text stringlengths 181 608k | id stringlengths 47 47 | dump stringclasses 3 values | url stringlengths 13 2.97k | file_path stringlengths 125 140 | language stringclasses 1 value | language_score float64 0.65 1 | token_count int64 50 138k | score float64 1.5 5 | int_score int64 2 5 |
|---|---|---|---|---|---|---|---|---|---|
Mary Boyer is a disaster risk management specialist at the World Bank in Washington, D.C., where she helps countries in Latin America and the Caribbean region prepare for financial responsibilities resulting from natural disasters.
Before joining the World Bank in early 2015, Mary spent nearly two years in Kabul, Afghanistan, working for a USAID-led initiative to strengthen local governments, which enabled her to serve in a variety of roles. Most notably, Mary served as the coordinator of a team of 40 international election observers, a significant portion of the 200 observers who monitored the 2014 audit of Afghanistan's runoff presidential election, which was negotiated by U.S. Secretary of State John Kerry.
"It was a very big deal, not only for the future of the country, but because it was the biggest terrorist target in Afghanistan at the time," Mary said. "We had to manage the persistent threat of being attacked while trying to do our job."
Before and after her role in the election Mary worked as a grant writer and program manager on a USAID-funded initiative to foster unity among communities that were vulnerable to exploitation by insurgents. The initiative enabled local governments to implement infrastructural, cultural, and vocational training projects.
"Our immediate goal was not necessarily long-term development, but smaller projects that helping stabilize local communities and build the relationships that are essential for continued development," Mary said. Focused on Afghanistan's southern and eastern provinces, the initiative funded everything from motorcycle maintenance courses for young men to road repairs to kite-flying festivals.
"Kite-flying, which was banned by the Taliban, is a popular recreational activity that has been passed down by Afghans for generations," Mary explains. "To encourage it is almost an act of defiance."
Before moving to Kabul, Mary worked in Johannesburg, South Africa, as a policy officer for African Risk Capacity, an insurance program led by the African Union that provides financial relief to African countries following drought.
"When you do this kind of work you never live in one place for too long," Mary said. "But my peace studies courses prepared me to live this kind of life not only as a skilled professional in the international community, but as someone with a vocation."
Since graduating from Notre Dame in 2007 with degrees in anthropology and peace studies, Mary also has conducted research on development for the Bologna Institute for Policy Research in Bologna, Italy, worked as a development coordinator for National Public Radio, and earned a master's degree in economics and international relations conflict management from Johns Hopkins University's School of Advanced International Studies.
Updated July 2018. | <urn:uuid:cbf75c57-780b-4096-9445-471e79dcb1df> | CC-MAIN-2022-33 | https://kroc.nd.edu/profiles/mary-boyer-2007/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00475.warc.gz | en | 0.968463 | 528 | 1.75 | 2 |
A Rhinoplasty, or nose reshaping procedure is a very popular cosmetic surgery procedure amongst both men and women. A lot of people can be self-conscious about a particular aspect of their appearance and many people are unhappy with the shape of their nose. It may have a hump, be too long or wide and in addition, there are sometimes problems that contribute to breathing difficulties.
This nose reshaping procedure can help and is a very popular choice for who want to improve their most prominent facial feature. It can alter the balance and proportions of your whole face, giving a dramatic improvement to how you look and feel.
Some patients choose to have a septoplasty as well, which is a cosmetic surgery procedure to straighten a person’s nasal septum. Your surgeon may advise this if necessary.
Rhinoplasty: Nose Reshaping Information
Step by Step
Before surgery, this patient has a slightly hanging nose with a hump and a large tip.
After surgery, a splint is applied to help the bone and cartilage of the nose maintain its new shape
After surgery, the patient has a smaller nose, a straighter bridge, a well-defined nasal tip and an improved angle between the nose and upper lip
A Rhinoplasty (Nose Job) Patient’s Story
Sharon Easdon was thrilled with her nose job, and with her surgeon Mr Renato Zacheddu. Her nose had bothered her for years and when she had finally saved the money to have the procedure, she said it was the best thing she’d ever done.
Frequently Asked Questions
Q: Can I decide the shape of my new nose?
At your consultation, you can discuss what you want to change about your nose with the surgeon and agree what size and shape nose you would like to achieve. There are many considerations to be taken into account and these will be discussed during your consultation with your surgeon.
Q: Will I have any scarring?
Many plastic surgeons perform rhinoplasty from within the nose, making their incision inside the nostrils so scarring is undetectable. Occasionally open procedure (operating on the outside of the nose) is more suitable especially in complicated cases.
Q: What happens after a rhinoplasty?
After your rhinoplasty surgery is completed, you will have a plaster cast that is applied in the operating theatre. It is important that this plaster cast is not removed for a period of at least 7-10 days.
If you would like to learn more regarding this cosmetic surgery procedure then why not book a free, no obligation consultation with a GMC registered cosmetic surgeon and dedicated patient care co-ordinator.
At your consultation you will be able to discuss the procedure in detail and ask any questions you may have. Many of our patient care co-ordinators have in fact had a procedure themselves so can share their experience with you first hand.
There is no guarantee of specific results and that the results can vary. | <urn:uuid:13134704-5a73-4f27-96ca-d5aa1ea341b9> | CC-MAIN-2017-04 | http://www.thehospitalgroup.org/cosmetic-surgery/face-home/rhinoplasty-nose-job/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280410.21/warc/CC-MAIN-20170116095120-00449-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.963225 | 620 | 1.539063 | 2 |
Nobel Prize-winning economist and New York Times columnist Paul Krugman argues that saving money is not the path to economic recovery. Instead, he says, we should put aside our excessive focus on the deficit, try to overcome political recalcitrance, and spend money to put America back to work. Krugman offers specific solutions to not only end what he calls a “vast, unnecessary catastrophe,” but to do it more quickly than some imagine possible.
His latest book, End This Depression Now!, is both a warning of the fiscal perils ahead and a prescription to safely avoid them.
Some moments from the conversation: | <urn:uuid:1b547a9a-6af0-4127-ae2e-e8b498d518d0> | CC-MAIN-2017-04 | https://ourfuture.org/20130114/paul-krugman-explains-the-keys-to-our-recovery | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00352-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.922511 | 127 | 1.859375 | 2 |
Albany, NY – While reporting on US and Iraqi security forces in January 2006, Bob Woodruff and his cameramen were seriously injured in an explosion from an improvised explosive device about 12 miles north of Iraq. He sustained severe shrapnel wounds, had a portion of his skull removed, and was kept in a medically-induced coma to assist his recovery. By March of 2006, Woodruff began to walk, recognize friends and family, and speak in several languages. He returned to work at ABC in the fall and developed a documentary about his journey and that of other soldiers with traumatic brain injury. He speaks about his current work, his new book, In An Instant, and what information he wants to get out about traumatic brain injury.
In An Instant by Lee and Bob Woodruff.
Published by Random House. | <urn:uuid:664a48a5-9121-4899-9bed-3113ed46e851> | CC-MAIN-2017-04 | http://wamc.org/post/joe-donahue-speaks-bob-woodruff-6-11 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279189.36/warc/CC-MAIN-20170116095119-00057-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.992761 | 165 | 1.765625 | 2 |
|It was the early morning hours of September 23, 1928, when Officer James Roche stopped a male subject on the porch of 32 Temple Street suspected of committing a burglary. The male subject produced a handgun and ordered the officer to raise his hands. Officer Roche produced his service revolver and fired twice, bringing the man down to the ground. Once on the ground, the suspect fired six shots at Officer Roche, hitting him five times. Officer Roche was rushed to Nashua Memorial Hospital where he died of his wounds some 22 days later. Officer Roche was 53 years old at the time and a four-year member of the Nashua Police Department. He was survived by his wife and five children. | <urn:uuid:152a1786-a780-4a76-819c-ffd807c399b4> | CC-MAIN-2017-04 | http://www.nashuapd.com/?A=DepartmentInfo&S=Memorial&D=James%20Roche | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00082-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.991755 | 138 | 1.585938 | 2 |
In Feburary, 1963, long before Neo took on the machines of the Matrix, Magnus, Robot Fighter appeared in the comic book world. Raised apart from humans by rogue robot 1A, Magnus learned amazing martial arts skills that allowed him to smash evil robots with his bare hands. He also possesed a special brain implant that allowed him to interface with and decode robot-to-robot communications. For 46 issues Magnus fought machines and human over-dependence on them. Magnus stood out as one of the few science fiction comics among the dominate super hero genre. Now, thanks to a deal with Simon and Schuster's iBooks, Magnus is coming back in the form of graphic novels. | <urn:uuid:84183449-21ca-4a55-8df3-eb21c74eb388> | CC-MAIN-2017-04 | http://robots.net/article/1162.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00556-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.958783 | 142 | 1.617188 | 2 |
7C372 CY7C372 CY7C371 FLASH370 22V10 I/O8-I/O15 I/O24-I/O31 I/O16-I/O23 - Datasheet Archive
Revision: October 19, 1995 CY7C372 UltraLogict 64Macrocell Flash CPLD Features D D D D D D D D Functional Description 64
7C372 7C372: Wednesday, September 23, 1992 Revision: October 19, 1995 CY7C372 CY7C372 UltraLogict 64Macrocell Flash CPLD Features D D D D D D D D Functional Description 64 macrocells in four logic blocks 32 I/O pins 6 dedicated inputs including 2 clock pins No hidden delays High speed fMAX = 125 MHz tPD = 10 ns tS = 5.5 ns tCO = 6.5 ns Electrically alterable Flash technology Available in 44pin PLCC and CLCC packages Pin compatible with the CY7C371 CY7C371 (PIM). The PIM brings flexibility, rout ability, speed, and a uniform delay to the interconnect. The CY7C372 CY7C372 is a Flash erasable Complex Programmable Logic Device (CPLD) and is part of the FLASH370t family of high density, highspeed CPLDs. Like all mem bers of the FLASH370 FLASH370 family, the CY7C372 CY7C372 is designed to bring the ease of use and high performance of the 22V10 22V10 to high density CPLDs. Like all members of the FLASH370 FLASH370 family, the CY7C372 CY7C372 is rich in I/O resources. Ev ery two macrocells in the device feature an associated I/O pin, resulting in 32 I/O pins on the CY7C372 CY7C372. In addition, there are four dedicated inputs and two input/clock pins. The 64 macrocells in the CY7C372 CY7C372 are di vided between four logic blocks. Each logic block includes 16 macrocells, a 72 x 86 product term array, and an intelligent product term allocator. Finally, the CY7C372 CY7C372 features a very sim ple timing model. Unlike other highdensi ty CPLD architectures, there are no hid den speed delays such as fanout effects, in terconnect delays, or expander delays. Re gardless of the number of resources used. or the type of application, the timing pa rameters on the CY7C372 CY7C372 remain the same. The logic blocks in the FLASH370 FLASH370 architec ture are connected with an extremely fast and predictable routing resourcethe Programmable Interconnect Matrix Logic Block Diagram INPUTS CLOCK INPUTS 4 2 INPUT/CLOCK INPUT MACROCELLS MACROCELLS 2 8 I/Os 2 LOGIC I/O0-I/O7 36 PIM D 16 16 LOGIC 8 I/Os LOGIC 36 BLOCK I/O8-I/O15 I/O8-I/O15 I/O24-I/O31 I/O24-I/O31 BLOCK A 8 I/Os 8 I/Os LOGIC 36 BLOCK 36 BLOCK B I/O16-I/O23 I/O16-I/O23 C 16 16 16 16 7c3721 Selection Guide 7C372-125 7C372-125 7C372-100 7C372-100 7C372-83 7C372-83 7C372-66 7C372-66 7C372L-66 7C372L-66 Maximum Propagation Delay, tPD (ns) 10 12 15 20 20 Minimum Setup, tS (ns) 5.5 6.0 8 10 10 Maximum Clock to Output, tCO (ns) 6.5 6.5 8 10 10 Maximum Supply Current, Current ICC (mA) 280 250 250 250 125 300 300 Commercial Military/Industrial Shaded area contains preliminary information. Cypress Semiconductor Corporation D 3901 North First Street 1 D San Jose D CA 95134 D 408-943-2600 December 1992 - Revised October 1995 7C372 7C372: Wednesday, September 23, 1992 Revision: October 19, 1995 CY7C372 CY7C372 28 29 30 31 term steering). Furthermore, product terms can be shared among multiple macrocells. This means that product terms that are com mon to more than one output can be implemented in a single prod uct term. Product term steering and product term sharing help to increase the effective density of the FLASH370 FLASH370 PLDs. Note that product term allocation is handled by software and is invisible to the user. I/O I/O I/O CC I/O 1 0 GND 2 V I/O 3 2 I/O 4 1 I/O 5 3 I/O 6 4 I/O Pin Configuration 44 43 42 41 40 I/O5 7 39 I/O27 I/O27 I/O6 8 38 I/O26 I/O26 I/O Macrocell I/O7 9 37 I/O25 I/O25 10 36 I/O24 I/O24 11 Half of the macrocells on the CY7C372 CY7C372 have separate I/O pins associated with them. In other words, each I/O pin is shared by two macrocells. The input to the macrocell is the sum of between 0 and 16 product terms from the product term allocator. The macrocell includes a register that can be optionally bypassed. It also has po larity control, and two global clocks to trigger the register. The I/O macrocell also features a separate feedback path to the PIM so that the register can be buried if the I/O pin is used as an input. I0 I1 35 CLK1/I5 12 34 GND CLK0/I2 13 33 I4 I/O8 14 32 I3 I/O9 15 31 I/O23 I/O23 I/O10 I/O10 16 30 I/O22 I/O22 I/O11 I/O11 17 29 I/O21 I/O21 GND I/O 20 I/O 19 I/O 18 I/O 17 I/O 16 CC GND V I/O 15 I/O 13 I/O 14 I/O 12 18 19 20 21 22 23 24 25 26 27 28 Buried Macrocell 7c3722 The buried macrocell is very similar to the I/O macrocell. Again, it includes a register that can be configured as combinatorial, as a D flipflop, a T flipflop, or a latch. The clock for this register has the same options as described for the I/O macrocell. One difference on the buried macrocell is the addition of input register capability. The user can program the buried macrocell to act as an input regis ter (Dtype or latch) whose input comes from the I/O pin associated with the neighboring macrocell. The output of all buried macrocells is sent directly to the PIM regardless of its config uration. Functional Description (continued) Logic Block The number of logic blocks distinguishes the members of the FLASH370 FLASH370 family. The CY7C372 CY7C372 includes four logic blocks. Each logic block is constructed of a product term array, a product term allocator, and 16 macrocells. Programmable Interconnect Matrix Product T erm Array The Programmable Interconnect Matrix (PIM) connects the four logic blocks on the CY7C372 CY7C372 to the inputs and to each other. All inputs (including feedbacks) travel through the PIM. There is no speed penalty incurred by signals traversing the PIM. The product term array in the FLASH370 FLASH370 logic block includes 36 in puts from the PIM and outputs 86 product terms to the product term allocator. The 36 inputs from the PIM are available in both positive and negative polarity, making the overall array size 72 x 86. This large array in each logic block allows for very complex func tions to be implemented in a single pass through the device. Development Tools Development software for the CY7C372 CY7C372 is available from Cy press's Warp2t and Warp3t software packages. Both of these products are based on the IEEE standard VHDL language. Cy press also supports thirdparty vendors such as ABELt, CUPLt, and LOG/iCt. Please contact your local Cypress representative for further information. Product T erm Allocator The product term allocator is a dynamic, configurable resource that shifts product terms to macrocells that require them. Any number of product terms between 0 and 16 inclusive can be as signed to any of the logic block macrocells (this is called product Maximum Ratings LatchUp Current . . . . . . . . . . . . . . . . . . . . . . . . . . . . >200 mA (Above which the useful life may be impaired. For user guidelines, not tested.) Operating Range Storage Temperature . . . . . . . . . . . . . . . . . . . -65_C to +150_C Ambient Temperature with Power Applied . . . . . . . . . . . . . . . . . . . . . . . . -55_C to +125_C Supply Voltage to Ground Potential . . . . . . . . . -0.5V to +7.0V DC Voltage Applied to Outputs in High Z State . . . . . . . . . . . . . . . . . . . . . . . . . . -0.5V to +7.0V DC Input Voltage . . . . . . . . . . . . . . . . . . . . . . . . -0.5V to +7.0V DC Program Voltage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12.5V Output Current into Outputs . . . . . . . . . . . . . . . . . . . . . . 16 mA Static Discharge Voltage . . . . . . . . . . . . . . . . . . . . . . . . >2001V (per MILSTD883 MILSTD883, Method 3015) Ambient Temperature 0_C to +70_C 5V ± 5% Industrial -40_C to +85_C 5V ± 10% Military -55_C to +125_C 5V ± 10% Range Commercial Note: 1. 2 TA is the instant on" case temperature. VCC 7C372 7C372: Wednesday, September 23, 1992 Revision: October 19, 1995 CY7C372 CY7C372 Electrical Characteristics Parameter Over the Operating Range Description VOH Test Conditions Output HIGH Voltage VCC = Min. Min. Max. 2.4 IOH = -3.2 mA (Com'l/Ind) V IOH = -2.0 mA (Mil) VOL Output LOW Voltage VCC = Min. V 0.5 IOL = 16 mA (Com'l/Ind) IOL = 12 mA (Mil) VIH Input HIGH Voltage Unit V V Guaranteed Input Logical HIGH Voltage for all Inputs 2.0 7.0 V -0.5 Inputs 0.8 V VIL Input LOW Voltage Guaranteed Input Logical LOW Voltage for all IIX Input Load Current GND < VI < VCC -10 +10 mA IOZ Output Leakage Current GND < VO < VCC, Output Disabled -50 +50 mA IOS Output Short Circuit Current[4, 5] VCC = Max., VOUT = 0.5V -30 -90 mA ICC Power Supply Current VCC = Max., IOUT = 0 mA, f = 1 mHz, VIN = GND, VCC mHz GND Com'l 250 mA Com'l L " -66 125 mA Com'l -125 280 mA Mil/ Industrial 300 mA Shaded area contains preliminary information. Capacitance Parameter Description Test Conditions Max. Unit CIN Input Capacitance VIN = 5.0V at f=1 MHz 10 pF COUT Output Capacitance VOUT = 5.0V at f = 1 MHz 12 pF Endurance Characteristics Parameter N Description Minimum Reprogramming Cycles Parameter VX tER (-) 1.5V tER (+) 2.6V tEA (+) 1.5V tEA (-) Vthc Test Conditions Min. Normal Programming Conditions 100 Max. Unit Cycles Output WaveformMeasurement Level VOH VOL VX VX VX 0.5V 0.5V VX 0.5V VOH VOL 0.5V (a) Test Waveforms Notes: 2. 3. 4. See the last page of this specification for Group A subgroup testing in formation. These are absolute values with respect to device ground. All over shoots due to system or tester noise are included. Not more than one output should be tested at a time. Duration of the short circuit should not exceed 1 second. VOUT = 0.5V has been cho sen to avoid test problems caused by tester ground degradation. 5. 6. 3 Tested initially and after any design or process changes that may affect these parameters. Meaured with 16bit counter programmed into each logic block. 7C372 7C372: Wednesday, September 23, 1992 Revision: October 19, 1995 CY7C372 CY7C372 AC Test Loads and Waveforms W W 5V W W 238 (com'l) (mil) (mil) 5V OUTPUT W W W W OUTPUT 170 170 (com'l) 236 35 pF (com'l) 236 (mil) (mil) 5 pF INCLUDING INCLUDING 7c3723 JIG AND JIG AND SCOPE (com'l) 319 238 319 SCOPE (a) (b) ALL INPUT PULSES Equivalent to: 3.0V THÉVENIN EQUIVALENT W W 99 136 90% (com'l) (mil) OUTPUT 90% 10% 10% 2.08V (com'l) GND 2.13V (mil) < 2 ns < 2 ns 7c3724 Switching Characteristics Over the Operating Range 7C372-66 7C372-66 7C372-125 7C372-125 Parameter Min. Description 7C372-100 7C372-100 Min. Max. Max. 7C372-83 7C372-83 Min. Max. 7C372L-66 7C372L-66 Min. Max. Unit Combinatorial Mode Parameters tPD Input to Combinatorial Output 10 12 15 20 ns tPDL Input to Output Through Transparent Input or Output Latch 13 15 18 22 ns tPDLL Input to Output Through Transparent Input and Output Latches 15 16 19 24 ns tEA Input to Output Enable 14 16 19 24 ns tER Input to Output Disable 14 16 19 24 ns Input Registered/Latched Mode Parameters tWL Clock or Latch Enable Input LOW Time 3 3 4 5 ns tWH Clock or Latch Enable Input HIGH Time 3 3 4 5 ns tIS Input Register or Latch SetUp Time 2 2 3 4 ns tIH Input Register or Latch Hold Time 2 2 3 4 ns tICO Input Register Clock or Latch Enable to Combinatorial Output 14 16 19 24 ns tICOL Input Register Clock or Latch Enable to Output Through Transparent Output Latch 16 18 21 26 ns 6.5 6.5 8 10 ns Output Registered/Latched Mode Parameters tCO Clock or Latch Enable to Output tS SetUp Time from Input to Clock or Latch Enable tH Register or Latch Data Hold Time tCO2 Output Clock or Latch Enable to Output Delay (Through Memory Array) tSCS Output Clock or Latch Enable to Output Clock or Latch Enable (Through Memory Array) tSL tHL 5.5 6 8 10 ns 0 0 0 0 ns 14 16 19 24 ns 8 10 12 15 ns SetUp Time from Input Through Transparent Latch to Output Register Clock or Latch Enable 10 12 15 20 ns Hold Time for Input Through Transparent Latch from Output Register Clock or Latch Enable 0 0 0 0 ns Shaded area contains preliminary information. 4 7C372 7C372: Wednesday, September 23, 1992 Revision: October 19, 1995 CY7C372 CY7C372 Switching Characteristics Parameter Over the Operating Range (continued) 7C372-66 7C372-66 7C372-125 7C372-125 7C372-100 7C372-100 7C372-83 7C372-83 7C372L-66 7C372L-66 Min. Max. Min. Max. Min. Max. Min. Max. Unit Description fMAX1 Maximum Frequency with Internal Feedback in Output Registered Mode (Least of 1/tSCS, 1/(tS + tH), or 1/tCO) 125 100 83 66 MHz fMAX2 Maximum Frequency Data Path in Output Regis tered/Latched Mode (Lesser of 1/(tWL + tWH), 1/(tS + tH), or 1/tCO) 153.8 153.8 125 100 MHz fMAX3 Maximum Frequency with External Feedback (Lesser of 1/(tCO + tS) and 1/(tWL + tWH) 83.3 80 62.5 50 MHz tOH-tIH 37x Output Data Stable from Output clock Minus Input Register Hold Time for 7C37x[5, 8] 0 0 0 0 ns tICS Input Register Clock to Output Register Clock 8 10 12 15 ns fMAX4 Maximum Frequency in Pipelined Mode (Least of 1/(tCO + tIS), 1/tICS, 1/(tWL + tWH), 1/(tIS + tIH), or 1/tSCS) 125 100 83.3 66.6 MHz Pipelined Mode Parameters Reset/Preset Parameters tRW Asynchronous Reset Width 10 12 15 20 ns tRR Asynchronous Reset Recovery Time 12 14 17 22 ns tRO Asynchronous Reset to Output tPW Asynchronous Preset Width tPR Asynchronous Preset Recovery Time tPO 16 10 Asynchronous Preset to Output tPOR PowerOn Reset 18 12 12 21 15 14 26 20 17 ns ns 22 ns 16 21 26 ns 1 18 1 1 1 ms Shaded area contains preliminary information. Note: 7. All AC parameters are measured with 16 outputs switching. 8. This specification is intended to guarantee interface compatibility of the other members of the CY7C370 CY7C370 family with the CY7C372 CY7C372. This specification is met for the devices operating at the same ambient tem perature and at the same power supply voltage. Switching Waveforms Combinatorial Output INPUT tPD COMBINATORIAL OUTPUT 7c3725 5 7C372 7C372: Wednesday, September 23, 1992 Revision: October 19, 1995 CY7C372 CY7C372 Switching Waveforms (continued) Registered Input REGISTERED INPUT tIS tIH INPUT REGISTER CLOCK tICO COMBINATORIAL OUTPUT tWH tWL CLOCK 7c3726 Registered Output INPUT tS tH CLOCK tCO REGISTERED OUTPUT tWH tWL CLOCK 7c3727 Latched Output INPUT tS tH LATCH ENABLE tPDL tCO LATCHED OUTPUT 7c3728 6 7C372 7C372: Wednesday, September 23, 1992 Revision: October 19, 1995 CY7C372 CY7C372 Switching Waveforms (continued) Latched Input and Output LATCHED INPUT tPDLL LATCHED OUTPUT tICOL tSL tHL INPUT LATCH ENABLE tICS OUTPUT LATCH ENABLE tWH tWL LATCH ENABLE 7c3729 Clock to Clock REGISTERED INPUT INPUT REGISTER CLOCK tICS tSCS OUTPUT REGISTER CLOCK 7c37210 Latched Input LATCHED INPUT tIS tIH LATCH ENABLE tPDL tICO COMBINATORIAL OUTPUT tWH tWL LATCH ENABLE 7c37211 7 7C372 7C372: Wednesday, September 23, 1992 Revision: October 19, 1995 CY7C372 CY7C372 Switching Waveforms (continued) Asynchronous Reset tRW INPUT tRO REGISTERED OUTPUT tRR CLOCK 7c37212 Asynchronous Preset tPW INPUT tPO REGISTERED OUTPUT tPR CLOCK 7c37213 PowerUp Reset Waveform POWER 10% VCC 90% SUPPLY VOLTAGE tPOR REGISTERED ACTIVE LOW OUTPUTS tS CLOCK tPOR MAX = 1 ms tWL 7c37214 Output Enable/Disable INPUT tER tEA OUTPUTS 7c37215 8 7C372 7C372: Wednesday, September 23, 1992 Revision: October 19, 1995 CY7C372 CY7C372 Ordering Information Speed (MHz) 125 100 83 66 Ordering Code CY7C372-125JC CY7C372-125JC CY7C372-100JC CY7C372-100JC CY7C372-83JC CY7C372-83JC CY7C372-83JI CY7C372-83JI CY7C372-83YMB CY7C372-83YMB CY7C372-66JC CY7C372-66JC CY7C372-66YMB CY7C372-66YMB CY7C372-66JI CY7C372-66JI CY7C372L-66JC CY7C372L-66JC Package Name J67 J67 J67 J67 Y67 J67 Y67 J67 J67 Shaded areas contain preliminary information. Package Type 44Lead Plastic Leaded Chip Carrier 44Lead Plastic Leaded Chip Carrier 44Lead Plastic Leaded Chip Carrier 44Lead Plastic Leaded Chip Carrier 44Lead Ceramic Leaded Chip Carrier 44Lead Plastic Leaded Chip Carrier 44Lead Ceramic Leaded Chip Carrier 44Lead Ceramic Leaded Chip Carrier 44Lead Ceramic Leaded Chip Carrier MILITARY SPECIFICATIONS Group A Subgroup Testing DC Characteristics Parameter Operating Range Commercial Commercial Commercial Industrial Military Commercial Military Industrial Commercial Switching Characteristics Subgroups Parameter tPD tCO tICO tS tH tIS tIH tICS VOH 1, 2, 3 VOL 1, 2, 3 VIH 1, 2, 3 VIL 1, 2, 3 IIX 1, 2, 3 IOZ 1, 2, 3 ICC 1, 2, 3 Document #: 38-00213-C 38-00213-C Subgroups 9, 10, 11 9, 10, 11 9, 10, 11 9, 10, 11 9, 10, 11 9, 10, 11 9, 10, 11 9, 10, 11 Warp2, Warp2+, Warp3 , UltraLogic, and FLASH370 FLASH370 are trademarks of Cypress Semiconductor Corporation. ABEL is a trademark of Data I/O Corporation. LOG/iC is a trademark of Isdata Corporation. CUPL is a trademark of Logical Devices Incorporated. 9 7C372 7C372: Wednesday, September 23, 1992 Revision: October 19, 1995 CY7C372 CY7C372 Package Diagrams 44Lead Plastic Leaded Chip Carrier J67 44Pin Ceramic Leaded Chip Carrier Y67 E Cypress Semiconductor Corporation, 1995. The information contained herein is subject to change without notice. Cypress Semiconductor Corporation assumes no responsibility for the use of any circuitry other than circuitry embodied in a Cypress Semiconductor Corporation product. Nor does it convey or imply any license under patent or other rights. Cypress Semicon ductor does not authorize its products for use as critical components in lifesupport systems where a malfunction or failure of the product may reasonably be expected to result in significant 10 injury to the user. The inclusion of Cypress Semiconductor products in lifesupport systems applications implies that the manufacturer assumes all risk of such use and in so doing indemnifies Cypress Semiconductor against all damages. | <urn:uuid:56eb2b36-1b12-4b21-baa3-df5c77bb29f7> | CC-MAIN-2017-04 | http://www.datasheetarchive.com/CY7C372/Datasheet-078/DSAE0073149.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00242-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.747464 | 5,198 | 1.578125 | 2 |
Houston Dog Bite Attorneys
Dog Bite Liability Laws in Texas
Although most dogs are beloved household pets, they can still be unpredictable. According to the Centers for Disease Control and Prevention (CDC), more than 4.5 million people are bitten by dogs in the United States every year. Approximately 800,000 of those bites require medical attention and, sadly, the majority of dog bite victims are children. Children are also more likely to suffer severe injuries and complications due to dog bites and attacks, making them doubly at risk.
