is limited knowledge obtainable about the molecular requirements that cell surface area proteins need to fulfill to do something as admittance receptors and just why they have already been selected during viral advancement . Paramyxoviruses encode two envelope protein necessary for cell Apremilast admittance the receptor connection proteins as well as the fusion proteins (F) which mediates fusion from the viral and mobile membranes upon receptor get in touch with. Three types of connection proteins could be recognized the hemagglutinin-neuraminidase (HN) the hemagglutinin (H) as well as the glycoprotein (G) which as opposed to the others does not Gata1 have any Apremilast hemagglutinating function. All connection protein are type II membrane protein using a membrane proximal stalk area and a propeller-like mind area . While HN protein make use of sialic acidity as receptor morbillivirus henipavirus and H G recognize proteinaceous receptors. For this reason and its own separated connection and fusion features the measles pathogen (MV) H proteins continues to be the initial viral connection proteins that was effectively engineered to employ a cell surface area proteins of preference for admittance rather than its organic receptor . While this process suggested a higher versatility in receptor use for MV it had been also of used relevance for the anatomist of tumor-specific oncolytic infections so when coupled with pseudotyping for the era of cell-type particular lentiviral vectors (LVs). With LVs as a significant device gene therapy is rolling out to one of the very most essential technologies in contemporary medicine for the treating monogenetic diseases aswell as various cancers types [5-7]. LVs mediate steady long-term integration and appearance of transgenes in to the genome of transduced cells. The widely used LVs Apremilast for healing applications are pseudotyped with either the glycoprotein G from the vesicular stomatitis pathogen (VSV) or the envelope (Env) proteins of γ-retroviruses such as for example murine leukemia. | <urn:uuid:b9b4984b-74e8-4359-bfa9-5844af01d2fc> | CC-MAIN-2022-33 | https://ruerup-rente24.com/receptor-targeted-lentiviral-vectors-lvs-is-definitely-an-effective-tool-for-selective/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00469.warc.gz | en | 0.923188 | 936 | 2.140625 | 2 |
The New Mexico Supreme Court ruled in a unanimous decision Thursday that a wedding photographer who refused to provide services to a same-sex couple violated the state’s Human Rights Act.
“[W]e conclude that a commercial photography business that offers its services to the public, thereby increasing its visibility to potential clients, is subject to the antidiscrimination provisions of the [New Mexico Human Rights Act] and must serve same-sex couples on the same basis that it serves opposite-sex couples,” the state’s highest court ruled. “Therefore, when Elane Photography refused to photograph a same-sex commitment ceremony, it violated the NMHRA in the same way as if it had refused to photograph a wedding between people of different races.”
The ruling comes in the case of Elane Photography v. Vanessa Willock, which was filed after Elaine Huguenin, co-owner of Elane Photography in Albuquerque, turned away Vanessa Willock and her partner in 2006 on the grounds that photographing the ceremony would violate her religious beliefs.
An investigation by the state Human Rights Commission that found the company was guilty of discrimination based on sexual orientation was upheld by the New Mexico Court of Appeals in June of 2012.
In its decision today, the New Mexico Supreme Court ruled that the state’s Human Rights Act, which was amended in 2003 to add “sexual orientation” as a class of people protected from discrimination, does not violate free speech because it does not compel the photographer to either “speak a government-mandated message or to publish the speech of another.”
“The purpose of the NMHRA is to ensure that businesses offering services to the general public do not discriminate against protected classes of people, and the United States Supreme Court has made it clear that the First Amendment permits such regulation by states,” the decision states. “Businesses that choose to be public accommodations must comply with the NMHRA, although such businesses retain their First Amendment rights to express their religious or political beliefs. They may, for example, post a disclaimer on their website or in their studio advertising that they oppose same-sex marriage but that they comply with applicable antidiscrimination laws.”
In a statement, Louise Melling, deputy legal director of the American Civil Liberties Union, which filed an amicus brief in support of Willock, said the ruling was in line with guarantees made in the Constitution.
“When you open a business, you are opening your doors to all people in your community, not just the select few who share your personal beliefs,” Melling said. “The Constitution guarantees religious freedom in this country, but we are not entitled to use our beliefs as an excuse to discriminate against other people.”
[Photo: The justices of the New Mexico Supreme Court/Courtesy of the New Mexico Supreme Court.]
Read the full decision here:
These are challenging times for news organizations. And yet it’s crucial we stay active and provide vital resources and information to both our local readers and the world. So won’t you please take a moment and consider supporting Metro Weekly with a membership? For as little as $5 a month, you can help ensure Metro Weekly magazine and MetroWeekly.com remain free, viable resources as we provide the best, most diverse, culturally-resonant LGBTQ coverage in both the D.C. region and around the world. Memberships come with exclusive perks and discounts, your own personal digital delivery of each week’s magazine (and an archive), access to our Member's Lounge when it launches this fall, and exclusive members-only items like Metro Weekly Membership Mugs and Tote Bags! Check out all our membership levels here and please join us today! | <urn:uuid:71651afd-981b-4b6d-808f-f4ba3bd060c7> | CC-MAIN-2022-33 | https://www.metroweekly.com/2013/08/new-mexico-supreme-court-rules/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00472.warc.gz | en | 0.963047 | 801 | 1.75 | 2 |
A two-month national demonstration project conducted in Washington, D.C., showed how a coherence-creating group of TM-Sidhas can reduce crime and social stress and improve the effectiveness of government.
This was a carefully controlled scientific demonstration carried out between June 7 and July 30, 1993. The study involved a coherence group of TM-Sidhas who increased in number from 800 to a maximum of 4,000 over the trial.
|TM crime prevention project in Washington showed a maximum 23.3% reversal in the predicted violent crime trend. Before the project the Chief of Police had exclaimed that the only thing that would create a 20% drop in crime would be 20 inches of snow. The TM crime prevention project took place during blistering summer weather. Read full article ...|
Before the project, violent crime had been steadily increasing during the first five months of the year.
A week or so after the start of the study, violent crime (HRA crime: Homicides, rapes and aggravated assaults, measured by FBI Uniform Crime Statistics) began decreasing and continued to drop until the end of the experiment.
Before the project the researchers had publically predicted that the coherence group would reduce the trend of crime by 20%. This prediction had been ridiculed by the Chief of Police who asserted that the only thing that would decrease crime that much would be 20 inches of snow. In the end, the maximum decrease was 23.3% below the time series prediction for that period of the year. This significant reversal in the predicted crime trend occurred when the size of the group was at its largest in the final week of the project and during a blistering heat wave.
The statistical probability that this result could reflect chance variation in crime levels was less than 2 in 1 billion (p < .000000002).
When the project disbanded HRA crime began to rise again.
The research is extremely reliable by the usual standards of social science. As a result we know that the effects of the coherence group can not be attributed to other possible causes, including temperature, precipitation, weekends, and police and community anticrime activities.
Incidentally, as predicted by the theory of Super Radiance, during this trial period there was increased popular support for the US President.
Or read more about this fascinating study in our free download "The Super Radiance effect"
Hagelin JS1; Orme-Johnson DW; Rainforth M1; Cavanaugh K1; Alexander CN1; Shatkin SF1; Davies JL2; Hughs AO3; Ross E4; "Effects of Group Practice of the Transcendental Meditation Program on Preventing Violent Crime in Washington, D.C.: Results of the National Demonstration Project, June--July 1993", D.C.Institute of Science, Technology and Public Policy Technical Report 94:1, 1994. Social Indicators Research (vol 47 issue 2: 153-201, 1999)
1. Institute of Science, Technology and Public Policy, Maharishi University of Management, Fairfield, Iowa, USA
2. Center for International Development and Conflict Management, University of Maryland, College Park, Maryland, USA
3. Department of Humanities and Social Sciences, University of the District of Columbia, Washington, D.C., USA
4. Planning and Research Division, District of Columbia Metropolitan Police Department, Crime Research and Statistics Section, Washington, D.C., USA
The full paper can be read in the Collected Papers of the Scientific Research on Maharishi’s Transcendental Meditation and TM-Sidhi Program vol 6 - 489 published by Maharishi European Research University and Maharishi International University.
|Why you can trust the research|
To support a TM peace group to prevent terrorism and restore peace in the Middle East. Tell him about this new technology before another Paris attack happens. Click here to sign...
Read the 50 research summaries that show how groups of specially trained meditators can prevent crime, terrorism and war. | <urn:uuid:a414098f-9f4e-4d99-bae2-a00432572db9> | CC-MAIN-2016-44 | http://www.worldpeacegroup.org/washington_crime_study.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719784.62/warc/CC-MAIN-20161020183839-00427-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.930769 | 820 | 2.890625 | 3 |
|CrossRef Text and Data Mining|
|Result of CrossRef Text and Data Mining Search is the related articles with entitled article. If you click link1 or link2 you will be able to reach the full text site of selected articles; however, some links do not show the full text immediately at now. If you click CrossRef Text and Data Mining Download icon, you will be able to get whole list of articles from literature included in CrossRef Text and Data Mining.|
|Words are not just words: how the use of media language in the COVID-19 era affects public health|
|Georgios P. Georgiou|
Epidemiol Health. 2021;43:e2021072 Published online September 23, 2021
Words, words, words
Words, Words, Words...
Using the right words to address racial disparities in COVID-19
Just Words: Law, Language, and Power:Just Words: Law, Language, and Power.
The UK Public Health White Paper: “just words”
How COVID-19 affects the use of evidence informed policymaking among iranian health policymakers and managers
How are pronunciation variants of spoken words recognized? A test of generalization to newly learned words
How Many Words Do the Eskimos Use?
How COVID-19 Affects Health Status of Chinese Immigrants | <urn:uuid:883b4d2f-af19-48dc-b919-c25704de615d> | CC-MAIN-2022-33 | https://kjccm.org/journal/crossRefTDM.php?number=1217 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00669.warc.gz | en | 0.857623 | 310 | 2.265625 | 2 |
Anyone driving through New Jersey this Thanksgiving break may have seen a billboard that depicts the birth of Jesus according to the Bible. The three wise men, the Star of Bethlehem, Mary, and Joseph; they were all there. The text, however, would probably offend anyone who featured similar images in their homes. “You KNOW it’s a Myth” the billboard reads, “This Season, celebrate REASON.”
American Atheists, an organization dedicated to protecting and promoting atheist beliefs, spent $20,000 dollars to purchase the billboard located outside the Lincoln Tunnel.
The goal of the campaign was to encourage ‘closeted’ atheists to voice their beliefs and to appeal to the logic of those who are unsure. It was also against the commercialization of Christmas and ignorance surrounding the origins of the holiday. The only way I could figure half this out was by looking at the website the billboard referred viewers to.
The group doesn’t feel bad about causing such controversy. In fact they embraced their role as the ‘Marines of atheism’ on the web page that explained the billboard. It’s obvious that they wanted some attention, and didn’t care .
In the past, the group has raised money to hold conventions, publish and collect literature, and protest government entanglement with religion. The organization’s late founder, Madalyn Murray O’Hair, won a Supreme Court case against school prayer in 1959. This is the first time they’ve purchased a billboard.
One of the sentiments express by the organization on their website was that this billboard would help to discredit Bill O’Reilly’s ‘War on Christmas.’ The opposite has proven to be true. They have drawn criticism from various religious leaders and have been featured on local news broadcasts in the tri-state area.
The American Atheists use a billboard to assert that they are right and people who believe in a religion are wrong. The language they used was designed to provoke. That attitude of there being one absolute truth is part of the reason atheists don’t like religion.
The American Atheists aren’t acting like the heroes that separated prayer from schools that they may have once been. They aren’t protecting or supporting atheists who face difficulties due to their lack of belief. They’re preaching. Preaching atheism, but preaching nonetheless.
$20,000 dollars is a lot of money to attack other people’s views. Yes, atheists have been subject to much of the same over the years, but two wrongs don’t make a right. Spend the money on atheists, not attacking the religious who have done nothing wrong. | <urn:uuid:c6d38778-b58b-443f-9689-652082543dc5> | CC-MAIN-2017-04 | http://sbpress.com/2010/11/the-atheists-who-preach/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00383-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.971059 | 561 | 1.773438 | 2 |
March 19, 2012
Legal opinions and publications commonly contain multiple pages and discuss many issues. As a result, pinpoint citations – references to a specific location in a multipage work – are used pervasively in legal writing. Luckily, WestlawNext® automatically recognizes pinpoint citations and can take you directly to the exact page you need.
Find by Pinpoint Citation
To retrieve a specific page in a document, simply type the citation and the pinpoint page in the search box. For example, perhaps you are interested in page 2557 of Wal-Mart Stores, Inc. v. Dukes, 131 S.Ct. 2541 (2011). Simply type 131 sct 2557 in the search box and click Search.
WestlawNext will retrieve the Wal-Mart case with page 2557 immediately displayed. The green arrow will show you precisely where the pinpoint page begins.
“Go to” Navigation
If you are already viewing a document, use the Go to button to quickly jump to a specific page instead of scrolling. The Go to button is located in the document toolbar at the top of the page.
Clicking the Go to button will open a menu of options. To jump to a particular page, simply type the page number in the Page # box and click Go.
Both of these options eliminate the need to scroll through documents to locate a page. This is a huge time-saver, particularly for long cases and journal articles. | <urn:uuid:8d543800-1a1a-4f58-9a98-0a3524fb38ea> | CC-MAIN-2017-04 | http://blog.legalsolutions.thomsonreuters.com/legal-research/reference-attorney-tips/westlaw-next-tip-of-the-week-instantly-locate-a-pinpoint-citation/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00291-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.84496 | 295 | 1.992188 | 2 |
Description Animal Quiz:
Dog, cat, mouse - those animals are easy to identify, but with some species things become complicated. In this free quiz you can test your knowledge about animals! Look at the picture in each level and guess the name which is hidden in the letters below. Play through more than 500 fun levels: how many animals can you guess correctly?
How to play:
Play Animal Quiz with your mouse, tablet, iPad, iPhone or mobile phone | <urn:uuid:179e66d5-73f4-4438-9667-3661e2fa9f99> | CC-MAIN-2016-44 | http://www.gameitnow.com/Animal-Quiz-online | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719027.25/warc/CC-MAIN-20161020183839-00301-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.915142 | 96 | 1.664063 | 2 |
Emergency managers say they're ready for the chance of severe weather on Wednesday in North Texas.
That readiness includes some last minute checks on the outdoor warning sirens throughout the city.
New batteries were installed at Siren 14 on West Bonds Ranch Road in far north Fort Worth on Tuesday afternoon.
There was no siren test performed, but nearby residents were glad to know it'll be ready if there's an emergency or for the next test.
"It's a good time to teach the kids what to do in case of a tornado and we normally keep our TV on and teach them the safe spots in the house," said Destiny Anderson.
Two of the city's 149 sirens are currently offline due to significant repairs that are needed. The outdoor warning sirens are intended to get people inside and to get information. But there are other ways of being informed, including the Nixle system where you can sign-up for text and e-mail alerts.
"The best way of receiving the initial warning is still with the outdoor warning sirens, but to find out more detailed information, you need to be connected," said Juan Ortiz, with the city office of emergency management.
The text warnings don't just inform residents of what's on the weather horizon or of another disaster or emergency, but also if there's a problem with the siren system.
Six months ago several sirens malfunctioned and sounded when they weren't set to go off.
"We don't expect to have those problems again," Ortiz said.
But, he added, water damage, wind damage and lightning can cause malfunctions. So, whether it's a false alarm or something real, Ortiz says it's best to sign-up, be informed and stay prepared.
"It just takes one storm to really cause a lot of damage," he said.
The outdoor warning sirens will sound for large hail, winds stronger than 60 miles an hour or a spotted tornado. | <urn:uuid:23de99ab-54b9-480d-ba48-c61da2fed6ab> | CC-MAIN-2017-04 | http://www.nbcdfw.com/weather/stories/Warning-Sirens-Ready-For-Spring-Storms-297455021.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00292-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.963016 | 398 | 1.546875 | 2 |
In 1987 architecture student Tiziana Redavid visits an industrial spring factory, in which the ground is strewn with springs. Tiziana picks them up by the dozen and puts them on her wrist. Soon, these simple springs will find in her imagination an artistic vocation. Molla in Italian means "spring", the name of the brand, La Mollla, with three L's, evokes the idea of the movement of the spring.
Each set contains 80 fine strands, 20 stainless steel and 60 gold. Each strand is finely spun around an elastic band to provide flexibility.
- Dimensions: Medium - 5.9cm circumference and Large - 6.3cm circumference
- To avoid distortions, roll on a few strands at a time to wear.
- Made in Italy | <urn:uuid:f3101f38-510f-44fb-848f-7ca807685793> | CC-MAIN-2022-33 | https://bello.co.nz/products/lamollla-saltandpepperbracelet | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00066.warc.gz | en | 0.913 | 160 | 1.578125 | 2 |
Tolfenamic acid (TA) is one of the non-steroidal anti-inflammatory drugs (NSAIDs) which are widely used as analgesic, anti-inflammatory and antipyretic drugs. In this study, we developed an improved detection method focusing on the validation of the TA residue using high performance liquid chromatography (HPLC) and a photodiode array (PDA) detector. TA in bovine, swine muscles and milk were analyzed using a C18 column (5 μm, 250 mm × 4.6 mm i.d.) and the mobile phase consisted of water with 0.1% phosphoric acid (eluent A) and 0.1% phosphoric acid in acetonitrile (ACN) (eluent B). Additionally, to optimize TA detection, liquid-liquid extraction (LLE) and additional purification steps were established to minimize the endogenous peaks and interferences. The developed method was validated through the limit of detection (LOD), the limit of quantification (LOQ), linearity, accuracy, and precision testing. TA in food samples were successfully detected after 20 min in chromatography. The LOQ was evaluated at 0.01 mg/kg and coefficient of determination of the linear regression (r2) was well over 0.99. The recovery rates ranged from 81.9-90.8%, 74.2-92.8% and 74.5-80.7% with relative standard deviations lower than 20% for bovine, swine muscles and milk, respectively, which corresponds to the CODEX International Food Standards guideline. Finally, the developed method has been applied for monitoring samples collected from the markets in major cities and proven great potential to be used as the confirmatory method to analyze and monitor TA residue in animal-based food products.
Keywords: Tolfenamic acid; HPLC-PDA; Pork muscle; Cattle muscle; Milk; Method validation; Monitoring
As people’s diet has developed recently in Korea, the consumption of high-protein foods including meat has significantly increased, expanding the size of the domestic livestock and fishery industries . With the increasing livestock consumption, the usage of veterinary drugs to prevent animal diseases and to improve productivity has been also on the rise [2-4].
Given that the use of antibiotics compared to the annual volume of livestock production in Korea is greater than any other leading livestock countries such as the United States, Japan, Denmark, New Zealand and Sweden, the abuse of antibiotics in livestock production in Korea has reached a serious level . Meanwhile, countries around the world allow the proper use of veterinary drugs to improve the productivity of livestock production, and the maximum residue limits (MRLs) for veterinary drugs in foods are regulated by the Council of the European Union and the U.S. Food and Drug Administration (FDA) .
The MRLs of about 147 veterinary drugs including antibiotics are also set and managed in Korea . The MRLs and analysis methods for veterinary drugs are set under the Korea Food Code and the Manual for Analyzing Hazardous Substances in Livestock and Fishery Products. Since the Animal and Plant Quarantine Agency first implemented the National Residue Analysis Program in 1991, the government has continued to conduct tests to monitor residues annually, strengthening the management of veterinary drug residues in animal feeds and meat .
If veterinary drugs that are administered to livestock are transmitted and remain in foods, end consumers may be exposed to those residues, which, in turn, can develop into serious hazards to health such as resistant bacteria and cancer. Against this backdrop, the demand for the development of methods to analyze, verify, and monitor the results is ever growing .
Tolfenamic acid (TA), a substance within the class of NSAIDs, has been widely administered to both humans and animals for the purpose of reducing inflammation [10,11]. Currently, it is used as an antibiotic only for veterinary purposes to treat musculoskeletal disorders, mastitis, lung disease, and enteritis. These types of veterinary drugs have a low toxicity, but its relative risk is high as it may cause resistant bacteria. For this reason, it is categorized as Grade 3 in the priority-based assessment of veterinary drugs such as in the assessment reports of JECFA (Joint FAO/WHO Expert Committee on Food Additives), EMEA (European Medicines Agency) and CMV (Center for Veterinary Medicine). In addition, if accumulated in the body, their toxicity may increase, causing aplastic anemia or stomach and intestine diseases .
Against this backdrop, the Ministry of Food and Drug Safety added methods to analyze TA to the Korean Food Code in 2012 . The current MRLs of TA in Korea are 0.05 mg/kg for the muscle of cattle and pigs; 0.4 mg/kg for the liver of cattle and pigs; 0.1 mg/kg for the kidney of cattle and pigs; and 0.05 mg/kg for the dairy products (Table 1). After comprehensive review of the analysis method regarding TA in Korean Food Code, specific analytical method for TA could not be found for meat and dairy products .
|Beef muscle||0.05||Pork muscle||0.05||Milk||0.05|
|Beef liver||0.4||Pork liver||0.4|
|Beef kidney||0.1||Pork kidney||0.1|
*Not for use in animals from which milk is produced for human consumption.
Table 1: MRLs of TA residues.
Various determination methods for NSAIDs in foods have been developed and described in the previous studies. Most of them use HPLC with ultraviolet (UV) [14,15] or fluorescence detection. Fluorescence has the advantage of being more sensitive and selective, but does not have the same range of applicability as UV making UV the most widely used detection method . In addition, LLE with additional clean-up and solid phase extraction (SPE) are often used for sample preparation in food-producing animals . The SPE is generally applied to clean animal products but does not provide sufficient extraction efficiency . To sum up, methods capable for simultaneous determination of TA in cattle, pork, and milk by HPLCPDA with LLE have not been developed.
In this study, our aim was to reestablish the analysis method by optimizing the composition of the mobile phase with HPLC and PDA detector for the determination of TA residues in livestock products. In addition, LLE and additional purification steps were established to minimize the endogenous peaks and interferences. Finally, newly established confirmatory method was validated according to the CODEX guidelines and was applied to monitor the TA residues in cattle, pork and milk collected from the markets in major cities .