If you were bitten or attacked by a dog in Texas, you may be able to hold the dog’s owner liable for your resulting damages. At The Shellist Law Firm, PLLC, our Houston dog bite attorneys are well-versed in the state’s dog bite rules and liability statutes and can assist you in bringing a claim against the responsible party. We have extensive trial experience and, if necessary, are prepared to aggressively pursue the compensation you are owed, even if that means going to court.
Continue reading to learn more about dog bite liability laws in Texas, as well as your options for recovery, or call (713) 999-6855 for a free consultation with our team today.
The “One-Bite” Rule
Texas is one of just a few states to not have a specific civil statute regarding dog bites. However, legal precedent has established that the state follows a “one-bite” rule when it comes to dog owner liability and awarding damages in personal injury and wrongful death claims resulting from dog bites.
The one-bite rule is an often-misunderstood rule. Many people mistakenly believe that, under this rule, dogs get one “free” bite in terms of the owner’s liability for injuries and other damages resulting from a dog’s first bite, and, only after this first bite can an owner be held legally responsible. However, the one-bite rule is actually more similar to general rules regarding negligence.
To establish liability in a dog bite case in Texas, the victim (or “plaintiff”) must typically prove the following:
- The dog owner knew or reasonably should have known that the dog had acted aggressively, including biting, in the past, and/or;
- The dog owner failed to take reasonable measures to restrain or otherwise control the dog or prevent the bite/injury, and;
- As a result of the dog owner’s failure to act reasonably to control the dog, the victim was bitten and suffered injuries and/or damages.
So, while a past bite can serve as evidence of the dog’s aggressive tendencies—something the dog owner should reasonably be aware of—it is not necessarily required that you prove that the dog that bit you had bitten anyone in the past. If you can simply show that the dog had a history of aggressive behavior, and the dog owner knew about or reasonably should have known about the dog’s history, you could have grounds for a personal injury claim or lawsuit.
Note that you do not necessarily need to prove that the dog owner knew about the dog’s tendency to act aggressively or history of biting and that the dog owner failed to take reasonable measures to control or restrain the dog, leading to your injury. Proving just one of these elements—either the owner’s knowledge of the dog’s past behavior or the owner’s failure to reasonably prevent injury—could serve as the basis of a valid dog bite or injury claim.
Non-Bite Dog Attack Injuries
The state’s negligence rule also applies to cases in which a dog attacks or otherwise injures a person without actually biting. For example, if you were walking in a public park where leash laws were in effect, and you were knocked down by a large, loose dog that jumped on you, causing you to break your arm, you could have a claim against the dog owner or handler.
In this case, you could prove that the dog owner negligently failed to control or restrain the dog by allowing it to roam off-leash in an area where this was not allowed. Even if the dog had no history of aggressive behavior, you could still have a case if you can prove the owner’s negligence and that the dog was the cause of your injuries and resulting damages.
Defenses to Dog Bite Claims
The state of Texas allows several defenses to dog bite claims, including:
- Lack of knowledge of the dog’s history of aggressive behavior/biting
- The dog bite or attack victim was trespassing when the incident occurred
- The dog was an active-duty police or military dog and was working when the incident occurred
If the dog owner or handler raises any of these defenses, you could have a hard time recovering compensation for your injuries, medical bills, lost income, pain and suffering, and other damages. It is important that you work with an experienced attorney who can fight back against attempts to dispute, devalue, or deny your claim.
At The Shellist Law Firm, PLLC, our Houston dog bite attorneys are seasoned trial lawyers with a long record of success in the courtroom. Our founder, Steven Shellist, is a highly respected attorney in the Houston area and is widely regarded as an authority on an array of legal matters. In addition to his in-depth knowledge of civil liability in dog bite claims, he is well-versed in issues involving criminal liability in these types of cases. He and our entire team can help you understand your rights and explore your options for moving forward. We take great pride in developing innovative and personalized legal strategies for our clients, always with the goal of maximizing their recoveries.
How Dog Breeds Come Into Play
There are no restrictions in Texas based on dog breeds. Legally, that means a Doberman bite or a pitbull bite is just as significant as a bite from a golden retriever or labrador.
It is currently illegal to pass any breed-specific regulations at all in Texas, so the way the dog looks will have nothing to do with the legal proceedings. This helps those who have suffered from any kind of dog bite be taken seriously.
Talk to a Member of Our Team Today
Dog bites and dog attack injuries are often catastrophic and can lead to an array of serious, life-changing complications. Victims may experience devastating brain injuries, permanent scarring, and disfigurement. Tragically, many dog attacks are fatal.
Regardless of how severe your situation may be, the team at The Shellist Law Firm, PLLC can help. Our dog bite lawyers take all types of cases and always fight to protect the rights of our clients. There are no upfront costs when you hire our firm; we only collect legal fees if/when we recover a settlement or verdict on your behalf. Get in touch with us today to learn more—our phones are answered 24 hours a day, 7 days a week, and we offer complimentary consultations in person, over the phone, and via video conferencing for your convenience.
Car Accident $20,000,000
Illegal Sexual Recording $800,000
Dog Attack $750,000
Oil Rig Settlement $2,000,000.00
Car Accident $300,000
Practicing Law for Two DecadesHaving practiced law for 20 years, you can be confident attorney Steve Shellist can successfully handle your case.
Extensive Trial ExperienceAs a former chief prosecutor, Mr. Shellist knows how to present a compelling case in front of a jury.
Highly Personalized RepresentationAt Shellist Law, we believe every case requires tailored representation in order to achieve the best possible outcome for the client.
Legal Analyst on ABC-13Over the years, Mr. Shellist has been called on by ABC-13 News to share his expertise on many newsworthy cases. | <urn:uuid:41518270-ee51-4e35-bd86-b9a496e007ef> | CC-MAIN-2022-33 | https://www.shellistlaw.com/dog-bites/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00672.warc.gz | en | 0.962724 | 1,642 | 1.523438 | 2 |
Copying, Printing, Scanning & Faxing
- A self-serve copier is available in the Business Library.
- Copier accepts coins, $1 bills and $5 bills, and copy cards.
- The Business Library does not provide change.
copy center Hours
- The copy center closes 1/2 hour prior to the closing of the Library.
- Copies are $.10 per page ($.09 per page when using a copy card).
- Transparencies can be purchased at the Circulation Desk for $.60 per page. Only transparencies purchased in the Business Library can be used on the self-serve copiers.
- Printing using credits via the MSU Print system is available in the Gast Business Library to patrons with an MSU NetID. We are unable to accept money for printing.
- Patrons may use one of three black and white laser printers (5 cents/print), or the color laser printer (40 cents/print).
- Purchase credit online at print.msu.edu.
- Prints may be generated directly through MSU Print from any of over 100 of our public computer workstations. Or wirelessly from laptops, using the Webprint feature of MSU Print. Using MSU Print, Webprint, prints may also be generated from anywhere in the world, to be printed in our library.
- Prints may also be generated from any of our selected resources computers, utilizing the Webprint feature, however you cannot save a file to the selected resource computers so you must first save the file you want to print to an external drive such as a thumb drive. There are also file type restrictions using Webprint. The advantage of using the selected resource computer would be that they do not require you to login and wait for the computer to configure.
- For complete information about using the self-service laser printers, visit print.msu.edu
- The Business Library has a Scan Station available in the copy center. It doesn’t require any log in and has both flatbed with a book edge and sheet feed options. It also is a fax machine for outgoing faxes only. See the Faxing section below for more information.
- Scan to Email, USB, and Google Docs.
- Cost: $.05 per scanned page. Payment options: Cash, or Copy Card.
- See also: Scanning Options at the MSU Libraries (PDF).
- The Business Library’s Scan Station offers the ability to send faxes.
- The fax is sent to the phone line through the internet.
- Cost: US/Canada: $.50 per page. International: $1 per page. Note you are charged for optional cover sheet if selected. Payment options: Cash, or Copy Card.
- Cash - Copiers are self service and accept coins, $1 bills and $5 bills.
Copy Cards -Copy Cards may be purchased in the Main Library at a dispenser near the Circulation Desk. The dispenser accepts five dollar ($5) bills only. The card is dispensed with $4.50 value. You may use this card at any coin/card operated copiers in the Business Library or Main Library. The card may be revalued at any copy machine coin box and reused indefinitely. Copies made with the copy card are $.09 each. Copies paid with coins are $.10 each.
Please note: These cards may not be used in the College of Law Library.
Note: The Business Library does not provide change and we are unable to accept money for printing. | <urn:uuid:b89d0bd1-9ef5-42bb-b6a8-94ecf2fa7e10> | CC-MAIN-2017-04 | https://www.lib.msu.edu/branches/bus/copyingandprinting/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283301.73/warc/CC-MAIN-20170116095123-00506-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.875232 | 747 | 1.523438 | 2 |
A computer network or data network is a telecommunications
network which allows nodes to share resources. In computer
networks, networked computing devices exchange data with
each other using a data link. The connections between nodes
are established using either cable media or wireless media.
The best-known computer network is the Internet.
Network computer devices that originate, route and terminate the data are called network nodes. Nodes can include hosts such as personal computers, phones, servers as well as networking hardware. Two such devices can be said to be networked together when one device is able to exchange information with the other device, whether or not they have a direct connection to each other. Computer networks differ in the transmission medium used to carry their signals, communications protocols to organize network traffic, the network's size, topology and organizational intent.
Computer networks support an enormous number of applications and services such as access to the World Wide Web, digital video, digital audio, shared use of application and storage servers, printers, and fax machines, and use of email and instant messaging applications as well as many others. In most cases, application-specific communications protocols are layered (i.e. carried as payload) over other more general communications protocols.
Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password. | <urn:uuid:1f3b70e9-ab57-4109-a16c-9fe7fed1337a> | CC-MAIN-2017-04 | http://www.rtbits.com/rtbits.com/Network_security.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00576-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.940089 | 445 | 3.75 | 4 |
Human rights activists say women and children in China and surrounding countries are bought and sold in China. They are victims of either forced labor or sexual exploitation. Some women and girls are also forced into marriages.
"These are the faces of the boys and girls who have disappeared in China without a trace," says Chai Ling, founder of the group All Girls Allowed, who has been working with
volunteer organizations to promote awareness and help families find their children. She says many of the missing are kidnapped and sold.
"The brothels, they buy the women and girls into sex slavery," said Chai Ling. "That's a huge market out there. There are then individual families who want to make sure they have wives for their own son."
Traditional Chinese culture places more value on a boy. When they grow up, the men are expected to live with and care for their parents, take a wife and continue the family name. "When a woman is pregnant with a girl, " Chai says, "Some families are taking this matter into their own hands by selectively aborting, abandoning and selling their baby girls. There are approaching 40 million young men inside China who will not find a bride. So as a result of that, sex trafficking against girls and women are becoming a huge problem inside China."
Human rights activists say China's one-child policy has contributed to the uneven gender ratio fueling the problem.
Chai says some missing girls may end up being sold to a family as a child bride. Boys can also be trafficked for families without male heirs.
But volunteers are slowly making progress.
All Girls Allowed says a three-year-old girl, named Little Bean, was kidnapped last June and sold. With the help of volunteers who put out flyers with her picture, she was found seven months later and reunited with her parents.
Andrea Bertone, the director of human trafficking.org, says the gender imbalance in China is affecting surrounding countries.
"There is a large number of women who are brought in from Vietnam, Laos and North Korea for forced marriage situations and they're mainly going into the rural areas,"said Bertone. "Women or children who are being brought from neighboring countries across the borders to either work or be in a marriage in the rural areas, we're talking about a smaller network of people who know how to navigate the borders and be able to pay off the border officials pretty easily."
Bertone says traffickers inside China could either belong to small networks or more organized crime syndicates.
While a few are caught, the demand for women and children continues and the problem of human trafficking is expected to grow in China and expand throughout the region. | <urn:uuid:b5fbee86-ea3a-447a-922b-1f35cb94cf38> | CC-MAIN-2017-04 | http://www.voanews.com/a/rights-activists-say-chinas-gender-ratio-contributes-to-human-trafficking-114480334/133959.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284352.26/warc/CC-MAIN-20170116095124-00189-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.979314 | 550 | 2.5625 | 3 |
National Geographic Uses Back Issues of NY Times To Promote History Show
The channel and the newspaper collaborated to create a dynamic ad experience for the TV program, Killing Lincoln.
One of the greatest difficulties the New York Times has had in the digital era, is how to deal with online advertising. Searching for a way to make the content interesting and interactive, the company launched a new ad platform last week in conjunction with its digital archive TimesMachine. The National Geographic Channel was the first to test road the platform, using the April 15, 1865 headline to advertise its first original drama, Killing Lincoln.
The advertisement is a custom built interactive unit, that uses the overlay of the 1865 issue and is clickable, leading to both video content for the show and the TimesMachine archive for issues around that time period. Says Todd Haskell, Times Group VP of Advertisting:
We’re increasingly seeing that advertisers want to tell more complicated stories online, and readers seem to love these types of executions when they’re done well.
This seems to mitigate the annoyance of being forced to view an ad just by arriving on the NYTimes.com site.
TimesMachine includes back issues from 1851 to 1922, and its use could be profitable for a number of historical shows and films such as Boardwalk Empire or The Great Gatsby. In this case, the advertising could be considered successful because The National Geographic Channel pulled its highest ratings ever for a scripted drama on the Sunday night premiere, with over 3 million people tuning in. | <urn:uuid:4924be54-c65d-4427-a92f-7737dc2bad0b> | CC-MAIN-2016-44 | http://www.psfk.com/2013/02/national-geographic-ny-times-ads.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719646.50/warc/CC-MAIN-20161020183839-00128-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.942527 | 310 | 1.773438 | 2 |
A Review of Neil Maher’s Nature’s New Deal (Oxford University Press, 2008)
The Civilian Conservation Corps (CCC) was one of the most popular and successful of the New Deal programs. Between 1933 and 1942, it put more than 3 million men to work, planted 3 billion trees, protected 20 million acres from soil erosion, helped establish 800 state parks, and installed 5000 miles of water lines. These are just a handful of the many infrastructural improvements accomplished by the Corps. In addition, it was an extremely popular program: in 1936, its approval rating stood at 82% (not coincidentally, Roosevelt won re-election that year with the second largest popular vote in U.S. history). Three years later, it rose to 84%.
As Neil Maher argues in Nature’s New Deal, the CCC was also philosophically opposed to and ultimately undermined by the forces that would coalesce into post-war environmentalism. For proponents of the Green New Deal, this fact should be a curious one: not only was the “greenest” of the original New Deal programs not established by nascent environmentalists, it was also internally fractured by their influence.
A Tale of Two Dams
In 1913, Congress decided to dam the Hetch Hetchy Valley in Yosemite National Park to provide water for San Francisco. Cheering the decision was Gifford Pinchot, first chief of the United States Forest Service and mouthpiece of the conservation movement. For Pinchot, conservation meant “the development and use of the earth and all its resources for the enduring good of men” (25). The underlying assumption of Progressive-era conservation was that nature is there for us: the reason it is imperative that we maintain natural resources such as timber, soil, and water is simply that human beings need these things to flourish. Damming the Hetch Hetchy made perfect sense to Pinchot. Cities need water, and the valley was there to hold it.
In fierce opposition to the dam were John Muir and the Sierra Club, who “believed in preserving nature’s beauty for its own sake as well as for the spiritual sake of humankind” (26). According to Muir and the preservationists, human beings were interlopers amongst “terrestrial manifestations of God,” stains on the ideal order of nature (26). Hetch Hetchy was a temple, its damming a sacrilege. Less than a year after the decision to build the dam, so the story goes, Muir “died of a broken heart.”
The preservationists might have lost the battle, but they would eventually win the war. In the late 1940s, a plan was hatched to build a similar dam in the Echo Park section of Dinosaur National Monument. The same foes faced off once again, but this time their fortunes were reversed: after much protest, the project was abandoned in 1955, a moment that, “many argue, unleashed modern environmentalism in the United States” (220).
For Maher, it is impossible to understand this tale of two dams without looking to the fates of the competing visions that animated and undermined the CCC. At its inception, the Corps was the fruit of Pinchot’s utilitarian conservationism, its early work of combatting “timber famine” and soil erosion carried out in the name of greater economic productivity. Around 1935, another strand of Progressive ideology, represented in the writing of Frederick Law Olmsted, began to shape the CCC’s work: that of “the belief in the rejuvenative power of the countryside” to cure the nervous ills of “overcivilized man, who [had] lost the great fighting, masterful virtues” (32-33). To promote outdoor recreation, the CCC increasingly turned to national and state park development, and their work paid dividends. In 1933, less than 3.5 million people visited national parks; by 1941 that number jumped to 21 million (73). The purview of Pinchot’s “simple conservation” was thus expanded to include not just trees, soil, and water, but parks as well.
Olmsted’s thinking was a natural fit for a project that understood itself more broadly as about the rejuvenation of men in the wake of the Depression. According to the Corps’ second director, James McEntee, CCC enrollees came “almost entirely from that third of the population which President Roosevelt has described as ‘ill fed, ill housed, and ill clothed’” (83). The Corps aimed not only to alleviate this impoverishment but also to harden the bodies and minds of the young men it employed. Indeed, the CCC’s first director, Robert Fechner, understood “the central role played by this labor” to be the source of the program’s success: “I believe that the general popularity of the Corps is due in large measure to the belief of the general public that it has not been conducted as a welfare organization but has engaged in useful worthwhile work” (84).
It’s worth noting that neither Fechner nor McEntee came from the conservation movement. The CCC was originally opposed by organized labor and the Socialist and Communist parties, and the appointments of Fechner and McEntee, two machinists’ union organizers, to direct the Corps were necessary for FDR to overcome this initial hostility. Such was the birth of the CCC: two machinists re-virilizing the nation’s young men to make efficient use of America’s natural resources.
Paved Paradise, Put Up a Parking Lot
In 1934 Aldo Leopold, an early CCC booster who had grown critical of its projects, gave a speech to the University of Wisconsin’s Taylor-Hibbard Economics Club. In it he described Corps crews as brash and destructive, chopping down eagles’ nests in the name of “timber stand improvement,” ruining the natural habitats of many species of migratory waterfowl, and generally as suffering from a lack of “ecological” understanding (165-166).
At that point the term “ecology” was unfamiliar to most Americans. Leopold meant by it a kind of systems-level thinking interested in “harmonious balance” that transcended the blinkered views of CCC farming, forestry, game cropping, and soil erosion experts (167). His “ecological critique of the CCC and its conservation work… migrated from the Midwest eastward and took root in the academic halls of Cambridge, Massachusetts,” where it unsurprisingly took on an even more paternalistic tone (167). Harvard botany professor Merritt Fernald dismissed CCC enrollees as “misguided and enthusiastic young men” (168), and the national media soon jumped at the chance to chastise a working-class institution for being “ecologically irresponsible” (168).
This academic critique added fuel to the preservationist fire, and soon the Corps was being attacked on many sides for “destroying the ‘primitive’ quality of America’s public lands” (176). To rehabilitate the CCC’s image in the face of these attacks, in the late 30s Roosevelt attempted to bring all conservation work under a centralized authority that would embody the spirit of “true conservation,” i.e. the enlightened “ecological” thinking of academics and preservationists. Pinchot allied with labor to defeat the proposed reorganization plan in 1938, which many historians have argued “marked a turning point for Franklin Roosevelt’s presidency and an early step in a half-century-long rollback of New Deal liberalism” (183).
In one sense this was a victory for Pinchot’s “simple conservation,” but the vehicle for its enactment emerged badly bruised. In addition, the ecologists and preservationists were not to be deterred: in 1940 a new conservation organization called Friends of the Land was created to carry forth their interests. It was to be the first of many special interest groups to take up the torch of “total conservation,” and these are the precise groups that would eventually tip the balance in favor of the preservationists at Echo Park in 1955.
In Maher’s telling, modern environmentalism is thus something like a parasite, infecting and destroying the body of its Corps host in order to spawn NGO babies. Perhaps critics are right that many other “historical forces beyond Roosevelt and the federal government” are responsible for the genesis of post-war environmentalism, but from this reviewer’s perspective, Maher’s book is less about environmentalism itself than about its hand in the undermining of the CCC.
An Ecological Politics for the Working Class?
Proponents of the Green New Deal are quick to tell you that “jobs vs. the environment” is a false dichotomy, an invention of the Right perhaps, but Fechner and McEntee might not have been so quick to agree. The preservationists and ecologically-minded academics of the New Deal era not only had no hand in the genesis of the largest green jobs program in American history, but they also did a good deal to undercut it. The CCC was a success not because but in spite of the nascent environmental movement.
Though Maher does not delve too deeply into this aspect of his story, it is difficult to read Nature’s New Deal and not be struck by the class character of its inner tension. The young men employed by the Corps were poor and working-class, and their knowledge and skills were acquired practically in the course of transforming America’s landscape. The Corps’ critics were academics and wilderness enthusiasts, who framed their complaints in terms of science and morals. It’s true that Pinchot was, much like FDR, an aristocrat, and thus that “simple conservation” had Progressive technocratic rather than working-class roots, but the CCC itself was a working-class program and the paternalistic criticisms of it reflect that fact.
There is of course no need to unduly romanticize the CCC: enrollee salaries weren’t great, though they were often lifelines to their families. It was organized as a paramilitary unit, and to the end of inculcating the “great fighting, masterful virtues.” And it suffered from discriminatory and segregating hiring practices, even if it also opened new vistas for black enrollees, who comprised approximately 8% of the Corps.
But for all its shortcomings, there are many important lessons to be taken from the CCC experience, perhaps none more important than that regarding the strategy needed to achieve such a popular and transformative public works project. Green New Deal programs will be won by catering to and empowering organized labor to lead the efforts of green infrastructural projects, and they will be won in the name not of treading lightly on the earth or respecting divine nature, but rather of developing and using our natural resources for the enduring good of human beings.
In the tradition of Pinchot’s conservationism, Christian Parenti has argued against the “implicit Malthusianism” of modern environmentalism, which “casts humans as intruders upon a harmonious and static thing called ‘nature.’” For Parenti, “we cannot retreat from our role as environment makers,” an imperative that would have well-suited the architects of the CCC.
Looking at the history of America’s greatest green jobs program, it is clear that the environment-making nature of human beings is not simply a philosophical question. The lamentations of environmentalists past and present about the intrusions of human beings on pristine nature are often thinly-veiled reservations about the ability of working people to shape and benefit from the earth. If we’re to take history as our guide, we will win large-scale green infrastructural projects not with but against the tireless moralizing of environmentalists. | <urn:uuid:d3f32e68-683b-401f-bbce-27604f7427e9> | CC-MAIN-2022-33 | https://newpol.org/the-new-deal-against-the-environmentalists/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00268.warc.gz | en | 0.963556 | 2,538 | 3.0625 | 3 |
A long distance romance is definitely an intimate romantic relationship between two partners just who are segregated by location. This type of romantic relationship poses a couple of challenges towards the couples. Face-to-face contact is normally not possible and geographic distance is a significant factor that must be triumph over. In a extended distance romantic relationship, the lovers do not see the other person on a regular basis. Nevertheless , they do connect through messages and text messages. It is difficult to get a close romantic relationship if the two partners are separated by much.
Interaction is a major issue in a long https://thebestmailorderbrides.com/mail-order-bride-legality/ allure. This is because a long-distance relationship means both equally partners are unable to spend sufficient time together. Lack https://agoraguillestre.ouvaton.org/2020/01/08/techniques-for-finding-appreciate-in-asia/ of physical get in touch with is one of the most frequent reasons for romances to end. Despite the fact that a long-distance partner can be more attractive than the other, a long-distance spouse is still lacking their soulmate’s company. The best way to stay in touch is to use a business online or mobile phone apps to hold in touch. If it is not possible, consider producing regular sessions to see one another.
One of the most difficult area of long-distance relationships is certainly coping with envy. While this concern is understandable, it can be hard to overcome. It is natural to feel envious of some other person’s life and the items that they do, such as going out with friends. Being possessive may also lead to significant jealousy, which can be common amongst long-distance lovers. To deal with jealousy, share your thoughts and feelings.
One of the common concerns of a long-distance romance is usually jealousy. This is normal for lovers who will not live in similar city or country. This is often easily defeat by sharing your feelings and demonstrating your feelings to one another. If you do not show your emotions with all your partner, it is likely to develop in to a greater problem. But in the end, you can find nothing halting you coming from enjoying your long-distance romance.
The other very in long-distance friendships is envy. It is ordinary to experience jealous if the partner is normally close to you, although a long-distance relationship can lead to significant envy. To deal with envy, share everything about your life. In this manner, your partner can truly know how you really feel and will not look jealous. The longer the length between you and your spouse, the more jealousy you’ll be.
One of the major problems in a long relationship is definitely jealousy. This is certainly quite normal since the a couple are not actually near one another. But if you may have an affair with somebody, this can cause jealousy. The very best approach to solve this problem is to be genuine with each other and openly connect using your partner. When you feel envious, you’ll be able to tell your partner your emotions. This will help you to overcome this problem. | <urn:uuid:36ef01ba-95f6-423d-815f-06d5165f548a> | CC-MAIN-2022-33 | https://hickorywindranch.com/uncategorized/working-with-the-strains-of-a-lengthy-distance-dating/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00076.warc.gz | en | 0.951281 | 651 | 1.75 | 2 |
The Human Potential Centre (HPC), previously known as the Centre for Physical Activity & Nutrition is a multi-disciplinary research group.
Our mission is to enhance the physical health and mental wellbeing of our communities through high quality and innovative research.
The centres success in designing, implementing and evaluating diverse and relevant projects has established the HPC as a leader in New Zealand health research.
Research undertaken by the HPC helps in understanding and improving the socio-ecological determinants of health behaviours and outcomes, and translating enables cutting-edge research to be translated into teaching, community programmes, and policy. We have an excellent track record of postgraduate student success, external competitive funding, published research, and national and international recognition for our work.
TV 3's 3rd Degree aired a segment on the increasingly controversial topic of "The Benefits of Saturated Fats". Not surprisingly, as NZ's leading advocate of the Low Carbohydrate High Fat (LCHF) living, Professor Grant Schofield played a major role in the interview. The segment highlights well-founded evidence on the merits of a diet based on the "evolutionary biology and understanding of human metabolism and nutrition".
For the full 3rd Degree interview watch it here.
A chance to view Professor Schofield and his team at the LCHF seminars held in October 2013.
Click here for the Reading List from the LCHF seminar. LCHF Reading List
The Human Potential Clinic bridges the gap between the medical and fitness industry. This unique clinic specialises in providing evidence-based advanced exercise assessment and exercise prescription for people living with a wide range of risk factors and medical conditions such as high blood pressure, diabetes, cardiovascular disease and cancer.
The Clinic works closely with referring medical practitioners, specialists and allied-health professionals to provide comprehensive prevention, treatment and management of various health conditions. Services are centred on the principles of progressive self-management and long-term changes in health-behaviours, ranging from intensely-supervised (one-to-one) to home-based (independent) programs. Research clearly shows that individualised exercise programmes based on gold-standard laboratory assessments can offer substantially greater health benefits than standard generic low to moderate intensity exercise programmes whilst minimising risk.
The facility contains the latest exercise equipment to ensure our patients are exercising in a safe environment under constant supervision. As well as having a scientific approach to assessment and prescription, a priority focus of our Clinic services is on equipping clients with the skills to maintain appropriate physical activity habits in the long term. Changes to everyday behaviour including the addition or modification of physical activity habits are not easily achieved. Our qualified clinical exercise physiologists recognise this, and assist clients with achieving independence by helping to identify and work around the barriers to achieving each person's specific health goals.
For more information please contact: HPC@autmillennium.org.nz | <urn:uuid:6c27416f-da4d-4c6b-8244-56ce75202a18> | CC-MAIN-2017-04 | https://humanpotentialcentre.aut.ac.nz/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283301.73/warc/CC-MAIN-20170116095123-00511-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.931357 | 587 | 1.632813 | 2 |
Hands up if you’ve ever skimmed a stone.
Chances are you’ve had a go at some point, maybe when you were a kid or holidaying on the coast. What feelings do such memories stir in you? A sense of fun perhaps, of a challenge, or an impression of being in the moment?
Skimming stones is a simple activity, it may even seem childish, but in keeping with the other activities in our book Skimming Stones and other ways of being in the wild, we believe it is deeply valuable.
That moment, skimming a stone over the waves, can lift us out of the ordinary rhythms and demands of day-to-day existence. When skimming stones, we enter a different way of being in landscape – we slow down and look more closely at the things around us. Scrabbling in the sand and rockpools in search of the perfect stone, the salt tang heavy in our noses, passing time in the alien terrain of the seashore, we can’t fail to interact with the landscape more deeply.
And it’s not just skimming stones. Do you remember building dens, making dams, and sleeping out by a fire? These are skills previous generations knew but that are disappearing from our society.
For many of us, growing up and trying to carve a place in the world means submitting to the demands of modern life, letting the daily grind dictate our every move. As urbanites we forget the riches that lie around us, drawing the curtains against the call of the owl and cry of the fox, spending our rare breaks in jet-fuelled escapes or at carbon-copy resorts. At home our experience of nature is filtered through laptop screens and HD TVs, our meals are shrink-wrapped and from around the globe, our daily movements via the climate controlled cages of cars, buses and trains. If we do spend time in the outdoors, we march through it from A to B; we ‘do’ a walk or ‘climb’ a mountain, projecting goals onto the landscape rather than taking the time to really be in it.
It is this unhealthy state of dislocation that Rob Cowen and I set out to redress in our book. As cell-mates imprisoned in the concrete and glass of a central London office, we found we shared a yearning for the open spaces of our childhoods and struck on an idea for a book of simple activities that would help all of us draw closer to the landscapes we evolved to exist in.
When Rob and I first went looking for reconnection, we started out setting challenges for ourselves and trying to push to the extreme, or at least our extreme. We wanted to conquer mountains, but in the end it was the simple things which gave us what we were looking for. From tracking animals through a forest to making kites out of bin bags and bamboo, our book shares techniques that help ease us out of our day-to-day lives. At the same time we explore the scientific and philosophical reasons why time spent doing these things in the outdoors so enriches our bodies and minds. It invites the reader to look more closely at natural world and, in so doing, their own nature.
Our journey showed us that by taking some time to reconnect with nature, you can throw off a layer of exterior concerns, relax, enjoy who you are and the world around you, and gain a more philosophical outlook on life.
There’s a tendency for self help and personal development books to put themselves forward as the one true route to happiness. That can be hubris, certainly, but it’s often part of the efficacy: the placebo effect is very real, but the placebo effect doesn’t function unless you believe it.
Will reading Skimming Stones change your life? Of course it will, but how much so is up to you. Connecting with nature has the advantage over more esoteric approaches that it is something with a growing body of research and evidence behind it, and a reasonable claim to having millions of years of evolution in its favour. That said, it’s all about what works for you.
Ultimately, whether you see a route to inner peace in it or not, skimming a stone is great fun too, so why not give it a go? Skim a stone! Buy the book! Take the time to support the foundations of your character.
- Leo -
We wrote this book so you can open it on any page and find something to take away.
- The ‘How To’ for each activity is explained so you can try it yourself.
- It is supported by our reflections on why and how doing these activities has such a profound and important effect on us.
- Each chapter is also a narrative of our own experiences, which can be enjoyed from an armchair without needing to recreate them.
- More adventurous readers may want to use the instructional elements as a basis for day trips and long weekends and all the facts and techniques are provided to enrich a personal experience.
- We also dig up of the ‘lore’ of the land – historical and cultural odds and ends, as well as topics as broad as geology, myths and legends.
Our hope is that you will ultimately discover a new side to yourself and be driven to uncover your own ways of being in the wild. | <urn:uuid:b43cc1e9-dd61-4e7e-bc0b-e9e269d31e91> | CC-MAIN-2017-04 | http://robandleo.com/author/leo/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282926.64/warc/CC-MAIN-20170116095122-00396-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.955932 | 1,106 | 1.726563 | 2 |
The 2012 London Olympics Games, officially the Games of the Olympiad,also known informally as London 2012, began in London, United Kingdom, on 27 July and will continue until 12 August 2012. The first event, the group stages in women’s football, began two days earlier on 25 July.
The 2012 Summer Olympics are the first Olympic Games in which every participant nation has had at least one female athlete,204 countries participating in Olympics in Games.
Motto Inspire a Generation
Different channel Broadcast Different Games of London Olympics | <urn:uuid:75951ef9-d6df-4996-8d26-3d966b7b0e79> | CC-MAIN-2017-04 | http://www.livetvant.com/london-olympics-2012-stream-2-live-online/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00030-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.956647 | 110 | 1.820313 | 2 |
The great whales, once under the threat of death from most seafaring nations (and now only a scant few), are some of the largest creatures to ever grace our planet. The group includes all the aptly named Mysteceti, the whales who filter plankton and krill through the plates of baleen that line their jaws, and the legendary sperm whales familiar to all high school students thanks to Moby Dick.
Over the thousand years of widespread whaling, we wiped out between two thirds and 90 percent of great whale populations, according to some estimates. The planet's total whale biomass may have been reduced by as much as 85 percent. Some species fared worse than others: blue whales were reduced to just 1 percent of their historical numbers in the Southern Hemisphere.
In a recent paper in the journal Frontiers in Ecology and the Environment, ecological economist Joe Roman and colleagues described four ways in which whales are vital to ocean health and to the future of our increasingly hot planet.
The fact that whales can consume a ton (literally!) of food actually helps keep carbon under the ocean rather than in the atmosphere, slowly cooking the Earth under a warm blanket of greenhouse gas. Here's why.
The amount of food required to allow just one blue whale to survive is enough to feed seven minke whales or 1500 penguins. Indeed, when whales declined, other species like penguins and Antarctic fur seals enjoyed a baby boom since there was suddenly so much more food for them to eat. But despite the ability of 1500 penguins to eat the same food as a single blue whale, their biomass is only 8% of the whale.
The greater biomass of the blue whales allows marine ecosystems to store more carbon simply because the animals – and their carcasses, once they die – are larger. In other words, for the same amount of food, the great whales allow the oceans to retain a larger amount of carbon than smaller animals ever could.
Whales are big, and the great whales are the biggest, but that doesn't provide them with protection from all forms of predation. Because they are so large, a single whale represents a bounty in energy and resources for any creature large, powerful, or stubborn enough to hunt it. Fossils provide evidence that the ancient (and very much extinct) shark Megalodon hunted the great whales, and both historical and modern accounts verify that the smaller killer whales do the same. The high frequency of scrapes and rake marks on the flukes of most large whale species," writes Roman, "affirm[s] a long-standing and wide-spread utilization of whales as prey."
When killer whales were forced to find other sources of energy, many turned to smaller marine mammals, like seals, sea lions, and sea otters. The loss of sea otters meant that their primary source of food, sea urchins, were suddenly without a significant predation pressure of their own. Sea urchin populations in the northern Pacific ocean flourished, and as a result, the kelp forests that they rely on for food began to decline.
The decline of kelp forests not only substantially changed the local ecosystems both in terms of biodiversity and biomass, but also reduced the ability of those marine ecosystems to retain carbon. Just like terrestrial forests, kelp forests are an important carbon sink, a manner in which it can be sequestered away from the atmosphere. But as kelp forests lost their vigor, they also lost their ability to hold onto carbon.
Everybody does it, but whales take it seriously. Whales and other marine mammals find food deep in the water – sperm whales dive to the darkest, deepest seas to find squid – but then return to the surface to eject their waste. And they do it in the most magnificent way possible, releasing massive amounts of nitrogen and iron into the water by way of fecal plumes. That allows for the growth of phytoplankton near the ocean surface. Eventually, those phytoplankton blooms sink, transferring at least 200 thousand tons of carbon each year from the atmosphere to the deep sea.
Whales don't only travel over vast distances in depth; they also migrate horzontally across the planet's surface. Baleen whales have some of the largest migrations in the world, moving from feeding at higher latitudes and calving at lower latitudes. While they fast during lactation, females release all the nitrogen that they stored up in their body fat as they burn it to maintain their energy. Thus, according to one estimate, blue whales transport 88 tons of nitrogen each year from their high latitude feeding grounds near Alaska or Antarctica to their low latitude birthing grounds in the tropics.
Calculating backwards, before commercial whaling began, that figure would have been closer to 24 thousand tons of nitrogen. That would have allowed phytoplankton to blossom, and that would have provided sequestration for an additional 140 thousand tons of carbon each year.
Roman calls the transfer of nutrients and chemicals by whales the "whale pump" and "great whale conveyor belt," to describe the vertical and horizontal gradients, respectively. As whale populations recover, he writes, those processes may allow our oceans to slowly begin acting as Earth's massive carbon sink, once again.
Whales may be magnificant creatures, but they eventually die. Because they're made mostly of proteins and lipids, dead whales provide brief feasts for deep sea dwellers in a place that is largely void of nutrients and energy. After a 40-ton grey whale takes its last breath, it sinks silently down, bringing some 2 million grams of carbon along with it. Altogether, whale falls currently transfer some 190 thousand tons of carbon each year from the atmosphere to the deep sea.
But that's an estimate based on today's whale populations, which have only begun to recover. If great whale populations were restored to their pre-whaling sizes, the increase in carbon export would be "comparable in magnitude to the hypothetical [climate engineering] projects intended to mitigate climate change," argues Roman. Whale conservation would accomplish the same in terms of carbon sequestration as the iron or nitrogen fertilization projects, which the IPCC described in 2007 as "speculative" and "without a clear institutional framework for implementation," aim to accomplish.
Whales provide many more ecosystem services beyond their role in global carbon transfer. Indeed, Roman and colleagues acknowledge that the contribution of whales to global carbon fluxes is indeed relatively small compared to other processes. Still, a continued effort towards whale conservation "may help to buffer marine ecosystems from destabilizing stresses," he says.
When you remove large predators en masse from their habitats, bad things tend to happen. When wolves were driven out of Yellowstone, the elk population exploded because they were no longer supressed by wolf depredation. But more elk meant that the plants they ate suffered. And the bears, beavers, and bison, who relied on many of the same plants as the elk, suddenly found themselves without enough food to eat. The entire Yellowstone ecosystem had shifted. But then wolves were re-introduced. The food chain began to settle into its former equilibrium. Elk populations were kept in check. Beaver and bison numbers increased. Where wolves were once thought primarily as nuisance animals (and in many cases, still are), conservationists, researchers, and policymakers are increasingly recognizing them for the ecosystem services that they provide.
Similarly, whales were once thought of in terms of the myriad ways in which they entered the consumer marketplace. From the harvest of great whales came meat, oil, whalebone, and spermaceti, a waxy substance found in the heads of sperm whales that was used in candles, ointments, and as a lubricant. But now, they are becoming increasingly recognized for the ecosystem services that they provide. And it's only now, after having begun to recover from a millennium of whaling, that scientists have even been able to notice. Only now can they begin to empirically quantify just how integral whales are to the health of ocean ecosystems.
Header image: Whit Welles/Wikimedia Commons | <urn:uuid:983d0200-aae0-4304-96e0-7461e626d893> | CC-MAIN-2022-33 | https://gizmodo.com/is-saving-the-whales-key-to-mitigating-climate-change-1617032537 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00074.warc.gz | en | 0.961345 | 1,657 | 3.703125 | 4 |
Conceived beneath the skies of the ancient world, the Titans were the incestual god-lineage of Zeus: gigantic creatures who bore names like Oceanus, Themis, Hyperion. The metals then known to man were those purest of elements, and it was some two millenia before titanium would be discovered and used.
With an unmatched strength-to-weight ratio, low thermal conductivity and a tendency to be impervious to corrosion, titanium is indeed a metal of mythical proportions, even to the point of being mythically difficult to work with. Titanium is what we use when we want to physically bond and repair the human body, it is what the hulls and appendages of our deep sea vessels are made of, it is the metal of engines that rocket our ships with ripping heat into space. For many reasons, it is considered nearly invincible, much like the hulkish gods it was named for.
First culled forth from the black sands of the Helford River back in 1791 — a veritable heyday for the discovery of elements — titanium was brought to light by one man and named by another. Reverend, mineralogist and chemist William Gregor knew there was something special about the black magnetic sand he managed to isolate from the wet earth of the Menachan Valley in Cornwall, England. With a magnet and hydrochloric acid, he was able to produce an impure oxide of the new element, though it would never be known by the name he wanted it to have, “mechanite.”
Four years later, a Berlin chemist, Matthew Albert Klaproth, independently isolated titanium oxide from chunks of dark Hungarian rutile. His was the name that stuck, and rightly so. The Titans he conjured with this new name were tough, but they were also condemned by their own father to be held captive in the earth’s crust.
Titanium is the 9th most plentiful of all known elements. In terms of structural metals, it’s the 4th most abundant (following only aluminum, iron and magnesium). It is usually found in ileminite-rich mineral sands (from the Ilmen mountains in Russia) or laced in the rutile of the beach sands of Australia, India, Mexico. Workable deposits can also be readily located in the U.S., Canada, South Africa, Sierra Leone, Ukraine, Norway, Malaysia.
Titanium is highly resistant to corrosion — superior to metals like bronze, brass, copper nickel, both stainless and carbon steel. It’s strength-to-weight ratio is unmatched, having all the strength of steel but less than half its weight. These are amazing properties and indeed, titanium is often called a super metal. But its prevalence in the earth’s crust begs the question: why are products made from titanium so few and far between? The same properties that make titanium super strong, super light and super corrosion-resistant also happen to make it nearly impossible to work with.
FOOTBALL FIELDS AND JET PROPULSION
Titanium would not be isolated to 99.9% purity for well over 100 years after it was discovered. Of all places, the element was finally rendered pure on a football field. It makes sense when we consider that the football field was at the Renssalear Polytechnic Institute in Troy, New York, and located conveniently close to the labs.
The hero was a professor of electrical engineering and instead of a football, his game involved a metal bomb. It would become known as the Hunter Process — a dangerous, explosive method by which titanium chloride is mixed with metallic sodium in an air-tight metal chamber and heated to extremely high temperatures. It’s not entirely practical because it doesn’t yield large quantities of the metal, but it is still used today when titanium of ultra high purity is desired.
It wasn’t until William Justin Kroll developed the Kroll Process in 1948 that titanium would finally be completely unlocked from the earth and useable by man. In an elaborate chemical process full of painstaking breakthroughs, Kroll used the key players of titanium tetrachloride and magnesium. The Kroll Process is still widely used today, and it is what sent the metal into the engines of aircrafts with breakneck speed.
FEARLESS WARRIORS, POOR LAB PARTNERS
Isolating pure titanium is difficult but it is only one part of the grueling process that is conforming this metal to one’s will. It then needs to be bent, welded, machined or molded, all of which are extremely difficult due to the great tensile strength of the metal. The low thermal conductivity, high tensile strength and resistance to forces as corrosive as sea water make titanium one complicated workhorse of a metal.
Machining it is particularly difficult. The metal is almost stubborn, too strong to conform to another’s will. The low thermal conductivity often results in machines wearing down because the heat they’re using is dissipated by the low density metal. Titanium is so hard it’s likely to spring back and away from the blade that’s supposed to be cutting it, and cutting tools often need to be replaced. Large quantities of chemical fluid are needed to cool it down from its 1,600 degree melting point and turnings, fines and chips are instantaneous fire starters. While being worked with, it has a great tendency to fret and gall. Working with titanium requires devotion to science and process. Respect for the lustrous, authoritarian metal doesn’t hurt either — to say nothing of admiration and patience.
THE BODIES WE EXPLORE
Lucky for us all, the stubborn nature of the ore meets its match in the determination of engineers and scientists, and today titanium is used on nearly every front where its properties are needed, from leisure activities to space exploration.
We even use it to rebuild ourselves, to hinge together what breaks down over time in our bones and cartilage, small and large. Titanium screws together bones. From the load-bearing joint of the hip to the hardworking, ever-pumping valves of the heart, titanium is trusted to hold up to the chloride brines and organic acids that comprise the pH of the human body. It seems Adamantium — that indestructible, fictional element used by Dr. Cornelius to fortify the skeleton of Marvel’s Wolverine — may have found its inspiration in this amazingly biocompatible metal.
The low modulus — or stretch — of titanium, when paired with its superior corrosion resistance and strength-to-weight ratio also make it the first choice when it comes to exploring the unthinkable depths of the sea, where nameless creatures amble and deadly pressure reigns. The high-tech submersible, Alvin, is being newly built with a hull of three inch-thick titanium that will allow the vessel to reach depths of 4 miles deep, making all but 1% of the ocean floor accessible to oceanographers.
In the realms of flight and space exploration, titanium allows for maximum payload capability. With its low conductivity of heat and high melting point, it is the ideal way to allow moving parts like jet engine blades and gas turbines to function at the highest level of efficiency.
Though the costly development of this super metal might be delayed because of this Great Recession, we will be seeing titanium in more and more elements of daily life, from bicycles to outdoor supplies, to anything that needs to face the elements and hold its form without rusting or breaking apart. From Frank Gehry’s Bilbao Guggenheim Museum in Basque Country, Spain, to the ocean floor, to wedding bands and bicycles and tools for the backyard, this mythic metal is found in reaches far away, close and dark — whether we talk about the exploration of space or the beating of the human heart. | <urn:uuid:dd27c257-cc51-4136-890b-3292b067a52a> | CC-MAIN-2017-04 | https://www.kaufmann-mercantile.com/field-notes/titanium/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00236-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.94959 | 1,631 | 2.953125 | 3 |
Nickname: State of the Virtuous
Governor: Gboyega Oyetola
Area: 14,875 square kilometres
Size Rank: 28th
Osun was declared a state on the 27th of August in 1991, under the administration of General Ibrahim Babangida. Osun was carved out of Oyo State with Osogbo being its capital. It is boundaried by Ogun to the south, Kwara to the north, Oyo to the west and Ekiti and Ondo to the east. The State is within the tropical rain forest with abundance of resources. Minerals resources found in the State include gold, kaolin and others which are being extracted for the benefit of the State and the people.
The name ‘Osun’ comes from a river that flows through the State. It is symbolic because it serves both spiritual and tourist purposes in the State. The river is worshipped annually by devotees. It is also a tourist spot as people from different parts of the country visit the Osun Groove in Osogbo. The river also provides water for irrigation for the agriculturally rich State.