Analytical standards of TA were purchased from Fluka (St. Louis, Missouri, USA). The molecular structure of this substance is shown in Figure 1. Phosphoric acid (85%, w/v), ammonium formate (≥ 99.995%), and octadecyl-functionalized silica gel (200-400 mesh) for the sample pretreatment and mobile phase for HPLC were purchased from Sigma-Aldrich (St. Louis, Missouri, USA). Sodium chloride (99%) was supplied by Daejung chemical and metals Co., Ltd. (Siheung, Gyeonggi, South Korea). Acetonitrile (ACN), methanol, and hexane were supplied by J. T. Baker (Phillipsburg, New Jersey, USA). Water was purified by using ELGA system. All the solvents used were filtered using 0.22 μm JG type filter (Millipore, Billerica, Massachusetts, USA) prior to injection.
Stock standard solutions (1000 μg/mL) were prepared by dissolving 10 mg of each compound in 10 mL of methanol and stored in glass-stopper bottles at 4°C. Working standard solutions of various concentrations were prepared by appropriate dilution with the stock solutions aliquoted with methanol.
Meat samples: For the analysis, muscle samples of cattle and pig were collected from the markets located in major cities of Korea (Seoul, Busan, Incheon, Daegu, Gwangju, and Ulsan). Samples were ground using a high-speed food blender and stored at -20°C before the analysis (Figure 2A). Each ground sample (5 g) was put into a 50-mL centrifuge tube and then 200 mM ammonium formate solution (0.2 mL) and water (4 mL) were added to the tube. Analyte was extracted with ACN (16 mL) on a shaker for 15 min. After separation by centrifugation at 4500 g for 10 min, the supernatant was transferred into a separate centrifuge tube. Then C18 powder (1 g) was dispersed in the tube and ACN-saturated hexane (20 mL) was added. The tube was then shaken for 10 min and centrifuged at 4,000 g for 10 min followed by the removal of hexane layer. After repeating the extraction procedure twice, the ACN extract layer was moved to a rotary evaporator and concentrated at low pressure in water (40°C). The sample was finally reconstituted in methanol (1 mL) and used as a test solution after filtering through a 0.2 μm membrane filter (Waters, Milford, Massachusetts, USA) (Figure 2B).
Milk samples: Milk sample (5 g) was weighted into 50 mL polypropylene tubes. ACN (20 mL) was added to each tube followed by addition of sodium chloride (4 g). The sample was then shaken vigorously for 30 s and centrifuged at 4500 g for 10 min. The ACN (upper layer) was transferred into 50 ml polypropylene tubes. ACNsaturated hexane (8 mL) was added and the tube was shaken for 30 s followed by centrifugation (4500 g × 10 min). The hexane layer was then removed and discarded to waste. ACN extract layer was moved to a rotary evaporator and concentrated at low pressure in water (40°C). The sample was finally reconstituted in ACN: water (28:72, v/v) (1 mL) and used as a test solution after filtering through a 0.2 μm membrane filter (Waters, USA) (Figure 2C).
The liquid chromatography system (Shiseido Co., Ltd., Tokyo, Japan) was equipped with a solvent delivery pump (SI-2/3101), an auto sampler (SI-2/3133), a column oven (SI-2/3004), and a PDA detector (Accela ChemBio Inc., USA). An analyte was separated with a Capcell Pak UG C18 column (5 μm, 250 mm × 4.6 mm i.d., Shiseido Co., Ltd., Tokyo, Japan). The temperature of the column oven was set at 40°C. The gradient elution program was applied with 0.1% phosphoric acid in water (phase A) and 0.1% phosphoric acid in ACN (phase B). The flow rate, injection volume, and total runtime were 1.0 mL/ min, 20 μL, and 40 min, respectively. The UV detector was set at a wavelength of 218 nm for TA. The gradient profile is shown in Table 2.
aMobile phase A: 0.1% phosphoric acid in water; bMobile phase B: 0.1% phosphoric acid in CAN
Table 2: Gradient elution profile.
The developed method was validated according to the CODEX guidelines . For the validation, following performance parameters were determined: specificity, LOD and LOQ, linearity, recovery, and the precision (repeatability and reproducibility). The LOD and LOQ were calculated based on the signal to noise ratio (S/N=3 for LOD and S/N=10 for LOQ) of the chromatograms. The signal to noise ratio was measured using the Fine Chemicals System (Shiseido, Japan). To determine the specificity, interferences were checked by analyzing 20 blank cattle, pork, and milk samples, respectively. These samples were prepared according to the described procedure and analyzed. The linearity determining TA residues in the cattle, pork and milk samples was tested at the concentrations of 0.0625, 0.125, 0.25, 0.5, and 1 mg/L. Calibration curves were prepared by plotting the peak area against analyte concentrations expressed as mg/L. The linear regression equations and correlation coefficients were calculated for the curves and used for calculating the concentrations of analytes. The accuracy and precision of the method were investigated by analyzing the fortified samples (n=6) at the concentration levels of 1/2 × MRL (Maximum Residue Limits), MRL, and 2 × MRL. Six replicates at each level were analyzed to calculate the recovery (expressed as percentile) and the coefficient of variation (CV%).
Optimization of sample preparation step
The purification procedure in analysis method for TA stipulated in the current Korean Food Code is based on LLE. To reduce the HPLC runtime of with adequate peak separation, Capcell Core C18 S2.7 (2.7 μm, 250 mm × 4.6 mm i.d., Shiseido Co., Japan) was used. When tests were analyzed using the HPLC method with LLE in current Korean Food Code as shown in Figure 2A, specificity for TA could not be found (Figure 3). Therefore, the purification method was chosen after comparing the chromatograms of a HLB cartridge in SPE and LLE and additional purification step with C18 powder from the livestock hazardous materials analysis handbook .
The SPE is one of the analysis methods that are widely used recently to increase the selectivity of target substances compared to LLE [22,23]. For instance, Gentili et al. have reported that the recovery rate of TA in beef was high (97~99%) by LC-MS in combination with SPE . However, peak values of TA were found in the same time range both in standard solutions and the blank samples, showing no specificity when TA, as a single substance, was analyzed using a HLB cartridge in SPE with this analysis method.
With the method using C18 powder to eliminate impurities, peak values of blank samples were not detected in the same time range of the standard. Also, TA was separated with a Capcell Pack UG C18 column (5 μm, 250 mm × 4.6 mm i.d.) instead of Capcell Core C18 S2.7 column (2.7 μm, 250 mm × 4.6 mm i.d.). Therefore, we confirmed that the TA was isolated after 20 min from the Capcell Pack UG C18 column, while the TA was isolated after 7 min using the Capcell Core C18 S2.7 column. However, in the case of the Capcell Core C18 S2.7 column, sufficient washing procedure was required to remove the diverse peaks using organic solvent. Adequate washing procedure was essential to avoid accumulation of impurities in the column ends that eventually results in peak interference that are detected within the TA retention time. Therefore, we decided to use the Capcell Pack UG C18 column which is more cost effective than the Capcell Core C18 S2.7 column with similar separation performance. TA was well separated by the sample preparation using C18 powder, however there was no specificity for the analysis of TA in milk, which is due to the emulsification of milk protein that has not been sufficiently removed [15,25]. Therefore, milk samples were extracted with ACN and sodium chloride was added to aid partition of the milk and ACN mixture . TA was then identified by matching retention times of peak to the values of the corresponding standard analyzed under the same experimental conditions in all samples (Figure 4).
Optimization of the HPLC mobile phase
In the case of using the analysis method stipulated in the Korean Food Code, acetic acid and ACN caused the analysis equipment to malfunction and columns as they remained within the equipment and are extracted slightly. To find the optimal solvent condition for the HPLC analysis method, three different mobile phase compositions were tested as follows: (1) 0.1% acetic acid:ACN (50:50) (pH 3.3) ; (2) 0.1% formic acid:ACN (50:50); and (3) 0.1% phosphoric acid:ACN (50:50). From the study of Park (2009) , the composition of the mobile phase was acidified to analyze TA by HPLC . The highest peak areas of TA were found using Mobile Phase A (0.1% Phosphoric acid in water), and Mobile Phase B (0.1% Phosphoric acid in ACN) as shown in the chromatograms in Figure 5 and Table 3.
|Mobile phase||Retention time||mAU||Peak area|
Phase A: 0.1% Acetic acid/ACN (50:50) (pH 3.3); Phase B: 0.1% Formic acid/ACN (50:50); Phase C: 0.1% Phosphoric acid/ACN (50:50)
Table 3: Result of TA chromatogram.
Validation of the analytical method
The specificity of the method was demonstrated by checking interfering peaks at the retention time of target analytes. The results showed that there were no interfering peaks co-eluted with target analytes in a wide range of food matrices. The HPLC-PDA method is capable of separating TA under the given gradient condition within 40 min, demonstrating that the method could be applied to monitor the residues in different livestock samples. Representative chromatograms of each fortified samples are shown in Figure 4.
To compensate for compound loss during sample preparation, measurements of linearity were carried out with standard solutions at the concentration of 0.0625-1 mg/L. Satisfactory linearity with correlation coefficients greater than 0.99 was achieved with the LOD of 0.003 mg/kg and the LOQ of 0.01 mg/kg (Figure 6).
The recovery rates of the procedure were determined by spiking blank samples with three different levels (0.025, 0.05 and 0.1 mg/kg) of TA (six replicates). As a result, the recovery rates of beef, pork, and milk were 81.9~90.8%, 74.2~92.8% and 74.5~80.7% respectively. Accuracy was assessed as the ability to measure the amount of the target substance added into the actual samples at certain concentration levels, and precision was assessed by the coefficient of variation of analysis results that were obtained by repeating sample tests. The coefficient of variation of beef, pork and milk were 2.1~10.0%, 6.2~18.2%, and 6.0~6.8%, respectively (Table 4).
|Sample||Spiked Conc.(mg/kg)||Recovery(%)1||CV (%)2|
1Values of six replicates with standard deviations; 2Relative standard deviation
Table 4: The average recovery rate and RSD of TA in samples.
According to the Codex guidelines for the attributes of analytical methods for residues of veterinary drugs in foods, average recoveries of 80 to 110% should be achieved when the spiked level is 100 μg/ kg or greater and coefficient of variation should be less than 15%. Recommended acceptable recoveries are 70 to 110% when the spiked level is 10 μg/kg to 100 μg/kg and coefficient of variation is less than 20% . Both recovery rates and accuracy are in compliance with the criterion of the codex.
Application of the developed method
The developed method was applied for the analysis of 125 commercially available animal based foods such as beef, pork, and milk collected from the markets located in major cities (Table 5). The collected food samples consisted of 47 beef (38%), 45 pork (36%), and 33 milk (26%) products. All samples were processed according to the method described above and the analytical results showed that none of the sample contained any detectable amount of TA.
(Unit: case); 1Not detectable
Table 5: Summary of purchased region and TA residue results.
A simple and effective HPLC-PDA method was developed for the determination of TA in beef, pork, and milk. TA residues were successfully separated by HPLC-PDA. The proposed method showed satisfactory validation characteristics with respect to specificity, accuracy, precision, analytical limits, and applicability. Therefore, it can be concluded that the proposed method has great potential to be used as the confirmatory method to analyze and monitor TA residues in animal-based food products.
This work was supported by a Project (No.13161foodsafety002) for Method development and monitoring on Residues of Veterinary Drugs in foods funded by the Ministry of Food and Drug Safety, Republic of Korea and the High Value-added Food Technology Development Program from the Korea Institute of Planning and Evaluation for Technology in Food, Agriculture, Forestry and Fisheries (iPET) (Grant number: 314058-03). The authors declare no conflicts of interest related to the content of this article. | <urn:uuid:9b909b61-2c60-4dd3-8075-76ea480de6f3> | CC-MAIN-2022-33 | https://www.longdom.org/open-access/development-of-an-improved-hplcpda-method-for-the-determination-of-tolfenamic-acid-in-meat-and-milk-51896.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571745.28/warc/CC-MAIN-20220812170436-20220812200436-00473.warc.gz | en | 0.939468 | 5,004 | 2.125 | 2 |
Why are so many students deep in debt before they finish college, only to take on more debt as they begin their careers? The answer may be found by looking at the social forces that shape the attitudes and behaviors of today's youth -- forces influencing them in ways that will determine their financial success or failure as adults.
According to a new study by Dr. Soyeon Shim, from the Norton School of Family and Consumer Sciences at the University of Arizona in the US, and her colleagues, parents have the greatest influence on students' financial habits, over and above work experience and financial education in high school. The new four-step model, which analyzes the process of financial socialization in first-year college students, is published online in Springer's Journal of Youth and Adolescence.
Students perceive financial independence as a means to achieve adult status. Although some young adults in college learn to manage their money well, many others overspend their budgets, accrue credit card debt, and fail to pay off debts on time. Dr. Shim and colleagues examined the processes that occur during adolescence that may explain these differences in financial management. They focused specifically on the period during which college students adjust to living away from home. The authors tested their proposed four-stage financial socialization model, which focuses on the role of parents, work and education, and their connections to the financial learning, attitudes, and behaviors of first-year college students.
A total of 2,098 students from a variety of ethnic backgrounds took part in the survey. They completed either an online or print questionnaire asking them about their parents' socioeconomic status and financial behaviors, parental direct financial teaching, high school work experience, and high school financial education. They were also questioned about adopting parental financial role modeling, financial knowledge and financial attitudes, and financial behavior (i.e., the quality of financial relationship with parents, financial satisfaction, and the performing of healthy financial behaviors).
The authors found that parents, work, and high school financial education during adolescence predicted young adults' current financial learning, attitudes, and behaviors, with the role played by parents substantially greater than the role played by work experience and high school financial education combined. The results also supported the authors' hierarchical model, indicating that early financial socialization is related to financial learning, which, in turn, is related to financial attitudes and, subsequently, to financial behavior.
The authors conclude: "In a culture that demands individual responsibility and self-sufficiency, financial literacy is an essential component of a successful adult life. Parents who intentionally teach their children about financial management may exert a greater influence on children's financial knowledge than do lessons learned in high school and those learned in the workplace combined. Given the importance of financial well-being to many indicators of college student success, such parental investment in the financial skills and knowledge of their adolescents may pay substantial dividends in terms of youth health, adjustment, and academic success."
The project was funded by National Endowment for Financial Education (NEFE).
Cite This Page: | <urn:uuid:5127b675-5a0e-4d19-815f-a788bc8b74c4> | CC-MAIN-2016-44 | https://www.sciencedaily.com/releases/2009/07/090727081110.htm | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720962.53/warc/CC-MAIN-20161020183840-00385-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.967278 | 612 | 3.359375 | 3 |
Children and the Remaining Gender Gaps in the Labor Market
- Journal of Economic Literature (Forthcoming)
The past five decades have seen a remarkable convergence in the economic roles of men and women in society. Yet, persistently large gender gaps in terms of labor supply, earnings, and representation in top jobs remain. Moreover, in countries like the U.S., convergence in labor market outcomes appears to have slowed in recent decades. In this article, we focus on the role of children and show that many potential explanations for the remaining gender disparities in labor market outcomes are related to the fact that children impose significantly larger penalties on the career trajectories of women relative to men. In the U.S., we document that more than two-thirds of the overall gender earnings gap can be accounted for by the differential impacts of children on women and men. We propose a simple model of household decision-making to motivate the link between children and gender gaps in the labor market, and to help rationalize how various factors potentially interact with parenthood to produce differential outcomes by gender. We discuss several forces that might make the road to gender equity even more challenging for modern cohorts of parents, and offer a critical discussion of public policies that seek to address the remaining gaps.
Forthcoming Article Downloads | <urn:uuid:389b76af-56a8-4372-856d-6faec87685fe> | CC-MAIN-2022-33 | https://www.aeaweb.org/articles?id=10.1257/jel.20221549 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00668.warc.gz | en | 0.939551 | 273 | 2.015625 | 2 |
· Paras Global Hospital, Darbhanga, hosts press conference to create awareness about the ill-effects of spurious alcohol, rampant in the area
· Consumption of illegally-produced liquor that often contains methyl alcohol, can cause permanent bodily harm, even death
Darbhanga, September 11th 2016: Methyl alcohol is a cheap yet powerful adulterant of spurious liquors. It has been a dominant cause of the outbreaks of methyl alcohol poisoning among the population in India. After Bihar witnessed a complete ban on all types of liquor earlier this year, Paras Global Hospital, Darbhanga, has recorded a steady rise of cases of illicit liquor poisoning. The hospital organized an informative talk on the subject in the hospital premises. The aim was to make people aware about this poisonous substance, cautioning them to avoid consuming spurious alcohol.
Dr A K Gupta Consultant &HOD9Non-Invasive Cardiology) Paras Global Hospital Darbhanga said, “Methanol poisoning is fairly common in our country. Being cheap and potent, it is sold on India's streets and people from low income groups often buy this. When swallowed in high concentrations, it may cause headache, dizziness, abdominal pain, vomiting, heart irregularities, convulsions, a complete collapse, and even death. We see that the victims as well as the families suffer, especially since most victims are in the 20-40-year age group.”
Methyl alcohol or methanol is basically used for industrial purposes and is found in varnish, antifreeze substances, paint, and fuel. It is added to spurious liquor to increase its alcohol content. When methanol drinks are consumed, it gets converted to formic acid: 500mg/ltr of this acid is considered severely toxic for the human body and can cause blindness. Any level more than this is usually fatal.
A note from the World Health Organization on methanol poisoning states that, “Problems arise when higher concentrations are formed during incorrectly managed distillation processes, but more particularly when methanol is deliberately added to fortify informally-produced spirits and illicit alcoholic drinks.”
“Methanol will not show any reaction in the body till it gets converted to formic acid. The initial symptom of alcohol poisoning is drowsiness, lack of ability to stand or walk straight. As these are common signs of drunkenness, the patient is not brought to the hospital immediately. After about six hours, the patient starts experiencing a headache, vomiting, and abdominal pain. He may start to hyperventilate and lose the power of sight. Coma, convulsions, and death from respiratory and cardiac arrest may follow,” added Dr Ankur Gupta
Getting quick treatment is crucial in surviving methanol poisoning. The only treatment or antidote to methyl alcohol poisoning is alcohol itself. Diluted ethanol is given to the patient intravenously to save his life.
“Prevention is most definitely better than cure. We hope that people will abstain from drinking under all circumstances. We are doing everything we can to educate people, through the media and through our OPD units, so that we can save lives,” said Dr Ankur Gupta | <urn:uuid:e1c9d281-6303-4354-ae04-cfc8316bf8eb> | CC-MAIN-2017-04 | http://www.pocketpressrelease.com/2016/09/Paras-Global-Hospital-Darbhanga-Puts-Out-An-Advisory-to-Stop-People-Drinking-Spurious-Alcohol.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280483.83/warc/CC-MAIN-20170116095120-00296-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.940108 | 657 | 2.734375 | 3 |
Odoo is the world's easiest all-in-one management software. It includes hundreds of business apps:
CRM | e-Commerce | Accounting | Inventory | PoS | Project management | MRP | etc.
After a long try I am not able to configure the two emails(incoming and outgoing) successfully in my openerp.I refered many previous questions but still email settings are showing connection error while testing.Can anyone please explain the complete steps involved in the configuration of incoming and outgoing mails.Is there any changes to be made in the settings of the email address account given as the login?
Go to Settings -> Technical -> Email -> Outgoing Mail servers
a. Description: Description about the mail server to be configured.
b. SMTP Server: Hostname or IP of SMTP server
For example smtp.gmail.com
c. Connection Security: Select SSL/TLS from the drop down list.
Sessions are encrypted with SSL/TLS through a dedicated port
d. Username: Username for SMTP authentication.
For example: firstname.lastname@example.org
e. Password: Password for SMTP authentication.
For example: password for email@example.com
f. Test the connection status by clicking âTest Connectionâ button.
For incoming mail server: Server Type : POP Server Server Name: pop.gmail.com Port: 995 SSL/TLS: True Username: firstname.lastname@example.org Password: pwd
For outgoing mail server: Server: smtp.gmail.com Connection Security: SSL/TLS port (default: 465) Username: email@example.com Password: pwd Test the connection status by clicking âTest Connectionâ button.
Please try to give a substantial answer. If you wanted to comment on the question or answer, just use the commenting tool. Please remember that you can always revise your answers - no need to answer the same question twice. Also, please don't forget to vote - it really helps to select the best questions and answers!
About This Community
This platform is for beginners and experts willing to share their Odoo knowledge. It's not a forum to discuss ideas, but a knowledge base of questions and their answers.Register
Odoo Training Center
Access to our E-learning platform and experience all Odoo Apps through learning videos, exercises and Quizz.Test it now
|Asked: 2/24/14, 4:03 AM|
|Seen: 10755 times|
|Last updated: 3/16/15, 8:10 AM| | <urn:uuid:74083571-eacd-4ef4-8106-184fdd2c56ed> | CC-MAIN-2017-04 | https://www.odoo.com/forum/help-1/question/incoming-outgoing-mail-configuration-44842 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00464-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.816288 | 537 | 1.5625 | 2 |
Photo Credit: Kimberly Holzer
The North Pacific Research Board (NPRB) was created by Congress under Title IV of H.R. 2107, signed into law on November 14, 1997 as P.L. 105-83 and codified as 43 U.S.C. §1474d. The Board was established in 2001. The Board is authorized to recommend marine research to the Secretary of Commerce to be funded through a competitive grant program using part of the interest earned from the Environmental Improvement and Restoration Fund (EIRF) created under 43 U.S.C. §1474d. The EIRF was part of a large settlement by the U.S. Supreme Court pertaining to a land dispute in the Arctic known as Dinkum Sands. The enabling legislation requires the funds to be used to conduct research on or relating to the fisheries or marine ecosystems in the North Pacific Ocean, Bering Sea, and Arctic Ocean. NPRB must strive to avoid duplicating other research and must emphasize research designed to address pressing fishery management issues or marine ecosystem information needs.
Building a clear understanding of the Gulf of Alaska, Bering Sea/Aleutian Islands, and Chukchi/Beaufort Seas that enables effective management and sustainable use of marine resources.
To develop a comprehensive science program of the highest caliber that provides a better understanding of the North Pacific, Bering Sea, and Arctic Ocean ecosystems and their fisheries. The work of the NPRB will be conducted through science planning, prioritization of pressing fishery management and ecosystem information needs, coordination and cooperation among research programs, competitive selection of research projects, enhanced information availability, and public involvement.
NPRB Strategic Plan 2019-2024
To facilitate and fund research to increase understanding of North Pacific marine ecosystems and sustainable use of their fisheries and other resources.
The NPRB will be a broadly influential force in collaborative marine research, balancing the most pressing fishery management and ecosystem information needs of the North Pacific.
Improve understanding of North Pacific marine ecosystem dynamics and use of the resources.
Foster cooperation with other entities conducting research and management in the North Pacific, and work toward common goals for North Pacific marine ecosystems.
Improve ability to forecast and respond to effects of changes, through integration of various research activities, including long-term monitoring.
Improve ability to manage and protect the healthy, sustainable fish and wildlife populations comprising of the ecologically diverse marine ecosystems of the North Pacific, and provide long-term benefits to local communities and the nation.
Support high quality projects that promise long- term results as well as those with more immediate applicability.
More than Funding
NPRB is not just a granting agency, but plays an important leadership role in identifying science, management, and monitoring needs. The board and staff manage and coordinate dynamic and scientifically sound research and monitoring programs. NPRB also supports a robust communication and outreach component; each successfully funded project is required to have dedicated education and outreach resources. The board is viewed as a source of unbiased, high quality scientific information.
Board of Directors
NPRB comprises a 20 member board, representing Federal, State, and other entitites. Receiving advice from selected Science and Advisory Panels, the Board recommends marine research priorities to the Secretary of Commerce, placing a priority on cooperative research that addresses pressing fishery management issues and important ecosystem information needs.
There are up to 19 members on NPRB's Science Panel. Members are selected by the Board for their expertise, broad perspective, experience, and leadership. The panel helps shape NPRB research programs, advises science planning, identifies research priorities, and develops recommendations for research funding based upon requests for proposals.
The Advisory Panel is composed of 12 members selected by the Board to provide experience and perspective as community members and representatives to various resource user groups (e.g., commercial fishing, subsistence use, and oil and gas). The panel provides a mechanism for meaningful stakeholder involvement in science planning, oversight, and review.
Financials: Total Research Programs
Since 2002 | $106,095,398
Financials: By Large Marine Ecosystem
Since 2002 | Total Research Programs
Funding Amount & Projects Awarded By Institution
Since 2002 | Total Research Programs
Total Percent Funded
Since 2002 | Combined for IERPs
This biennial report marks 18 years of North Pacific Research Board support for marine research in Alaska’s waters, and celebrates the publication of the 2018 Science Plan. NPRB continues to set the standard for funding high quality marine research that sparks scientific inquiry and informs a wide range of users. Since 2002, NPRB has supported three major integrated ecosystem research programs, over 430 multi-annual projects, 62 graduate students, three long-term monitoring projects, and activities that provide the infrastructure to conduct and communicate science.Download
Summaries from past meetings can be downloaded below:
- Click to Expand
NPRB strives to implement a science program of the highest quality. To maintain this high quality research, NPRB has implemented procedures for reviewing proposals, avoiding conflicts of interest, reviewing final reports, and protecting confidential information. They are published in NPRB’s standard operating procedures and are revised as necessary. Prior to submitting a proposal, please review this documentation. For successful proposals, specific documentation, such as semi-annual progress reports and annual reports, may be found in NPRB's specific research program (e.g., Core Program). | <urn:uuid:ad9102f0-c316-4a6a-b619-726527db352d> | CC-MAIN-2022-33 | https://www.nprb.org/nprb/about-us/#reports | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz | en | 0.918389 | 1,135 | 2.71875 | 3 |
ERIC Number: ED242219
Record Type: RIE
Publication Date: 1984
Reference Count: 0
Bibliography of Research on the Acquisition of French L1 and L2.
Approximately 500 works concerning acquisition of French as a first or second language by children from infancy to adolescence are listed. Although works on prelinguistic development are not included, research on comprehension during this period is. Studies of early simultaneous bilingual development are included if one of the languages is French. Articles on French instruction are included only if they take the language acquisition approach to teaching, but a large number of works on school language, aspects of reading and writing development, the relationship of language and cognitive development, and pathological development emphasizing developmental rather than remedial aspects do appear. Research in both French and English is included. (MSE)
Descriptors: Adolescents, Bilingualism, Children, Cognitive Development, Comprehension, Educational Research, French, Language Acquisition, Reference Materials, Second Language Learning
International Center for Research on Bilingualism, Pavillon Casault, 6e sud, Universite Laval, Quebec, Quebec, Canada G1K 7P4
Publication Type: Reference Materials - Bibliographies
Education Level: N/A
Authoring Institution: Laval Univ., Quebec (Quebec). International Center for Research on Bilingualism. | <urn:uuid:04f3d5a2-998c-4db0-bdaa-b674a7d4955a> | CC-MAIN-2017-04 | https://eric.ed.gov/?id=ED242219 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00079-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.884953 | 282 | 2.578125 | 3 |
Business & Management
Finance & Investing
The Best Investment Advice Is Sometimes About What Not to Do
- Your Price: $1.59
- List Price: $1.99
About Watermarked eBooks
This PDF will be accessible from your Account page after purchase and requires the free Adobe® Reader® software to read it.
The eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
Watermarked eBook FAQ
- Copyright 2011
- Dimensions: 5-3/8" x 8-1/4"
- Pages: 10
- Edition: 1st
- ISBN-10: 0-13-261711-0
- ISBN-13: 978-0-13-261711-6
This Element is an excerpt from It's About More Than the Money: Investment Wisdom for Building a Better Life (9780137050321) by Saly A. Glassman. Available in print and digital formats.
Why the best investment advice you ever get might be what not to do.
Shortly after 9/11, a terrible period for all investors and advisors–for all Americans–Edward called to thank his advisor. “Thank me?” the advisor exclaimed. “Why? I feel terrible about our losses over the last year.” Edward said, “No, you don’t understand. You told me not to invest $600,000 in a private equity partnership I was seriously considering. I’ve just learned that investment was a total failure.”
Unlimited one-month access with your purchase | <urn:uuid:57866a0a-1f77-44c0-8c2d-bdc947f96df7> | CC-MAIN-2016-44 | http://www.informit.com/store/best-investment-advice-is-sometimes-about-what-not-9780132617116 | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720941.32/warc/CC-MAIN-20161020183840-00519-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.891354 | 344 | 1.523438 | 2 |
By John B. Taylor
W.W. Norton & Co.; 235 pages; $24.95
Ben Bernanke's Federal Reserve comes in for harsh criticism — and not just from any gadfly — in "First Principles."
Stanford University Professor John Taylor, for whom the "Taylor Rule" of monetary policy is named, rips the Bernanke Fed for the way it handled the financial crisis and for its efforts to help the economy recover from the ensuing recession.
Taylor is not just any schlub. He's a respected monetary economist who has advised both the Fed and foreign central banks and held senior positions in both Bush administrations. His Rule, which essentially directs the central bank to adjust short-term interest rates when inflation and unemployment deviate from specified norms, is considered a model of how to operate monetary policy.
His chief complaint is that the Fed, under Bernanke, has increasingly followed a discretionary path unconstrained by any systematic or rule-based strategy.
This short but comprehensive book also offers prescriptions — perhaps aimed at the next Republican president — for fiscal policy, banking regulation and health care. The unifying theme, per mentor Milton Friedman, is that economic freedom works best and is essential to the maintenance of political liberty.
But Taylor's real expertise lies in the monetary area, and it is here he lays waste with a sharp pen. Taylor contends Bernanke got it all wrong in responding to the mortgage crisis. The Fed never should have bailed out Bear-Stearns in March 2008, he argues; having done so, it set up expectations that other investment banks would get the same treatment — hopes that were dashed when the Fed let Lehman Brothers go under six months later.
Recalling that the Fed then reversed course to rescue AIG's creditors, Taylor charges "the Fed's on-again/off-again bailout measures were thus an intergral part of a generally unpredictable and confusing government response to the crisis, which, in my view, led to panic."
Nor does Taylor have much use for the "quantitative easing" the Fed undertook after the panic shook the economy. Contrary to Fed claims, he says its massive purchases of mortgage-backed securities "had at best a small effect on mortgage rates." And he warns the resulting explosion of bank reserves "creates risks to the financial system and the economy."
"If it is not reduced, then the bank money will eventually pour out into the economy and cause a rise in inflation," he says.
The author also has tart words for the "cozy connections" between Wall Street and the New York Federal Reserve Bank, then under the leadership of Timothy Geithner, in the years before the crisis.
Taylor even alleges "the European debt crisis...has U.S. fingerprints on it." His logic runs as follows: By keeping the federal funds rate too low from 2003 to 2005, the Fed forced European nations to hold their own rates artificially low to avoid an appreciation of their currencies against the dollar that would have hurt their exports and slowed their economies. Those low rates fuelled European housing booms like the U.S. experienced — with similar consequences.
Bernanke contends it was a "global savings glut" that caused interest rates to be low worldwide and that the Fed's low official rates had little to do with the housing boom/bust. But Taylor documents policy deliberations showing foreign central banks set their rates in line with Fed rates.
Taylor criticizes former Fed Chairman Alan Greenspan, his one-time boss, for deciding to "deviate in 2003-05 from the predictable rules-based policy that worked well in the 1980s and 1990s." But he laments that, after Bernanke replaced Greenspan in 2006, "we saw monetary activism as it never had been seen before in the United States."
Taylor is a perennial guest and speaker at the Kansas City Fed's famed annual symposium in Jackson Hole, Wyoming, and it would be surprising if he were not in attendance again in 2012. But he might get some cross looks. | <urn:uuid:f2e16530-6149-4f0c-bfb9-fe2959f91a4c> | CC-MAIN-2017-04 | http://www.futuresmag.com/2012/08/01/first-principles-five-keys-to-restoring-americas-p?t=education | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281151.11/warc/CC-MAIN-20170116095121-00117-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.959073 | 821 | 1.71875 | 2 |
The Archbishop of Canterbury has used his New Year message to call on the public not to give up on the younger generation despite the "horrific" scenes during the summer riots.
Rowan Williams described the violence as "angry" and "lawless" but said that, when shown the right support and love, young people could "flourish".
Describing the disturbances which swept the country, he said: "Quite a lot of the images we're likely to remember from the footage of the riots in the summer will be of young people out of control in the streets, walking off with looted property from shops, noisily confronting police and so on.
"It all feeds into the national habit of being suspicious and hostile when we see groups of youngsters on street corners or outside shops and bus shelters.
"We walk a bit more quickly and hope we can pass without some sort of confrontation.
"The events of the summer were certainly horrific. They showed us a face of our society we don't like to think about – angry, destructive, lawless."
He said those involved were a minority and most young people shared the "general feeling of dismay at this behaviour".
He praised charities such as Kids Company in London for providing support and role models to enable youngsters to develop.
"When you see the gifts they can offer, the energy that can be released when they feel safe and loved, you see what a tragedy we so often allow to happen," he said.
"Look at the work done by groups like the Children's Society or by the astonishing network of Kids Company here in London, and you see what can be done to wake up that energy and let it flourish for everyone's good."
The archbishop called on people to recognise how their actions could help improve society as a whole.
He said: "Being grown up doesn't mean forgetting about the young.
"And a good New Year's resolution might be to think what you can do locally to support facilities for young people, to support opportunities for counselling and learning and enjoyment in a safe environment.
"And above all, perhaps we should just be asking how we make friends with our younger fellow citizens – for the sake of our happiness as well as theirs."
The New Year message will be broadcast on New Year's Day at 12.45pm on BBC1 and 4.15pm on BBC2. | <urn:uuid:947722e5-712e-4c63-96cd-8e9be41650e5> | CC-MAIN-2017-04 | https://www.theguardian.com/uk/2012/jan/01/archbishop-of-canterbury-young-people | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284405.58/warc/CC-MAIN-20170116095124-00034-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.970057 | 488 | 1.765625 | 2 |
On Tue, 27 Mar 2012 18:14:44 +0500, Kinaan Khan Sherwani <mr.sherwani@stripped>
> I am an undergraduate student and want to learn about innodb storage
> engine. I came up with this line in mysql reference manual that MySQL
> server keeps data dictionary information in .frm files which it stores
> in the database
> directories, whereas InnoDB also stores the information into its own
> data dictionary inside the table space files.I want to know , where
> comes the difference between InnoDB internal data dictionary and table
> definition ( .frm ) files . Do they store the same information about a
> table ?
No, they don't store all the same information. While the InnoDB data
dictionary duplicates a bunch of the information in the FRM, it does not
contain all of it.
e.g. the MySQL ENUM type is really just a integer when it comes down to
The FRM is the only place for table/column comments, real column types,
the 80x24 VT100 text interface definition etc.
If you want to delve in a bit more, check out how Drizzle does it. We
allow you to (read) the InnoDB data dictionary tables, you can see the
(remotely human readable) definition for the table protobuf message and
you can use the table protobuf printer utility to see what's in it for a
There are a couple of sites out there that attempt to explain the FRM
file format, but all are incomplete beyond the obvious. | <urn:uuid:54737afb-6e51-4b8e-bc66-24aade65228e> | CC-MAIN-2017-04 | https://lists.mysql.com/innodb/63 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282926.64/warc/CC-MAIN-20170116095122-00391-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.832697 | 347 | 2.5 | 2 |
Chewelah UCC Mission Statement
“As children of God, united in our belief in Christ, we are called to love one another as God loves us: helping each other to live as givers, to be as doers, to pray as believers, and always to serve.”
Chewelah UCC Church History
Visit the past and learn how our church became a part of the history of Chewelah, Washington. CLICK HERE
Chewelah UCC Constitution & By-Laws
Visit our Resources library for a copy of our Constitution & By Laws. CLICK HERE
Open and Affirming Statement of the
Chewelah United Church of Christ
adopted by the membership March 19, 2000
What is the significance of the UCC logo?
“In keeping with our mission of “being children of God, united in our belief in Christ, and called to love one another as God loves us”, and to deepen our mutual involvement in the aims and work of the General Synod, we declare ourselves to be Open and Affirming, joyfully welcoming people of any sexual orientation, race, gender, age, nationality, marital status, economic circumstances, emotional condition, physical or mental ability to all levels of the church.”
The symbol of the United Church of Christ comprises a crown, cross, and orb enclosed within a double oval bearing the name of the church and the prayer of Jesus, “That they may all be one” (John 17:21). It is based on an ancient Christian symbol called the “Cross of Victory” or the “Cross Triumphant.” The crown symbolizes the sovereignty of Christ. The cross recalls the suffering of Christ – his arms outstretched on the wood of the cross – for the salvation of humanity. The orb, divided into three parts, reminds us of Jesus’ command to be his “witnesses in Jerusalem and in all Judea and Samaria and to the ends of the earth” (Acts 1:8). The verse from Scripture reflects our historic commitment to the restoration of unity among the separated churches of Jesus Christ. | <urn:uuid:f9cde696-2fb1-4fc1-9756-3341e1660cee> | CC-MAIN-2022-33 | http://chewelahucc.org/who-we-are/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00465.warc.gz | en | 0.937467 | 447 | 2.078125 | 2 |
Written by: Dominik Cergna
Similarly to IKEA, whose innovativeness and approach in the past few decades have revolutionised the way in which we shop for and furnish our spaces, first of all by flat pack solutions and mass production of its items, the future brings some new and different methods of shopping, designing and manufacturing objects we use in our homes.
Millions of young people go to live in big cities, where they often change jobs and flats, and those flats are many times limited in space and decrepit. Their specific way of life affects what they shop for and the way they shop. Most of us today have an unlimited Internet access and there isn’t virtually a person without any online shopping experience by now. However, the statistics suggests a very small share of furniture e-commerce. Why is that so? First of all, because of a lack of experience of objects in the space when shopping online and because of expensive and complicated delivery. “Traditional” manufacturers who sell furniture mostly in physical stores and showrooms at attractive locations have to a great deal failed to prepare properly for doing business in which online furniture ordering will become very important. Some young companies and startups want to tackle the predicament of young people from big cities and to offer them exactly what they need at a given moment in their lives.
Photo credit: Tylco.com
Tylko.com is a new furniture brand Yves Behar, one of the most influential global designers, worked on together with his Polish partners. Tylko strives to digitalise the furniture industry. You can use a simple slider on their website to literally design your own table or shelf within given parameters. You can use the application to visualise such piece of furniture in your living room and order it straightaway by a click generating a database for automated manufacturing. This example clearly shows a change in the existing shopping model. In this case the customer does not buy an off-the-shelf piece of designer furniture, but chooses on his/her own the size, colours and shapes of objects s/he wants to have. This triggers an avalanche of new opportunities for manufacturers and customers alike, as design adaptability and possibilities to adjust to different spaces are unlimited. How can the prices of such new, advanced brands compete with traditional companies? Direct sales without dealers and selling online exclusively cut down significantly the margin and the costs of the final product, making it better in quality and cheaper. It is very important in this context to have online selection and shopping process as simple and as intuitive as possible, similar to physical stores – without any fuss, ambiguities and complications.
The second example is Made.com: a British webshop manufacturing products on offer only when a customer orders a specific product, eliminating the need for storage and physical stores. At the same time, it promotes young talented designers by offering and distributing their products. They have recently opened a brick and mortar showroom as well to allow potential customers to have a look at their products and try them out in person, in order to address the biggest challenge of online furniture shopping – a lack of immediate experience and testing – at least to some point. Made.com does everything in a completely opposite fashion from “old” brands – without famous designer names and dealers, and the decision on new products depends on their webpage visitors. Made.com invites their customers to vote for the pieces of furniture, and the most popular among them go into production.
Photo credit: Hem.com
Another interesting example is hem.com, initiated by Jason Goldberg. In the furniture market, Hem is making an attempt to replicate what Warby Parker did with eyewear or Nike with NikeiD custom shoes. Hem offers good quality Scandinavian design, relevant to people with different lifestyles. Now already a half of their company profit comes from customers who personalise products on their website. The customers want to have a selection and they want something of their own and unique, which they will be able to share on the social media and show off to their friends when they come to visit. These types of brands give them exactly what they want, as opposed to e.g. a small IKEA table or shelf that practically everyone has. interiordefine.com and campaignliving.com are also trying to adapt and humour a huge population of young people, adjusting to their fast lifestyles by custom-made and flexible products easily assembled and movable to other spaces. These new business models require quite different designing logic as well. Some completely change the existing paradigms and push the existing borders while considering the entire process of objects production and sales. The company, i.e. the designer, no longer designs a single product but gives the parameters according to which the customer will shape his/her own table. The company doesn’t any more make its own decisions about the products to be launched into the market, but the market and the customers do it, who can now say what they want and what is relevant to them. In the designing process, a special focus is placed on the possibility of sending the product in parts and of assembling different combinations or modules into a single product, to facilitate many combinations the customer can put together. A good example of such design is the ILI-ILI lamp by Grupa made of differently coloured modular elements easily stack up, offering a very simple way of creating a practically unique lamp.
Owing to the advantages they offer, and given the social and technological changes happening continuously in our time, it is possible that such models of furniture shopping and designing will prevail in the future and occupy a large segment of the target market. | <urn:uuid:0a05dc44-d1be-43d5-a92d-b539e974b0c4> | CC-MAIN-2022-33 | https://www.brigada.hr/endless-combinations_online-shopping-affects-contemporary-furniture/?replytocom=1757 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00265.warc.gz | en | 0.959517 | 1,150 | 1.796875 | 2 |
Marine who covered grenade to save friend receives the Medal of Honor
(CNN) – William “Kyle” Carpenter lost most of his jaw and an eye when he fell on a grenade to shield a fellow Marine from the blast. His body shattered, one lung collapsed, Carpenter was nearly given up for dead after that 2010 Afghanistan firefight.
Then he spent 2½ years in a hospital as doctors worked to rebuild his body. But if you think he’s bitter, think again.
“I look back, and I’m actually very appreciative I had those two and a half years, because those years put things in perspective more than a whole lifetime of things could if I wasn’t there,” Carpenter said.
On Thursday, he became the eighth living veteran of U.S. combat in Iraq and Afghanistan to receive the Medal of Honor, the nation’s highest military award.
Carpenter was wounded in Helmand province, Afghanistan, on November 21, 2010, while serving as a machine gunner, according to the White House.
Carpenter and another Marine were manning a rooftop position during a firefight with Taliban insurgents when a hand grenade landed nearby, the Marine Corps said.
Carpenter rushed toward the grenade and his body took most of the blast, according to the Marine Corps. The other Marine, Lance Cpl. Nicholas Eufrazio, sustained damage to the frontal lobe of his brain from shrapnel. Until recently, his wounds rendered him unable to speak.
In a Defense Department video, Carpenter said he had to be revived while being evacuated by helicopter from the battle and was labeled dead on arrival at a field hospital. He later nearly died again at Walter Reed Army Medical Center, he said.
“The enemy killed me. I came back, ran a marathon, completed a mud run and jumped from a plane. I won’t ever quit. I am just getting started,” he said in the video.
Carpenter, medically retired from the Marine Corps last year, is now a student at the University of South Carolina, the White House said.