The State of Osun has 30 Local Government Areas and Ife East Area Office, Modakeke. The LGAs of Osun are: Ayedaade, Ayedire, Atakunmosa East, Atakunmosa West, Boripe, Boluwaduro, Ede North, Ede South, Egbedore, Ejigbo, Ifedayo, Ifelodun, Ife Central, Ife East, Ife North, Ife South, Ila, Ilesa East, Ilesa West, Irepodun, Irewole, Isokan, Iwo, Obokun, Odo Otin, Ola Oluwa, Olorunda, Oriade, Orolu, Osogbo, and Area Office Modakeke. | <urn:uuid:264db451-256e-4717-8e53-381e08b7fe90> | CC-MAIN-2022-33 | https://dawncommission.org/osun-state/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00676.warc.gz | en | 0.946473 | 404 | 2.21875 | 2 |
The practice of women wearing full face veils in northern India is not a trademark of any particular religion. In much of the region, particularly in rural areas, Hindu, Jain, Sikh and Muslim women, especially those who are married, are forced to observe the ritual of veiling the body. A ghoonghat (also called a laaj, chunni or odhni) is one such veil or headscarf that they cover their faces with.
It is greatly debated how this practice evolved to be in this particular region, but what is certain is that the veiling tradition has been in India for centuries. Throughout history more and more women have started to ditch the covering. However, in rural areas and some parts of urban centers, it still prevails.
— snehanjali (@handfulo_luv) October 26, 2016
Manju Yadav, a teacher from Mirzapur in Faridabad, Haryana, has started a campaign to help stop women from covering their whole faces. Her campaign has picked up and spread to 47 villages. The video below by Keep Trending news explains:
The video explains how the practice of ghoonghat is considered a sign of modesty and respect by some villagers. They say that it is important to cover women's faces to show respect for men.
Chander Shekhar, the deputy commissioner from the local administration, has supported the campaign, saying that the practice of ghoonghat affects women's self-respect.
For her part, Yadav says men ask women to cover their faces to keep them under control. “Ask a man to cover his face for a day, he will not be able to do it,” she says.
Many Indians have reacted to this news. Chanchal Mishra wrote on Facebook:
[I]n the name of culture and tradition many such hypocrisy has been practiced for ages now. I was wondering why is the list for men missing when we are blessed to have such long list of illogical customs for women.
In a comment on BBC India's page, Ash Chowdhury explained the practice in further detail:
I'm from this kind of villages where these customs still survive and the veil (ghunghat ) where you don't have to do all the time its only when the lady is married and she is with in her in laws house or in front of husbands relatives
And Kavaseri Vasudevan Venkataraman Iyer opined:
If women want to wear veil let them. If they do not want to wear veil let them. It is ad [sic] simple as that. Men should understand and behave properly and not harass them. | <urn:uuid:d2a4dbe2-227d-4783-9eab-d373916b2707> | CC-MAIN-2022-33 | https://globalvoices.org/2016/10/28/rural-women-in-northern-india-are-challenging-patriarchy-by-removing-their-veils/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571911.5/warc/CC-MAIN-20220813081639-20220813111639-00468.warc.gz | en | 0.976515 | 559 | 2.84375 | 3 |
- 1 What did Shakespeare refer to the Globe Theater as?
- 2 What was Shakespeare’s theater originally called?
- 3 What is the new name for the Globe Theatre?
- 4 Why is the Globe theater Important?
- 5 How much did it cost to watch a play at the Globe Theatre?
- 6 Which is Shakespeare’s longest play?
- 7 What was Shakespeare’s most popular play in his lifetime?
- 8 Who was Shakespeare’s audience?
- 9 Is the Globe Theatre still standing?
- 10 How was the Globe Theatre destroyed?
- 11 What was the impact of the globe Theatre?
- 12 Why is the Globe Theatre so famous today?
- 13 Why is the Globe Theatre called the Globe?
What did Shakespeare refer to the Globe Theater as?
The most famous Elizabethan playhouse ( theater ) was the Globe Theatre (1599) built by the company in which Shakespeare had a stake – now often referred to as the Shakespearean Globe.
What was Shakespeare’s theater originally called?
Shakespeare’s company, the Lord Chamberlain’s Men, was one of several to perform at the Theatre, appearing there by about 1594. A few years later, the Burbages lost their lease on the Theatre site and began construction of a new, larger playhouse, the Globe, just south of the Thames.
What is the new name for the Globe Theatre?
In 1994, the name “Globe Theatre” was used by one of the theatres in Shaftesbury Avenue; to make the name available and to avoid confusion, that year it was renamed as the Gielgud Theatre. The theatre opened in 1997 under the name “Shakespeare’s Globe Theatre”, and has staged plays every summer.
Why is the Globe theater Important?
The Globe was significant in the past because it was part of the English Renaissance, a time when theater and the arts flourished. It was also the place where many of Shakespeare’s plays saw their premieres. While the Globe Theatre was not the first playhouse in London, it was one of the early theaters built there.
How much did it cost to watch a play at the Globe Theatre?
Admission to the indoor theatres started at 6 pence. One penny was only the price of a loaf of bread. Compare that to today’s prices. The low cost was one reason the theatre was so popular.
Which is Shakespeare’s longest play?
The longest play is Hamlet, which is the only Shakespeare play with more than thirty thousand words, and the shortest is The Comedy of Errors, which is the only play with fewer than fifteen thousand words. Shakespeare’s 37 plays have an average word count of 22.6 thousand words per play.
What was Shakespeare’s most popular play in his lifetime?
Hamlet is Shakespeare’s most popular play in modern times, but how did Shakespeare’s contemporaries rate his works?
Who was Shakespeare’s audience?
Shakespeare’s audience was the very rich, the upper middle class, and the lower middle class. All of these people would seek entertainment just as we do today, and they could afford to spend money going to the theater.
Is the Globe Theatre still standing?
There are many replicas and pop-up venues all across the world that seek to recreate Shakespeare’s original performance space. After being closed for the majority of 2020 due to the Coronavirus outbreak, the Globe Theatre reopened in 2021 for tours and performances.
How was the Globe Theatre destroyed?
On 29th June 1613, a theatrical cannon misfired during a performance of Henry VIII and set fire to the thatch of the Globe Theatre, engulfing the roof in flames. Within minutes, the wooden structure was also alight, and in under an hour the Globe was destroyed. Incredibly, only one casualty was recorded.
What was the impact of the globe Theatre?
The role of the Globe Theatre in Shakespeare’s life is significant because the possibility to participate in the theatre’s The Lord Chamberlain’s Men Group and to write plays for the theatre’s performances contributed to the development of Shakespeare’s career as a professional playwright, influenced his personal life,
Why is the Globe Theatre so famous today?
The Globe is known because of William Shakespeare’s (1564–1616) involvement in it. Plays at the Globe, then outside of London proper, drew good crowds, and the Lord Chamberlain’s Men also gave numerous command performances at court for King James.
Why is the Globe Theatre called the Globe?
By May 1599, the new theatre was ready to be opened. Burbage named it the Globe after the figure of Hercules carrying the globe on his back – for in like manner the actors carried the Globe’s framework on their backs across the Thames. | <urn:uuid:8857b871-3f5a-4561-883b-4de7b95d347c> | CC-MAIN-2022-33 | https://42ndstreetcinema.com/theatre/what-did-shakespeare-call-the-globe-theatre.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00471.warc.gz | en | 0.973064 | 1,034 | 3.125 | 3 |
CTRL ultrasonic technology is an integral part the quality control and aftermarket support of a variety of manufacturers.
The UL101 is used within the military and commercial organizations for readiness, routine maintenance, diagnosis and leak detection. Both small and large aircraft, fixed wing and helicopters benefit from using the CTRL UL101.
Boeing - CTRL products are used at various production facilities and for numerous engineers for maintenance and support activities. The Boeing Space Program used the UL101 to test the main landing gear door in which the UL101 found 3 times as many leaks as the traditional methods.
Air Bus/Air France - The Intrinsically Safe UL101 is an approved inspection tool for all maintenance centers. The UL101 is used for quality control and support of A320 and A380 class aircraft.
Lockheed Martin - Due to comprehensive testing and work with NASA and Lockheed Martin, Lockheed designated the Intrinsically Safe UL101 for quality control and aftercare for the new F-35 Joint Strike Fighter. Testing and integration is on-going for legacy aircraft production & support.
Quality Control - cabin pressure, pilot oxygen systems, pneumatic systems (such as reaction control system that controls vertical take-off of F-35 and AV-8)
Boeing - 787 Dreamliner, 737, 767, 777, C-17 Globemaster III
Air Bus/Air France - A318, A319/320/321, A330/340, A380
Lockheed Martin - F-35, C-130J Hercules
Maintenance Centers - cabin pressure, oxygen systems, pitot static systems, hydraulic valves and cylinders, spark plugs (small aircraft), fuel cell leaks, and more
Air Bus/Air France - global service centers
International & Regional Airports
Private Service Contractors | <urn:uuid:8c81431c-8485-44a2-8d08-59df84476fd0> | CC-MAIN-2017-04 | http://www.hotfrog.ca/business/ctrl-systems/ctrl-systems-commercial-solutions-for-aviation-153762 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00337-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.871211 | 370 | 1.609375 | 2 |
NASA marks 25 years since Challenger disaster
CTV.ca News Staff
Published Friday, January 28, 2011 10:24AM EST
Twenty-five years and a generation later, members and supporters of the American space program are remembering the seven crew who perished aboard the space shuttle Challenger.
Families and NASA officials gathered at an outdoor memorial at Florida's Kennedy Space Center on Friday morning, to mark the quarter-century that's passed since the shuttle Challenger exploded, taking the lives of its crew and casting doubt on what had, until then, appeared to be an unflaggingly safe space program.
After launching late in the morning of Jan. 28, 1986, Challenger was bound for six days in space when it exploded just 73 seconds into its flight.
As the world watched events unfold live on broadcast television, the shuttle exploded in a spectacular, careening fireball.
The crew compartment emerged from the blast intact to soar almost 5 kilometres more before plummeting Earthward in a free fall that lasted more than two minutes.
With no parachute, escape system or even protective clothing for the crew, all seven aboard -- including the first schoolteacher and ordinary citizen launched into space, Christa McAuliffe -- had no hope.
Cmdr. Dick Scobee, pilot Michael Smith, payload specialist Gregory Jarvis and mission specialists Judith Resnik, Ellison Onizuka and Ronald McNair were also killed as the eyes of the world watched in shocked disbelief.
Looking back on the events of that day, Canada AM space educator Randy Attwood laments the sense of routine that pervaded NASA's attitude toward shuttle flights at the time.
"It's sad when you look back to know that the engineers knew about the problem that ultimately brought Challenger down," Attwood said in an interview with CTV's Canada AM on Friday, recalling the combination of freezing launch weather and a disintegrating booster rocket O-ring seal that were eventually blamed for the disaster.
"It reminds us that even though it looks like it's straightforward going into space on the space shuttle, it is risky business."
Before the ill-fated Challenger launch, NASA had flown its shuttles into space two dozen times without incident. But that year, delays were frustrating the space agency's goal of launching the shuttle fifteen times in twelve months.
Instead, after the deadly disaster, the program wound up grounded for more than two years.
Seventeen years after the Challenger explosion, almost to the day, seven more astronauts died when a chunk of fuel-tank foam led to the shuttle Columbia ripping apart as it descended to Earth at the end of its mission.
Now, the shuttle fleet is grounded once more as engineers struggle to correct fuel tank cracking they fear could lead to another catastrophic malfunction.
The shuttle Discovery is expected to launch by the end of February, with Endeavour slated to follow in April. Then, Atlantis is slated to mark the official end of the 30-year shuttle program when it's launched into space late in the summer.
Although that final flight will mean NASA no longer has a means of launching its own astronauts into orbit, the agency has yet to announce a replacement. Undaunted, U.S. President Barack Obama announced last spring that the U.S. hopes to send humans to Mars and back in the next twenty years.
Canada's space program, which has long-relied on NASA for carriage into orbit, is planning to maintain its own commitments in space including the upcoming mission of veteran astronaut Chris Hadfield to serve as commander of the International Space Station for three months in 2013. | <urn:uuid:200653b5-bd2b-44a6-a331-c40688ba7244> | CC-MAIN-2016-44 | http://www.ctvnews.ca/nasa-marks-25-years-since-challenger-disaster-1.601418 | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988725470.56/warc/CC-MAIN-20161020183845-00075-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.951724 | 728 | 2.21875 | 2 |
Briefly describe the terms operations management and supply chain.
Answer to relevant QuestionsBriefly discuss each of these terms related to the historical evolution of operations management: a. Industrial Revolution b. Scientific management c. Interchangeable parts d. Division of labor List and briefly explain the four basic sources of variation, and explain why it is important for managers to be able to effectively deal with variation.Why is the degree of customization an important consideration in process planning? 1. Hazel is the operations manager of her business. Among her responsibilities are forecasting, inventory management, scheduling, quality assurance, and maintenance. a. What kinds of things would likely require forecasts? b. ...Name 10 ways that banks compete for customers.
Post your question | <urn:uuid:e21b7c38-bd36-41bc-9286-d3d5f519dc77> | CC-MAIN-2017-04 | http://www.solutioninn.com/briefly-describe-the-terms-operations-management-and-supply-chain | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00076-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.927394 | 149 | 2.796875 | 3 |
Recently, biodegradable materials such as Mg and its alloys have emerged for various implantable applications in orthopedic fixatives and cardiovascular devices (Witte et al., Reference Witte, Kaese, Haferkamp, Switzer, Meyer-Lindenberg, Wirth and Windhagen2005; Staiger et al., Reference Staiger, Pietak, Huadmai and Dias2006). However, there is a lack of knowledge regarding nanoscale corrosion mechanism and biological evaluation method (Nie & Muddle, Reference Nie and Muddle1997; Kim et al., Reference Kim, Kim, Lee and Seok2008; Li et al., Reference Li, Gu, Lou and Zheng2008; Gu et al., Reference Gu, Zheng, Cheng and Zheng2009, Reference Gu, Zheng, Zhong, Xi, Wang and Wang2010). As biodegradable materials dissolve over the implantation period in the living body, various characterizations are required for biological safety evaluation of medical devices, based on a recently revised ISO 10993-1 guideline.
In general, a unique biodegradability of Mg alloy is originated from the corrosion property that Mg atoms are dissolved by the oxidation as a following chemical reaction equation (Staiger et al., Reference Staiger, Pietak, Huadmai and Dias2006):
The evolution of hydrogen gas in the equation can cause a problem when biodegradable metal alloys are used as an implantable device for human body with high corrosion rate because it can induce abnormal gas pockets in the subcutaneous tissue (Witte et al., Reference Witte, Kaese, Haferkamp, Switzer, Meyer-Lindenberg, Wirth and Windhagen2005).
Although it is very important to understand the reaction that affects the biodegradable properties, the detailed corrosion reaction in the Mg–Ca alloy is not revealed yet. Furthermore, as H2O molecules cannot diffuse into the metal's internal area, this corrosion reaction reported by many researchers can be valid only at the Mg surface (Witte et al., Reference Witte, Kaese, Haferkamp, Switzer, Meyer-Lindenberg, Wirth and Windhagen2005; Kannan & Raman, Reference Kannan and Raman2008; Kim et al., Reference Kim, Kim, Lee and Seok2008). On the corrosion mechanism of the Mg–Ca alloy, we simultaneously performed in vivo study showing that the alloy is rapidly corroded by the interdiffusion of O and Ca via the Mg2Ca phase in femoral condyle of the rabbit. However, it did not show direct evidences of how to transport O to the corrosion front.
On the other hand, most studies on biodegradable implant materials have mainly concentrated on using the techniques such as computer tomography and magnetic resonance imaging in order to characterize reaction products at corrosion surface (Witte et al., Reference Witte, Fischer, Nellesen, Crostack, Kaese, Pisch, Beckmann and Windhagen2006). These techniques allow a macroscopic corrosion observation in the living body, but do not provide any information regarding degradation and reaction products in the atomic scale. Thus, in this study, the in vitro corrosion mechanism of the Mg–Ca alloy is thoroughly investigated by using electron microscopy (EM), which allows observation from atomic scale to macroscopic scale simultaneously.
Materials and Methods
Mg and Ca wt% ratio of 90 to 10 were mixed, melted, and cast in vacuum melting furnace in argon atmosphere. For in vitro corrosion test, the cast ingot was submerged into Hanks' solution, which is utilized for simulating body fluid conditions, for 3 h. Then, the pretreated samples for EM observation were investigated by using electron probe microanalyzer (EPMA, JXA-8500F, JEOL, Japan) and backscattered electron detector equipped in focused ion beam (FIB, Quanta 3D, FEI Company, USA) system, including scanning electron microscopy (SEM). For more chemical detail, elemental maps were acquired by energy-dispersive spectroscopy (EDS, equipped in FIB). Transmission electron microscopy (TEM; Titan, FEI Company, USA) observations were performed from special samples prepared by FIB at the front area of corrosion. In particular, electron energy-loss spectroscopy (EELS, GIF866, Gatan, USA) technique was used to confirm the elemental distribution in atomic scale. Lastly, all crystalline phases of corrosion products were identified with selected area diffraction (SAD) analysis.
Results and Discussion
As mentioned in our previous results, the cast microstructure of Mg–Ca 10% alloy in EPMA compositional image of Figure 1a mainly consists of a primary Mg phase and a eutectic phase, which includes Mg phase (lamellar Mg) and Mg2Ca phase (lamellar Mg2Ca). Figure 1b is a cross-sectional SEM image of the sample after submerged in Hanks' solution for 3 h. The lamellar Mg2Ca phase is rapidly corroded into the internal part of Mg–Ca binary alloy so that its corrosion rate was relatively higher than the lamellar Mg phase. On the contrary, the lamellar Mg has a very similar gray color compared with the primary Mg phase as shown in the enlarged inset of Figure 1b. It means that there is no any corrosion phenomenon in the lamellar Mg phase yet. Interestingly, another Mg2Ca phase, named as wrapping Mg2Ca phase indicated by a series of four white-dotted arrows in Figure 1b, exists at the surface surrounding the primary Mg phase. This phase is distinguished from the lamellar Mg2Ca, having the same crystal structure.
As seen in Figure 2, the elemental distribution at the corrosion front was investigated using EDS maps. There are two white-dotted arrows to indicate corrosion direction. Extensive observation of microscopic elemental movement after corrosion indicated that O came into the alloy and most of the internally existing Ca is depleted. That is, the wrapping Mg2Ca surrounding the primary Mg phase and the lamellar Mg2Ca are corroded by interdiffusion of Ca and O. In addition, Mg and O elemental maps in Figure 2b and 2d clearly show the corrosion frontline as shown in Figure 1b. The corrosion rate of the wrapping Mg2Ca is relatively faster than the normal lamellar Mg2Ca, although both have the same crystal structure and chemical composition. The corrosion behavior observed in Figure 2 reveals that in vitro corrosion of the alloy submerged in Hanks' solution seems to be very close with in vivo corrosion (Jung et al., Reference Jung, Kwon, Han, Lee, Ahn, Yang, Cho, Cha, Kim and Seok2012). For detailed examination, we distinguished four regions having different corrosion states and then labeled them from region 1 to region 4. Those labels will be used in TEM observations and EELS elemental maps in Figure 3. The chemical distribution and corrosion state at each region is summarized in Table 1.
a The corrosion state was estimated from scanning electron microscopy/energy-dispersive spectroscopy results.
b Due to the coexistence of calcium and oxygen.
c Due to the interdiffusion of calcium and oxygen.
d The corrosion state was observed by TEM.
O, exist or large amount; ▵, medium or small amount; X, does not exist or rare amount.
From EDS maps of Figure 2, region 1 does not seem to be macroscopically corroded, and both regions 2 and 3 are corroded by O penetration into the wrapping Mg2Ca phase. In those regions, the opposite distribution of O and Ca is very similar to our findings in the previous study, which proposed the interdiffusion mechanism of O and Ca via Mg2Ca phase. However, coexistence of O and Ca in region 2 does not seem to match with our previous findings as it means that Ca can still remain in the area after corrosion. It is attributed to the limitation of SEM observation due to the reaction volume of electron and sample. As shown in Figure 3, therefore, we adopted TEM and EELS observations to discuss in more detail. Lastly, region 4 is considered a perfectly corroded area originating from the wrapping Mg2Ca.
To begin with, we found that the TEM images in Figure 3 show various corrosion states of the Mg–Ca alloy submerged in Hanks' solution for only 3 h. It is a critical point to understand the change of Mg2Ca phase for the knowledge of corrosion behavior in Figures 3a–3d. In Figures 3a, 3e, and 3i, TEM allows us to observe a nanosized crack-like pathway, which is developing at the wrapping Mg2Ca. This nanosized pathway may be the first signal of in vitro corrosion, which nobody finds. In our findings, the pathway propagates along the interface between the wrapping Mg2Ca and the primary Mg, which may contain internal stress by lattice mismatch between two phases or irregular distribution of chemical composition. By the characterization of SAD pattern in Figure 3i showing the pathway tip, the wrapping Mg2Ca phase with a single crystalline structure is transformed to polycrystalline MgO phase. It reveals that the pathway acts as a “highway” for O diffusion. Schematic descriptions in Figures 3m–3p will provide the geographical information of each phase of the specimens for further understanding.
The corrosion pathway shown in Figure 3b became thicker than Figure 3a and clearly contained the higher O concentration, meaning more corroded state. The remaining half layer of the wrapping Mg2Ca keeps the original Mg2Ca state without the change of crystal structure and chemical composition. On the other hand, especially in the corroded layer, Ca in Mg2Ca and O in Hanks' solution are exchanged by the interdiffusion along the crack-like pathway. As a result, nanocrystalline Mg oxide was formed, as shown in a SAD pattern of Figure 3j. In addition, there are a few small holes and CaO phase.
In Figure 3c, showing the region 3, Ca is rarely found on the whole sample and O is perfectly packed into the Mg2Ca phase. There are bigger holes and more amount of CaO phase when compared with Figure 3b. The most corroded area in Figure 3g is transformed to Mg oxide. Its enlarged image and SAD pattern in Figure 3k shows the same results as reported earlier (Witte et al., Reference Witte, Kaese, Haferkamp, Switzer, Meyer-Lindenberg, Wirth and Windhagen2005; Staiger et al., Reference Staiger, Pietak, Huadmai and Dias2006; Li et al., Reference Li, Gu, Lou and Zheng2008; Gu et al., Reference Gu, Zheng, Cheng and Zheng2009). Lastly, Figure 3d, which represents the completely corroded area, no longer contained Ca in the Mg2Ca phase and most area became nanocrystalline MgO as shown in Figure 3l. Figures 3a–3d and 3m–3p obviously show a sequential progress of O diffusion into the wrapping Mg2Ca and the lamellar Mg2Ca through the crack-like pathway. In the final stage of corrosion, the lamellar Mg was also corroded and then transformed to Mg oxide. This was confirmed from a homogeneous contrast of Mg oxide observed in the lamellar area of Figure 3d.
The corrosion rate of the wrapping Mg2Ca phase was always faster than that of the lamellar Mg2Ca phase. We strongly assume that it is due to the internal stress or the chemically different composition between different phases such as the primary Mg and the wrapping Mg2Ca. Such conditions at interface may slightly induce the potential difference and can easily make the crack-like pathway (Jung et al., Reference Jung, Kwon, Han, Lee, Ahn, Yang, Cho, Cha, Kim and Seok2012). The Mg2Ca phase in Mg–Ca alloy is selectively corroded by making the pathway, by generating rapid interdiffusion of Ca and O into the alloy, and then by expanding the corrosion toward the inside of the lamellar Mg2Ca.
Biodegradable Mg–10 wt% Ca binary alloy was cast and was immersed in Hanks' solution for the evaluation of in vitro corrosion. The alloy consisted of a primary Mg phase and eutectic lamellar structure. The lamellar Mg2Ca phase corroded faster than the primary Mg phase and the lamellar Mg phase by the interdiffusion of Ca and O. The in vitro corrosion mechanism was very similar to in vivo corrosion mechanism. In particular, we found a crack-like pathway, leading to the interdiffusion of O and Ca, in the wrapping Mg2Ca phase surrounding the primary Mg phase. Finally, we can expect that all phases existing in the alloy will be transformed into polycrystalline Mg oxide after in vitro corrosion.
This work has been supported by a grant from Korea Institute of Science and Technology project (2E21950), from the Pioneer Research Center Program through the National Research Foundation of Korea funded by the Ministry of Education, Science and Technology (2011-0001704), and from Seoul R&BD program, Seoul Development Institute, Republic of Korea (SS100008). We would like to thank the U&I Corporation from Republic of Korea for their help in providing the alloys and fabricating the specimens used in this study. | <urn:uuid:c1efc437-e6c9-444f-b7a5-6796b244437b> | CC-MAIN-2022-33 | https://core-cms.prod.aop.cambridge.org/core/journals/microscopy-and-microanalysis/article/rapid-in-vitro-corrosion-induced-by-cracklike-pathway-in-biodegradable-mg10-ca-alloy/9D4CBC4B2A1CA6006CDEF90B0EB270BA | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00470.warc.gz | en | 0.909229 | 2,891 | 2.234375 | 2 |
The BBC has announced a season of programming across television and radio to mark the 65th anniversary of Her Majesty The Queen’s Coronation.
The Royal Collection Season will include The Coronation, a new film for BBC One revealing the compelling story of the Crown Jewels and the ancient ceremony for which they are used.