Carpenter’s other awards include a Purple Heart Medal, Navy and Marine Corps Achievement Medal, and Combat Action Ribbon. Additional awards and decorations include the Navy Unit Commendation, Marine Corps Good Conduct Medal, National Defense Service Medal, Afghanistan Campaign Medal with one bronze campaign star, Global War on Terrorism Service Medal, Sea Service Deployment Ribbon with one bronze star, North Atlantic Treaty. | <urn:uuid:58072db4-eb80-44db-8bc9-3eab35764a53> | CC-MAIN-2017-04 | http://wtkr.com/2014/03/06/marine-who-covered-grenade-to-save-friend-will-reportedly-receive-medal-of-honor/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284352.26/warc/CC-MAIN-20170116095124-00192-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.968081 | 522 | 1.5625 | 2 |
In 2010, observations carried out by the Fermi Gamma Ray Telescope revealed two enormous structures
associated with our Milky Way galaxy. These two lobe-like structures have been dubbed Fermi Bubbles,
and they span about 50,000 light-years. Their origin is not entirely known, but they maybe related
to superheated gas emitted by Sgr A*, the supermassive black hole at our galaxy's centre. | <urn:uuid:64e90dba-7ea3-4476-99a7-b13c3c769929> | CC-MAIN-2022-33 | http://www.space-art.co.uk/image.php?gallery=galaxies&image=Fermi%20Bubbles.jpg | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00674.warc.gz | en | 0.906865 | 120 | 3.15625 | 3 |
The If It Fits Your Macros weight loss diet is simple and easy to follow, and lets you eat whatever you want, event “junk food” while still helping you to lose weight. It’s a great diet, but it is not without issues. If you’re focused purely on hitting the same macro and calorie targets every day you might find that your performance suffers when you train.
Eating for Performance Maximizing Your Macros
Your body needs protein for muscle growth and repair, healthy fats for hormone production and energy, and carbohydrates as a readily available energy source. While it is possible to use fat as your primary energy source, many performance athletes find that they perform better when “carb fueled”.
The first thing you should understand is that your weight will change regardless of the macronutrients you take in, as long as your calorie intake is correct. Calories are the key metric for weight loss.
Your satiety, well-being and body composition, however, will be determined by the macronutrients that you eat.
If you focus on “eating clean” without paying attention to macros, and hit your calorie goals, you will lose weight but you may feel deprived. If you hit your calorie intake at lunch time with a fast food meal then you will be hungry and cranky by evening.
Macros give you balance, and on the surface, it looks like there is a case for eating different macros on different days, depending on the type of exercise that you do and how hard you train.
Macros for Weight Training
If you do a lot of weight training, you need extra protein for recovery. If you don’t have that protein and you are eating at a calorie deficit then you run the risk of losing muscle mass. The weight on the scale might move, but your overall body composition may end up less than ideal.
Even if you don’t end up losing too much muscle you might struggle to recover between workouts. You won’t gain strength as quickly as you would with adequate protein intake, and the risk of injury is higher.
Adding a little extra post-workout protein to your intake on days that you lift could be beneficial.
Macros for Cardio
Here’s where things get tricky. Some people adapt to a high-fat diet easily and perform equally well whether they’re following a high-fat diet, a high protein diet, or one with more carbs. Other people find that they need carbs to do cardio.
This is very much an individual thing. It’s also something that could be worked around through nutrient timing. If you really struggle to get through that jiu-jitsu class or aerobics session without some carbs, have a piece of fruit a while before the session so that it’s digested and hitting your bloodstream at the right time.
You Don’t Need to Adjust Your Macros Daily (But You Can if You Want)
If you really want to micromanage your food intake then you can change your diet based on your day to day activity. However, many people find this stressful and find that it makes it more difficult to stick to a long term way of eating.
In addition, if your goal is weight loss and you start changing your calorie goal and macro targets on a day to day basis you could hamper your recovery. If you eat more to “fuel that long run” then less the next day, you’re depriving your body of nutrients it could use to repair your body after the intense exercise.
Remember that your body is not a car that needs fueled every X number of miles. It is a more complex machine with its own built-in energy stores. Some micro-nutrients are water-soluble and should be replenished regularly.
Others, however, are stored in your body. Nutrients such as Vitamin B12 can take years to deplete.
You will not keel over if you skip a meal. Your body won’t “turn carbolic and destroy all your gains” because you had less protein than you needed one day. What matters is long term habits. If over the course of the week, you are getting the right balance of protein, carbohydrates, and fats to support your activity level then you will be OK.
Finding the Right Balance
The right balance will differ depending on your habits. If you are a triathlete, you probably do want to have a diet that is rich in carbs. Up to 55-60% is not unheard of for people who put in a lot of miles running or cycling.
People who are aiming to gain muscle will want to eat more protein. People who are less active will likely aim for a balanced diet such as 40/30/30% across the macronutrients.
These are broad, example figures. The real ideal figure is individual and is based on your age, gender, current weight and target weight, body composition and level of activity, as well as the types of activities that you do.
If you get those figures right when averaged out over the course of the week then you will find that you don’t need to fuss with different meal plans and with “over-eating” some days and “under-eating” on others.
Don’t Sweat the Small Stuff
One common mistake that dieters make is throwing away the whole diet because they made one mistake. There is no need to do that. It’s not a waste to eat a steak “at a time when your muscles don’t need it”. Your workout won’t be ruined because you skipped that pre-workout.
Your body is the culmination of a series of small choices, and even partly right choices will still get you towards your goals. Focus on getting to the gym on the days you aimed for.
Use the IIFYM calculator to get a clear idea of your targets averaged out over time and stick to those. Build that as a habit long-term, then consider refining that if you’re a competitive athlete who needs to peak for a specific day.
For most of us, however, this is a lifetime effort. | <urn:uuid:d746072a-32b5-46f4-a9ce-91593e51752a> | CC-MAIN-2022-33 | https://www.iifym.com/blog/diet-and-nutrition/should-i-adjust-my-macros-on-days-that-i-dont-exercise/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00278.warc.gz | en | 0.956144 | 1,295 | 1.921875 | 2 |
The Georgian alphabet consists of 33 letters and is included in the UNESCO list of Intangible Cultural Heritage. We want to introduce our alphabet through Georgian cuisine and choose 34 Georgian dishes.
Yes, 34. We could not choose between Khachapuri and Khinkali.
Meet the Georgian culinary alphabet:
ა [A] – Ajapsandali (A summer dish made from stewed vegetables)
ბ [B] – Bazhe (Smooth Georgian walnut sauce)
გ [G] – Gozinaki (Sweet bomb made of nuts and honey)
დ [D] – Dambalkhacho (It is made from buttermilk cottage cheese that remains after churning butter)
ე [E] – Elarji (Cornmeal with Sulguni cheese)
ვ [V] – Varia (Megrelian chicken dish)
ზ [Z] – Zutkhi (Sturgeon with coriander and vinegar sauce)
თ [T] – Tatarberagi (Boiled cured dough, onion)
ი [I] – Ispanakhi’s borani (Spinach dish)
კ [K] – Kupati (Offal Sausage)
ლ [L] – Lobio (Georgian Bean dish)
მ [M] – Mchadi (Georgian Cornbread – without Cheese)
ნ [N] – Nazuki (Georgian Spice Bread)
ო [O] – Ojakhuri (Baked Pork and Potatoes)
პ [P] – Prasi nigvzit (Leeks with nuts)
ჟ [Zh] – Zhipitauri (a type of alcoholic drink, vodka)
რ [R] – Rachuli Lobiani (Bean Stuffed Bread from Racha)
ს [S] – Satsivi (Chicken Walnut Stew)
ტ [T] – Tolma (Stuffed Vine Leave)
უ [U] – Unabi (Jujube) jam
ფ [Ph] – Phelamushi (The glutinous grape based coating used in Churchkhela is turned into a big gel block and served in chunks)
ქ [Q] – Qababi (Minced Meat Georgian Kebab)
ღ [Gh] – Ghomi (Traditional Georgian dish from western region of Samegrelo. It is made with cornmeal and slices of cheese put in the hot portions to melt before tasting)
ყ [K] – Kaurma (Delicious Georgian dish made with beef)
შ [Sh] – Shkmeruli (Chicken in Milk and Garlic sauce)
ჩ [Ch] – Churchkhela (Georgian Snickers)
ც [Ts] – Tskhvari (Lamb) with quince
ძ [Dz] – Dzrokhis ena arazhnis sousit (Beef Tongue in Sour Cream Sauce)
წ [Ts] – Tsandili (Traditional Georgian dessert prepared with cereal seasoned with raisins and walnuts)
ჭ [Ch] – Chvishtari (Cheesy Cornbread)
ხ [Kh] – Khachapuri (Cheese-filled bread) & Khinkali (Georgian dumpling)
ჯ [J] – Jonjoli (Staphylea with onion and vinegar)
ჰ [H] – Hasutha (Adjarian dessert)
Soon you will be offered the top 10 Georgian dishes, until that, we want to let you know that 7 dishes of the 34 listed in the alphabet are Vegan and 5 Vegetarian.
Georgian Vegan Dishes:
Ajapsandali, Bazhe, Tatarberagi, Spinach, Lobio (Beans), Leeks with Nuts, Jonjoli with Onions and Vinegar.
Georgian Vegetarian Dishes:
Dambalkhacho, Elarji, Ghomi, Chvishtari and Khachapuri.
The list also included some Georgian sweets:
Gozinaki, Nazuki, Phelamushi, Jujube jam, Churchkhela, Tsandili and Hasutha.
Which is your Favorite Georgian Dish? | <urn:uuid:c452a43e-541e-48ea-814a-6d2e60e30059> | CC-MAIN-2022-33 | https://guestme.ge/en/our-blog/georgian-dishes-from-a-to-z | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00070.warc.gz | en | 0.879043 | 952 | 2.4375 | 2 |
Are you a new salesperson? What is Zig Ziglar’s advice on selling?
In Secrets of Closing the Sale, salesman and public speaker Zig Ziglar reveals how you can greatly increase your chances of closing your sales. To do so, you need to exhibit the core qualities of a good salesperson and address customer objections.
Here’s the beneficial advice of Zig Ziglar on selling and becoming a better salesperson.
The Qualities of a Good Salesperson
The first piece of advice from Zig Ziglar on selling is that you need to learn what a successful salesperson looks and acts like. Embrace these six qualities to boost your sales numbers:
Quality #1: A Strong Belief in the Product, Yourself, and the Customer
First, to sell well, start from a rock-solid belief that your product will improve the customer’s life, stresses Ziglar. You’ll transfer this strong belief to your lead during a pitch.
Second, develop a strong sense of your value as a salesperson, recommends Ziglar. Be convinced that you have something to offer customers and that you’re there to help them. This lets you approach each pitch with confidence and bounce back from negative interactions.
Third, believe that the customer can afford the product or service, states Ziglar. Your belief in their ability to pay carries over to the lead, who will then also believe they can afford the product.
Quality #2: Credibility in the Eyes of the Customer
The most important quality for any salesperson to possess is credibility in the eyes of the customer, writes Ziglar. The customer must trust that you have their best interests at heart and that you’re not trying to take advantage of them. Establish credibility by helping others find success, understanding everyone is always selling, and developing the qualities we’re currently talking about.
Quality #3: A Professional Appearance
Present yourself well while selling, insists Zig Ziglar. Do this by being clean and good-smelling and dressing neatly and professionally, yet not showily. Think about the image you want to project to your customers—reliable, knowledgeable, experienced, and so on—and dress in a way that reflects this.
Quality #4: Empathy for the Customer
Develop empathy for the customer you’re selling to, advises Zig Ziglar. Empathy is understanding how someone else feels (even if you don’t currently share that feeling) and then taking steps to help the person deal with that feeling.
Empathy is effective in sales because leads are motivated to buy when they feel understood and cared for, claims Ziglar. Empathy also helps you create a better pitch because, by putting yourself in your customer’s shoes, you can gear your presentation to their specific needs, thereby increasing your chances of success.
Quality #5: A Positive Perspective and Attitude
Ziglar writes that you must enter a selling situation with the expectation you’re going to close the sale. When you have faith in your chances and abilities and approach the lead with a positive attitude, you greatly increase the chance of a sale. Avoid allowing negative, defensive, or combative thoughts or behaviors to seep into your sale. This will ruin your chances of selling.
Ziglar adds that you can gain confidence in your abilities by becoming a better public speaker and an expert on your product. You also gain confidence by simply practicing selling. This confidence, in turn, will let you approach the next sale positively.
Quality #6: A Growth Mindset
Finally, to maximize your chances at closing the sale, always seek opportunities to grow and acquire new knowledge that makes you better at your job, writes Ziglar. Do this by consuming relevant content and media, like self-help books and podcasts.
Address Objections Effectively
While selling your product, the customer will likely bring up objections, writes Zig Ziglar. This is good because it means the customer is seriously considering the purchase. Nonetheless, you must address all objections to effectively close the sale.
Here are three techniques to counter objections:
Technique #1: Elicit And Address All Objections Immediately
Elicit the lead’s objections before they bring them up themselves so you can address them immediately, suggests Ziglar. Do this by asking targeted questions; for example, “Do you have any concerns about the durability of this smartwatch?” If the lead voices a concern, address it head-on.
If the lead flat-out says no to the purchase, straightforwardly ask why they’re not interested and then address those objections, advises Ziglar.
Technique #2: Address Objections One at a Time, Appealing to Logic and Emotion
When addressing objections, do so one at a time, while always appealing to the customer’s logic and emotions. Addressing objections one at a time keeps you in control and maintains the clarity of your pitch. Also, structure your responses to objections so you first logically and then emotionally invalidate them.
For instance, if your customer is worried about using their smartwatch for swimming, first assure them that the watch is designed to be water-resistant up to 20 meters (logic), and then assure them that if something does go wrong with the watch while swimming, they’ll get a free replacement (emotion).
Technique #3: Stay Calm When Objections Are Unfair
If the customer raises an objection you feel is nonsensical or even malicious, maintain your positive attitude by responding courteously and thoughtfully, insists Ziglar. You can do this by agreeing with the customer on their objection before addressing it. | <urn:uuid:c6a06dd1-125b-4104-bcd2-4d22b781edc8> | CC-MAIN-2022-33 | https://www.shortform.com/blog/zig-ziglar-on-selling/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00068.warc.gz | en | 0.939703 | 1,172 | 1.617188 | 2 |
Time to make the sponge! In this six-part series called “Follow the Sourdough,” Chef John shows you how to make sourdough bread, from beginning to end. Last time, you observed the tiny bubbles that told you your sourdough starter was alive and well, and almost ready for breadmaking duty. Today, you’re ready to roll! It’s time to use your sourdough starter to make the sponge. The key here is to use warm but not hot water. Hot water could wipe out the yeast you’ve been so carefully nurturing for the last few days. The timing here is key. See how it’s done. Want to see the previous episode? Check out How to Tell if Your Sourdough Starter Is Alive & Well. Ready for what’s next? Move on to How to Knead Your Sourdough Bread. Or start at the very beginning with How to Make San Francisco Sourdough Starter. | <urn:uuid:004a533b-7293-43f4-9c9e-17d92645a030> | CC-MAIN-2017-04 | http://allrecipes.com/video/4156/how-to-make-the-sponge-for-homemade-bread/?prop24=VD_RelatedVideo | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00567-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.931317 | 205 | 2.140625 | 2 |
The News: Google’s TensorFlow Quantum is a key industry milestone in machine learning acceleration. Google announced the launch of TensorFlow Quantum earlier this week, a new software-only stack that extends the widely adopted TensorFlow open-source machine learning (ML) library and modeling framework to support building and training of ML models to be processed on quantum computing platforms. Read more about the Google announcement from VentureBeat.
Google’s TensorFlow Quantum Is a Key industry Milestone in Machine Learning Acceleration
Analyst Take: Google’s TensorFlow Quantum launch is exciting, bringing together both quantum and machine learning initiatives at the company. Morever, Google has achieved an artificial intelligence (AI) industry milestone with this release. Though early quantum-computing developers had used the approach to accelerate machine learning (ML) algorithms, none has until now had the benefit of a quantum framework and library that’s integrated with a popular ML open-source tool.
Bringing Quantum Computing Into the Dominant ML Modeling Framework
Google’s TensorFlow Quantum brings quantum computing into the dominant modeling framework used by today’s developers of ML, deep learning (DL), and other AI applications. Developed by Google’s X R&D unit, TensorFlow Quantum enables data scientists to use Python code to develop quantum ML models through standard Keras functions. It provides a library of quantum circuit simulators and quantum computing primitives that are compatible with existing TensorFlow APIs.
Recognizing that quantum computing is not yet mature enough to process the full range of ML workloads with sufficient accuracy, Google has wisely designed its new open-source tool to support the many AI use cases with one foot in traditional computing architectures. TensorFlow Quantum enables developers to rapidly prototype ML models that hybridize the execution of quantum and classic processors in parallel on learning tasks. Using the tool, developers can build both classical and quantum datasets, with the classical data natively processed by TensorFlow and the quantum extensions processing quantum data, which consists of both quantum circuits and quantum operators.
Developers can use TensorFlow Quantum for supervised learning on such ML use cases as quantum classification, quantum control, and quantum approximate optimization. They can also execute advanced quantum learning tasks such as meta-learning, Hamiltonian learning, and sampling thermal states.
In addition, Google has designed TensorFlow Quantum to support the growing range of AI use cases—such as “deepfakes”—that do video, voice, and image generation with a high degree of verisimilitude. Google ML developers can use TensorFlow Quantum to train hybrid quantum/classical models to handle both the discriminative and generative workloads at the heart of the generative adversarial networks used in such applications.
Google designed TensorFlow Quantum to support advanced research into alternative quantum computing architectures and algorithms for processing ML models. This makes the new offering an invaluable research tool for computer scientists who are experimenting with different quantum and hybrid processing architectures optimized for ML workloads.
To this end, TensorFlow Quantum incorporates Cirq, an open-source Python library for programming quantum computes. It supports programmatic creation, editing, and invoking of the quantum gates that constitute the Noisy Intermediate Scale Quantum (NISQ) circuits characteristic of today’s quantum systems.
Cirq enables developer-specified quantum computations to be executed in simulations or on real hardware. It does this by converting quantum computations to tensors for use inside TensorFlow computational graphs. As an integral component of TensorFlow Quantum, Cirq enables quantum circuit simulation and batched circuit execution, as well as estimation of automated expectation and quantum gradients. It also enables developers to build efficient compilers, schedulers, and other algorithms for NISQ machines. Here’s an interesting video that walks you through programming a quantum computer with Cirq if you’d like a deeper dive:
Google’s Open-Source Tool for Quantum ML Demonstrates its Market-Leading AI R&D Prowess
Google’s R&D labs seem to be producing an endless stream of innovative research into both AI/ML and into quantum computing.
TensorFlow Quantum’s release is no big surprise, coming several months after Google declared “quantum supremacy”, which refers to its achievement of a quantum computing feat that would have been impossible on traditional computing architecture. For the past several years, researchers at various commercial and research institutions have been demonstrating that quantum processing of ML models is in fact feasible. However, one can expect that AI/ML researchers at Google and elsewhere will probably use TensorFlow Quantum to do some fairly amazing things that were never feasible on traditional AI-accelerator hardware platforms.
In addition to providing a full AI/ML software stack into which quantum processing can now be hybridized, Google is looking to expand the range of more traditional chip architectures on which TensorFlow Quantum can simulate quantum ML. Google has also announced plans to expand the range of custom quantum-simulation hardware platforms supported by the tool to include graphics processing units from various vendors as well as its own Tensor Processing Unit AI-accelerator hardware platforms.
Google’s New Tool Will Spur AI/ML Projects Throughout the Quantum Industry
Google’s latest announcement lands in a fast-moving, but still immature, quantum computing marketplace. By extending the most popular open-source ML development framework, Google will almost certainly catalyze use of TensorFlow Quantum in a wide range of ML-related initiatives.
- Announced in November 2019, Azure Quantum is a quantum-computing cloud service that is currently in private preview and expected to become generally available later this year. It comes with a Microsoft open-sourced Quantum Development Kit for the Microsoft-developed quantum-oriented Q# language as well as Python, C#, and other languages. The kit includes libraries for development of quantum apps in ML, cryptography, optimization, and other domains. Microsoft’s plan is to integrate this kit and such development tools and Visual Studio so they can be used to build quantum programs for quantum hardware platforms from Honeywell, IonQ, QCI, and others, and also to simulate program performance on these and other platforms.
- Announced in December 2019, the Amazon Braket service, still in preview, is a fully managed AWS service that enables scientists, researchers, and developers to begin experimenting with computers from quantum hardware providers (including D-Wave, IonQ, and Rigetti) in a single place. It allows users to explore, evaluate, and experiment with quantum computing hardware to gain in-house experience as they plan for the future. It provides a single development environment to build quantum algorithms—including ML–and test them on simulated quantum computers. It enables developers to run ML and other quantum programs on a range of different hardware architectures. It allows users to design quantum algorithms using the Amazon Braket developer toolkit and use familiar tools such as Jupyter notebooks. This gives customers the choice of executing either low-level quantum circuits or fully managed hybrid algorithms, and select from a range of software simulators and their choice of quantum hardware.
- In January 2020, IBM announced the expansion of its Q Network, under which over 200,000 users are running hundreds of billions of executions on IBM’s quantum systems and simulators through the IBM Cloud. Participants in the network have access to IBM’s quantum expertise and resources, open source Qiskit software and developer tools, as well as cloud-based access to the IBM Quantum Computation Center. Many of the workloads being run include ML, as well as real-time simulations of quantum computing architectures.
- In March 2020, Honeywell announced that its quantum computer will be generally available within three months, with a quantum volume of at least 64. Fellow analyst here at Futurum, Daniel Newman, covered this in detail here: Honeywell Drives Quantum Forward With New Roadmap and Partnerships. Honeywell also announced that Honeywell Ventures is making investments in Cambridge Quantum Computing and Zapata Computing, both of whom have expertise in ML and other cross-vertical algorithms and software for quantum computing applications.
The Takeaway—Google’s Open-Source Tool Will Make ML Quantum’s Killer App
Quantum computing has been in wait-and-see mode for so long that we tend to overlook the fact that it’s being rapidly put to practical uses.
If quantum computing were to take 60 years to mature into a commercial reality—in other words, roughly the amount of time it took for ML to emerge from laboratory curiosity to practical tool—we wouldn’t see quantum computing until the year 2075. But it’s clear, from all the recent industry announcements discussed above, that we’ll not only see commercialized quantum computing in our lifetimes, but that it’s already begun to emerge and will gain steady adoption in this decade, even while research labs roll out ever more sophisticated quantum architectures.
Also, it’s become clear that ML, deep learning, and other AI workloads will be quantum’s killer application. The new Google-developed quantum ML framework will find its way into a wide range of other solution providers’ quantum computing environments. As it does, AI developers will be able to build and train ML models that can achieve heretofore unimaginably intelligent algorithmic feats.
On final takeaway concerns what Google’s likely next move will be in the quantum ML space. My prediction is that before 2020 comes to a close, Google will combine TensorFlow Quantum with its pre-existing Quantum Computing Playground into a full-featured, managed quantum ML service.
Considering the fact that Google’s top public-cloud rivals–Microsoft, AWS, and IBM—all have such services either on the market or in preview, it would be shocking if the Mountain View, California-based company doesn’t try to one-up them with a quantum-ML service of its own.
Futurum Research provides industry research and analysis. These columns are for educational purposes only and should not be considered in any way investment advice.
Other insights from Futurum Research:
Image Credit: The Next Web
James has held analyst and consulting positions at SiliconANGLE/Wikibon, Forrester Research, Current Analysis and the Burton Group. He is an industry veteran, having held marketing and product management positions at IBM, Exostar, and LCC. He is a widely published business technology author, has published several books on enterprise technology, and contributes regularly to InformationWeek, InfoWorld, Datanami, Dataversity, and other publications. | <urn:uuid:4c5e7d09-dfde-4aa4-9ec2-dbad71d15553> | CC-MAIN-2022-33 | https://futurumresearch.com/research-notes/googles-tensorflow-quantum-is-a-key-industry-milestone/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00077.warc.gz | en | 0.911676 | 2,211 | 1.90625 | 2 |
Afro-Turks are usually the children and grandchildren of those who settled in Anatolia from Africa mostly came through the slave trade or other means during various periods of the Ottoman Empire. Most of them settled in the Aegean and Mediterranean regions, worked in the field of agriculture, and formed villages. There are also those who came from Africa and settled here one by one, both in the Ottoman Empire and the Turkish Republic period.
During the Ottoman period, people of African origin from Niger, Saudi Arabia, Libya, Kenya, and Sudan were brought to the Dalaman, Manavgat, Çukurova, Menderes, and Gediz plains through the slave trade, usually via Zanzibar. Also, some came from Crete during the 1923 Turkey-Greece Population Exchange and settled in the Aegean region, mostly in Izmir. People of African descent from Ayvalık say that their ancestors from Crete spoke Greek and learned Turkish later. Their number is around 10,000 to 20,000 individuals in modern Turkey.
Historical sources partially illuminate the question of why “Turks” of African origin mostly live in the Western Aegean Region, instead of in other regions of Turkey such as Central Anatolia, Northern Anatolia, or Eastern Anatolia. According to written sources, this tendency began in the second half of the 19th century, with the increase of foreign investments especially in the Western Aegean, many slaves were brought from Africa to be employed in tobacco and cotton farming.
Modern-day Afro-Turks, whose ties with their past were at the breaking point, began to search for their ancestors, question their past, and revive their traditions that were about to disappear, through the African Cultural Solidarity and Solidarity Association, which they founded in 2007. The most important of these traditions is the “Feast of Veal”. Afroturks in Izmir and Istanbul have been continuing the Veal Feast tradition for the last 14 years, which is still celebrated in many parts of Africa and shows gratitude to nature.
In this festival, which also has some religious rituals, Godya*, a natural leader, wishes health and forgiveness for his people. A calf is decorated and walked from house to house, donations that were attached to the calf and usually food were given to the poor and homeless children under Godya’s protection. The most important feature of the Veal Feast celebrated in Anatolia is that Afro-Turks communicate with each other through Godya, people come together, see each other, and exchange news. Godya also shared this information with other Godyas, so that distant relatives, distant family members would hear from each other. | <urn:uuid:1162f56a-b116-4b73-ba3e-614cdbb9bf4d> | CC-MAIN-2022-33 | https://toursaroundturkey.com/afro-turks/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00075.warc.gz | en | 0.979654 | 564 | 3.734375 | 4 |
Many political initiatives designed to strip segments of society of their rights and/or to make them less equal have emerged in Congress and State legislatures in recent years. Some of them came from ALEC. Targets include the poor, students, minorities and the elderly (changes to voting rights), women (equal pay, discrimination protections, access to preventative care, contraception and abortion), LGBTQ (spousal benefits, adoption, marriage) and undocumented immigrants (AZ and AL, etc.). Some have been proven unconstitutional by the reportedly most conservative SCOTUS in history; others are still working their way through the courts at taxpayer expense.
Either our own rights have been targeted or can be next if we remain silent. Commit to telling your state and federal representatives and senators that you disagree with these paths at odds with what the founding fathers envisioned--as frequently as needed until they listen and hear.
For those who will not hear, and were not replaced in November, remind them of your views and duty to represent you and your interests.
We who either did not vote or voted for those proposing or voting for such legislation are responsible for these results.
Follow-up with letters, phone calls and emails to hold current ones accountable through the end of the year and newly elected ones continuously. | <urn:uuid:d80d4fdf-e999-4bc9-916d-ee5aa44cdbe7> | CC-MAIN-2017-04 | http://www.thepetitionsite.com/986/905/408/hold-america-to-her-ideals-of-liberty-justice-for-all/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282140.72/warc/CC-MAIN-20170116095122-00130-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.968438 | 255 | 1.90625 | 2 |
Centering DIV Layers + floating over a table
I've been trying to set up a DIV layer in my website. I would like it to be in the center, and to be 570 pixels wide, and 400 pixels from the top. I do not want to set a height for it because I want it to extend as much as there is text. I also want it to float over a table. So far, however, I have not been able to do this.
Here's my HTML code (saved as a text file):
Here's my CSS code:
As you can see, the problem with this CSS code is that the DIV Layer is starting from the absolute center of the page (although it's starting 400 pixels from the top, and is floating over the table).
What can I do to fix this problem?
I would greatly appreciate it if you downloaded the files and worked on them, because then you'll truly see the problem (and hopefully, have a better chance of fixing it).
I did not upload the images which make up the table and the background image because it was not necessary. However, the table will be visible.
Once again, I would like the layer:
1. To be in the center of the page
2. To be 570 pixels wide
3. To start 400 pixels from the top
4. To float over the table
In addition, I would like the text in the layer...
5. To be aligned on the left
I tried several codes, one of which was this:
But this code made the DIV layer start under the table rather than 400 pixels from the top.
border : 0px none;
margin : auto;
text-align : left;
width : 570px;
If anyone could help me fix this problem by fulfilling all 5 "conditions" that I listed earlier, I would greatly appreciate it.
Things you want to look at:
1) You need a proper doctype. See my link below. Use html4.01 strict.
2) Do not call divs 'layers'. Divs can be placed in a z-layer but they aren't always layers and they aren't in this case.
3) You shouldn't use tables for layout.
EDIT: Well, now that I look at this, I can see why you could call it a layer.
Last edited by drhowarddrfine; 04-24-2007 at 07:39 AM.
Why shouldn't I use a table in my layout? Do you have any suggestions for something else I could use?
I'm afraid that I have to use a table because the image is large and needs to be split up, otherwise it will take too much time to load.
If you (or anyone) could figure out a way where I could use a DIV layer with the five conditions I specified in my first post, along with a table, I would greatly appreciate it.
Once again, I highly recommend you download the files (and save the text file as an HTML file) so you can see the problem.
Users Browsing this Thread
There are currently 1 users browsing this thread. (0 members and 1 guests) | <urn:uuid:9bc9061b-64e0-471a-a217-e1031771ffad> | CC-MAIN-2017-04 | http://www.webdeveloper.com/forum/showthread.php?146190.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00348-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.947978 | 668 | 2.046875 | 2 |
Instead, having instant access to information will drive a need for knowledge. A deeper understanding of the inner workings. And where is this knowledge to be found? It won’t be found at Google, or any of the aggregation sites known today. I doubt knowledge can be indexed or queried automatically. Microsoft disagrees, and they just bought Powerset to move into that direction. It can only be found in people. I suspect that having a unique expertise, experience, or a deep knowledge, will become a very valuable asset in this future of instant access.
For a moment let's step back though and look at this whole Social Media movement that is basically taking over the Web. No matter from where you look information is flowing faster than it ever has before, but unlike before, Social Media is being driven by both consumer and content producers. Unlike when Google came out with their secret sauce algorithm called PageRank where the power of popularity is no longer in the hands of content producers. PageRank, in its simplest explanation, ranks a Web site by the number of links that were pointed at it.
Social Media changes all that in that the playing field has been widened to include the very consumers who are visiting those sites and then passing that link to all their friends. With Social Media the consumer's voice is finally being heard as to what is popular rather than the closed world of content producers. Herein lies an idea that could very well make Google's PageRank obsolete or at the very least worth a lot less than it is now.
If we accept the probability that Social Media or its future version, is here to stay then we have to begin looking at the idea that, as Alexander suggests, it is the people - the consumers first and the producers second that are the real indicators of what is popular or important. Now what if some young whippersnapper figured out a way to quantify that popularity index/rank and built a new search engine around it and the Social Media sphere - where does that leave PageRank?
When you have startups like Gnip looking to be the gateway between social media content producers and the consumers of all that information you can begin to see that they would be able to quantify who is getting all the link love on a realtime basis, plus they could create an incredible meta database of content around which any ranking system could be applied against. Where Google updates its PageRank values when they feel like it, something like this Social Media Index would be a realtime beast that changes with every Twitter posting, every blog posting, every FriendFeed posting or any of the many other social media providers or comments made via third party commenting platforms like Disqus.
Granted many here might want to suggest that this is what Technorati does, but I don't agree. It could have; and maybe still can, but it has become a stagnated and aimless service that would need a radical shift in purpose to be able to pull something like this off. Google could do this because they have the power of search, but I would seriously hope they are happy to stick with their PageRank as I don't want them gaining any more power. No - this is an idea for a very smart startup who already might be involved in the Social Media arena.
Where once we had something like Google's PageRank dictating what is popular, something like a Social Media Index would change the game by letting the people decide what is popular. Isn't that the way it should be anyway?
[page rank image via] | <urn:uuid:225b83f4-512f-492e-9dcd-fb68d4466883> | CC-MAIN-2017-04 | http://mashable.com/2008/07/02/google-pagerank/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00274-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.972927 | 711 | 1.648438 | 2 |
Leave a comment
Be the first to add a comment.
With welfare spending constituting a third of the entire Government budget, and £100 billion spent on welfare payments for working age people alone, it is understandable the design of the UK’s benefits system is a key theme of an election campaign in which fiscal austerity continues to dominate parties’ policy platforms.
Throughout Britain, the annual welfare bill per capita varies widely from city to city (see map below). Unsurprisingly, cities with the strongest economies rely on welfare payments less than other cities. In Cambridge, the city with the lowest welfare bill, the bill amounts to just £2012 per person. In Blackpool it is twice as much at £4,020 per person. There is also a clear geographical pattern, with nine out of the 10 cities with the highest welfare bill per capita located in the North.
All of the major parties have stressed that they want to reduce the welfare bill through making the system simple, effective and most of all ‘fair’. With headlines about benefits tourism, or people having a ‘lifestyle’ of living on benefits, it is not surprising that the idea of ensuring that work pays is a key part of all parties’ proposals:
Aside from Labour’s benefits cap proposal, the problem with the majority of the welfare polices announced is that they don’t reflect the varying costs of living in different places, or the different levels of jobs and work experience opportunities places currently offer.
Due to variations in factors such as housing and childcare costs, a larger amount of money is needed to achieve a basic standard of living in some cities than in others. High basic living costs mean the introduction of the benefits cap has had a much larger impact in London than elsewhere – 45 per cent of households seeing their benefits reduced are in the capital. And of the top 20 local authorities with the highest number of households affected, only one (Birmingham) is outside London. This is why it is so important to ensure that welfare policies take into account the diversity of core living expenses in different cities throughout the UK, or we risk pricing some of the most vulnerable people out of their communities.
But even Labour’s proposals do not seek to tackle the second key issue with assuming cuts in benefits will incentivise people to work – namely the limited job and training opportunities some areas have to offer. The fact remains that there are large economic disparities between cities, and some have fewer available jobs for their residents, or a skills mismatch between residents and vacancies. The latest ONS figures show a significant number of people (16 per cent) working part-time because they cannot find full-time employment. The UKCES has shown that work experience opportunities vary geographically, with 46 per cent of companies in London offering placements but only 29 per cent in The Humber. As such, it is more challenging for residents to get a job or training in some cities than others, and reducing benefits may just reduce standards of living for those unable to do so.
Benefits play an important role in ensuring those who are out of work have a reasonable baseline standard of living as they seek to find new employment. Merely reducing welfare support is not enough to significantly reduce worklessness in some parts of the country. We also need to empower cities to respond to the specific challenges they face – through giving them greater powers to implement policies that provide people with the skills required by local employers, and creating attractive business environments that attract firms to areas that currently have limited jobs opportunities.
Be the first to add a comment. | <urn:uuid:37021610-54f6-4eaf-a674-5aa69b4991ac> | CC-MAIN-2022-33 | https://www.centreforcities.org/blog/britains-benefits-burden-is-not-a-level-playing-field/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00471.warc.gz | en | 0.959375 | 731 | 2.421875 | 2 |
The throat could be a straight stretch and it could also wind around taking a longer route than a conventional one. Physicists like Nathan Rosen and Einstein used the theory of general relativity in 1935, to introduce the existence of bridges through space time and the wormhole is known as an Einstein Rosen bridge which is considered a hypothetical topological feature of space-time with shortcuts through space time. These paths known as wormholes or Einstein Rosen bridges form a connection between two different points in space time creating shortcuts which can reduce the distance and time.
A simple version of the wormhole is to visualize space as a two dimensional surface of a tube which connects various points of the surface where the mouths of a wormhole are analogous to the holes at both ends of a two dimensional surface.
When the wormhole contains adequate exotic matter either naturally or artificially, it could be used as a method of sending travelers or information through space. Adding exotic matter to wormhole to some extent might stabilize the same to a point where travelers there might be a possibility of the addition of regular matter which would be sufficient to destabilize the portal. Besides connecting two separate regions within the universe, wormholes could also connect two different universes and some scientists presume that if one mouth of a wormhole is shifted in a specific manner, it could be used for time travel though there is a controversy according to British cosmologist Stephen Hawking that this argument is not possible.
Present time technology is insufficient to stabilize or enlarge wormholes if they could ever be found though scientist are still debating on the possibility of exploring the concept in obtaining a method of space travel where technology could be utilized.
Without directly observing a wormhole, scientists can only wonder on how they could operate. Some are of the opinion that a black hole, at a point in space time where gravity is the strongest, with no possibility of light could serve as an entrance and this opening could be connected to a tube which would empty from a white hole from which point matter and light would exit. Chances are less that this type of wormhole can be used for space travel where the passages are likely to prevail only on small subatomic scale and if large enough to traverse, the gravitational forces would enable them to collapse at an instant, on opening.
The theory of Einstein on general relativity, mathematically relates the presence of wormholes though none have been discovered till date. A case of negative mass wormhole could have been discovered whose gravity is so intense that even light cannot escape. Certain solutions of general relativity could be considered for the existence of wormholes wherein the mouth is a black hole though a naturally formed black hole occurred during the collapse of a dying star could not be considered for the creation of a wormhole.
Since it cannot be seen, NASA scientists focused on the tiny core of the galaxy M87 instead which was a super massive cosmic engine, 50 million light years from the earth and astronomers indicated that the core of M87 contained ferocious swirling maelstrom of superhot hydrogen gas which spun at 1.2 million miles per hour. In order to keep this disk of spinning gas from flying violently apart in various directions, a colossal mass concentrated at the center, weighing around 2 to 3 billion sun was essential. According to Davis’ publication in July in the American Institute of Aeronautics and Astronautics journal, reference is made to time machines with the possibility that wormhole could become or could be used as a means to travel back into time.
Moreover he relates that scientist’s understanding of the laws of physics are connected with time machine where there are numerous space time geometry solutions to portray time travel or have properties of time machines. A wormhole would probably permit a ship to travel from one point to another much quicker than the speed of light since the ship would arrive at its destination faster than a beam of light by taking a shortcut through space time through the wormhole. Thus the vehicle does not actually break the universal speed limit, the speed of light where in fact the ship never really travels at a speed faster than light. A wormhole could be utilized to cut through space as well as through time. | <urn:uuid:f244b14b-7014-435e-8926-64bb2897c174> | CC-MAIN-2017-04 | http://www.elixirofknowledge.com/2014/02/science-mystery-wormhole-means-to.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00069-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.957315 | 834 | 3.65625 | 4 |
Doctors are left stunned after cancer 'disappears' for EVERY patient in drug trial - raising hopes treatment is 'tip of the iceberg' and can be used to help people fighting other forms of the disease
Dostarlimab, a monoclonal antibody, works by attaching to a protein called PD-1 on the surface of cancer cells. This helps the immune system effectively 'unmask' hiding cancer cells and destroy them. The drug, which is made by GlaxoSmithKline, is given intravenously in a 500mg dose
By Mansur Shaheen @Daily Mail & Emily Craig @Mail Online
7 June 2022
Clinical trial of dostarlimab cured 18 patients in the US of colorectal cancer
One researcher said that it was the 'first time this has happened' in a cancer trial
It is still too early to declare the drug a cancer cure because the trial was small
Doctors are expanding trial for gastric, prostate and pancreatic cancer patients
A womb cancer drug has shocked experts with how effective it is against colorectal tumours, after it seemingly cured every patient in a trial.
The antibody therapy Dostarlimab, already approved for women in the UK, smashed expectations in a study at Memorial Sloan Kettering Cancer Center in New York.
All 18 colorectal cancer patients involved in the trial were still in remission one year after it finished, with no signs of tumour reformation.
Researchers said there were 'a lot of happy tears' among the participants. All 18 had been unsuccessfully treated with traditional therapies before signing up to the study.
While the trial was small, it sets up Dostarlimab as a potential cure for one of the most deadly common cancers.
Dr Luis Diaz, one of the lead researchers of the trial, said: 'I believe this is the first time this has happened in the history of cancer. It's really exciting. I think this is a great step forward for patients.'
Colorectal, or bowel, cancer, is the second most common cause of cancer deaths in the US, taking 50,000 lives a year. In the UK, around 16,000 Britons die each year.
There is no specific treatment for the disease, with patients reliant on surgery to remove tumours and chemo or radiotherapy to keep it away.
However, Dostarlimab — made by the British pharmaceutical giant GlaxoSmithKline — only works on a fraction of patients.
Dr Luis Diaz (second left) and Dr Andrea Cercek (fourth left) stand with some of their patients. From left: Sascha Roth, Imtiaz Hussain, Avery Holmes and Nisha Varughese
A recent clinical trial of the drug dostarlimab, a monoclonal antibody, found that it virtually cured cancer in every participant (file photo)
It targets cancers that have a gene mutation that prevents cells from repairing damage to DNA.
All 18 patients in the trial had this type of cancer, but overall it only affects just five to 10 per cent of patients with the disease.
But Dr Diaz, who is also a member of the White House's National Cancer Advisory Board, told the New York Times the discovery was 'the tip of the iceberg'.
The team now plan to investigate whether the drug can tackle other cancers in the same way.
'We are currently enrolling patients with gastric (stomach), prostate, and pancreatic cancers,' said Dr Diaz.
Around 43,000 Britons and 150,000 Americans are diagnosed with colorectal cancer every year.
Dostarlimab is made by designing antibodies in a lab to attach to proteins called PD-1 on the surface of cancer cells.
This helps the immune system effectively 'unmask' hiding cancer cells and destroy them.
The body makes antibodies on its own but the natural response is often not enough to tackle aggressive tumours.
Dostarlimab can be used in patients who have tumours with a specific genetic makeup known as mismatch repair-deficient (MMRd) or microsatellite instability (MSI).
Just five to 10 per cent of all bowel cancer patients are thought to have MMRd tumours, including all the patients in the clinical trial.
The 18 trial patients had all gone through previous treatments for colorectal cancer before the trial, including chemotherapy and surgeries.
They received Dostarlimab every three weeks for six months.
Researchers followed up with the patients 12 months later, and the cancer had seemingly vanished from their bodies, with the medical staff unable to find signs of tumours with any of the available screening methods.
Dostarlimab costs about $11,000 per 500mg dose in the US. In the UK, it is sold for £6,000 per dose.
However, the NHS has agreed a discount with manufacturer GSK, which sponsored the US trial, to treat advanced endometrial cancer.
Dostarlimab is given to around 100 advanced endometrial, or womb, cancer patients every year. The life-extending drug aims to improve their quality of life and avoid chemotherapy, which has more side effects and a limited benefit.
Dr Diaz said: 'Our message is: Get tested if you have rectal cancer to see if the tumour is MMRd.
'No matter what stage the cancer is, we have a trial at Memorial Sloan Kettering that may help you. And MSK has special expertise that really matters.'
'At the time of this report, no patients had received chemoradiotherapy or undergone surgery, and no cases of progression or recurrence had been reported during follow-up,' researchers wrote in the study published in the New England Journal of Medicine.
'There were a lot of happy tears,' said Dr Andrea Cercek, an oncologist at Memorial Sloan Kettering Cancer Center and a co-author of the paper, which was presented Sunday at the annual meeting of the American Society of Clinical Oncology.
Furthermore, no more treatments were required.
'It's incredibly rewarding to get these happy tears and happy emails from the patients in this study who finish treatment and realize, "Oh my God, I get to keep all my normal body functions that I feared I might lose to radiation or surgery", Dr Cercek said.
Cercek takes a selfie with one of her patients, Imtiaz Hussain
Sascha Roth was the first person to join the Memorial Sloan Kettering clinical trial for rectal cancer
While the results of the study are ground breaking, researchers note that the sample size was relatively small and it will take more research to determine whether they have actually stumbled on a cancer cure (file photo)
As a result, all of the participating patients were able to avoid going through more dangerous, taxing, treatments.
'[The results] enabled us to omit both chemoradiotherapy and surgery and to proceed with observation alone,' researchers wrote.
Surgery and radiation can have permanent effects on fertility, sexual health, and bowel and bladder function.
'The implications for quality of life are substantial, especially among patients in whom standard treatment would affect childbearing potential.'
The treatment triggered mild side-effects, including a rash, dry and itchy skin, fatigue and nausea.
Around 20 percent of participants felt an adverse effect, but they were easily managed.