The hour-long documentary will see The Queen share memories of the ceremony as well as that of her father, King George VI, in 1937.
The Crown Jewels form the most complete collection of royal regalia in the world and consist of 140 items, containing 23,000 precious stones.
The Coronation will explore the role and symbolic meaning of the Crown Jewels in the centuries-old coronation ceremony, showing these objects of astonishing beauty in new high-resolution footage.
It will also tell the extraordinary story of St Edward’s Crown, which was destroyed after the English Civil War and remade for the Coronation of Charles II in 1661. It has only been worn by Her Majesty once, at the moment she was crowned.
The film features eyewitness accounts of those who participated in the 1953 Coronation, including a maid of honour who nearly fainted in the Abbey, and a 12 year-old choirboy who was left to sing solo when his overwhelmed colleagues lost their voices.
Charlotte Moore, BBC Director of Content, commented: “It is a real honour to have Her Majesty The Queen revealing her intimate knowledge of the Crown Jewels, and fond childhood memories from when her father was crowned King George VI, in this very special film for BBC One. In her own words, The Queen will bring to life the enduring symbolic importance of the Coronation ceremonies for modern audiences to enjoy.”
Watch the trailer:
Other programmes in the Season will include the four-part Art, Passion & Power: The Story of the Royal Collection on BBC Four (Andrew Graham-Dixon reveals some of the most spectacular works of art in the Royal Collection), Charles I’s Treasures Reunited on BBC Two (Brenda Emmanus explores the Royal Academy’s landmark exhibition Charles I: King And Collector), a concert recorded in the Grand Reception Room at Windsor Castle on BBC Radio 3, and Stories From The Royal Collection on BBC Radio 4 (Dr Amanda Foreman discovers the captivating stories behind works of art in the Royal Collection through documentary material from the Royal Archives.) | <urn:uuid:bb182eef-95e4-40b2-853b-67981b6621a9> | CC-MAIN-2022-33 | https://britishperioddramas.com/news/bbc-celebrates-65th-anniversary-of-the-queens-coronation-with-new-documentaries/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571234.82/warc/CC-MAIN-20220811042804-20220811072804-00077.warc.gz | en | 0.931645 | 500 | 1.734375 | 2 |
DIRECTIONS: Read the assignment prompt. Use the material in the right pane to review the sources and your answers from the Inquiry page, by selecting a source and then using the tabs. Compose your answer in the box on the left. Use the email form to send your answer to your instructor.
ASSIGNMENT: Some books say something like this: "Rosa Parks was arrested for refusing to give up her seat to a White man. African Americans heard this and decided to boycott the buses." But this is a brief description of a complex event. Write a more complete answer to the question: Why did the boycott of Montgomery’s buses succeed?
Use the documents and your background knowledge to support your ideas. Include specific examples and quotes.
COMPOSE ESSAY ANSWER:
REVIEW THE NOTEBOOK:
Bayard Rustin's diary
Bayard Rustin, an African American civil rights activist, traveled to Montgomery to advise Dr. King and support the bus boycott. Though he was eventually asked to leave Montgomery because leaders feared his reputation as a gay Communist would hurt the movement, he kept a diary of what he found.
42,000 Negroes have not ridden the busses since December 5. On December 6, the police began to harass, intimidate, and arrest Negro taxi drivers who were helping get these people to work. It thus became necessary for the Negro leaders to find an alternative—-the car pool. They set up 23 dispatch centers where people gather to wait for free transportation.
This morning Rufus Lewis, director of the pool, invited me to attend the meeting of the drivers. On the way, he explained that there are three methods in addition to the car pool, for moving the Negro population:
2) The transportation of servants by white housewives.
Later he introduced me to two men, one of whom has walked 7 miles and the other 14 miles, every day since December 5.
"The success of the car pool is at the heart of the movement," Lewis said at the meeting. "It must not be stopped."
I wondered what the response of the drivers would be, since 28 of them had just been arrested on charges of conspiring to destroy the bus company. One by one, they pledged that, if necessary, they would be arrested again and again. | <urn:uuid:515e06f5-35da-4cb4-85a1-4b19f064642c> | CC-MAIN-2017-04 | http://historicalthinkingmatters.org/rosaparks/0/assignment/main/source/25/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00182-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.964301 | 474 | 3.390625 | 3 |
LSE Space takes responsibility for satellite and ground operations services in both the German Aerospace Center (DLR) and the European Space Agency’s (ESA) Spacecraft Operations Centre (ESOC).
24/7 satellite and ground segment operations.
LSE Space provides teams of staff to a wide array of customers to support Satellite and Ground Segment Operations on a 24/7 basis. These teams support a variety of mission types including Earth observation satellites, manned missions, geostationary telecommunication satellites and navigation constellations. The tasks undertaken by the teams encompass real time monitoring and analysis of telemetry during contact periods and the transmission of telecommands to the spacecraft. Our experts deal with daily operations and initiate anomaly handling and resolution.
Multi mission operations team.
LSE provided one of the first multi mission operations team in Europe. This approach provided significant efficiencies for the Customer such that four diverse missions were operated by a single operations team, pass by pass, day by day. The LSE Space responsibility included management of the team, satellite operations and training and certification of the staff. Our skill lies in the creation of robust and reliable operations teams for our customers which as a result create efficiencies. | <urn:uuid:9d5f9f95-54e4-4f44-bdab-15a9e04d04b8> | CC-MAIN-2017-04 | http://www.sscspace.com/products-services/engineeringservices/ground-station-engineering-and-operation-1 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00171-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.932406 | 245 | 1.78125 | 2 |
It is sometimes hard to know whether those in power adopt a policy of confusion purposely, or through grand design. When it comes to the flawed policy of data retention on a mass scale, a burden that is bound to fall on telecommunications companies, the problem is most acute of all. What is to be kept? What falls within that broad term metadata?
The Australian Prime Minister, Tony Abbott, a somewhat challenged individual in twenty first century politics, is one such example. Here, dinosaur meets politician, and the result is far from pretty. It is less pretty for the fact that his Attorney-General, George Brandis, is talking another language on the same subject.
Neither seems entirely clear what the subject of metadata constitutes. For Abbott, it is a matter of dealing with “the material on the front of the envelope” while leaving the contents of the letter untouched, a crudely inaccurate analogy if ever there was one. On public channels, Brandis claims that the new proposals on mandatory data retention would require internet service providers (ISPs) to retain “metadata” for up to two years which would include “the web address” of each site visited by the individual user.
Within the Australian cabinet, some dissent has brewed over the subject. The communications minister, Malcolm Turnbull, is irritated for good reason – he is the one left carrying the can and mollifying ISPs over their onerous duties. He wasn’t even invited to Monday’s national security committee meeting.
Turnbull, in an attempt to clear the mud that had invariably slipped into the waters, suggested on Friday that metadata was a matter of difference. In his postmodern retort, a user’s web browsing history would not be part of the captured mix.
There has been some concern expressed that the government was proposing that telcos should retain for two years a record of the websites that you visit when you’re online, whether that’s expressed in the form of the domain names or their IP [internet protocol] addresses – in other words, that there would be a requirement to keep a two-year record of your web browsing or web surfing history.
Turnbull then brought in the traditional card of policing data, denying that the browsing history would be the subject of retention. “What they are seeking is that the traditional phone records that are currently kept, and by some ISPs and telcos for more than two years, that is the caller, the called party – you know, I called you, time of call, duration of call… they want them to be kept for two years.”
But, of course, it does not stop there. The IP address, or as Turnbull describes it, “the number that is assigned to your phone or your computer when you go online by your ISP” is to be retained.
Similar denials on the extent of data capture have also been issued by the Australian Security Intelligence Organisation (ASIO) chief David Irvine, and the Australian federal police (AFP) deputy commissioner, Andrew Colvin. While both were keen to dispel rumours that browsing histories would be captured, they dumped on the idea that warrants were required to access metadata.
As Irvine explained, metadata was already being accessed “for many years”, a process that was bound to continue. Then there was the honourable, reliable office of the Inspector-General of Intelligence and Security (not, of course, a judge or an expression of the law) keeping an eye on “the way we access [metadata].”
Colvin, in an unconvincing attempt to pacify critics, attempted to draw a distinction between metadata, which can be accessed as an “initial investigative tool” and actual content. The latter required a warrant, with its judicial protections.
Australia remains virginal when it comes to matters associated with accessing metadata, with authorities totally oblivious to a scheme of rights and protections to prevent overstretch of power. Even the independent national security legislation monitor, Bret Walker SC, has suggested a warrant system. By all means, store the data, but ensure some means of control when accessing it. Traditionally conservative voices from such organisations as John Roskam of the IPA have also warned that, “Once it happens there is no winding this back. It gives enormous power to the government over people’s privacy. The material will leak. It will be used for purposes not related to anti-terrorism.”
The assumption here is that the authorities will stick to the straight and narrow, refusing to step into the realms of illegality. Sticking to such protocols of propriety is, however, impossible in an age where metadata is the guiding principle of the information age. All governments want to feast on it, and they get rather frustrated when the civil rights lobby remind them that information should not be there for the taking without just and probable cause.
The excuse, as it always tends to be, is also one of blunt pragmatism. Privacy rights, and correlative obligations to respect them, tend to be matters of nuisance to spy chiefs and figures behind the intelligence gathering apparatus. For Irvine, having a warrant for each request for metadata would see “the whole system…grind to a halt.” This is patent nonsense, seeing as an intelligence service operating within the boundaries of warrants and judicial oversight is bound to be better for it. More gaps do not necessarily imply more insecurity or less freedom. It does, in fact, suggest the reverse. | <urn:uuid:8e1ecb18-c676-40ee-b6a7-aa3546cbbc81> | CC-MAIN-2017-04 | http://dissidentvoice.org/2014/08/gluttons-of-information/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00438-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.958373 | 1,128 | 2.03125 | 2 |
When we give a gift, usually that act begins and ends with the gift itself. We usually don’t think about what, if anything, we’ll get out of it. However, charitable gifting allows us to support the causes we hold in high esteem, and in many cases, see a real taxable benefit when all is said and done.
Now, you can always make a gift without claiming it on your tax return. In fact, this ends up being the case for many, particularly those for whom deducting would not be beneficial because charitable deductions need to be itemized. If the value of all your itemized deductions (e.g. your charitable gifts, medical expenses, taxes already paid, etc.) is less than your standard deduction, your gift is still doing all the good for the charity, but you won’t be seeing any real tax benefit from it.
For example, let’s say you’re married filing jointly in 2022 – if the sum total of all your donations, as well as everything else, was under the $25,900 mark, it wouldn’t be worthwhile to itemize. So if you donate with the intent to take deduct the said amount on your taxes, just be wary of whether or not your total itemized deductions exceed that standard deduction. With all that said, let’s take a look at how you can make an eligible charitable gift:
We’ll start by outlining who counts for charitable gifting: For a gift to count, it will need to go to a nonprofit – gifts to individuals, political campaigns, etc. won’t make the cut. So, you can give to a university, but giving your nephew money for his tuition doesn’t qualify. In general, a nonprofit will qualify as a potential charitable organization if they have a religious, educational, literary, charitable, or scientific purpose and 501(c)(3) status from the IRS (think your local church, public school, or library). If you’re unsure, the IRS has a handy tool to look for organizations that quality, which you can use as a resource to vet and research a given charity.
Let’s take a moment to quickly touch on the difference between a charitable gift and something else we’ve talked about before: a Qualified Charitable Distribution. While both of these funding methods go to the same kind of organizations, their tax impact and strategy are different – a QCD is money taken directly from one’s retirement account and given to a charity, which prevents said money from counting as income the way it usually would when you withdraw funds. You do not need to itemize to take advantage of a QCD. It instead nets against your income, which can be a handy way of keeping a Required Minimum Distribution from causing you undue tax grief.
When you’ve confirmed that your org of choice is eligible, the next step is knowing what counts as a contribution. Cash is, all-around, the easiest to give. That’s not to say that you shouldn’t give other items, but determining and filing a non-cash gift can get tricky pretty quickly, depending on the value of the donations (which we’ll dive into below.) So what non-monetary stuff can be donated? Clothes, art, highly appreciated stock, food, raw materials, and much more are all eligible – the tricky bit comes from calculating the value of said donations, and then how you end up claiming them on your taxes –
|Donation:||What You’ll Need:|
|Non-Cash Gift under $250||A receipt from the charity and to have the receipt on hand to file your taxes.|
|Non-Cash Gift of $250-500||A written acknowledgment from the charity 1) describing the item 2) denoting whether the charity provided anything in exchange for the item, and a good-faith estimate of the value of the goods/services if rendered.|
|Non-Cash Gift $500-$5,000||The written acknowledgment above, plus written evidence of its acquisition date, fair market value, cost, etc. You’ll also need to fill out IRS Form 8283.|
|Non-Cash Gift over $5,000||Fill out IRS Form 8283 and obtain the written acknowledgment. You’ll also need a qualified appraisal, which certifies the value of the said item.|
The above represents a rough summary of what is applicable to the most common types of non-monetary deductions. Because this type of donation is near limitless, this table should be considered a guideline that can help you begin to navigate your situation (or, if the above seems a bit convoluted for your taste, it may be the deciding factor in making a gift of cash.)
We mentioned highly appreciated stock before – not everyone has an original Monet in their living room, but it’s a pretty safe bet that you have some appreciated stock in your portfolio, so let’s explore this in a little more detail. There are a number of reasons this is a great idea: the first is that if you donate the stock directly instead of selling it and donating the proceeds, you’re donating up to 20% more than if you had given away the cash. This is because you’re avoiding the capital gains tax associated with the sale, so you can give the charity the entire value of the stock! Another potential benefit is, that if you’re attached to a given stock and want to hang on to it, you can donate some appreciated shares and buy new shares at the current, higher prices, essentially resetting your basis. This lowers future capital gains taxes if the stock continues to grow into the future.
Regardless of whether you end up being able to deduct a charitable contribution on your taxes, ultimately the gift itself will be doing the same amount of good for whoever you donate it to. So, the next time you support a cause you believe in, feel free to reach out to us to see whether or not it might make sense to factor it into your taxes – but know that either way, it will simply be the cherry on top of an already wonderful deed. | <urn:uuid:8531c3a3-97c8-4fd6-bc94-975afc3e9a54> | CC-MAIN-2022-33 | https://gdpinc.com/2022/04/01/charitable-giving/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00066.warc.gz | en | 0.9428 | 1,282 | 1.609375 | 2 |
Clinton R. “Bob” Moorman, Jr., Major (ret) US Army, passed peacefully at home with his family after a lengthy battle with Alzheimer’s. Bob was a 43 year resident of Hampton, VA. He was born in Cincinnati, Ohio in 1924. Shortly after his birth, the Moorman family moved to the Far East where they lived in Manila, Philippines and Shanghai, China. Upon his father’s death in Shanghai, Bob and his mother returned to Columbus, Ohio, his parent’s home.
Bob left Hampton Institute during World War II and entered the US Army, segregated at that time, as an enlisted man. He was assigned to a transportation (trucking unit) which later was part of the all Black “Red Ball Express”, which delivered ammunition, fuel, food, and medical supplies to the Patton’s Third Army during and after the Normandy invasion. The unit battled the German Army on the route in their attempts to cut off supplies to Allied troops. The unit returned to their base with the dead and wounded. After the war, he returned to Hampton to finish his studies.
In 1948 after completing the Officer Training Course, Bob was commissioned as a 2nd Lieutenant and assigned to the famed 24th Infantry Regiment, the Buffalo Soldiers. Stationed in Japan, the 24th was one of the first units sent to Korea at the outbreak of the war. His unit was in the Battle of the Chosen Reservoir when the 250,000 Chinese troops entered the Korean War. He was awarded the Bronze Star and Purple Heart during the conflict.
After the war, he returned to the States continuing his military career and being involved in the Armed Services Football League where different branches of the military had post teams which travelled between military bases. In early 1960s he was assigned to the 7th Special Forces “Green Berets” and stationed in Bad Toelz, Germany. He retired from the Army in 1966.
His new career was athletics, both collegiate and professional sports. After a short stint as head coach at Wiley College, he was hired by the San Diego Chargers as the East Coast Scout. As he continued his career, he became the first full time Commissioner for the Central Intercollegiate Athletic Association (CIAA) in the 1970s. During his tenure with the CIAA, Bob served on a number of national committees: President of the NCAA College Division Commissioners’ Association, NCAA Athletic Steering Committee, NCAA Council, Division II Football and Basketball Committees, NCAA Professional Liaison Committee, and the National Association of College Directors of Athletics. He represented the NCAA and United States at the first Goodwill Games in the Soviet Union. He was past president of the Virginia Sports Hall of Fame and the Peninsula Sports Club. He was a life member of the Alpha Phi Alpha Fraternity. Bob’s last position was a college official scout for the National Football League.
Bob is survived by his wife of 63 years, Tamiko of Hampton, VA; Son, Clinton (Bob) R. III (Elizabeth) of Bahama, NC; Daughter, Kathy Epps (Keith) of Hampton, GA; five grandchildren; and three great grandchildren.
A memorial service will be held 1:00 PM, Saturday, September 13, 2014 at the Hampton University Memorial Church.
Memorial contributions may be made in lieu of flowers to the Alzheimer’s Association
Southeastern Virginia Chapter; 6350 Center Drive, Suite 102; Norfolk, Virginia 23502
Friends are encouraged to visit www.parklawn-woodfh.com to share memories and words of condolence with the family.
Arrangements are under the care of Parklawn-Wood Funeral Home, 2551 N. Armistead Ave., Hampton, VA 23666.
Tonight is the BCS National Championship in College Football and it’s truly a toss-up between the Pac-10 Champion Oregon Ducks and the SEC Champ Auburn Tigers.
Auburn has Heisman Trophy winner Cameron Newton at quarterback and a standout on defense in lineman Nick Fairley. Oregon is the led by their combo of RB LaMichael James and QB Darron Thomas, who helped the Ducks put up nearly 50 points per game. These are two prolific offenses and it’s shaping up to be a shootout.
Winning the turnover battle along with whichever defense and special teams unit can make a game-changing play could decide the outcome here. Both teams entered the season outside the Top 10 in the preseason polls, so neither was expected to get this far, and ecah has overcome some adversity, rallying in the fourth quarter for some victories, especially Auburn. And some could make the argument that the nation’s best team is not playing in this game as last year’s Champion Alabama was very impressive in its bowl thrashing of Michigan State, and likewise for TCU, who finished undefeated and beat Wisconsin in the Rose Bowl, as well as Stanford, which took care of business in convincing fashion against Virginia Tech in the Orange Bowl.
But it’s Oregon and Auburn, two unbeaten teams that have put up outstanding numbers and navigated its way through some challenging tests to reach the title game in Glendale, Arizona.
In the end, I like…
Pick: Oregon 38, Auburn 34
It’s shaping up to be another exciting Saturday of College Football action with plenty of good games on the slate – highlighted by #1 and defending National Champion Alabama visiting #10 Arkansas along with Stanford taking on Notre Dame and capped in the evening with Oregon State versus Boise State on the Blue Smurf Turf in one of the more interesting West Coast games of the year to date.
So far some early thoughts…
It’s the first quarter and Arkansas already leads Alabama 7-0 in the first quarter with the ball. Looks like my Upset Pick of the Year in College Football isn’t looking too bad (I had Arkansas not only +7.5 but winning outright 34-28 over the Tide). Ryan Mallett drove the Razorbacks offense right down the field for a touchdown, taking up only 50 seconds in two plays, while Alabama went 3 and out. This game is far from over though because I expect the Tide defense to adjust and the run game with Heisman Trophy winner Mark Ingram and Trent Richardson to get going, plus Greg McElroy to strike for a couple big plays through the air to Julio Jones, who could be the next Michael Irvin once he gets to the pros.
Other games of note… how about NC State today against Georgia Tech? Quarterback Russell Wilson is only about 5-foot-11 and not an NFL prospect, but the Al Groh coached defense of the Yellow Jackets made him look like Michael Vick. Wilson is shredding defenses apart, including Cincinnati last week, and the Wolf Pack certainly appear to be a darkhorse candidate to win the average-at-best ACC this year. NC State also deserves to be ranked, somewhere in that 21-25 range, when the next polls come out. Wilson threw for a career-high 368 yards and 3TD’s (so maybe he was closer to Drew Brees than Vick today) as they put up a very impressive 45 points on Ga. Tech.
Michigan’s offense was sensational too, albeit agaisnt a Bowling Green team that isn’t all that strong. The Wolverines torched the Falcons for 65 points in a game where Heisman front-runner Denard Robinson was injured.
… Back later with more thoughts!! | <urn:uuid:fb1ffbd0-64f3-4256-a985-250b4a6c3d21> | CC-MAIN-2017-04 | http://matthewhatfield.com/blog2/category/college-football/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281574.78/warc/CC-MAIN-20170116095121-00026-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.969649 | 1,544 | 1.578125 | 2 |
In April 2011, Half Moon Bay, Calif.-based Odwalla Inc., a Coca-Cola company, became the first company to transition its single-serve offering – which represents more than 80 percent of the company’s total business – to a new and sustainable package made of up to 100 percent plant-based materials (minimum of 96 percent) while still maintaining its 100 percent recyclability. Additionally, Odwalla reduced the single-serve bottle’s size from 15.2-fluid oz to 12-fluid oz.
Developed by Coca-Cola, the PlantBottle consists of HDPE plastic made of up to 100 percent plant-based materials derived from sugarcane and molasses, a by-product of sugar production. Manufacturing the new plastic bottle is more environmentally efficient as well. A life-cycle analysis conducted by Imperial College London indicates the PlantBottle with 30 percent plant-base material reduces carbon emissions by up to 25 percent, compared with petroleum-based PET.
(Earlier this year, Coca-Cola opened the world's largest plastic bottle-to-bottle recycling plant in Spartanburg, S.C., which produces approximately 100 million pounds of recycled PET plastic for reuse each year -- the equivalent of nearly 2 billion 20-oz Coca-Cola bottles.
Helping to cut the plant’s carbon footprint by an estimated 35 percent, Odwalla recently completed the installation of five fuel cells operating on redirected bio-gas at its juice packaging plant in Dinuba, Calif. Through its annual Plant a Tree program, Odwalla has donated $350,000 worth of trees to state parks across the country to support reforestation and planting initiatives over the last three years.
Less than 1 percent of the by-products of Odwalla’s packaging plant in Dinuba goes into landfills. Pulp, peels and cullage are used as livestock feed; plastic and cardboard are baled and recycled; and worn-out equipment and other metals are sold as scrap. And most of the fresh produce Odwalla uses is locally grown.
“The PlantBottle packaging represents a significant step in Odwalla’s ongoing sustainability efforts to protect our planet,” said Alison Lewis, president, Odwalla. “Since the brand’s inception in 1980, it has maintained a very simple vision: Make great juice, do good things for the community, and build a business with a heart. Such a simple vision has proven to have a large impact, especially when supported by a guiding principle of respect – respect for our consumers who rely on us for nourishing beverages, and respect for our earth on which we rely for holistic nourishment.” | <urn:uuid:d9c8c517-6f05-48d8-9e4b-6dddf25fcd09> | CC-MAIN-2016-44 | http://www.foodprocessing.com/articles/2011/odwalla-plant-based-bottles/?CMP=ILC-rss | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719646.50/warc/CC-MAIN-20161020183839-00128-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.937969 | 559 | 2.578125 | 3 |
This week, Friday Feedback takes a second look an analysis that found no lives saved from annual mammograms.
To do that, we reached out to a diverse group of actual healthcare providers by email and asked them to respond to the following question:
How will you discuss these latest findings with your patients?
The participants this week:
Diana L. Bitner MD, director, Women's Health Network at Spectrum Health in Michigan
Kristin Byrne, MD, chief, breast imaging, Lenox Hill Hospital in New York
Margery Gass, MD, executive director, The North American Menopause Society
Laura L. Kruper, MD, co-director of the Breast Cancer Program and director of the Rita Cooper Finkel and J. William Finkel Women's Health Center, City of Hope
Donald Northfelt, MD, co-medical director, the Breast Clinic, Mayo Clinic in Arizona
Richard Wender, MD, chief cancer control officer, American Cancer Society, and a practicing family doctor and former chair of the department of family and community medicine, Thomas Jefferson University
Guidelines In Question
Margery Gass, MD: “This study certainly challenges current screening practices. The finding that a thorough clinical breast exam resulted in a mortality rate equivalent to annual mammograms should prompt serious review of all current breast cancer screening guidelines. Many European countries already screen with mammograms every two years instead of annually.”
Diana Bitner, MD: "I will continue to follow current guidelines. I look to my colleagues for guidance from clinical trials but have not seen enough yet to change my day to day management."
Donald Northfelt, MD: "It is certainly reasonable to continue to follow guidelines developed by respected organizations who have based their recommendations on the preponderance of scientific data related to screening. The American Cancer Society (ACS), the Mayo Clinic, and the U.S. Preventative Services Task Force, among others, provide very similar recommendations regarding mammographic screening based on these data. Insurers largely follow these guidelines in providing coverage for screening."
Richard Wender, MD: "This latest publication is just a longer-term follow-up of a study that was completed over a decade ago, so the fact that they did not find a benefit from mammograms is not new."
Laura L. Kruper, MD: "This study does not change my view. Eighty percent of breast cancers are spontaneous, so there's really no way to determine who is at risk and should be getting regular mammograms."