While this study is ground breaking, and looks like doctors may have stumbled onto a cancer cure, they know it is too early to declare this a miracle drug.
The researchers noted that the results are 'promising' but need to be repeated in larger studies.
Dr Hanna Sanoff of the University of North Carolina's Lineberger Comprehensive Cancer Center, said the results were 'small but compelling.'
Dr Sanoff, who was not involved in the study, said it is not clear if the patients are cured.
'Very little is known about the duration of time needed to find out whether a clinical complete response to dostarlimab equates to cure,' she said in an editorial.
The first patient of the 18 was Sascha Roth, then 38, who noted some rectal bleeding in 2019 but felt fine.
She had a sigmoidoscopy — a test to look inside the lower part of the bowel — and her gastroenterologist said: 'Oh no. I was not expecting this.'
Ms Roth's doctor called the next day, and told her: 'It's definitely cancer.'
Ms Roth told the New York Times: 'I completely melted down.'
She was due to begin chemotherapy at Georgetown University, but a friend recommend she first see Dr Philip Paty at Memorial Sloan Kettering, who then told her that her cancer included the mutation that made it unlikely to respond well to chemotherapy.
She was, however, eligible to begin the trial with dostarlimab.
Ms Roth did not expect the trial to work, and had planned to move to New York for radiation, chemotherapy and possibly surgery after the trial ended - even having her ovaries removed and put back under her ribs to preserve them.
After the trial, Dr Cercek told her the good news.
'We looked at your scans,' she said. 'There is absolutely no cancer.'
Roth added: 'I told my family. They didn't believe me.'
HOW DOES DOSTARLIMAB WORK?
Dostarlimab (also known as TSR-042) is a type of immunotherapy called a monoclonal antibody.
It works by attaching to a protein called PD-1 on the surface of cancer cells.
This helps the immune system to recognise and attack the cancer.
A 500mg dose of he drug is administered into the blood stream through a drip into a vein over a 30-minute period.
The treatment can trigger mild side-effects, including a rash, dry and itchy skin, fatigue and nausea.
It is already used to treat around 100 women with advanced endometrial cancer in the UK. For these patients, the drug is given every three weeks for 12 weeks.
In the trial involving 18 colorectal cancer patients in the US, it was administered every three weeks for six months.
Dostarlimab costs about $11,000 per 500mg dose in the US. In the UK, it is sold for £5,887 per dose.
However, the NHS has agreed a discount with the manufacturer GlaxoSmithKline.
Colorectal cancer: cases and survival rates
Signs and symptoms may include blood in the stool, a change in bowel movements, weight loss, and fatigue.
Every year, in the US:
106,180 new cases of colon cancer
44,850 new cases of rectal cancer
Every year, in the UK:
43,000 new cases of bowel cancer
Five year survival rate, if not spread:
US = 90 percent
UK = 65 percent
US = for all aged 45 or over, or younger if family history or aggravating factors
UK = from the age of 60, or younger if medically necessary
If you appreciate our content, please consider making a donation -- GiveSendGo - Help Support Tuzara Post Newsletter | <urn:uuid:21ee3fca-bd22-40bd-8482-481d7ab4b7d4> | CC-MAIN-2022-33 | https://arutzshevatuzarapost.substack.com/p/doctors-are-left-stunned-after-cancer | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00674.warc.gz | en | 0.959088 | 2,336 | 2.140625 | 2 |
Best Answer: I have to make decisions everyday on whether to approve or deny people that apply for credit. If I had to give advice to people that are trying to start out building credit, this is the advice that I would give:
What you have to understand is what makes up your credit score:
1. Payment history- 35%
2. Total debt owed to avialable credit ratio-30%
3. Length of time establishing credit-15%
4. Types of credit established-10%
5. Inquiries and New accounts-10%
With that in mind, this is some steps that you should do in order to get yourself in a better financial position to build your credit:
1. Open a checking account- While opening the account doesn't directly build your credit, it does create a relationship between you and the bank by being an accountholder. Banks love to cater to their preferred customers that have accounts in great standing by offering loans and credit cards. Also, having a checking account not only helps manage your money, but it gives you the most powerful tool in building credit, a checking account to help pay your bills on time. Most banks and credit unions offer online banking with billpay that can make it easy for you to pay your bills on time, which is important in building credit.
2. Open a secured credit card- Secured credit cards are the easiest credit cards to get, mainly becuase a security deposit is placed upfront in order to establish a line of credit in the same amount. For example, if you deposit $250, your credit limit is $250, and so on. The deposit isn't used to pay for any of the purchsases on the card unless, it was charged off and sent
to collections, so you would have to repay it just like a regular card either in full or minimum monthly payments. The deposit is sometimes linked to a savings account, so it earns interest while you're building credit, so the deposit isn't sitting there. You can think of this as building credit with a savings account. The more you deposit, the higher your limit, which is good for your score because it creates a cushion between the total debt you owe and the credit you have available. Also, by continuing to add to the deposit, you're also creating an emergency fund at the same time. A good way of using the card is by making small purchases ($20/month max) and paying on time every month while adding to the deposit. Usually after a year or so, the card either converts or upgrades to a regular card, and most importantly, the deposit is given back, which you can place in a savings account as an emergency fund.
3. Enroll with PRBC- PRBC is America's Alternative Credit Bureau, providing a helpful service to the over 50 million people with limited or no credit history. If you pay your monthly bills on time, PRBC can help you build credit to qualify for a mortgage and better interest rates.On-time payments for the following bills are not reported to the traditional credit bureaus:
The only time your payments for these bills are reported to the other credit bureaus is if they're missing or late.With PRBC, your on-time payments count. You build credit for paying your bills on time, even if you have no credit history. PRBC offers two simple ways to start building credit today. | <urn:uuid:51487105-ca77-4388-bcba-16a45e3cb3d8> | CC-MAIN-2017-04 | http://credit-help.biz/credit/26923 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280825.87/warc/CC-MAIN-20170116095120-00210-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.962787 | 699 | 2.15625 | 2 |
Mary's 在这里注册在线学院 St. Mary's Online Academy (SMOA) is a global online learning platform offered by St. Mary's School, a renowned U.S. private preparatory school located in Medford, Oregon. Our school started in 1865 in …
Continues St. Mary’s Academy is Denver’s premier independent, Catholic coeducational PreK-8 and all-girls High School that was established in 1864 by the Sisters of Loretto. It continues to be a forward-thinking educational leader focused on a …
Represent Pre-Kindergarten to Grade 8 at St. Mary’s Academy is co-educational, while our high school is all-girls. Students come from across the metro area and represent many religious and ethnic backgrounds—creating a vibrant community of collaboration, discovery, and unity.
About About Us. St. Mary’s Academy is Denver’s premier independent, Catholic coeducational PreK-8 and all-girls High School that was established in 1864 by the Sisters of Loretto. It continues to be a forward-thinking educational leader focused on values-based, purpose-driven education with rigorous academics, integrated service learning
Young St. Mary's Academy student athletes compete at the highest level of competition in the state in the Three Rivers League across 11 sports. Through training and guidance, we empower young women by teaching and providing them with necessary tools to make confident and positive decisions on or off the field.
Mary’s Welcome from the Academy President. It is my great pleasure to welcome you to St. Mary’s Academy. For more than 150 years, St. Mary’s Academy has been fostering excellence in each child through academic achievement, spiritual development, and service. Our Loretto School Values of faith, community, justice, and respect guide our community in
Welcome Welcome to SMA Alumnae Connection. Please create an account to get started. First Name. Last Name
Co-Ed SMA Apparel. Admissions. Virtual Admissions Center. WHY SMA? Applying to St. Mary’s Academy. Co-Ed Pre-Kindergarten and Kindergarten. Co-Ed Lower School, Grades 1-5. Co-Ed Middle School, Grades 6-8. All-Girls High School, Grades 9-12.
941-953-4181Origin If you have questions, please feel free to contact us at 941-953-4181. St. Mary Academy/St. Martha Catholic School admits students of any race, color, national and ethnic origin to all the rights, privileges, programs, and activities generally …
(609) 597-3800Welcome Welcome to the St. Mary Academy website! You are encouraged to browse the site and take a virtual tour in the above video. If you are interested in an in-person school tour contact us at (609) 597-3800 or email Principal Lizanne Coyne [email protected] Start Here!
Mary's St. Mary's Academy is one of 2000 schools worldwide to offer an AP Capstone Diploma program focused on college-level research and collaboration. St. Mary's Academy is proud to announce the construction of a new Innovation Lab coming soon! Dr. Maria Rosario Jackson, Red Tie ‘83, nominated as chair of the National Endowment for the Arts.
School The St. Mary’s Academy Extended Day Program is a service provided for the care and safety of students enrolled in the Academy. This service provides care on school days before school from 7:30 a.m. to 8:10 a.m., and after school from 2:40 p.m. until 5:30 p.m. The program is staffed by St. Mary’s employees, with help from assistants from Bay
785-437-2471Mary's St. Mary's Academy . St. Mary's Academy 200 E. Mission Street St. Mary's, KS 66536. Grades K-12 (high school: boys & girls) Boarding students accepted. 785-437-2471 785-437-6597 fax email. academy website
Collection The St. Lawrence-Lewis School Library System collection consists of high school yearbooks from area high schools. The Marian is the annual yearbook of St. Mary's Academy. Scope of Collection. This collection consists of issues of the Marian dating between 1937 and 1969. Browse within this collection. By Subject:
Mary’s Cambridge Network is proud to launch St. Mary’s Online Academy in collaboration with St. Mary’s School of Medford, OR. Highlights of the SMOA program are below, or full details can be found here in the SMOA Credentials Package. Synchronous online learning and on-campus instruction in Asian time zones across 10 campuses.
(303) 679-3412Answer Hello friends and family of the St. Mary's Academy program in Peru, Thank you so much for your trust and support of our programs. We are very excited about the group's upcoming departures and want you to know that we are here to answer any questions you have. You can either email us or call at (303) 679-3412 (toll-free 1-888-831-8109). Here are
Either Get Feed for iCal (Google Calendar). This is for subscribing to the events in the Calendar. Add this URL to either iCal (Mac) or Google Calendar, or any other calendar that supports iCal Feed.
St. Mary’s Academy is Denver’s premier independent, Catholic coeducational PreK-8 and all-girls High School that was established in 1864 by the Sisters of Loretto.
100% College Acceptance rate 1859 Founded by the Sisters of the Holy Names of Jesus and Mary St. Mary's Academy 1615 SW 5th Avenue Portland, OR 97201 P: 503.228.8306 F: 503.223.0995 [email protected]
$2.2 Million in Annual Tuition Assistance Awarded to St.Mary's Families 100% College Acceptance rate 1859 Founded by the Sisters of the Holy Names of Jesus and Mary St. Mary's Academy 1615 SW 5th Avenue
1859 Founded by the Sisters of the Holy Names of Jesus and Mary St. Mary's Academy 1615 SW 5th Avenue Portland, OR 97201 P: 503.228.8306 | <urn:uuid:88cddae5-2013-42d9-91bd-c20d1e38fcbd> | CC-MAIN-2022-33 | https://education-online-courses.com/st-marys-academy/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00667.warc.gz | en | 0.91864 | 1,359 | 1.609375 | 2 |
We provide a Christian accountability housing program helping homeless, previously incarcerated people, and/or parolees by assisting them enter a residency program using biblical principles as well as practical teachings and life skills training for a successful re-entry into society. We have multiple transitional houses in Clay County for both men and women.
We assist those seeking help in the following areas to:
- Learn and practice basic biblical principles
- Learn and practice basic life skills
- Seek educational opportunities
- Participate in regular bible studies
- Enhance relationship with their family
- Refrain from individuals, communities, and/or activities that lead to incarceration
- Life skills training - including teachings on anger management, addiction counseling, conflict resolution, decision-making, self-esteem, assertiveness training, parenting skills, etc.
Residents are required to work, volunteer, or go to school 40 hours per week. Crossing Home Moorhead is a self pay safe housing opportunity. We do not accept GRH or other government funding.
If you would like an application please email Chaplain Ryan, email@example.com. | <urn:uuid:557e7212-f1c2-423c-9450-682750e2bf8b> | CC-MAIN-2022-33 | https://www.heartofclay.org/housing | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00475.warc.gz | en | 0.946307 | 228 | 1.578125 | 2 |
An open work permit gives official permission to foreign nationals to work for any business or employer in a foreign country. If you are a foreign national that wants to procure a Canada open work permit, there are means to apply for it outside Canada, at the Port Of Entry (POE), and also if you’re already in Canada. Besides, open work permits are not offered to businesses or employers that specializes in escort services, erotic massages, stripteases, and erotic dances.
Open Work Permit Requirements within Canada
Foreign nationals are eligible to apply for Canada open work permit as long as they meet certain conditions. Here are some things you should take note to be qualified for open work permit application inside Canada.
- If you have a valid study/work permit
- If you have made a claim for refugee protection
- If Immigration and Refugee Board of Canada acknowledges you as a protected person or as a convention refugee
- Based on Canada-United States-Mexico Agreement (CUSMA), you are eligible to apply for open work permit in Canada if you are a professional, trader, investor, or intra-company transferee
- If you have a valid Temporary Resident Visa (TRV) with not less than 6 months to its expiration
- If your parents, spouse, or common-law partner have a valid study/work permit
- If you have applied for Canada’s permanent residency, and you are waiting for its decision
- If you are permitted to work in Canada without a work permit but you prefer to apply for another job that is completely different from your current job
- If your study permit has not expired, and you also meet the requirements for Canada’s Post-Graduation Work Permit (PGWP)
Applying for open permit at the port of entry
If you didn’t apply for work permit in your home country, you still have the opportunity to apply for it just as you arrive at Canada. Not all foreign nationals can take this opportunity. Only foreign nationals from USA are eligible to apply for their Canada open work permit at the port of entry. Also, you need to be qualified for an electronic travel authorization or to enter Canada with exemption of a visitor visa.
Types of Canadian open work permits
The types of open work permits include restricted and unrestricted open work permits:
Restricted open work permits
This work permit creates boundaries to the type of job that you are permitted to apply for. It also restricts the areas where foreign nationals can send their job applications to.
Unrestricted open work permits
This Canada open work permit does not restrict the areas and jobs that foreign nationals are permitted to apply for. It avails more freedom to the foreign national to be able to work wherever and under any employer they prefer to work with in Canada.
Processing fee for open work permits
You are mandated to pay the;
- Open work permit fee of $155
- Open work permit holder’s fee of $100
Canada’s processing time for open work permit is mostly between 4 to 5 months. Although, COVID-19 outbreak has made some severe impacts that affected the CIC open work permit processing time and has resulted to abnormal processing of applications.
Spousal Open Work Permit
You can apply for Canada Spouse Open Work Permit (SOWP) if you’re a spouse or family member of someone working or studying temporarily in Canada.
Before you commence any process of Spousal Open Work Permit application, it is necessary to consider if you are eligible for the application. It’s eligibility factors entails if you are;
- the spouse of a skilled worker in a job under NOC skill type 0, A or B and have been authorized to work in Canada for at least 6 months
- the spouse of a foreign student who is studying in a public tertiary institution or is undergoing study in Quebec’s Collège d’Enseignement Gènèral Et Professionnel (CEGEP)
- the spouse of an individual who is applying for the Atlantic Immigration Pilot Program in an occupation under National Occupational Classification 0, A, B or C
Extending your SOWP in Canada
It is best to apply for an open work permit extension when your existing work permit still has at least 30 days to its expiry date. You also need to ensure that your passport won’t expire anytime soon. Your passport expiry’s date needs to be on a later date of when your new work permit will expire
Open permit spousal sponsorship
The fee attached to sponsoring a spouse or common-law partner varies from $1,050. It’s processing time usually take about 12 months. After completing the application, the spouse who is being sponsored are sometimes required to undergo some biometric measures. Before you can sponsor your spouse, you have to;
- be at least 18 years old
- be a permanent resident or a Canada citizen. It is also permissible if you are registered under the Canada’s Indian Act as a India citizen. Being a permanent resident, you must be residing in Canada to be eligible for open work permit spousal sponsorship. Besides, Canada citizens who are not residing in Canada are mandated to tender proof of their intention to return and live in Canada as soon as their spouse becomes permanent residents
- be financially capable of providing your spouse’s essentials
- have evidence to ascertain that you are not receiving any kind of social assistance. This is not applicable to disabled persons
Bridge Open Work Permit (BOWP)
As a foreign national who is working with any of Canadian employers, Bridge Open Work Permit authorizes you to work in Canada pending when your application for permanent residence is being decided. Canada bridging open work permit is specifically for foreign nationals that already have a job in Canada.
Bridging open work permit processing time varies on how you initiated your application. If you applied for your BOWP online, its processing will take about 60 days, which is equivalent to 2 months. If you applied for BOWP through physical submission (paper) of supporting documents, your BOWP processing time will estimate to 100 days.
Bridging open work permit expires after 1 year. By this time, you would have gotten a decision based on your application for permanent residence. Hence, if you have applied for your permanent residence (Economic Class), bridging open work permit via express entry allows you to continue working for a period of 4 months.
Open work permit for spouse of PGWP holder
As a spouse to a person that possesses Post-Graduation Work Permit (PGWP), you can leverage their influence in your application for open work permit. Hence, your work permit will be processed to expire at about the same time with your spouse’s work permit.
Spouse open work permit document checklist
Spouse open work permit processing time is more likely to be decided in a period of 4 to 5 months. In order to avoid your spouse open work permit from being rejected, ensure that your proof of relationship and other supported documents are valid and complete. If your husband/wife is a holder of PGWP, your work permit application requires a copy of;
- your spouse’s open work permit
- their recent pay slips
- your spouse’s job offer letter or contract. Besides, a letter from your spouse’s employer also serves this purpose as it helps CIC to confirm that he/she is a worker under National Occupational Classification 0, A or B
Letter of Explanation
A letter of explanation (LOE) is otherwise known as explanation letter. It is usually being prepared by foreign nationals in order to extend their study permit, as well as to support their post-graduation work permit. LOE is being addressed to Immigration, Refugees and Citizenship Canada.
If you are drafting he letter of explanation spouse open work permit, you will have to include a personal statement about yourself and your spouse in the letter. Therefore, you will begin the letter of explanation by providing information about providing information about yourself, including your name, age, educational background, qualifications, and work experience. It should also include your intentions when you arrive to Canada. Your spouse’s current status also needs to be included in the letter, their arrival date to Canada, legal proof of marital status, and other supporting information.
If you are a live-in caregiver in Canada, you are obligated to posses a minimum of 2 years work permit under the live-in caregiver class. It is also necessary for you to have worked for not less than 3,900 hours or for 2 years in period of 4 years.
Questions about Spouse Open Work Permit (SOWP)
- If you made an online application for your work permit, You can cheek your application status by;
- Signing in to your online account
- Navigate to View my Submitted application or profiles
- Then, click on check status and messages.
- For paper applications of open work permit, Foreign nationals that applied for their work permit online are required to connect their application to an online account in order to access and receive updates on the status of your application.
- Valid passport
- Proof of identity
- Proof of relationship | <urn:uuid:411ee1d1-919f-4dae-b7e9-fa34a6c23a09> | CC-MAIN-2022-33 | http://sohowork.net/index-40.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00679.warc.gz | en | 0.939105 | 1,915 | 1.585938 | 2 |
While technology has significantly changed how companies market their products and services over the years, the guiding principles behind successful advertising campaigns have remained constant.
Before you launch an advertising campaign, whatever the media and channels, you first must know be able to answer these questions:
- What is the marketing budget?
- How long will the ad campaign run?
- What are your marketing goals?
- Who is your audience?
- How will you measure your marketing goals?
It also helps to know what your competitors are doing. More on that later.
First things first
Let's not put the shopping cart before the horse, so to speak. That is, one of your first tasks is to determine the campaign's overall goal. If your goal is to sell products or services, you will be creating a much more aggressive campaign than if your goal is to increase brand awareness.
You can find a great deal of information on digital advertising campaigns designed to drive conversions. Somewhat less prevalent are articles focusing on the creation of online advertising campaigns simply designed to create brand awareness. We're talking apples and oranges or, in this case, conversions and clicks.
The ultimate goal of an online brand awareness campaign typically is to drive traffic to your site. Once the visitor clicks through to your site, you have the opportunity to educate and engage via relevant, valuable content. But we're getting a bit ahead of ourselves here.
Your ad campaign will be impacted by the factors listed above, which means you may have to tweak your original goals along the way. For example, if your original goal was simply to create top-of-mind awareness for your brand, you might want to inundate the web with banner ads. You would place ads based more on reach and frequency than on targeting a specific audience. However, if your online marketing budget is limited, you probably would have to rethink such a broad-based approach.
Consistency is key
You may not be able to blanket the web with your banner and search ads, but you can (and should) be consistent in your creative efforts. In doing so, you will build visual recognition with your online audience. Over time, elements such as your color scheme, logo and fonts will instantly resonate with viewers.
The banner ads below are good examples of consistency in advertising. It just so happens the ads are promoting BP, which has had to dig its brand out of the PR hole created by the oil spill back in 2010. And with the release of the "Deepwater Horizon" movie, the BP brand may take a bashing again.
A brand awareness campaign such as BP's hovers between the worlds of advertising and public relations. Because BP is already a known brand, the overarching goal may be brand awareness, with a campaign devoted specifically to altering the public's perception of the brand.
Note, too, the call to action (CTA) for each of the banner ads. It is not an "in-your-face" CTA like BUY NOW. Instead, the CTAs encourage the viewer to "Learn more" or "Read the Report." In the most simplified sense, brand awareness campaigns are soft sell vs. hard sell.
In fact, your brand awareness campaign could be the precursor to a straight sales campaign. This ties in perfectly with the consumer buying process:
AWARENESS ---> RESEARCH ---> EVALUATION ---> COMMITMENT
Just keep in mind that it most likely will take longer to see results from a brand awareness campaign. Patience and persistence will pay off in the long run.
If you want to learn more about brand strategy and awareness, OMI recommends How To Be The Most Talked About Brand.