40 and Over
Kristin Byrne, MD: "It's hard to ignore these headlines and controversial studies, but women need to have a mammogram every year starting at age 40 because the information provided is very misleading because they aren't given the whole picture or, in this case, the study is just not a valid study."
Kruper: "The American Cancer Society has already issued a statement (in response to this study) that they still recommend annual screening starting at age 40."
Northfelt: "These guidelines generally include initiating screening between ages of 40 and 50, conducting screening every year or two, and discontinuing screening above age 75. Within these broad parameters I would think that every thoughtful patient and physician would find a comfortable process that they could follow."
Bitner: "I recommend annual mammography over age 40 as well as a physical exam, self breast exam, and a healthy lifestyle including fewer than 12 servings of alcohol per week and for her to maintain a healthy body weight. If she has higher than normal risk factors, such as extremely dense breasts or a family history of pre-menopausal breast cancer, I recommend advanced screening."
Wender: "For my healthy patients age 40 and over, I recommend a mammogram every year. All of the major guideline groups looked at this and many other studies and agree that screening all women over age 40 is associated with at least a 15% reduction in risk of dying from breast cancer. The bottom line is that having a mammogram every year, as recommended by the American Cancer Society, is the best way to avoid a premature death from breast cancer."
Kruper: "The researchers only looked at mortality rates, and the problem with that is that our treatments are so good now that a woman presenting with later-stage disease might do as well as a woman who has earlier-stage breast cancer because of the better treatments. The study does not look at morbidity. With breast cancer caught at earlier stages, there is often less-aggressive surgery, perhaps no chemotherapy. That really matters, because chemotherapy can have life-long effects on people."
Byrne: "Many experts have discounted this study as a valid screening study for innumerable reasons. They used secondhand mammography units which were not state-of-the-art in the 1980s, never mind they would never pass inspection today. The technologists weren't trained to properly position the patients, and the radiologists were not specifically trained in mammography. The average size of the breast cancers they detected on a mammogram were so big, I could see them across the room on a mammogram today. This just goes to show how invalid this study is."
Northfelt: "It is probably worth considering that the continued healthy debate about the value of screening mammography illustrates the fact that screening of large populations with overall low risk for disease can never be flawlessly efficient and will always operate at the margin of usefulness. I believe that the controversy about mammographic screening offers us an opportunity to look more specifically at individual needs for screening. Mammographic screening can be individually designed for each patient based on careful discussion between the patient and her physician, the context in which the most appropriate approach for her can be developed."
Byrne: "There's always going to be a controversial study or headline news that will get out to the public and confuse people or even educated professionals as to what's true. The bottom line is we know screening mammograms save lives. Early detection saves lives. Everything is also not about prolonged survival. It's also about quality of life. If you detect breast cancer at an early stage, it may mean no chemotherapy or less chemotherapy or less surgery which can be physically disfiguring. It's better to just ignore the headlines and have a mammogram every year. There has also never been a study showing a mammogram every year has caused breast cancer or any other type of cancer because there is such little radiation."
Bitner: "We are just getting to a point of getting disparate populations into primary care and prevention; I fear changing the guidelines prematurely will scare those women away who have just come forward to be screened. Over time, I look forward to knowing more about the right test and treatment for the right person at the right time."
Northfelt: "Could we somehow do this better if we were more specific about who we screen and how often we do it? Unfortunately, guidelines do not allow us to provide highly personalized recommendations for individual patients, but rather are expressions of broad policy for large populations. Screening can only be personalized when individual patients and their physicians look carefully at each patient's unique circumstances. The renewed discussion of the guidelines will be of greatest value when it is viewed as an opportunity to think creatively and specifically about the circumstances of the individual patient. Mammographic screening can be individually designed for each patient based on careful discussion between the patient and her physician, the context in which the most appropriate approach for her can be developed."
Work in Progress
Wender: "Mammograms are not perfect. They certainly can lead to some needless worry -- since most abnormal mammograms do not lead to a diagnosis of breast cancer. We are now learning that there are some cases of breast cancer that may never progress to cause harm, even though we treat all breast cancers as if they can cause harm or even death."
Northfelt: "An important idea coming out of the commentary related to this report was the fact that breast cancers discovered as a result of provider physical exams or patient self-exams led to successful outcomes of breast cancer treatment which may have overcome the fact that screening mammography did not detect the cancers first. The point of this observation is that in recent years our treatments for breast cancer have become more successful, to the point where the majority of women diagnosed with breast cancer by whatever means will survive their disease."
Friday Feedback is a feature that presents a sampling of opinions solicited by MedPage Today in response to a healthcare issue, clinical controversy, or new finding reported that week. We always welcome new, thoughtful voices. If you'd like to participate in a Friday Feedback issue, reach out to email@example.com or @elbertchu.
UPDATE: This article, originally published Feb. 14, 2014, at 2:30 p.m., was updated with new material (Feb. 14, 2014, at 5:25 p.m.). | <urn:uuid:99a37bac-30ce-46ed-98bc-5672d116205d> | CC-MAIN-2017-04 | http://www.medpagetoday.com/HematologyOncology/BreastCancer/44317 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00447-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.961197 | 1,819 | 1.9375 | 2 |
Scroll of teleportation
(Redirected from Scrolls of teleportation)
|A scroll that translocates the reader to a random position after a short delay.|
Reading a scroll of teleportation will cause the player to teleport to a random location after several turns have passed, inflicting the Tele status before it happens.
You feel strangely unstable.
The actual duration depends on where you are, and if you have the Orb status:
|In the Realm of Zot or when carrying the Orb||8-14 turns|
|In the Abyss (even when carrying the Orb)||8-19 turns|
- Keep in mind that the teleport is entirely random. If you are attempting to escape a dangerous situation, there is a chance that you only teleport a few tiles away, or even into a whole new can of worms!
- If necessary, you can read a second scroll of teleport while a teleport is pending to cancel it and keep you in place. Teleport scrolls are very precious, so evaluate the necessity of consuming a second scroll:
You feel strangely stable.
- A potion of cancellation will also end a teleport (along with any other effects you may have).
- Monsters with Quicksilver Bolt can also cancel your teleportation, whenever you'd like it or not.
- Prior to 0.19, scrolls of teleportation worked normally in The Realm of Zot, before picking up the Orb of Zot.
- Prior to 0.17, it was possible to perform controlled teleports.
- Prior to 0.17, there was a 20% chance that the Abyss would not add time to teleportation.
- Prior to 0.13, controlled teleports did not have a longer delay. In older versions, the Orb did not add time to teleportation.
- spl-transloc.cc:743 (0.28.0)
|Acquirement • Amnesia • Blinking • Brand weapon • Enchant armour • Enchant weapon • Fear • Fog • Holy word • Identify • Immolation • Magic mapping • Noise • Silence • Summoning • Teleportation • Torment • Vulnerability| | <urn:uuid:74b59ddd-9485-4da4-9e72-e845bdfbe2a8> | CC-MAIN-2022-33 | http://crawl.chaosforge.org/Scrolls_of_teleportation | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570977.50/warc/CC-MAIN-20220809124724-20220809154724-00469.warc.gz | en | 0.846049 | 462 | 1.546875 | 2 |
Recycled 1/72 Airfix Hawker Harts and Demons
by Brian Baker
I like to refurbish old models. This involves taking old, scrapped models built years ago, and breaking them apart and soaking them in automotive brake fluid to remove the paint, decals, and old glue. Once the models are processed, they are ready to be rebuilt and restored to life.
Why, you might ask, would any rational person do this when you can just build a model straight from the box? The answer is that we are all insane to a certain degree, some more than others, and I couldn’t see just wasting some of those old models—they deserve a second chance. So several months ago, I went into my old model scrap box and picked out a number of old Airfix Hawker Hart and Demon models that I would rebuild, just to see if it could be done. The answer was that it can, but it is a lot of work.
I should mention at this point that the Airfix kit was not the first 1/72 issue of the Hart series. Before the war, the old Frog Penguin series included a model of the Hawker Hind Trainer, which had two pilot-type cockpits. It is very similar to the Airfix Hart kit in most repects. Some of these have been reissued, and I have one of these. For its day, it was a masterpiece.
There is a lot of material available on the Hawker series of bombers, fighters, and army-cooperation types. Probably the best source of information is the Mushroom edition of “The Hawker Hart Family” by Alex Crawford. This book has photos, 1/72 scale drawings, color profiles, and detail photos of restored examples displayed throughout the world. The old Profile Publications on the Hart and Audax are also useful. You will need three views and detail photos to do anything serious with these old kits.
The Hart series was built in numerous variations, differing primarily in cockpit configuration, armament, and powerplant. When the original Hart outran the RAF’s current fighters, a fighter version, the Demon, quickly appeared. This was followed by the Audax, an army cooperation type, and other variants were eventually developed for the RAF, Royal Navy, and foreign air forces. These include the Osprey for the Navy, and the Audax, Hardy, Hind, Hector, and Hartbeeste for the RAF. Foreign users included Afghanistan, Belgium, Egypt, Erie, Estonia, Iraq, Latvia, Persia, Portugal, Spain, Sweden, Switzerland, and Yugoslavia. Swedish Harts were used in Finland by volunteer units against the Soviets during the Winter War, and some Latvian, Estonian, and Persian Harts were captured and flown by the Russians. There were numerous powerplants involved also, both liquid cooled in-line engines and air cooled radials. With this great variety, it is possible to build twenty or thirty models of the series without duplication.
Many years ago, I believe in the fifties, Airfix produced a series of 1/72 scale models of British aircraft, of such airplanes as the Gladiator, Spitfire, Hurricane, Lysander, and many others. One issue that was probably one of the better ones was the Hawker Hart bomber. In those days, there was no cockpit detail, and other features were sometimes crudely done, but the Hart had fairly nice detail, especially on the fuselage exterior. The one feature of the kit that makes it valuable is the exterior cockpit detail, with the pilot’s and gunner’s positions in the form use by the Hart. Many years later, probably in the early seventies by my failing memory, Airfix reworked the molds to produce a pretty competent kit of the Hawker Demon, the fighter variant. Not only did they modify the fuselage and rear gunner’s position, but they also reworked the wings and tailplane, adding rib detail and some of the protrusions common to biplanes of that era. They also provided a new gun-mounting ring, and the Lewis gun was a little better. The Hart kit had flush exhausts common to that series, while the Demon kit has the long stacks typical to the Demon. However, no more Harts kits were produced, making this a collectors’ item. Burns’ 2003 “Plastic Aircraft Kits of the Twentieth Century” lists the Hart at $15-20, and the price has probably gone up since then. So if you have any, hang on to them. There are some kits of the types currently available, including A-Model’s Hector and Osprey, but even though they have much more detail, I’m not convinced that they are really that much better than the old Airfix kits. Now maybe the new Airfix management might see fit to reissue the kit to modern standards, like they did with some of their current reissues. That would be something to look forward to.
I had approximately five or six scrapped Harts and Demons to start with, plus an additional seven unbuilt kits. I had already built five kits a few years back, so I decided to do two Harts and two Demons. One of the scrapped kits was the Swedish version with the Bristol Mercury engine, which was taken from a Frog Westland Wallace kit, another very nice old kit that can be built with a variety of engines. I began by disassembling the models, soaking them in brake fluid to remove the paint and glue, cleaning up the parts, and rebuilding them. For details, see my previous article on recycling old kits. With all of the models, I built up interiors based on photos from the Crawford book. Since I was doing four models at once, this was done on almost a mass production basis, although the interiors of the Hart and Demon kits were slightly different. They all required removal of the interior pegs and “seats” so that sidewall detail could be constructed. I scratchbuilt the seats and instrument panels, and fabricated control sticks with those little rings on top so peculiar to British aircraft of that day. I found some small metal rings in a craft store that worked out perfectly.
In the past, when I built a Hart, I replaced the wings from those from a Demon because of the better detail, but after looking at the wings from both kits, I concluded that the Hart’s wings and tailplane were probably a little underdetailed, while the Demon units were overdone. This makes both units acceptable, so the models are pretty much stock. They are interchangeable, however, and Demon parts can be used on the Hart, and vice versa.
I did all four models at the same time, and each stage was done on all four models. Once the cockpits were detailed, the fuselage halves were joined and the seams filled in. The lower wings were attached to the fuselage, along with the tailplanes, and at that stage, after suitable preparation, I painted the airframes. Once the kits were painted, I assembled the upper wings and landing gear. I usually do biplane wings by attaching the outboard “N” struts first before installing the upper wings. Then, I measure the inboard cabane struts and glue them in place.
Once the main assembly was done, I applied the decals and markings. Decals from the spares box were used for most markings, but I did my RAF, RAAF, and RNZAF serials on the computer. Once the decals were in place, I did the final detailing, such as control horns, steps, and other specifics. I used my technique of unstranded electronic wire for rigging and control cables, installing the wires in order so that the next ones could be attached without fishing them through and behind the wires already installed. Last, the radio antenna wires were put in place, and the models were then finished.
If you’ve never tried an Airfix Hart or Demon, I’d certainly suggest that you try one. They are very basic kits, but with a little time and effort, a first class model can be built. And besides, every 1/72 scale model collection should had at least one of these beautiful little biplanes in place. And the Demons are so readily available. Maybe they will reissue or retool the kit. Are you listening, Airfix?
If you would like your product reviewed fairly and fairly quickly, please contact the editor or see other details in the Note to Contributors.
Back to the Main Page
Back to the Review Index Page
Back to the Previews Index Page | <urn:uuid:bf640fee-9370-465e-b459-8791f20bba62> | CC-MAIN-2022-33 | http://modelingmadness.com/review/preww2/gb/bakerhd.htm | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00668.warc.gz | en | 0.976221 | 1,827 | 1.53125 | 2 |
To further understanding of demand and supply influences on the economic sustainability of health and care systems by using research evidence to co-design solutions and evaluating initiatives to increase economic sustainability.
The theme is addressing the management of demand and sustainability of health and care services, as well as financial and workforce sustainability, in the face of well-known pressures on the health and social care systems.
- To contribute to the design of the Person-Centred and Community Approaches programme, which will focus on alternatives to formal care. The programme will involve social prescribing and community asset development to address loneliness, low levels of mental health, isolation, and debt management.
- Support the GMHSCP's proposals for further devolution from April 2021 through reviewing the perverse incentives and unintended outcomes of national performance targets. | <urn:uuid:668718e4-87d7-44c7-b672-9382c4b7674e> | CC-MAIN-2022-33 | https://arc-gm.nihr.ac.uk/economic-sustainability | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00678.warc.gz | en | 0.928655 | 167 | 1.851563 | 2 |
An efficient and computationally attractive localization algorithm under large equal radius scenario
Metadata[+] Show full item record
A wide variety of applications have been developed based on source localization in areas like sonar, radar, global positioning system (GPS), wireless sensor networks, emergency response and human-computer interactions. Accurate source localization has gained much research interest in recent years, motivated by the rapidly increasing demand for services and systems that depends on accurate location estimations. We give a review of the basic techniques and positioning methods in the field of source localization. We introduce the Large Equal Radius (LER) scenario based on satellite geolocation problem. Here we propose a computationally friendly and efficient estimator based on TDOA measurements under LER scenario. The performance of the proposed estimator is analyzed, and it's shown theoretically that the position covariance matrices can approach the Cramer-Rao Lower Bound (CRLB) when the LER conditions are sufficiently satisfied. Simulation results are included and assessed by comparing with the CRLB. We also analyze the performance degradation due to the presence of sensor position error, and take them into account in the proposed estimator. The proposed estimator can eventually improve the source location estimate accuracy and reach the CRLB when sensor position errors are small. Theoretical developments are provided and simulations are included to evaluate its localization accuracy. | <urn:uuid:0ad235b0-5f77-4bce-9f8f-6ab607da0ee8> | CC-MAIN-2017-04 | https://mospace.umsystem.edu/xmlui/handle/10355/49133 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00342-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.921203 | 278 | 1.828125 | 2 |
Music Therapy for Multiple Sclerosis
Beyond the long list of medications and physical rehabilitation techniques used to help people with multiple sclerosis (MS), there’s another kind of treatment that may offer relief: music therapy. Music has been shown to make a difference in the lives and well-being of people with MS in many ways. The best part is that you don’t have to have any musical skills or ability—just an openness to discover how music can benefit you.
Improving Coordination and Movement
Music therapy teaches you to match your body’s actions with a rhythmic beat. This can help you boost your coordination, endurance, and concentration. It can also lead to a more even gait.
At Your Appointment
What to Ask Your Doctor About MS
“Music therapy often involves using instruments in a group setting,” says Al Bumanis, a board-certified music therapist in Silver Springs, Maryland. “But it’s not about creating great music. It’s the physical motions and coordination involved in making music that can have significant benefits for individuals.”
Even if you’ve lost some physical ability and can’t play an instrument, adaptive devices—such as a synthesizer on an iPad that works by fingertip touch—can still allow you to participate in music-making.
Music can also help people with MS who experience changes with memory. It is a powerful tool. Unlike with speech, your brain almost never loses the ability to process music.
“In this way, music therapy can make a big difference in your quality of life,” Bumanis says. “Despite the memory changes you may be experiencing, when you’re able to sing a song that’s rooted in your memory, it makes you feel like yourself again.”
The relationship between music and memory is a complex one. For instance, the part of your brain that fires when you hear music is linked to the part of your brain where your long-term memories are stored. As a result, listening to music can elicit certain feelings associated with those memories. It can help you recall moments you may have thought were lost. In addition, learning a new physical skill, such as playing an instrument, improves your memory by building new brain connections.
Easing the Emotional Effects of MS
Many people with MS experience depression, anxiety, fear, and stress from time to time.
“Music therapy opens the door for emotional expression,” Bumanis continues. “Music is often a way of accessing those emotions that may be difficult to verbalize.” Certain types of music can also help improve your mood and relax your mind.
If you’re interested in learning more about music therapy or locating a credentialed music therapist near you, visit the American Music Therapy Association.
Music has been shown to make a difference in the well-being of people with MS.
Music therapy teaches you to match your body’s actions with a rhythmic beat. This can help boost your coordination, endurance, and concentration.
Listening to music can elicit certain feelings associated with memories, helping you recall moments you may have thought were lost.
- Playing and listening to music also has been shown to help people cope with fear, stress, and depression.
Healthgrades Operating Company, Inc. All rights reserved. May not be reproduced
or reprinted without permission from Healthgrades Operating Company, Inc. Use
of this information is governed by the Healthgrades User Agreement.
- FAQ’s. American Music Therapy Association.
- Music Therapy in Multiple Sclerosis. American Music Therapy Association. (http://www.va.gov/MS/articles/Music_Therapy_in_Multiple_Sclerosis.asp); | <urn:uuid:9a47151e-9bba-4754-8eaa-46952c3ccbb7> | CC-MAIN-2016-44 | http://healthguides.healthgrades.com/managing-multiple-sclerosis/music-therapy-for-multiple-sclerosis?did=t9sum_spec19 | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721555.36/warc/CC-MAIN-20161020183841-00178-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.932913 | 783 | 2.921875 | 3 |
World's largest wind turbine test facility aims to resolve stresses of more wind generation
Clemson University created what it calls the world's largest 15-megawatt (MW) Wind Turbine Drivetrain Test facility to create new technologies for the energy market. The facility, which opened November 2013, uses National Instruments (NI) integrated hardware and software tools.
The U.S. Dept. of Energy expects wind power to meet 20% of U.S. power needs by 2030 (up from 4.2% today), which requires advancing the technologies used to develop and test wind turbines and their interactions with the power grid. Using NI integrated hardware and software tools, Clemson University unveiled the world's largest 15 MW Wind Turbine Drivetrain Test facility in November 2013 to help design and test new technologies for the energy market. The facility has expanded to include a grid simulation lab so manufacturers can test the mechanical and electrical characteristics of wind turbine machines in a controlled environment. With this advanced testing center, companies can test any utility scale distributed energy resource, up to 15 MW, while checking the reliability and robustness of the equipment, before deploying it to the actual power grid. This approach, known as power hardware-in-the-loop (HIL) testing, can accurately mimic the dynamic behavior and interaction between the grid and the device under test while it's running full power. However, because the grid is simulated, the response of the equipment can be validated in a complete range of simulated test conditions that would be impossible to produce using the actual power grid, National Instruments explained.
Successfully integrating wind power into the existing electric power grid is a complex challenge that relies on distributed, interconnected cyber-physical systems (CPS), which are proliferating within the engineering industry, according to NI. In the 2014 NI Trend Watch, NI provides more on "Cyber-Physical Systems-Developing systems that continuously and dynamically interact with their environment through coupling of distributed computational and physical components."
The document gives an example of the complexity of systems testing today, explaining, in part, "Modern engineered systems are rarely designed once, rarely designed in isolation, and rarely ever complete. The braking mechanism in your car evolved from the mechanical lever brake on horse carriages and was soon enhanced with hydraulics to improve braking power and stability. Electrical components were introduced with the advent of power-assisted brakes. Antilock brakes began as mechanical feedback control systems to prevent airplane wheels from locking and eventually migrated to automobiles."
NI believes a platform-based design approach that leverages holistic development solutions and commercial off-the-shelf hardware can help engineers achieve better CPS designs, speed design iterations, and test complex system interactions. NI offers the LabVIEW reconfigurable I/O (RIO) architecture, which is optimized to address the needs of cyber-physical systems designers.
CPS questions, answers
CFE Media (Control Engineering and Plant Engineering) asked Brian MacCleery, principal product manager for clean energy, NI, about the facility.
Q. Can you please tell us about the facility?
A. I have been working with the Duke Energy Electric Grid Research, Innovation and Development (eGRID) Center for several years on inverter control and high-speed microgrid simulation technologies for a 15 MW (20,000 hp) grid simulator. The scale of the facility is mind-boggling-I was like a kid in a candy store when touring the facility during a recent visit. The cyber-physical systems test facility is truly unique in that it covers all aspects of the wind turbine generator, including interactions with the grid. That includes the mechanical torsion of the wind turbine shaft and the complex electromechanical interactions between the control software, generator, gearbox, power electronics converters, and the power grid. There's a strong need for this type of scientific, reproducible testing, since the DOE's plan is to expand U.S. wind generation to 20% of the total by 2030, a significant expansion from around 4% now. Gear boxes need to extend their life span to 20 years, up from about 7-10 years at present. Meanwhile, electrical system failures are five times more frequent than gear box failures according to DOE data. The mechanical, electrical, and control software aspect of the wind turbine all have an impact on the lifetime of the machine, and therefore the cost of the energy produced. The new facility will enable the industry to scientifically study all of those complex multi-domain interactions to identify cause and effect.
Q. What is the total cost of the testing facility?
A. The drivetrain was $98M and the grid simulator cost another $12M, bringing the entire building cost to a total $110M.
Q. Have any tests resulted in design changes yet?
A. No tests have actually run yet, so there are no design changes to share at this time. They are still working through commissioning and will begin testing in the next few months. Unfortunately, we will not be able to share specifics on design changes in the short term based on confidentiality and competitive reasons.
Q. In general, what are the expected impacts of the facility?
A. Clemson University said that when tying drivetrain testing with the electrical testing, those using the facility are looking at how to model interactions that cross the mechanical and electrical parts of the wind turbine. This includes 1) performing full wind model simulations in real time, 2) driving the mechanical test bench from these wind field simulations, and 3) simulating an electrical grid in real time, while making it possible for a generator to interact with the system too. They expect that this real-time simulation of the wind field and the electrical grid will make it possible to look at higher level wind turbine control challenges that are the result of similar time constants in mechanical and electrical systems. An example might be sub-synchronous resonance on the electrical grid interacting with the pitch control system of a wind turbine. These are the types of developments that can be fully explored in this facility.
Q. How is NI involved?
A. NI LabVIEW reconfigurable I/O (RIO) embedded control software and hardware are used in the 15 MW power amplifier inverter used to simulate the power grid, which was developed by the TECO Westinghouse Motor Company. The 4160 V modular multi-level power converter uses a series connected H-Bridge topology and phase shift carrier pulse width modulation (PWM) to provide 12 kHz of amplifier bandwidth and very low total harmonic distortion (THD). This is achieved through the synchronized control of 69 FPGA-based NI Single-Board RIO control systems coordinating via serial fiber optic links. The TECO bi-directional inverters can also be easily reconfigured for different voltage and current ratings. In addition, NI LabVIEW software and PXI instrumentation equipment is used to acquire the mechanical and electrical system measurements, as well as to record and analyze the massive amounts of data generated during testing.
Q. Cyber-physical systems (CPS) aren't new. How are these concepts helping here and in other high-tech applications?
A. Originally, it was only a mechanical drivetrain test facility. However, electrical grid simulation was determined to be one of the biggest needs. There are many complexities related to harmonics and control stabilities that cross the boundary between mechanical and electrical, as well as cyber and physical. NI is developing a new class of real-time simulators that is fast enough to accurately mimic the high-bandwidth nature of cyber-physical systems. It's only today that we are able to achieve the simulation speeds necessary for this kind of CPS validation and verification. It opens up the possibility of designing much more complex CPS that have been fully validated and verified so they can perform reliably in the field.
Q. Simulators were available previously; how is this different?
A. For combustion engines, no automotive company would ship a car that is not fully HIL tested, yet with wind turbines and similar grid tied equipment, simulation bandwidths in the 500 kHz to 1 MHz range have not been readily available. NI has invested in R&D over the last five years to develop real-time simulators for high-speed electric power applications. As a result, we can now demonstrate how an FPGA-based simulator captures the full frequency response of electrical equipment on a microgrid. A month ago, we released the NI electric motor simulation toolkit. As an example, a new hybrid vehicle power electronics control system was comprehensively validated and verified using these new tools.