How to get the most bang for your buck
The Google Ad Network is a popular choice for setting up a digital advertising campaign. According to Google AdSense, the most successful banner ad sizes are:
- 336x280 large rectangle
- 300x250 medium rectangle
- 728x90 leaderboard
- 300x600 half page
- 320x100 large mobile banner
Whether you're resizing an image within each ad or the ads themselves, this can eat up a lot of valuable time. That's when a tool like the Image Resizer comes in handy. Simply upload your image, plug in the desired width and height in pixels, and you've got yourself a resized image.
The tool also comes in handy when prepping ads and images for social media. That's right, don't overlook advertising on social media sites. These can be particularly effective for brand awareness campaigns. Admittedly, it all can be a quite overwhelming. Here's a helpful guide to ad sizes on social media.
With search engine marketing (SEM) campaigns, be careful in your keyword bidding. If you're running more than one campaign at a time, you don't want to bid against yourself. With Google AdWords, you can use the AdWords Editor to avoid duplicate keywords.
As mentioned above, it's important to know what your competition is up to online. This is especially true when it comes to keyword bidding. Your competitor may be bidding on your brand name, and you can return the favor.
If you want to learn more about Social Media and Branding, OMI recommends Brand Advocacy Strategies for Social Media.
Getting them to 'click' with your content
So someone clicked on your ad and ended up on your website; now what? Your first inclination might be to take the visitor to your home page. For best results, however, create a dedicated landing page. Even better, create (and test) several landing pages to see which ones perform best. If you don't have the bandwidth or budget to design multiple landing pages, use an online service such as Unbounce, which provides landing page templates (no HTML coding needed).
The content on the landing page should follow search engine optimization (SEO) best practices. It also should be tailored to complement the banner ad. That way, when the visitor arrives at your page, there is no disconnect. It's a seamless experience. We often think of site design and functionality when we're discussing user experience (UX), but content also can dramatically affect the online experience.
Are we there yet?
How do you know if your brand campaign is a success? Many marketers are leery of brand awareness campaigns because they can be more difficult to measure. But that's the beauty of digital advertising; it's easy to track your campaigns online.
In addition to monitoring your Google and other paid search campaigns, you can use Google Adwords Keyword Planner and Google Trends to track the volume of searches for your brand name.
Be sure to conduct social listening, as social networking sites offer keen insights into how consumers react to your brand (or not). Several social listening platforms, such as Hootsuite, offer both free and paid plans.
Assuming you've integrated an email component into your online campaign (as you should), you also could conduct a survey to gauge brand awareness.
Want to learn more about any of the topics discussed in this article? Visit the Online Marketing Institute to browse over 400 classes in the digital and social media marketing space. Ready to start learning? Sign up here.
Darcy Grabenstein is a freelance copywriter with more than 20 years experience in print and digital advertising. In the digital world, she has worked extensively with e-commerce and email campaigns. Connect with her on LinkedIn. | <urn:uuid:e44691f2-0c64-4c95-addb-35c408354405> | CC-MAIN-2017-04 | https://www.onlinemarketinginstitute.org/blog/category/pay-per-click/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00282-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.946247 | 1,527 | 1.765625 | 2 |
Remagen No buyer has yet been found for a World War II landmark on the Rhine despite a bidding deadline. The two towers of the "Bridge at Remagen” were made world-famous in a movie of the same name.
Officials in Bonn informed the German Press Agency (dpa) that the bridge towers had not yet been sold although the Federal Railway real estate division continues its efforts to sell the property. The bridge towers are near Erpel on the right bank of the Rhine River, just south of Bonn. One sale had been planned to interested parties who wanted to establish a foundation for the towers but it fell through. An original deadline for bidders expired on July 1, 2018.
The two bridge towers are connected on the ground floor, they are a century old and are listed as historical monuments. Heating and water pipes are absent, the dark empty buildings are in need of renovation. Erpel's departing mayor, Cilly Adenauer (CDU), says the roofs have been renovated, but not the walls: "It is not unthinkable that parts of the facade will fall down.”
Edgar Neustein, chairman of the cultural association Ad Erpelle, explains that he tried to buy the bridge towers for art exhibitions together with an investor, planning for a foundation to be established, but gave up because of the structural and financial risks. Now the association is striving to establish a Rhineland-Palatinate state foundation for all four towers: The other two towers are on the opposite side of the Rhine in Remagen and house a museum. But it is currently closed due to inadequate fire protection.
In March 1945, Allied troops crossed the Rhine near Remagen for the first time during the Second World War. They made it across the bridge after an unsuccessful German blasting attempt. A few days later it collapsed. The U.S. film "The Bridge at Remagen" made the structure world-famous (it was released in 1969 starring George Segal).
(Orig. text: dpa; Translation: ck) | <urn:uuid:9b736017-fd2c-4069-8acf-0094b0556a79> | CC-MAIN-2022-33 | https://www.kamelle.de/incoming/no-buyer-for-second-world-war-landmark-on-the-rhine_aid-44437877 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571234.82/warc/CC-MAIN-20220811042804-20220811072804-00067.warc.gz | en | 0.969322 | 425 | 2.296875 | 2 |
The WMA Decoder Library includes a new modular framework for audio decoders, including support for MP3 and AAC, allowing easier audio application development. Microchip says it will simplify development and increase flexibility of consumer audio products such as audio docks, automotive head units and home audio platforms.
Microchip’s Audio Decoder Framework allows for audio software codecs to be added to a PIC32 design project. Rather than having to rewrite large sections of application code, the framework allows for easier integration into an existing application after the corresponding decoder library has been purchased. The WMA Decoder increases the depth of the library for PIC32 MCU-supported audio decoders, in addition to MP3 and AAC. This increases the range of audio formats that designers can choose to support. The audio decoder framework within the Harmony environment allows designers to add, subtract and switch among various software-based audio decoders. Including a WMA decoder gives developers an even wider set of options and support for audio playback.
The WMA Decoder Library is targeted for low-cost applications in the consumer markets, such as audio docks, home audio receivers and automotive head units. It gives developers added flexibility in decoder options that play back from internal or removable media. The addition of a WMA decoder library further expands the audio application flexibility of PIC32-based designs, building upon existing USB and Bluetooth streaming audio solutions.
The Microsoft WMA Decoder Library is supported by Microchip’s free MPLAB Harmony Integrated Software Framework and PIC32 Bluetooth Audio Development Kit (Part # DV320032, $199.99).
The Microsoft WMA Decoder Library (Part #s SW320015 and SW320025-1HPM, $199.97 and $199.00) is available in two variants. | <urn:uuid:ec08e4ef-bf21-487a-8979-8a90c297ce91> | CC-MAIN-2017-04 | http://www.edn-europe.com/news/pic32-harmony-software-decoder-framework-microsoft-wma-decoder-library | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00324-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.876038 | 372 | 1.632813 | 2 |
from The American Heritage® Dictionary of the English Language, 4th Edition
- n. Any of various venomous tropical snakes of the family Hydrophidae that are adapted to living in the sea, especially in the Pacific and Indian oceans, and that bear live offspring.
from Wiktionary, Creative Commons Attribution/Share-Alike License
- n. Any of several snakes, of the family Hydrophiidae, that live in the waters of the Pacific and Indian Oceans.
from the GNU version of the Collaborative International Dictionary of English
- Any one of many species of venomous aquatic snakes of the family Hydrophidæ, having a flattened tail and living entirely in the sea, especially in the warmer parts of the Indian and Pacific Oceans. They feed upon fishes, and are mostly of moderate size, but some species become eight or ten feet long and four inches broad.
from The Century Dictionary and Cyclopedia
- n. A sea-serpent, in any sense.
from WordNet 3.0 Copyright 2006 by Princeton University. All rights reserved.
- n. any of numerous venomous aquatic viviparous snakes having a fin-like tail; of warm littoral seas; feed on fish which they immobilize with quick-acting venom
Sorry, no etymologies found.
Sorry, no example sentences found. | <urn:uuid:6a387491-ea7b-441a-a0d5-bf8f799c5267> | CC-MAIN-2017-04 | https://www.wordnik.com/words/sea%20snake | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00053-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.873341 | 282 | 2.578125 | 3 |
A week today the cuts will start to bite. As the financial year ends, grants will run out, contracts will wind up, and charities and services will begin to shut their doors. After months of anxiety about the impact of the cuts, the consequences of the government's rapid deficit reduction programme will begin to be real.
The Guardian gives a slice of what this will mean across the country, highlighting a cross-section of 50 services that will shrink or cease to exist from the end of this month. Most are unglamorous, obscure, unfeted projects, staffed by employees who are not very well paid, but hugely committed to what they do. All of these losses come as a result of the government's decision to cut spending by £95bn over five years.
Their disappearance may not be noticed by anyone with a good income, in secure employment, in sound health, without caring responsibilities – anyone who does not look to the state for support with life's problems. For the more vulnerable, the decision to close these bodies and cut these jobs will be sharply felt. They will be more acutely obvious beyond the south-east, in areas that are more dependent on government grants. Women, parents, carers, disabled people, teenagers and elderly people are likely to be the most affected.
From a Westminster perspective, they may be easy to ignore. These are not dramatic closures of maternity wards, big events that would inspire fury and noisy protest; instead the process is much smaller, more fragmented in scale, and hardest felt by people who tend not to be particularly powerful or vocal. Mostly, ministers are able to wash their hands of responsibility, dismissing these cuts as local decisions (despite the fact that they originate in central government funding reductions).
Viewed from Downing Street, they probably seem a fractured collection of regrettable but relatively insignificant services, located (conveniently) in greater concentration the further you move from Westminster. But from the service users' perspective, their disappearance will often be catastrophic.
Among the organisations going is the Connexions careers and advice centre in Lewisham, south-east London, one of the country's most deprived neighbourhoods, which has had all its funding cut, triggering the loss of 35 jobs. As a result, teenagers who have not thrived at school and face unemployment will no longer get specialist help.
Also from next week, 600 children with severe learning disabilities, many of them unable to speak, will no longer benefit from music therapy when the Northern Ireland Music Therapy Trust loses its budget. These children have learned to express themselves with the help of percussion instruments, pianos and guitars; the decision will have a "major impact on this already vulnerable and disadvantaged group of people," the charity's director says.
The cuts affect a wide spectrum of projects: youth offending teams will shrink, probation staff numbers will dwindle, refugee advice centres will halve in size, Sure Start services will disappear, domestic violence centres will have to restrict the number of people they can help, HIV-prevention schemes will end, lollipop wardens will no longer be funded, help for women with postnatal depression will vanish, a work scheme for people who are registered blind will be wound down, day centres for street drinkers will close their doors, theatres will get less money, debt advice services will have fewer people available to help, fire stations will shut.
But the services highlighted here represent only a tiny selection of what is just one wave. The full impact of the cuts in public spending will come gradually, and will not be fully tangible for several years, as changes to the welfare system and the NHS, and cuts to housing benefit and police services will be staggered over this parliament.
Reductions to local authority budgets were announced in the comprehensive spending review last October, which is why councils have acted swiftly to cut jobs and services from the beginning of the new financial year. There is much more to come – with libraries, respite centres and nursing homes still waiting to find out if they are to survive – and the process will be protracted, but 1 April will be the key moment when the cuts become visible.
This cross-section of cuts shows how, across the country, local authorities are dispensing with "discretionary services" – extra free childcare, afterschool play schemes, lunch clubs for elderly people, youth clubs – so that from now on they will provide only the bare statutory minimum services, and even these will be whittled down. While councils will continue to support the most needy, people with requirements that are one notch short of urgent will have to fend for themselves.
Council officials have described the paring-back process as heartbreaking and are worried about what the longer-term costs and consequences will be. Youth clubs have quietly prevented anti-social behaviour, day care centres for elderly people have helped users stay out of hospital, after-school play centres have made it easier for women to work. The removal of these services could prove expensive in unexpected ways.
In the context of the government's "big society" agenda, some of these decisions are perplexing. Many of the organisations that will shut are small community groups or local charities which have been supported by central or local government grants to provide important neighbourhood services. The people running them think it unlikely that philanthropists can be found to step in with alternative funding.
The closure of groups like the Northern Ireland Music Therapy Trust illustrate the difficulty of finding alternative sources of income at a time when everyone's budgets are strained. Once organisations close, the damage is instant and long-lasting; the prospect that they can be revived is slim.
Council officials are sceptical about the prospect of local volunteers signing up as part-time, unpaid social workers, rubbish collectors, probation officers or youth offender workers. In any case, there is little confidence that even the most well-intentioned volunteers could provide the same consistent, reliable service that paid employees have given.
The government says most of the cuts to local authority budgets can be met with "efficiency savings", invisible, painless bits of internal restructuring. The communities secretary, Eric Pickles, has suggested that cuts can be made by eliminating pointless "non-jobs" and cutting chief executive pay.
But councils have found it hard to identify non-jobs to cut and point out that reducing executive pay makes only a tiny dent in the amount that needs to be cut. They argue that frontline services are so closely interwoven with back-office support functions that it is impossible to provide one without the other.
The Treasury said: "The government's priority is to deal with the deficit. Unless the deficit is tackled, there won't be the economic confidence to support job and wealth creation."
Throughout this period, the government's mantra has been that we should all learn to do more for less. The imminent disappearance of the jobs and services profiled here suggests we will simply end up with less. | <urn:uuid:6d98156f-5802-46e1-aab1-73856501c8ab> | CC-MAIN-2017-04 | https://www.theguardian.com/society/2011/mar/25/public-sector-cuts | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00356-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.962218 | 1,401 | 1.617188 | 2 |
THE microwave has revolutionised speedy access to hot snacks, with over 90 per cent of households both in the UK and US owning one.
But the humble machine was actually created partly by accident - and partly because a nature-loving man wanted to feed the squirrels.
When was the microwave invented?
In 1945, American physicist Percy Spencer had been testing a radar magnetron - typically used today as the main frequency source in a microwave.
When it came to lunchtime, Spencer went to feed the squirrels with a peanut cluster he had been keeping in his pocket - only to find it had melted.
He experimented with placing an egg beneath the tube, and it exploded in his face, so the next day he made popcorn for all his colleagues.
He passed microwaves into a metal box, where they bounced around unable to get out.
Spencer realised this form of cooking was quicker than conventional heat ovens, and filed for his patent in 1945.
Spencer was not the only person to notice the microwave cooking effect - but he was the first to be interested enough to develop the idea.
In the early 1940s, British physicist Sir John Turton Randall and his team had developed the radar magnetron, which had been sold to American companies, including Raytheon, in exchange for help during World War II.
The first ever commercial microwave, the Radarange, by Raytheon, went on sale a year later.
It weighed nearly 750 pounds, cost over $2,000 and apparently stood at five foot six high.
A domestic microwave appeared in 1955, but it was expensive too, and microwaves were not affordable enough to be accepted into people’s homes until the Amana’s Compact Radarange hit the shelves in 1967.
By 1975, over one million microwaves a year were being sold in the US.
Spencer happened upon his invention when working on how to mass-produce radar magnetrons and make them more powerful
He managed to increase production from 17 to over 2,600 per day.
They are vacuum tubes, like electric whistles that create electromagnetic waves instead of sound.
They produce microwave radiation and are used in radar systems.
Who invented the microwave?
Percy Spencer invented the microwave after the nut cluster he was planning to feed the squirrels turned into a gooey mess in his pocket while he was testing a military grade magnetron.
Spencer’s family were so poor he often had to hunt for his food in the wilderness where he grew up, in Howland, Maine.
He managed to become an engineer even though they had no electricity, no car, or modern appliances, and no formal schooling.
He worked at a spool mill when he was 12, installed electricity to another mill at age 14, then joined the navy because he wanted to learn about radios.
He continued to teach himself, reading borrowed books while he worked.
He started working for the American Appliance Company in the early 1920s, which became Raytheon Manufacturing Company in 1925.
He made some important artillery fuses for them which allowed shells to explode before hitting their target.
Today, Raytheon still makes missiles, military training systems and electronic warfare products.
Spencer earned his place in the National Inventors Hall of Fame, in Virginia, US, with over 150 patents to his name. | <urn:uuid:4786d6a2-b344-4204-b480-d4667932331d> | CC-MAIN-2022-33 | https://www.thesun.ie/news/8158234/when-was-microwave-invented/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.95/warc/CC-MAIN-20220817032054-20220817062054-00476.warc.gz | en | 0.984519 | 699 | 3.484375 | 3 |
This is the second in a series of blog posts describing the process I undertook to recreate the child-sized coat armour on display at the Musée des beaux arts in Chartres, France. I’ll be covering the process of drafting the pattern. Find the first part here: Dyeing an Imperfect Lampas.
When I examined the coat in the museum in Chartres on July 1, 2011, my first order of business was to take a myriad of measurements. I gave careful thought to all of the lengths I would need to recreate the pattern on flat paper later. I laid them out in a spreadsheet before going to France. My best friend, Greta, accompanied me as my assistant and recorded them for me as I measured and called out each number to her. Time was short. I was only given three hours to gather all the data I would ever get from this coat.
Here are the measurements I took. Each number corresponds to a measurement on the following tables.
This may seem like an excessive number of measurements, but without them, I couldn’t be certain I was accurately reproducing the flat pattern. It’s probable that with fewer measurements I would have been forced to fudge some aspects of the pattern from memory. This way, I could be confident.
I framed out the shapes of the torso pieces using straight lines crossing each other (an x and y axis) as a guide. I was delighted to discover a beautiful symmetry at play. The waist ran exactly midway between the highest point of the shoulder and lowest point of the hem. The torso pieces could also be bisected by a line that ran from the highest point of the shoulder, directly down the middle of each piece.
Note the chalice shape framed by the square in the middle of the diagram above. We frequently think of an hour-glass shape when describing the fashionable silhouette of the 14th century. This certainly applies for women. For men, however, I think a chalice shape describes the silhouette better, especially in the last 40 years of the century. Their chests were framed with bold curves, but their hips less so. The lower half of the torso was more typically defined by an A-line. In the most fashionable clothing, this A-line was enforced with the use of rigorous padding and quilting.
That straight-line flare from the waist to the hips was made all the more striking by placing the waist artificially high. The dotted line extension in the diagram above shows where the bottom of a man’s hips would end. The waist on a man typically sits about halfway between the armpits and the bottom of the hips. Here, the waist has been placed about one third of the distance between armpits and the bottom of the hips. Modern re-creations typically place the waist too low to give the correct silhouette.
Analysis of period silhouettes aside, I drafted the pattern using pencil, wide craft paper, ruler, yard stick, a flexible curve ruler and—of course—the measurements. Here is an example of the back piece in progress:
In addition to re-creating the pattern shapes, I had the added challenge of re-creating the placement of the quilt lines. The curator at the Musée des beaux arts took photos at my request, which I consulted when placing the quilt lines. As you can see in the picture above, the quilt lines were not uniform or parallel.
Apologies for the dark photo. I did not have a decent camera at the time. As you can see, I added a half-inch of seam allowance all around. See how the quilt lines do not line up with all the hem scallops? It’s clear that the maker was not concerned with that sort of neatness. Far more important was the emphasis on the waist. The lines move inward proportionately, and then back out again, once past the waist.
Here’s a photo of the front piece before I added the hem scallops and seam allowance:
The quilt lines are complex and somewhat unpredictable. Some curved more strongly than others, and the curves themselves were all slightly different.
The sleeve was quite straight-forward. It had a somewhat shallow s-curve sleeve cap, which allowed the curved seam to run down the back of the arm and provide a fullness for the elbow to bend into.
The finished sleeve pattern’s quilt lines were much easier to map out than the body pieces’ quilt lines—straight lines that run parallel to each other are the easiest of all.
The cleaned-up pattern, including tiny godets on the side seams, finally emerged. For the purpose of reproduction, I decided to incorporate the tiny godets in the main pattern pieces. They existed on the original because the original, lengthwise-folded fabric was not wide enough to accommodate the full width of the skirt for cutting purposes.
I also mapped out the shape of the padded placket which sits behind the buttonholes on the original coat:
Clearly plackets were a done thing, because this is not the only extant garment from the time period with one. The jupon preserved with the Black Prince’s funerary achievements (dated to 1376) in England also has a placket behind its lacing holes. See Janet Arnold’s article (citation below) for a good source of information on the jupon.
The final step in preparing this pattern was to treat the pattern pieces like stencils. Instead of cutting the fabric into the shape of the finished pattern pieces, I was going to lay these stencils on rectangles of linen fabric and then transfer the final shapes as well as the quilting lines. I planned to use the prick-and-pounce method for the transfer. These large rectangles of linen would serve as the base upon which I would build the padding and quilting.
In the next installment, I’ll show you how I padded and quilted the garment pieces before sewing them all together. (Part 3: Padding and Quilting on a Frame)
Arnold, Janet. “The Jupon or Coat-Armour of the Black Prince in Canterbury Cathedral.” Journal of the Church Monument Society VIII (1993): 12–24.
Kelly, Tasha D. “The Tailoring of the Pourpoint of King Charles VI of France Revealed”. Waffen- und Kostümkunde Hefte 2 (2013): 153–180. | <urn:uuid:1bbc2f6b-2c8c-4a0f-90d4-2bb079fda0a9> | CC-MAIN-2022-33 | https://cottesimple.com/pourpoint-of-charles-vi/charles-vi-coat-armour-reproduction-recreating-pattern/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00072.warc.gz | en | 0.957995 | 1,356 | 2.109375 | 2 |
March Printable Calendar 2022 Time And Date – The March calendar is helpful in planning your daily life. There are plenty of fun events and celebrations during the first two months. Then, you’ll have a moment to get ready for the next month. You can save and print your favourite calendars, and alter your wallpaper to make it look fresh. The March calendar includes many options that can make your life easier. You can start by saving your favourite wallpapers and calendars. In the next step, you can make your own March calendar and start planning your life.
What Happens in March
The March birthstones vary. Aquamarine is the first birthstone and it symbolizes health, youthfulness, and the possibility of a bright future. The second is bloodstone, which is a quartz type with vibrant red streaks. Both are very popular since they can be used for purposes of spiritual or religious. You can find a calendar that has the month of March online and print it. After that, you can alter it to fit your personal preferences.
A printable March calendar is a great option if you want something unique. They can help you plan your time in advance. There are numerous attractive designs to choose from, and include pictures to help you remember what to do when. If you’re trying to get organized and accomplish your goals at your job, a March calendar can help you accomplish this. Get a March calendar printable and start planning your month.
Get March Printable Calendar 2022 Time And Date
There are many benefits of printing a calendar in March. For instance, you’ll be able to see when the next day will fall , and also when you’ll need to be working. Online, you can also download a March 2022 template calendar. These templates are available in various styles and formats, including the monthly format. Digital versions are the most sought-after, and you can print them for later use. A printable calendar has one downside: you have to remember the dates.
A calendar for March is useful in planning your day. The “Worm Moon” is a full moon in March, will be visible only for a few days after the equinox. In the Northern Hemisphere, this will be the beginning of spring, while the Southern Hemisphere will begin autumn. It’s a great way for you to plan your entire month by using a winter calendar! You’ll also have the opportunity to plan events with your family and friends.
Three significant dates form the March dates. The names of the month come from Mars, the Greek god of war. This month marks the start of spring in the Northern Hemisphere and is the first day of the year in the Southern Hemisphere. The last three days of March are also known as the Borrowing Days, and are famous for their weather. This is a great opportunity to create a calendar to use for personal use. | <urn:uuid:70cb16e9-89d1-4fee-92e8-fcc318da5676> | CC-MAIN-2022-33 | https://www.2021calendarsprintable.com/march-printable-calendar-2022-time-and-date/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00065.warc.gz | en | 0.953892 | 594 | 1.960938 | 2 |
For those who want to make custom-fitted armor but don’t have access to an armoring shop, these leather brigandine legs can be made using basic tools without any special equipment.
To make them, you will need the following supplies:
- A silver sharpie for marking the leather
- Posterboard for making the pattern
- Garment-weight leather (5-7 oz), about 5 square feet
- 1 yard of heavy fabric to line the leather legs: cotton canvas, denim or linen all work.
- 12-oz aluminum sheeting for the plates
- Lots of rivets, preferably 200 rivets so you have a few extra. We used the Medium Double-Cap Steel Rivets from Tandy Leather; others have used old-fashioned rivets with washers, or even roofing nails.
- @3 feet of Leather strapping for the buckles and straps. We used black ¾ inch cowhide strips from Tandy.
- 4 buckles for the straps. We used center bar roller buckles from Tandy.
- Brads (from Office max—they are the two-pronged metal things put through the holes in notebook paper to hold bunches of paper together)
- A jigsaw with a metal-cutting blade
- A good drill
- A belt sander and 80-grit sandpaper
- Tin snips
- A reamer
- A rivet setter
- A sewing machine with a leather needle and heavy-duty upholstery-weight thread
- A scratch awl
- Leather contact-cement glue
Step 1: Make the Pattern
Using posterboard, paper, cardboard or other material, wrap it around your leg and create a pattern for the leg armor. The highest point of the leg should come to the outside of the hip joint. Make sure that the top of the leg armor is low enough that it doesn’t dig into the top of your leg or crotch area at any point. The edges of the leg should meet at a point between the back of the leg and the inside of the leg. There should be about an inch of space between the edges of the leg.
Once you have your pattern, mark the front center line and the back center line. Wrap the pattern around your right leg and label the outside “right”. Flip the pattern around, wrap it around your left leg and label that side of the pattern “left”. This will be the pattern for the leather legs.
To create the pattern pieces for the metal plates, trace this pattern on some more poster board. Draw a line ½ inch inside the original pattern, and draw vertical lines dividing this into 8 roughly even pieces. The metal plates should have ¼ to 3/8 of an inch of space between them. Cut out the pieces for the metal plates, numbering them 1 to 8. Label one side of a pattern 1L, flip it over, and label the other side 1R. Label the top and bottom of the pattern pieces as well. Then draw a line down the center of each piece and, starting ½ an inch from the bottom, mark a hole there. Measure up 1 inch and mark another. Continue marking a hole every inch until you get to the top. Punch out the holes with a nail or needle, and expand the hole with a scratch awl.
Cut out the plate pieces and lay them on top of the posterboard pattern for the leather leg. There should be half an inch of space around the edges of the leather leg pattern, and ¼-3/8 of an inch of space between the plates.
Make the leather legs
Lay the leg pattern down on the inside of your leather and draw around it with a silver sharpie. If the side of the pattern pressed against the leather said “Right”, label this piece “right”. If it said “left”, label this piece “left”. Transfer the markings for the center front and center back from the pattern onto the leather.
Cut out the leather piece about half an inch outside the silver lines.
Lay the same leg pattern down on the lining canvas/linen fabric. Draw around the edges of a pattern with a pencil, and cut on this line. There is no seam allowance for the lining.
Cover the inside of the leather piece with contact cement, out to the silver sharpied lines. Lay the linen onto the inside of the leather leg piece, matching up the edges of the piece with the silver sharpie lines. Put a piece of saran wrap over both pieces and rest a heavy weight on them for at least 5 minutes. Take the saran wrap off and let the glue dry.
Where the leather curves in, cut snips in the leather just to the linen lining. Where the leather curves out, cut notches. Brush contact cement onto the edge of the leather, and fold it over the linen and press it into place. We used clips to help hold the leather down as it dried.
Once dried, sew the leather edging down. Use a leather needle in your sewing machine with heavy duty upholstery thread, and use a long stitch (4-stitches per inch or longer) to avoid perforating the leather overmuch. Stitch around the edges of the leg ½ to 3/8 inches in from the edge, stitching the leather edging down to the linen.
Make the Aluminum Plates
We used aluminum because we didn’t have the tools for cutting and shaping steel.
The aluminum sheeting will be covered with a layer of plastic on both sides. Leave this on until you’re actually riveting each piece to the legs.
For each pattern piece, lay it on the aluminum and trace around it with a sharpie. Mark the holes down the center of each piece with a sharpie as well.
Flip the pattern piece over and repeat. You should end up with sixteen pattern pieces. Where possible, line the pattern pieces up on the aluminum so that you can cut as many straight lines as possible.
Drill the holes before cutting out the pieces. We used a ¼ inch drill bit. Make sure that the rivets you have will fit through the holes without too much extra space, but not too tightly.
Cut out each piece with the jigsaw. Snip the corners with tin snips, and grind the edges with your belt sander, using 80-grit sandpaper. Ream out the holes with a reamer. You want to get rid of any sharp edges that could wear on the leather legs (or on you!)
If possible, you will want to curve each plate a bit for comfort and fit as it wraps around your leg. If you can find a wooden stump, create a groove in it with a belt sander and/or carve out the groove with a chisel. Take each piece, and hammer it into this groove with a ball peen hammer to shape it. (It’s best to try this on a couple of scrap pieces first to get the hang of it.)
Testing the fit
Lay the aluminum pieces down on the leather on top of a piece of wood. There should be some space between each aluminum piece, and a bit of room around the outside edges.
Using your scratch awl and a hammer, hammer through the top and bottom hole of each plate, through the leather, into the wood. With the awl, stretch the hole a bit. Then slip a brad through the leather and the plate at the top and bottom, splitting the two metal pieces of the brad to hold the two together. Once you’ve done this to all eight pieces, hold it up and wrap it around the leg. Make sure that the aluminum pieces fit and don’t bind or lock along the edges. If it is too stiff and won’t bend to wrap it around your leg you will need more space between the metal plates.
Riveting the metal plates
Once you’ve confirmed that everything fits, replace the brads with rivets. Rivet the top and bottom hole of a plate. Then hammer the awl through the other holes, poke the awl back through from the leather side to stretch the hole, and put in the rest of the rivets for each plate. | <urn:uuid:ccfbfc79-94fc-4967-98af-7c4a3502e571> | CC-MAIN-2017-04 | http://www.elizabethancostume.net/blog/page/2/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00347-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.889658 | 1,725 | 1.578125 | 2 |
Copper is so valuable that its theft from worksites and power substations has become a national problem. Replacing the lost copper with new metal produced by the traditional method of cooking copper sulfide ores requires a multistep process to extract the copper and produces troublesome byproducts. Antoine Allanore, the Thomas B. King Assistant Professor of Metallurgy at MIT, wants to simplify copper extraction and eliminate noxious byproducts through electrolysis.
"If you look at the energy consumption of a copper smelter today, it's enormous,” Allanore says. “They are dependent on electricity already to exist. My approach asks, why don't we try to do 100 percent electrical, starting from the concentrate and ending with the metal product, if I can use electricity to be more efficient as well as more environmentally friendly?"
In the traditional process, which still accounts for more than half of copper production, smelters roast a mixture of copper sulfide ore and oxygen. Besides copper, the process produces sulfur oxides, which are chemical precursors to acid rain. To prevent their release into the atmosphere, the sulfur oxides have to be trapped, filtered, and treated to make sulfuric acid, adding to capital costs. In contrast, the proposed electrochemical process of molten sulfides electrolysis melts the materials at high temperature (above 1,085 C or 1,985 F) and yields pure liquid copper and elemental sulfur gas.
The idea for direct sulfides electrolysis dates to as early as 1906. In a presentation for the Copper International Conference in Santiago, Chile, in December 2013, Allanore noted the proof of concept for producing copper and sulfur by electrodecomposition of copper sulfide, achieved by T.P. Hoar and R.G. Ward and published in the London-based Transactions of the Institute of Mining and Metallurgy in 1958.
In the electrolysis process, copper sulfide ore is added to a chemical stew called electrolyte, and the chemical transformation of the copper sulfide into its constituent parts takes place on two electrodes in the electrolyte — an anode and a cathode. The crucible, the vessel in which the process occurs, has to be nonreactive both to the electrolyte and to the copper sulfide.
Postdoc associate Sang-Kwon Lee is working on the electrolyte design. "The main strategy of our work is using the multicomponent molten sulfide in order to change the property of the supporting electrolyte and to reduce the melting temperature of the electrolyte," Lee says. See related article. The molten sulfides electrolysis research received funding from the Office of Naval Research and is continuing with support from an anonymous private investor. The research funds are managed through the Materials Processing Center.
The copper research builds on Allanore's previous work in the steel industry, where he developed new electrochemical processes to make iron without greenhouse gas emissions. One of those efforts, in collaboration with Donald R. Sadoway, John F. Elliott Professor of Materials Chemistry, focused on liquid iron production at 1,600 C, and resulted in a patent, a Nature paper, and a spinoff company, Boston Electrometallurgical Corp. (BEMC), in Woburn, Mass. BEMC is now scaling up the process to 1,000 times laboratory scale to demonstrate its commercial viability. Allanore addressed the fundamental scientific question of how to promote removal of oxygen from these systems in the paper "Electrochemical engineering of anodic oxygen evolution in molten oxides," published in November 2013 in Electrochimica Acta.
"The previous challenge was working with processing of an oxide system,” Allanore says. “Here, the challenge is to work with a sulfide system, but in the molten state. We know surprisingly little about molten sulfides. We know their properties in the solid state, because they are used for thermoelectrics, magnetic material, and optical materials." Graduate student Cooper Rinzler, in Allanore's group, is studying the materials science that makes liquid sulfides different from their solid counterparts. "The challenge for us is really to predict the thermodynamic and physical properties of multicomponent sulfides, with the eventual objective of doing the electrolysis, which works very well if you don't have any electronic conductivity," Allanore says.
The fundamental electrolysis process is well understood — at one electrode, an electron reacts with an ionic compound in contact with the electrolyte to release the metal, and at the other electrode, a component in the electrolyte reacts to give back an electron. "In an ideal electrochemical process, you don't have electrons flowing in your electrolyte — they are stopped at the electrodes,” Allanore says. “The problem in liquid sulfides is that some of them are allowed to go through." Allowing free electrons to pass through the solution without causing the desired chemical transformations on the electrodes allows their energy to be wasted as heat but doesn't contribute to metal separation. "The challenge right now is to probe how electrons are either flowing or not flowing in the system, so that we can design a system that works for metal extraction," Allanore says.
Allanore is optimistic, because his research documenting trends in metal refining reveals a historical trend of reduced overall energy consumption and higher electricity usage. "Interestingly, in the United States and some other countries, a significant reduction in energy consumption and CO2 emissions for steelmaking occurred at the end of the 20th century, coinciding with a more intensive use of the electric arc furnace,” Allanore wrote in the paper "Contribution of Electricity to Materials Processing: Historical and Current Perspectives," published in February 2013 in Journal of the Minerals, Metals & Materials Society. “This demonstrates that using electricity for steelmaking is a modern reality and actually provides benefits." Greater recycling of steel, which uses electric arc furnaces instead of coal-fired blast furnaces, has also fueled the improvements in energy consumption. "If you look carefully at the history of aluminum production, steel production, which are commodities where we speak about little numbers having a big impact, they show us the path,” Allanore says. “They show us that we go for cheap electricity, and we go for more electricity as time goes by.”
In traditional smelting processes for steel, for example, a plant has to put out four million tons a year and run for 20 to 30 years to be economical, requiring large consumers such as car makers to purchase its output. "Let's be honest,” Allanore says. “If you don't pay for the environmental costs, and you have a steel plant that needs to be valuable for the next 30 years, there is no way you're going to change your technology. Now, there are always lags in metallurgical processing between when someone comes out with an idea, when it becomes ready for big-scale demonstration, and when the market is ready to buy it. One of the key factors is that this timing has to match the time when someone is willing to consider an investment. All of these things are dynamic, but the time constant is long." But the push for sustainability and environmental awareness are working in favor of the changes he advocates, Allanore argues.
Experience in the aluminum industry shows that it is actually fairly cheap to make the electrolysis device, Allanore says. "So if you can secure the supply of electrons, if you can make a device that is smaller or cheaper, now we are speaking about a different business scenario. We're not speaking about 20 or 30 years of investment at several billion [dollars]. It's something that you will pay once, hopefully, half the price, and therefore, the old business model changes completely. And I think that's the only way this innovative technology will be implemented, is if it is flexible enough to be integrated anywhere in the country and it has the ability to actually scale from lower capacity to extremely high capacity. And electricity allows that." | <urn:uuid:3f479823-91eb-4e78-9fe5-4aa68531069f> | CC-MAIN-2017-04 | http://news.mit.edu/2014/reinventing-copper-extraction-electricity | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285289.45/warc/CC-MAIN-20170116095125-00150-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.946183 | 1,646 | 3.640625 | 4 |
BERLIN -- They came as brutal conquerors. Then they posed as liberators, only to betray the cause by overstaying their welcome and helping prop up an infamous wall.
And even as the last of 380,000 departing Russian soldiers said goodbye to eastern Germany yesterday after 49 years of uneasy occupation, they left an odd, ambivalent legacy: barracks stripped of every item of value; fields polluted by jet fuel and kerosene; a black market in surplus hats, medals and weaponry; grandiose monuments to a bygone Soviet empire; a lingering east German taste for left-wing politics; and, strangest of all, hundreds of stray cats.
In the face of all this, the German government managed a graceful if subdued farewell yesterday, ending the ceremonies with a somber march of soldiers from both countries across a quiet, green corner of east Berlin.
Big favor recalled
Russian President Boris N. Yeltsin sought to remind Germans, as well as the rest of the world, of just what a big favor the then-Soviet army did for everyone in World War II. At a loss of 20 million citizens and soldiers -- the largest casualties suffered by any nation -- the Soviets barely held off a Nazi onslaught before slogging and pounding all the way to the center of Berlin, where a surrounded Adolf Hitler took his own life rather than submit to his hated enemies from the east.
"The poisonous roots of an unparalleled evil were ripped out here in Berlin, and the ashes of Hitler's monstrous plans were thrown into the wind," Mr. Yeltsin said.
Mr. Yeltsin spoke at the Soviet war memorial in Berlin's Treptower Park, standing at the foot of a towering statue of a Soviet soldier tenderly holding a German child rescued from battle. Spreading before Mr. Yeltsin was a long green lawn, the burial site of nearly 5,000 of the Soviet soldiers killed in the battle for Berlin.
On both sides of that lawn yesterday, Russian and German soldiers stood at attention, backed by a few thousand spectators beneath tall maples. Behind them along the perimeter of the site was a high fence of spiked iron, where hundreds of Russian emigres peeped between the bars, hoping to get a glimpse of Mr. Yeltsin.
German Chancellor Helmut Kohl acknowledged the German debt for the Russian defeat of the Nazis. But he added, "We must also not forget what Russians later inflicted on Germans."
Indeed, it didn't take long after the end of World War II for the Soviet Union to split from the other three "occupying powers," the United States, Great Britain and France.
By 1948 the Soviets were trying to starve out West Berlin with a blockade. That brought on the U.S.-led Berlin Airlift, and nearly a year later the Soviets backed down.
The division of East and West Germany only deepened, however. Each side set up its own government, and, in June 1953, Soviet tanks helped the East German government put down a worker's uprising.
In 1961 came the greatest affront of all to the West, the building of the Berlin Wall, and the Soviets supplied the might to keep it standing.
When the Soviet might began to crumble in the late 1980s, so did the Wall. It finally came down in November 1989, as the Communist regime of East Germany collapsed amid popular protest and economic weakness.
As part of the 1990 agreement for German reunification, the former conquerors of World War II promised to pull their soldiers out of Berlin by this fall. Russia further agreed to leave Germany ++ altogether, getting a $9 billion farewell gift to ease the pain of resettling its departing soldiers.
Summer of goodbyes
All summer long, Berliners have been saying goodbye to the various armies that have stayed in the city since 1945, with the fondest sentiments reserved for the Americans and the British.
Mr. Yeltsin had hoped that the final farewell ceremony would be a joint affair, but Cold War memories were still too fresh for the other Allies and the Germans.
Yet, in the meantime, the re-formed Communist Party of east Germany has enjoyed a resurgence at the polls in state and local elections this summer, consistently winning more than a third of the vote in the old eastern states, while recent polls have shown Germans feeling more divided than ever.
Yesterday's ceremonies began early in the morning, with Russian Gen. Matvei Burlakov announcing to Mr. Yeltsin and Mr. Kohl, "I report to you that the international agreement on the temporary stay and the complete withdrawal of the Soviet army in Germany has been fulfilled."
The leaders and assembled dignitaries then went indoors to hear a performance by the Berlin Philharmonic before heading to Treptower Park.
If the Germans have felt a bit awkward about saying goodbye, the Russian soldiers have found parting to be downright painful. They're leaving behind hard currency salaries far more bountiful than what they'll earn in rubles in the mother country, and that's assuming they'll have a job. It is feared that some of the unemployed will end up as new recruits in the burgeoning Russian mafia.
Partly to compensate themselves for their coming drop in income, the soldiers, in behavior well reported by a disapproving German press, have ripped out virtually every removable item from their barracks and bases -- from plumbing fixtures to lampposts.
But they've been leaving behind their cats, which dart about the empty buildings and stray into neighboring streets.
A bigger headache for the Germans will be cleaning up the environmental mess left behind. German officials estimate that it will cost at least $6 billion to clean up the former Russian bases, prompting several eastern German states to refuse federal offers of the sites, free of charge.
But in yesterday's ceremonies the dominant theme was of peace and unity.
"We want to strengthen and further develop our new friendship and partnership," Mr. Kohl said. | <urn:uuid:8a2695fe-aac1-404f-8f0e-4fe417431cec> | CC-MAIN-2017-04 | http://articles.baltimoresun.com/1994-09-01/news/1994244045_1_east-berlin-east-german-russian | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00355-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.963426 | 1,218 | 2.0625 | 2 |
Low Profile Friction Tires 2 for OpenR/C F1 car
by Palmiga, published
Use This Project
Give a Shout Out
If you print this Thing and display it in public proudly give attribution by printing and displaying this tag.Print Thing Tag
PLEASE RESPECT THE LICENSE AND GIVE CREDIT TO THE DESIGNER!
These friction tires will hopefully give a better grip... Print using 0.2mm layers.
I have included lots of versions with differently sized "loops" so that you can create your own preferred grip depending on your filament/speed etc. ( In the pics I have used PI-ETPU 95-250 Carbon Black http://rubber3dprinting.com/ )
Use the rims found here: http://www.thingiverse.com/thing:1103751
This snap-on design is also available for tires/rims that can be used with the OpenR/C Touring Car or similar RC cars naturally.
PI-ETPU 95-250 Carbon Black is a professional 3D printer flexible and conductive filament
Don´t need the conductivity?
Well the conductivity is great for some things but perhaps not your first choice? Then consider this:
This filament will give you some really nice benefits if the conductivity is not an disadvantage for your 3D printed design:
•The material composition eliminates “stringing / webbing” issues.
•The hardness of 95 shore A and the carbon black filler makes for great print abilities.
•The carbon black filler is an excellent UV stabilizer thus the prints are built to last in very harsh environments.
•The matte black surface finish has a very exclusive look.
•The material feels very nice and dry to touch.
•The elongation at break is only 250%.
For more info regarding release of the F1 car and also the other Open-RC project head over in this direction: http://danielnoree.com/
For OpenR/C Formula 1 print-files (after release) go here: https://pinshape.com/users/18846-danielnoree
For my designs check out http://www.thingiverse.com/Palmiga/designs & https://www.instagram.com/rubber3dprinting/
Due to the nature of 3D printing / material used etc... Keep in mind that you use my designs on your own risk and that I in no way is responsible for any damage och injuries.
Low Profile Friction Tires 2 for OpenR/C F1 car by Palmiga is licensed under the Creative Commons - Attribution - Share Alike license.
What does this mean?
- You must attribute (give credit) to the creator of this Thing.
- You must distribute Remixes under the same license as the original.
- Remixing or Changing this Thing is allowed.
- Commercial use is allowed.
Show Some Love
Say thanks by giving Palmiga a tip and help them continue to share amazing Things with the Thingiverse community.Tip Designer
We're sure Palmiga would love to see what you've printed. Please document your print and share a Make with the community.
To post a Make simply visit this Thing again and click I Made One to start uploading your photo. It’s even easier to post a Make via the Thingiverse Mobile app (available via Google Play and Apple App Store). | <urn:uuid:13b72892-3720-4cf7-9a50-3e9e32f24895> | CC-MAIN-2016-44 | http://www.thingiverse.com/thing:1274262 | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719286.6/warc/CC-MAIN-20161020183839-00499-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.78837 | 720 | 1.554688 | 2 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.