Q. What lessons could others learn in other control and monitoring applications?
A. New, full power testing technologies can provide rigorous test coverage for complex cyber-physical systems. Such testing capabilities mean that power grid equipment can be as fully verified as the control systems used in automobiles and aircrafts. Although students may not have been taught in school that such HIL testing is part of the embedded control system design process, we're trying to bring this formal design process to the power grid industry.
- Edited by Mark T. Hoske, content manager, CFE Media, Control Engineering, email@example.com.
May has more information and answers under this headline.
Nov. 22, 2013, Clemson test facility dedication information.
NI provides reference designs and tutorial videos at
Department of Energy 20% wind report shows (page 76 of 248-page PDF) that electrical system failures occur five times more frequently than gearbox failures.
And see prior articles on wind power, below. | <urn:uuid:3e468c53-ecba-4b70-ba68-cdc4f4a4e47d> | CC-MAIN-2016-44 | http://www.controleng.com/industry-news/more-news/single-article/world-s-largest-wind-turbine-test-facility-aims-to-resolve-stresses-of-more-wind-generation/fee4e0ee711fb8b6e645973d91402141.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720941.32/warc/CC-MAIN-20161020183840-00519-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.93757 | 1,958 | 3.03125 | 3 |
CHIROPRACTIC IS SAFE, GENTLE AND UNBELIEVABLY EFFECTIVE
The third largest health-care system in the world, it unleashes the innate ability of the body to heal itself by realigning the spine. This opens the nerve channels and allows the healing power of your body to be turned on. The nervous system is the “master controller” of your body. With a nervous system that is free of interference the brain sends and receives all the vital correct messages your body needs to function.
Chiropractic is based around the principle that the human organism has an innate power to maintain its own health. When vertebrae of the spine become misaligned or move out of their normal position they can distort the flow of information from the brain to the body. Without the proper information from the nervous system the body cannot function to its full potential. This information coordinates the myriad chemical reactions that dictate how well we sleep, how food is digested, how well we concentrate, our body’s physical strength and coordination, the capabilities of the immune system and all aspects of body function.
Chiropractic focuses on removing interference to your nervous system by finding areas of the spine that are out of alignment causing a decrease in range of motion and spinal health.
Proper alignment and motion of the spine are the most important factors in keeping your spine healthy. A slight decrease or increase in the range of motion will lead to improper biomechanics of the vertebra which in turn can irritate blood vessels, create tension in the spinal cord, and also irritate nerve roots which branch off from the spinal cord between each of the vertebrae. This irritation may cause pain and dysfunction in muscles, lymphatic and organ tissue as well as imbalance in the normal body processes.
A fall, injury, sudden jar, trauma, or sometimes an inherited spinal weakness can displace a vertebra. Other causes include improper sleeping conditions or habits, poor posture, occupational hazards, repetitive strain via computer use or TV watching, incorrect lifting practices, obesity, lack of rest and exercise, and stress. | <urn:uuid:2cb70ad2-1bc9-4691-aa5b-fd75bacb08eb> | CC-MAIN-2022-33 | https://haystchiro.com.au/about-chiropractic/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00278.warc.gz | en | 0.924124 | 444 | 2.3125 | 2 |
Page created on February 20, 2019. Last updated on May 4, 2022 at 11:53
Written by ms. worldwide, edited by Nikolas.
Diverticulosis and diverticular disease
Introduction and epidemiology
A colonic diverticulum is a sac-like protrusion of the colonic wall. These diverticula are false diverticula (pseudodiverticula), due to how they involve only the mucosa and submucosa, and not the other layers of the colonic mucous membrane. The presence of many diverticula is called diverticulosis. In some cases, the diverticula may become inflamed. This conditition is called diverticulitis and occurs in approx 10% of people with diverticulosis.
Diverticulosis is usually asymptomatic, but it may cause symptoms like abdominal pain or lower GI tract bleeding. Diverticular disease refers to symptomatic diverticulosis or diverticulitis.
Diverticular disease is mostly a disease of elderly. 60% of people at the age of 60 have diverticulosis. Diverticulosis and diverticular disease is more common in the West, likely due to our eating habits. In the Western world, diverticulosis predominantly affects the left colon, while in Asia, it predominantly affects the right colon.
Etiology and pathomechanism
Colonic diverticula develop under conditions of high intraluminal pressure in the sigmoid colon, and since the colon has the muscle layer gathered at some places as teniae coli, this increased pressure may result in diverticula in these weaknesses where the muscle isn’t present. Exaggerated peristaltic contractions due to diet low in fibre may lead to high luminal pressure. In the western countries, as many as half of the population over 60 years may have this, while the prevalence in Japan and developing countries is much lower. This difference is due to the reduced fibre intake in the well-developed countries.
To avoid the development of diverticulosis, its recommended to eat dietary fibre (fresh fruits and vegetables, pasta etc.) and to change the way of sittin’ on the toilet (see the figure below).
The vessels of the diverticula become stretched and therefore weakened, which predisposes to the bleeding which presents are diverticular bleeding.
Diverticulitis occurs due to micro- or macroscopic perforation of a diverticulum, due to erosion of the diverticular wall by increased pressure and food particles. The perforation is usually contained by pericolic fat and mesentery, causing only a simple localised inflammation (simple diverticulitis). However, in some cases, a localised abscess, obstruction, large perforation or fistula may occur (complicated diverticulitis), which may lead to peritonitis.
Polyps of the colon and rectum
Colonic polyps are elevated protruding lesions of the colon into the colon lumen. They may be hyperplastic, inflammatory, hamartomatous, or neoplastic. These polyps may cause symptoms or develop into cancer. >90% of colorectal cancers develop from an adenomatous polyp, but only 3 – 5% of adenomatous polyps progress to cancer.
Colon polyps are very common, affecting 30% of adults >50 years.
- Non-neoplastic polyps
- Inflammatory polyps (pseudopolyps)
- Hyperplastic polyp
- Mucosal polyp
- Neoplastic polyps
- Adenomatous polyps (colorectal adenoma)
- Serrated polyps
- Sessile serrated polyp
- Traditional serrated polyp
- Hamartomatous polyps
Colonic polyps can also be classified according to their macroscopic appearance:
- Pedunculated – have stalk
- Sessile – no stalk
Colonic polyps are highly related to the Western, obesogenic lifestyle.
- Diet high in meat and low in vegetables and fruits
- Lack of exercise
- Hereditary polyposis syndromes
- Familial adenomatous polyposis (FAP) and Gardner syndrome – for adenomatous polyp
- Juvenile polyposis syndrome and Peutz-Jeghers syndrome – for hamartomatous polyp
Inflammatory polyps are consequences of mucosal ulceration and regeneration, often present in IBD. They don’t have malignant potential.
Hyperplastic polyps are consequences of idiopathic mucosal hyperplasia. Mucosal polyps have similar histology as normal mucosa, but often with more goblet cells. Neither have malignant potential.
Adenomatous polyps, also called colorectal adenomas, are the most important form of polyp, as they have the highest malignant potential, from 5 – 50% depending on subtype, and they’re the most common.
They are characterized by epithelial dysplasia, and these neoplastic mass lesions can range from small pedunculated polyps to large sessile lesions. As many as 50% of the western population over 50 years have these polyps, and since they are known to develop into malignancies, screening should be mandatory when you reach 50 years.
The morphology of the colorectal polyps varies, and they can be:
- Pedunculated, having a stalk with vessels supplying it
- Sessile, having a broad base
- Semisessile, a mix between the two.
More about the morphology of the colorectal polyps can be studied in the slide section.
The following factors indicate a higher malignant risk for adenomatous polyps:
- Large (>2 cm)
- Sessile morphology
- Villous histology
- High grade of dysplasia
Familial adenomatous polyposis (FAP) is an autosomal dominant and caused by the mutation of the adenomatous polyposis coli gene, APC. This disease manifests with hundreds to thousands(!!) polyps in the colon and rectum and start to appear already in the teenage years. They are actually morphologically indistinguishable from colorectal adenomas, so the only way to diagnose a patient with FAP is to count that more than 100 polyps are present.
If a patient with FAP doesn’t get treatment, this patient actually has 100% risk of developing a colorectal adenocarcinoma! And as that isn’t enough, FAP also has different variants like Gardner syndrome and Turcot syndrome.
All patients with FAP must their colon removed to prevent cancer.
Colonoscopy of a patient with FAP. We can see the high number of polyps.
Serrated polyps have a characteristic “sawtooth” morphology, which is the etymology of their name. They have moderate malignant potential (5%).
Hamartomatous polyps are comprised of normal tissue but with disorganised growth. They may be idiopathic or develop in associated with a syndrome like juvenile polyposis syndrome or Peutz-Jeghers syndrome. Sporadic hamartomatous polyps have no malignant potential, but syndromic hamartomatous polyps do.
Macroscopically, they are pedunculated, round and lobulated. They may also be eroded. Histologically we can see branching and cystically dilated crypts.
Peutz-Jeghers syndrome is a rare autosomal dominant disorder and is characterized by hamartomatous polyps in the whole GI-tract, and mucocutaneous hyperpigmentation. The syndrome also carries higher risks for many malignancies, like breast-, colorectal-, pancreatic-, ovarian-, lung- and stomach cancers. Although the polyps mainly appear in the intestines, they can also occur in the stomach or in the lungs.
This is not part of the topic name and will therefore not be asked on the exam.
This malformation is the lack of neurons and ganglion cells of the myenteric (Auerbach) and submucous (Meissner) plexus. The most prominent symptom is constipation, followed by vomiting, abdominal pain, diarrhea and slow growth.
This malformation has different names depending on where it affects:
- Hirschsprung’s syndrome is located in the rectum and the sigmoid colon. The major threats for life in new-borns with this are enterocolitis, fluid and electrolyte disturbances, perforation and peritonitis.
Treatment requires surgical resection of the aganglionic part of the colon and anastomosis between the normal parts.
- Long segment aganglionosis includes the rectosigmoid and the proximal colon
- Zuelzer-Wilson syndrome includes the total colon and rectum.
In the colon, ischemia leads to a gangrenous infarction if its severe enough, which can further develop into perforation and sepsis.
90% of all cases occur in patients that are over 60 years old and often together with other morbidities, such as cardiovascular disease. It affects younger people if they had abdominal surgery.
The ischemia can be occlusive or non-occlusive, depending on the cause, like ischemia of the small intestines. The causes can be studied in the previous topic.
Angiodysplasia is a small vascular malformation in the gut. It’s the second most common cause for bleeding from the lower GI-tract after diverticulitis. The incidence increases with age, and affects usually the right colon, but can occur anywhere in the bowels. This manifests as lower GI tract bleeding. | <urn:uuid:347f5933-4084-405f-be28-1a2a5f1ae713> | CC-MAIN-2022-33 | https://greek.doctor/third-year/pathology-2/theoretical-exam-topics/7-diverticulosis-of-the-colon-pathology-of-colonic-polyps/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00265.warc.gz | en | 0.90809 | 2,190 | 3.46875 | 3 |
About Tier One
Tier One is a general term used for a university that has been nationally recognized for excellence in academics and research.
Such universities also are proven to be an economic powerhouse for their region.
Economists estimate that Tier One universities generate 334 new jobs and add $8.6 million in wages for every $10 million in research expenditures.
Investment in research and development yields a 20 to 30 percent rate of return to Texas in terms of jobs and economic stimulus, according to the Texas Legislative Study group.
Texas needs more Tier One universities
In 2009, the Texas Legislature recognized the state's need for more Tier One universities by passing House Bill 51.
This serves as a framework for the state to provide funding and incentives for emerging research universities. There is a need for more Tier Ones in Texas because the state should lead the nation in research, venture capital investment, and graduate education programs.
It is estimated that at least 10,000 academically talented students leave Texas each year to enroll in graduate programs at Tier One universities in other states.
Only 4,000 students outside of the state choose Texas for their higher education.
Texas experiences a net loss, or “brain drain,” of 6,000 talented students per year, many of whom do not return to Texas after graduation.
Estimates show that Texas loses $3.7 billion annually in federal research and development funding to states with more than three Tier One universities.
California, the only state in the nation with a higher population than Texas, has nine Tier One universities; New York, which has a population of 7.2 million fewer people than Texas, has seven. | <urn:uuid:d3a226bd-b670-4f90-a40d-d1f68cec233f> | CC-MAIN-2017-04 | http://www.utsa.edu/tierone/about/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00241-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.93891 | 337 | 2.40625 | 2 |
It has also been asked to assess the likely impact on India's drug exports.
The international forum -- Pharmaceuticals Inspection Convention/ Pharmaceuticals Inspection Cooperation Scheme jointly referred to as PIC/S is an instruments between countries and pharmaceutical inspection authorities to promote GMP (good manufacturing practices).
"As many countries are requiring the standard of PIC/S it was decided by government to conduct a study to understand the requirements of PICs and the likely implications to the Indian pharma industry," Minister of State for Chemicals and Fertilisers Hansraj Gangaram Ahir today said in a written reply to the Lok Sabha.
PIC/S scheme is a forum where certain standards for drugs and pharmaceuticals have been adopted and about 47 countries have already joined it and more countries are contemplating to join the same, he added.
Further action on the matter will be taken only after consulting all stakeholders, the minister said. | <urn:uuid:a40e1404-e0d0-4e1a-81a0-554d2e33a52d> | CC-MAIN-2017-04 | http://health.economictimes.indiatimes.com/news/pharma/ims-health-to-conduct-study-on-india-joining-global-pharma/52215797 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00436-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.961161 | 188 | 2.171875 | 2 |
Digger construction trucks scoop dirt and materials at construction sites where something is being built. Jazz up this powerful digger construction truck coloring page with color!
Let’s Color the Digger Construction Truck Coloring Sheet
Does your child love trucks, especially those in the construction field? This digger construction truck coloring sheet is perfect to get their attention and encourage them to color! Digger construction trucks come in many different colors so you don’t have to worry about which colors you should choose. Just color it however you want.
How to Use the Digger Construction Truck Coloring Page
There are a lot of ways to use the digger construction truck coloring page but here are some of our personal favorites:
- Create a three-dimenional model of a digger construction truck by printing it and just adding some personal, yet artistic, touches.
- Use the coloring sheet to make a unit study on construction workers, transportation, or trucks more fun and engaging.
- Use the coloring page as part of your alphabet study. It’s perfect for the letter D and can be added to your alphabet coloring fun – especially if you’re focusing on vehicles!
- After coloring the digger construction truck coloring sheet, it can also be used as a writing prompt! What is its function in construction? What do digger construction trucks typically dig out?
- Color it while watching your favorite construction cartoon or show.
What to Use with This Coloring Page
Digger construction trucks vary in their colors and design, so you can let your imagination run free and make your digger construction truck coloring sheet unique. It is your digger truck so don’t hesitate to make it stand out! You can also design its environment and add your own construction crew in the background if you want!
While we encourage you to use the coloring tools that you like best, here are some of our favorites and the ones that we used to color in our own digger construction truck coloring page.
- Colored Pencils – A big and detailed digger construction truck needs some pointy coloring tools, which is why it made the colored pencils a good fit for it.
- Markers – How about a bright colored digger construction truck using brightly colored markers? Your friends will really dig it! (Ha! Dig it….digger truck…get it? 😉 ) | <urn:uuid:3818449a-7188-40fa-9c0e-88a7804e1e90> | CC-MAIN-2022-33 | https://coloringpagesandmore.com/digger-construction-truck-coloring-page/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00678.warc.gz | en | 0.906308 | 490 | 2.015625 | 2 |
TAFE SA offers programs and services which are relevant, accessible, fair and inclusive. The access and equity policy aims to to improve the participation and outcomes for disadvantaged students and to promote a learning environment free of discrimination. The policy aims also to redress past disadvantage and improve the position of particular groups in society, such as:
- Aboriginal and Torres Strait Islander people
- people of non English speaking backgrounds
- people with physical or intellectual disabilities
- the long-term unemployed
- the rurally isolated.
Aboriginal and Torres Strait Islander students
TAFE SA aims to meet the needs of the Aboriginal and Torres Strait Islander community by:
- involving Aboriginal and Torres Strait Islander people in making and implementing decisions which affect their access, participation rates and successful outcomes in vocational education, training and employment
- increasing the participation rates and success of Aboriginal and Torres Strait Islander people in vocational education and training proportionate to other South Australians
- actively promoting Aboriginal and Torres Strait Islander people as positive role models
- eliminating any discriminatory policies, practices, assumptions and behaviours in the organisation by providing training programs and employment conditions which are equitable, accessible and culturally inclusive
- providing temporary, special measures schemes for the benefit of Aboriginal and Torres Strait Islander employees, potential employees and students. | <urn:uuid:9c2f3f98-95ba-4175-a0bd-7ee1a96cd982> | CC-MAIN-2017-04 | https://www.tafesa.edu.au/apply-enrol/before-starting/student-policies/access-equity | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00072-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.92548 | 263 | 2.6875 | 3 |
Computation Efficient Multicast Key Distribution full report
Active In SP
Joined: Mar 2010
14-03-2010, 09:19 PM
Efficient key distribution is an important problem for secure group communications. The communication and storage complexity of multicast key distribution problem has been studied extensively. In this paper, we propose a new multicast key distribution scheme whose complexity is significantly reduced. Instead of using conventional encryption algorithms, the scheme employs MDS codes, a class of error control codes, to distribute multicast key dynamically. This scheme drastically reduces computation load of each group member compared to existing schemes employing traditional encryption algorithms. Such a scheme is desirable for many wireless applications where portable devices or sensors need to reduce their computation as much as possible due to battery power limitations. Easily combined with any key-tree based schemes, this scheme provides much lower computation complexity, while maintaining low and balanced communication complexity and storage complexity for secure dynamic multicast key distribution.
IN many applications, multicast is an efficient means of distributing data in terms of resources (such as network bandwidth, server computation, and I/O load) usage. The privacy of a multicast communication session is usually ensured using (symmetric) encryption. All the designated receivers or members in a multicast group share a session (encryption) key. In many applications, however, the multicast group membership changes dynamically, i.e., some new members are authorized to join a new multicast session, whereas some old members should be excluded. Thus, session keys shall change dynamically to ensure both forward secrecy and backward secrecy of multicast sessions. The forward secrecy is maintained if an old member who has been excluded from the current and future sessions cannot access the communication of the current and future sessions, and the backward secrecy is guaranteed if a new member of the current session cannot recover the communication data of past sessions. Each session thus needs a new key that is only known to the current session members, i.e., session keys need to be dynamically distributed to authorized session members.
for full report please view
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion | <urn:uuid:4474981a-27f8-4958-8387-0023d03604a5> | CC-MAIN-2016-44 | http://mytopics.org/topic-Computation-Efficient-Multicast-Key-Distribution-full-report | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719155.26/warc/CC-MAIN-20161020183839-00333-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.877091 | 458 | 1.507813 | 2 |
CMYK - Cyan-Magenta-Yellow-Black
Short for Cyan-Magenta-Yellow-Black, and pronounced as separate letters. CMYK is a color model in which all colors are described as a mixture of these four process colors. CMYK is the standard color model used in offset printing for full-color documents. Because such printing uses inks of these four basic colors, it is often called four-colorprinting.
In contrast, display devices generally use a different color model called RGB, which stands for Red-Green-Blue. One of the most difficult aspects of desktop publishing in color is color matching -- properly converting the RGB colors into CMYK colors so that what gets printed looks the same as what appears on the monitor.
Stay up to date on the latest developments in Internet terminology with a free weekly newsletter from Webopedia. Join to subscribe now.
Like everything in technology, AI touches on so many other trends, like self-driving cars and automation, and Big Data and the Internet of Things... Read More »DevOp's Role in Application Security
As organizations rush to release new applications, security appears to be getting short shrift. DevSecOps is a new approach that holds promise. Read More »Slideshow: Easy Editorial SEO Tips to Boost Traffic
This slideshow reviews five easy on-page editorial SEO tips to help drive organic search engine traffic, including the page title, heading,... Read More »
Java is a high-level programming language. This guide describes the basics of Java, providing an overview of syntax, variables, data types and... Read More »Java Basics, Part 2
This second Study Guide describes the basics of Java, providing an overview of operators, modifiers and control Structures. Read More »The 7 Layers of the OSI Model
The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. Use this handy guide to compare... Read More » | <urn:uuid:1a0d82ac-46e5-4f2d-92ab-4e1113f130ca> | CC-MAIN-2017-04 | http://www.webopedia.com/TERM/C/CMYK.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00242-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.852829 | 401 | 3.515625 | 4 |
If you are suffering from debilitating medical ailments or you are searching for a natural substitute for suffering management, it can be time to look into some great benefits of cannabis. However it is really not regarded as a “magic medication” by a lot of within the healthcare group, it can supply some positive aspects for patients struggling with many health issues. Knowing these positive aspects is crucial to letting you make an informed final decision about utilizing this substance for the condition.
When you have almost any inquiries about in which in addition to the way to employ Zipp Delivery Cannabis, you are able to call us on our own site.
Much like artificial medicinal drugs that may help some medical conditions, marijuana is just a 1-measurement fits-all remedy. For the reason that active component is THC or tetrahydrocannabinol (THC), you can use it to treat several different health issues. It is actually thought that specific CBD (cannabidiol) skin oils from weed have possible positive aspects the same as those of CBD found in pharmaceuticals, but with no dangerous side-effects. It can be thought that CBD has related anti–inflamation related homes as that of other natural substances, like people seen in herbal tea, turmeric, and ginger herb.
The latest investigation done on possible benefits associated with marijuana was done from the Nationwide Institute on Medicine Mistreatment (NIDA) as well as the Federal Organizations of Overall health (NIH). The study was centered on researching the negative effects of cannabis on HIV patients. The study was completed inside the take a look at developing rules for treating people with Aids that are also being affected by chronic problems includingglaucoma and cancer malignancy, etcetera.
When analyzing the report, it is actually clear that the research performed by the NIDA is specifically examining the primary advantages of marijuana on affected individuals identified as having Aids/Products. Nonetheless, the researchers made a decision to concentration their attention on two affected individuals affected by a unusual form of many forms of cancer named glaucoma, as their only known cure thus far is surgical treatment. In these two affected individuals, the researchers found out that the end results of both marijuana use and supervision were definitely substantially decreased as compared to the command group of people. The analysis then continued to determine that each cannabis use and supervision were actually related to significant developments in over-all tactical and diminished need for more treatment.
The identical analysts found out that after reviewing the details that they had compiled over the two matters, it looked that the benefit of legalization of weed was not instantly related to reduced substance use and better way of life. Alternatively, some great benefits of legalized cannabis is on reducing the prices linked to curing health conditions that originate from conditions such as tumors. They mentioned their former research performed on creatures revealed that the constituents seen in marijuana, for example THC, are accountable for considerable decline in cancers in your system. On their recent research, they could reproduce and grow after people findings. They could actually verify that employing THC, or tetrahydrocannabinol, can actually aid treat glaucoma, and perhaps support invert it.
The specialists also were able to conclude that the main advantages of weed may help to fight serious psychological conditions like depressive disorders and anxiousness. They managed, on the other hand be aware that further more studies are necessary to corroborate these assertions. Their previous study did not check out this vitally important facet. The investigation performed uncover, nevertheless, that using CBD can help you patients that suffer from stress. People that have pre-current mental health condition, and particularly little ones, could also visit a gain in using CBD essential oil.
The main advantages of weed can help you to address significant emotive issues, and diseases. These conditions includedepressive disorders and panic, and schizophrenia. Schizophrenia impacts numerous American citizens every day. Making use of CBD natural oils could assist in reducing the results of schizophrenia, by managing hallucinations, helping sufferers to deal with their ailment, and being able to help these phones keep beneficial and lively inhabitants in the future.
Folks experiencing multiple sclerosis also can make use of the benefits of cannabis. Several sclerosis is usually a uncomfortable ailment that triggers quite a few physical and mental trouble for afflicted people. An individual study performed on rodents established that cbd engine oil happens to be an efficient solution for people troubled with several sclerosis. A prior analysis finished on pets or animals established that CBD may also be employed to cure spasticity in people with this condition. This latest investigation carried out on humans turned out to be that there is definitely a significant website link somewhere between using tobacco weed and spasticity.
If you have any inquiries concerning the place and how to use this site, you can speak to us at our web-site.
A lot more strategies from suggested publishers: | <urn:uuid:e08f1291-dca0-4486-9908-b7c866db8b35> | CC-MAIN-2022-33 | https://catloveandpeace.com/research-indicates-benefits-associated-with-weed/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00265.warc.gz | en | 0.96945 | 988 | 2.25 | 2 |
Portfolio theory tells us that if you manage to combine assets whose returns show low correlation with each other, you may be able to minimize risk while maximizing returns. This means that it is possible to be a “prudent investor” even if one’s portfolio includes riskier assets, as long as those riskier yet higher yielding investments are balanced with others in a well-diversified portfolio. Theoretically, “buy and hold investors” may minimize those down days if they invest in assets whose returns have low (or possibly negative) correlation with each other.
Of course the problem is whether the portfolios that claim to be well diversified are indeed that way, including mine. Lately we have witnessed that being diversified across different industries or international markets is not good enough to escape those big down days, when almost every stock, domestic or international, gets hit. During these times stock investors do not have anywhere to turn unless they’ve already hedged their stock portfolios with other asset classes.
These other assets may include buying protection in the form of derivatives or being equally invested in bonds, however both come with costs. Assuming that our buy and hold investor is not in the business of timing the market, he or she will have to pay significant premiums for buying protection in the form of derivatives. Or the investor will have to let go of the higher long-term excepted returns of more volatile assets if he or she wishes to be equally invested in bonds.
Which brings us back to the basics of investing, that those seeking higher returns will have to bear higher risks. Yet it is not fun to be a portfolio manager during such times when even the most stoic stocks, the ones you think are least correlated with the stock market, start getting hit as soon as “program trading” and other portfolio insurance schemes kick in. Of course I’m speaking from personal experience and this is not the first time it’s happened to me, however if I lose my cool and start reacting to the market in the name of “tactical” decision-making, I tend to make things worse.
Which is why I’m writing this article for those buy and hold investors who would much rather sit out these down days or weeks and to give an idea of how to construct a portfolio that will take minimum damage while this ugly unwinding unfolds.
To that end I have calculated correlation matrices for a variety of sector ETFs of U.S. stocks that I thought would show less correlation with S&P 500 Index (our benchmark). I have calculated correlations two ways: correlations between index trends and correlations between daily returns of indices. I have done the same thing for certain international ETFs to see how their trends and returns correlated with those of S&P 500. While I tried to choose specific ETFs that I believed would correlate less, the availability of data was more important in my calculations. I wanted to have at least 6 years of daily data, which ruled out commodities and bond ETFs and Chinese shares.
The first thing that strikes the eye is that domestic index and ETF trends, no matter which industry they come from, are highly correlated, around 80-90 %. This is mainly because most stocks and indices followed the market since the beginning of 2001, the time frame of this correlation exercise. The only exception to that rule has been technology stocks, which during this time frame under-performed all other industry categories that are of more defensive nature, such as consumer goods, or industries that reflect an increase in demand for commodities and energy, such as materials or oil services.
But we knew that already. Correlation exercise is not meant to figure out which indices or sector categories under-performed or out-performed the market. It is rather a measure of how index or sector returns differ from each other. Correlations between daily or weekly returns are much more relevant when measuring the risk exposure of individual assets in a portfolio. If we can combine assets whose returns have low correlation with each other, we can reduce the overall dispersion of returns, the “volatility” of our portfolio.
The figure above shows correlations between daily returns of different sectors. These are much lower, ranging from 20-50 %. Financial and technology returns, on the other hand, are highly correlated (80-90 %) with S&P 500. This means well-diversified portfolios that include diverse sectors, specifically energy, consumer goods, oil services, precious metals, and real estate stocks are going to be a lot more robust than portfolios constructed solely from technology, internet, or financial stocks.
You might say you knew that already. But every time I talk to investors, it amazes me to learn how concentrated their portfolios are in a few stocks, perhaps in the same industry. Even if these stocks capture alpha and expect to outperform the market, such a portfolio strategy is simply wrong. Or the ETFs investors hold may be well correlated, which does not result in an optimal portfolio in terms of diversification.
We can construct a much better portfolio knowing a little bit about how correlation works. Such a portfolio may also absorb the daily volatilities of those high-risk, high-return stocks. But it is still not diversified enough when sharp market movements and increased volatility occur.
I doubted that being internationally invested would significantly reduce portfolio volatility because as companies and markets have become more global, country correlations have increased. As we have seen recently, practically every market has been hit with selling pressure because of seismic waves that appear to have originated in China.
Emerging market trends show fairly high correlations, similar to U.S. sector trends. Correlations between emerging market returns are significantly lower, but so are correlations between U.S. sector returns. While a carefully crafted international portfolio might increase diversification, the results are not as good as one would have hoped, as the figures above indicate.
Being invested in stocks may not be good enough for the risk-averse investor. Increased returns come with increased risk. Sharp drops in the markets may be barely visible in the long run for investors with long horizons, but volatility is very tangible for us today and now. However, hedging for this type of volatility may come at a price or being invested in bonds and other negatively correlated instruments may mean missing out a sharp rally in the stock market when the time comes.
Nevertheless, I was a bit disillusioned when none of the sector correlations in the stock market, domestic or international, returned anything close to negative. In my quest to find negative correlation, I had to look into the commodities futures that included trading in agricultural produce and livestock. I looked into correlations between monthly prices and returns of various commodity futures for the last 30 years, where nearby futures in the portfolio rolled over to the following months after the last trading day. Here are some of the results, including correlations with 30-year Treasury bond yields and S&P 500 Index, our benchmark:
As expected, trends are a lot more divergent when it comes to commodities futures, which are influenced mainly by the supply and demand pertaining to the specific product or commodity. 30-year T-bond also shows a very definite negative trend vis-à-vis our benchmark. However this also indicates that owners of such negatively trended instruments will lag behind during times when the stock market turns bullish.
The optimal would be an asset whose trend is positively correlated with S&P 500 index but whose returns are negatively correlated with S&P 500 returns. With such an asset we would ensure not to miss out on a stock market rally while minimizing our losses on down days, perhaps weeks or years.
In the following graph, I’ve calculated correlations between returns of commodity futures above and it turns out that monthly returns for gold and crude oil futures are negatively correlated with S&P 500 returns, despite the trends being positively correlated with the index.
Since the negatively correlated returns above are closer to 0 rather than –1, we cannot be certain that a truly negative correlation exists. However it is true that on down days, liquidity will follow more defensive instruments such as treasury bonds or gold, as we have observed recently when bond prices increased and yields dipped.
While there is no guarantee that the future is going to resemble the past, there are certain fundamental and/or technical reasons why correlations of index trends and returns look the way they do. These numbers could shed light on certain market moves or at least verify what we already know. Portfolios that are constructed according to these principles will turn out to be a lot more robust than ordinary ones, as well as out-performing less carefully designed ones in the long run. | <urn:uuid:c9d8b9e0-340a-412e-a234-c61907e605a0> | CC-MAIN-2017-04 | http://seekingalpha.com/article/28917-in-search-of-low-or-negative-correlation-between-asset-returns | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279224.13/warc/CC-MAIN-20170116095119-00476-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.959772 | 1,774 | 1.546875 | 2 |
By Gordon Lambie
In some ways, Tanya Bellehumeur-Allatt’s new memoir, Peacekeeper’s Daughter is the work of a lifetime.
“I’ve been working on this book for 20 years,” the author said. “I started right after 9/11, when the American administration declared the war on terror because I realized I had a story to tell.”
In this case, that story revolves around Bellehumeur-Allatt’s experiences as a 12 year old girl living for a year first in Israel and then in Lebanon while her father worked as a Peacekeeper in the Middle-East for the United Nations. Although parts of the experience have been shared in the past as standalone essays, this book marks the first time that they have been collected together in chronological order.
Bellehumeur-Allatt grew up in a military family, moving from place to place as her father was given different assignments.
“It was while we were living in Yellowknife that my dad volunteered with the United Nations to be a peacekeeper and to serve in the Middle East,” she said, explaining that in the early days of 1982, the region was in a state of relative peace so the idea seemed like an adventure and a nice change from life in the north. “We didn’t see it as a dangerous thing,” she added.
In June of that year, however, the calm in the region came apart as Israel invaded southern Lebanon and Bellehumeur-Allatt saw her life change in a way that has been with her ever since.
“My book is about the five months that we were in Israel, and the seven months we were in Lebanon,” she said. “It was a tough time for me. My childhood ended when the war began.” | <urn:uuid:0532122f-a0a8-4107-b29f-4f44f2955a9b> | CC-MAIN-2022-33 | https://www.sherbrookerecord.com/tanya-bellehumeur-allatt-on-being-a-peacekeepers-daughter/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00077.warc.gz | en | 0.982656 | 391 | 1.703125 | 2 |
Nudge Nudge, Wink Wink
|Title:||Nudge Nudge, Wink Wink|
|Click here for related articles on Fanlore.|
The phrase, often used for ironic sexual innuendo, comes from a Monty Python sketch known as Nudge Nudge.
Nudge Nudge, Wink Wink 1 was published in February 1992 and contains 139 pages.
From the zine: "This Fanzine contains over 80,500 words, in a format of 139 pages. It is possible to print, clearly, 80,000 words in any page format ranging from 95 pages to 240 pages. PAGE COUNT IS NOT AN ACCURATE MEASURE OF STORY OR ZINE LENGTH! And so concludes this lecture to support editors to begin relying on word count and saving trees...."From the editorial:
Hiya, slashfans! The first, natural thing any normal editors (and us, as well) want to make known is their deep and abiding gratitude to their contributors! We sincerely appreciate the support and skill of all of our writers, with special thanks to Pam Rose (for being so damned good!). Jane (for surprising us! and for being a wonderful correspondent), and Stew for her continued commitment to support our publications. We love you all...'nuff said.
This zine was fun. We've enjoyed building it probably more than any other thus far, and we hope you'll enjoy reading it half as much. And now, if technical thingies and chances to save money bore you to tears, please, shift your eyes to the facing page and enjoy the zine. Thank you for playing!A Word on Page Count.... With the incredible latitude of programs and computers, fonts, styles and formats that Very Small Presses use in fandom, we have come to the realization that 'page count' doesn't really mean anything. So...while we will still be polite and number our pages (maybe even correctly and in order), Manacles Press now and forevermore includes WORD COUNT on three, count them three, pages of its zines. We would love to solicit other editors to do the same, and we'd appreciate your response (we expect "I don't really care" to top the list. Sigh). Word count is a more accurate measure of what the reader is buying, and for MP, a way for us to start printing more ecologically, i.e. smaller, tighter formats on fewer pages that still provide as much or more story content as a larger format might. We are committed to offering you between 75,000 and 95,000 words of quality fiction in every zine.
- Say No More, editorial (ii)
- Time Out: Past Tense by Pamela Rose (1)
- Land-Bridge by Jane Mailander - Land-Bridge (Doyle/Murphy) (50)
- My Brother's Keeper by Anna Parrish (58)
- Fireworks and Violins by Stew (77)
- Sorcerer's Apprentice by Alys Sanders (86)
- A Game for Two Players by Jane (92)
Reactions and Reviews: Issue 1
See reactions and reviews for Time Out: Past Tense.
See reactions and review for The Land-Bridge Saga.
Nudge Nudge, Wink Wink 2 was published in 1993.
- Limbo by Thomas
- The Sisters of No Mercy by Jane Mailander - companion to "Some Say the World Will End in Fire, Some in Ice" by Jane Mailander in Concupiscence 2 - 10 pages
- Crazy Little Thing Called Love by Maggie Hall - 26 pages
- Games by Alexandra
- Guardian Angels by Baravan
- Champers by Sophie Max - 11 pages
- Measure for Measure by Maggie Hall - sequel to Madelein Lee's "Carnal Interests" trilogy in Proslib - 52 pages (Part 1 is "Carnal Interests", Part 2 is "Selling Hours" and Part 3 is "Good Morning Soldiers")
Reactions and Reviews: Issue 2
See reactions and reviews for Limbo.
See reactions and reviews for The Sisters of No Mercy.
See reactions and reviews for Crazy Little Thing Called Love.
See reactions and reviews for Guardian Angels.
See reactions and reviews for Measure for Measure.
See reactions and reviews for Champers.
See reactions and reviews for Games.
Nudge Nudge, Wink Wink 3 was published in September 1993 and contains 136 pages.
From the zine: "This Fanzine contains 79,200+ words, in a format of 136 pages. PAGE COUNT IS NOT AN ACCURATE MEASURE OF STORY OR ZINE LENGTH! And so concludes this lecture to support editorsto begin relying on word count and savingtrees...."From the editorial:
Well, this was fun! We are even quite proud of ourselves for getting this zine to the printer's several (okay, three.. .okay, two) days before our flight was due to depart lovely Los Angeles. Thank you to all our authors for different reasons: Jane Mailander, for rewriting above and beyond the call of duty, Jane Carnall for proofreading French where we were incapable, Alex MacKenzie for calling us and checking in before she left for ZebraCon, Courtney Gray for asking, "Do you want my story?" (do we want it?!?!), Lezlie Shell for responding gracefully to death threats, and Maggie Hall for saying, "yeah, sure, whatever" to our numerous and heated comments. Thanks, folks. We really appreciate it! Also, special thanks to our friends from the LA crowd who we press-ganged into proofreading this when they thought they were just going to a party. We worked on it after they read it though, and of course, all errors are 100% our responsibility.
- Coming to Terms by Alexandra
- The Blue Figurine by Courtney Gray
- La Perfide Albion by Jane Carnall - companion to Some Days are Better than Others, N'est-ce pas? - 7 pages
- Some Days are Better than Others, N'est-ce pas? by Jane Carnall - 6 pages
- Settlement by Jane Mailander - Land-Bridge 3
- Blood of the Lamb by Lezlie Shell
- Facets II: Stolen Moments by Maggie Hall - 19 pages
Reactions and Reviews: Issue 3
See reactions and reviews for The Blue Figurine.
See reactions and reviews for Facets II: Stolen Moments.
See reactions and reviews for Settlement.
I'm also finished with Nudge, Nudge, Wink Wink III, (No snickering...) and liking it a lot more.
Blood of the Lamb--[Lezlie Shell] What can you say about a story with this line? "He slapped the doubled deather belt across his palm, shuddering with dread at the thought of reddening his beloved's perfect buttocks." Wonderfully silly!
Coming To Terms--[Alex MacKenzie] is even better now than the version she circulated on-line. The intergration of aired moments and their growing relationship is great. I loved Bodie's reaction when Doyle comes clean. If I could have changed this at all, it would just have been to flesh out the individual pieces a little more.
Some Days are Better Than Others...La Perfide Albion--[Jane Carnell] Coming to Terms, a story written by a Doyle lover where Cowley looks like an insensitive pig, is perfectly followed by a story written by a Cowley lover who makes Doyle look like an insensitive... Two parter shows the Doyle Cowley relationship from both sides.
Settlement --[Jane Mailander] continues the Landbridge series. (Murphy/Doyle) This one is a little too repetitive and obvious compared to the deft touch of the first couple of stories in the series, but I did like it.
Facets II--[Maggie Hall] is the rewriting of a story that she first wrote for Frank and Vinnie, exploring how the same situation would have to change because of the differences between Frank and Vinnies relationship and Bodie and Doyle's. Good story whether you've read the other or not.
The Blue Figurine--[Courtney Gray] was sad and intense and wonderful. I expected it to be a 'It's a wonderful life' rewrite, and it surprised me more than once. What would Ray's life be like if he had never been partnered with Bodie? And what would he do to get him back...What more you ask? Well, consistant editing, nice layout, a decent prize ($15 in person for 79,000 words) All in all, a very nice Pros zine. Well, consistant editing, nice layout, a decent prize ($15 in person for 79,000 words) All in all, a very nice Pros zine.
Nudge Nudge, Wink Wink 4 was published in October 1995 and is 135 pages long.
From the editors: "This Fanzine contains 79,400 words, in a format of 135 pages. PAGE COUNT IS NOT AN ACCURATE MEASURE OF STORY OR ZINE LENGTH! And so concludes this lecture to support editors to begin relying on word count and saving trees...."From the editorial:
Well, here we are again, and an interesting road it has been to this, Nudge Nudge, Wink Wink iv. Pros has resurged as a driving passion in our fannish lives, and if by chance this zine sees Bodie with a slightly rose-tinted eye, we ask your indulgence (it's just that he's great!).
Nudge Nudge, Wink Wink iv is are turn to Pros fandom's roots for us, with five lovely stories featuring the "real" Bodie and Doyle, in the "real" CI5 universe doing "real" tv tough-guy things. (We hesitate to call anything a"plot"— but we're getting there.) This zine is blessed by four wonderful authors, all willing to keep our boys alive, in one piece, and with at least a hope for happiness at the finish. We thank them for their love of fandom, their love of their craft, and their incredible patience with our sometimes-cumbersome editing process.
This is the direction we think our Nudge Nudges should be going; please loc with steering comments, at your convenience. We'll look forward to hearing from you.
We extend heartfelt thanks to Nicola, Melissa and Sandy for proofreading above and beyond the call of duty (and way beyond the last minute....)Yours in Sin, J & C
- Be My Valentine by Gwyneth Rhys (38)
- Stealing Home and here by Sandy K. Herrold (51)
- You Get What You Need by Maggie Hall (77)
- Hide and Seek by Morgan Dawn (123)
Reactions and Reviews: Issue 4
See reactions and reviews for The Two Trees.
See reactions and reviews for Be My Valentine.
[zine]: Couldn't get into the first story ("The Two Trees"), got bored waiting for the Lads to get in the same scene together. Loved "Be My Valentine" and "Stealing Home" (Okay, I know the authors are my Seattle pals, but still, I can say in a quite unbiased fashion that these are *good* stories. Honest. Trust me.) Didn't like the last story ("Hide and Seek"), though at least I read it. It's not bad, it just seemed written for the situation, and not for the characters. Best story in the zine is Maggie Hall's long piece, "You Get What You Need" - she's trying something with more plot here (and a good one!) and makes it work beautifully. I could tell that a lot of thought went into this story, into the plot, the characters, into everything. Very enjoyable to read. This was by far the best zine I got at Zcon, and despite the first story, I can definitely recommend it. | <urn:uuid:b4617594-05be-4424-911f-bfd26a0c1891> | CC-MAIN-2016-44 | http://fanlore.org/wiki/Nudge_Nudge_Wink_Wink | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721027.15/warc/CC-MAIN-20161020183841-00549-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.944634 | 2,509 | 1.898438 | 2 |
Pungent vegetables equal profit for a Wairarapa grower.
"You go 'pwhoar' . . . people are always commenting on the pungency of the produce," said Jeremy Howden, owner of Te Manaia Organics just outside Masterton.
Like a winemaker putting a pinot noir's bouquet down to his region's unique soils and climate, Howden said his celeriac smells great because of its "terroir".
While Hastings growers might count on deep, loamy soil and Napier's on high sunshine hours, Howden's point of difference is 12 hectares of stony alluvial plains between Masterton's aerodrome and the Waingawa river.
Howden has turned Wairarapa's comparatively small number of commercial vegetable growers into a market advantage and a personal mission. "I'm trying to find out what the Wairarapa can produce . . . every district has the ability to grow vegetables; there's not some golden goose in some particular area."
Brought up on a sheep and beef farm with a large vegetable garden an hour east of Masterton, Howden learned early to love home-grown fare. This was reinforced on his OE by the "reverence" for food in countries such as France, Greece and Turkey.
After a stint angora goat farming in the late 1980s things became "hostile" for primary sector small businesses, so journalism-trained Howden took a job selling newspaper advertising; but his green fingers began to itch.
He bought a bean sprout business just as the country developed a twin infatuation with health food and world cuisine; Howden's sales doubled annually for five years.
A weekly cash crop, fixed margins and an unsaturated market built momentum for a move out of the warm sprout-house on his father's farm onto his own land.
Coloured lettuce and fennel were the first crops, followed by "just about anything other than cabbage" as the Wellington restaurant scene boomed, specialty ingredient stores did well and immigrants demanded respite from traditional Kiwi blandness.
But it was the nascent organic movement's insistence on quality and diversity that cemented Howden's market gap.
He avoided large supermarkets with their push for growers to specialise in a few, mass-produced items. Howden's customers wanted the opposite. "I have to deal with a lack of scale but it does give me the opportunity to be quick on my feet."
Importantly, the organic market is prepared to pay extra for that responsiveness and diversity. "It's not about driving the price down, it's about establishing a fair value for what you're eating."
The recipe seems to work, with turnover doubling in the last three years and full-time staff up to seven from three. Growth has prompted some concessions to scale; alongside his more specialised offerings, Howden now harvests staples such as broccoli, cauliflower, leeks and pumpkins.
Their tighter margins are supported by smaller, more profitable lines such as fragrant celeriac. A three-year rotation lets the land rest, while a 52-week cropping programme reduces exposure to bad weather.
A challenge has been maintaining quality without using chemicals; but if the proof of the vegetable is in the eating, the enthusiastic response at farmers' markets make a pretty good case for Howden's pungent produce.
$2.25: Retail price 100-gram box of alfalfa sprouts
$1.75: 250g box of mung bean sprouts
75,000: Boxes of sprouts sold annually
$3: Head of broccoli
25,000: Heads of broccoli sold annually
Do you feel better off than at this time last year? | <urn:uuid:0f5ee911-47c0-45d7-8c5b-d636768eb3f2> | CC-MAIN-2017-04 | http://www.stuff.co.nz/business/small-business/10109167/Pungent-smell-of-success | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00240-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.966222 | 779 | 1.632813 | 2 |
TRIPOLI, Libya, May 23 (UPI) -- A voter registration campaign launched in preparation for June elections in Libya was a major accomplishment for the country, a U.N. envoy said.
Libya wrapped up its voter registration campaign this week. Voters in late June head to polling stations for the first time in a generation to choose leaders for their new national Congress.
Registration "is a major milestone and a source of pride for the Libyan people who endured 42 years of denial of political rights," Ian Martin, U.N. special envoy for Libya, said in a statement.
Election officials said roughly 2.7 million adults registered to vote during the campaign. There were several different political parties registered to take part on the congressional vote, Martin added.
"This has been a huge challenge and undertaking in terms of logistics and security planning, particularly in the context of Libya's post-conflict transition and the fact that there has been no electoral experience in over four decades," he said.
Longtime Libyan leader Moammar Gadhafi died late last year after falling into rebel hands. His government by mid-2011 began to collapse under the dual strains of civil war and a NATO-led campaign meant to protect civilian demonstrators from pro-Gadhafi forces.
The security situation in the country is complicated by tribal conflicts and internal rivalries. | <urn:uuid:640594e7-d727-4011-9617-56d251b04a80> | CC-MAIN-2017-04 | http://www.upi.com/Top_News/Special/2012/05/23/Libya-wraps-up-voter-registration-campaign/UPI-52191337784427/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00391-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.97108 | 278 | 1.953125 | 2 |
Amid energy crisis, a need to define and promote innovation
Today’s energy technologies won’t be able to propel the world to deep reductions in global carbon emissions, Stepp writes, but improving energy innovation and developing new designs can.
Innovation is Central to Making Clean Energy Cheap
The United States and the world face an urgent imperative to transform its energy system by developing and deploying low or zero-carbon technologies on a dramatic scale. And while developed regions like the United States and Europe might be willing to change their consumption patterns and businesses to incorporate clean energy (though not significantly), developing nations can’t afford to pay the necessary premium for this access. And they shouldn’t have to, as they try to gain access to energy of any kind. As such, the only way the entireglobal energy system can transition to clean energy is if its cost is lower and its performance is equal to or greater than cheap fossil fuels like natural gas, coal, and oil.
Unfortunately, today’s clean energy technologies like wind, solar, electric vehicles, smart grids, and energy storage are more expensive and oftentimes performance-limited compared to their fossil competitors. Solar and wind power are intermittent without energy storage and still require significant advances in energy conversion efficiency. Electric vehicles are up to double the cost of comparable gasoline powered cars, and significant infrastructure build-out like smart grids, charging infrastructure, and transmission lines are barriers to rapid deployment as well. (Read More: An Introduction to Fueling Innovation)
Without a doubt today’s clean energy technologies have made dramatic progress and innovations have propelled a doubling of renewable energy in less than 5 years, but much more is needed. Today’s technologies won’t be able to propel the world to deep reductions in global carbon emissions, but improving on today’s technologies and developing new designs can.
Defining Energy Innovation from a Policy Perspective
In my opinion, no one outside of the occasional Luddite is “anti-innovation.” As a result, more often than not, the term “energy innovation” is used as rhetoric to sell policies that have little to do with innovation at all or could actually stifle innovation. It’s become a useful catch-all phrase in the policy space, so properly defining energy innovation is important!
Historically, research and development (R&D) is fundamentally considered the most important part of spurring energy innovation and, as a result, is most often equated with energy innovation policy. But by itself, R&D is not enough. In this column, spurring clean energy innovation means support for the back-end (basic science and R&D) through the front-end (testing, demonstration, commercialization, and smart deployment) of the technology pipeline. And it’s not enough to view these individual stages of innovation within a vacuum: each interact within an innovation ecosystem and ensuring not only proper support for each, but proper linkages, collaboration, and institutional support is critical. This idea of supporting comprehensive energy innovation ecosystems will be a reoccurring theme throughout my articles.
Supporting Energy Innovation through Science Policy
History has shown that public support is a key driver of innovation. Look no further than natural gas fracturing for the most recent example in a long list of publicly supported technologies that stretches back a century. The U.S. energy industry would not be benefitting from cheap and plentiful shale gas without decades of public investments in R&D, testing, demonstration, and deployment policies.
While global climate change adds an economic, moral, and social element to why governments must aggressively act, I focus more on the direct role of government in particular policy levers. While I’ll discuss in more detail the policy levers available to addressing climate change through innovation, there are three broad reasons why government support for energy innovation is critical.
First, like other industries, the energy industry underinvests in early stage research because the potential private returns on research investments are normally much less than social returns. In other words, energy companies fail to capture enough benefit from research and choose not to invest, resulting in a short-sighted energy industry. This problem is exacerbated further by risk-averse energy firms’ unwillingness to commit limited resources to high-risk research with long time horizons, when competitive pressures demand short-term profits. In response, the government fills this void by publicly supporting high-risk research that the private sector is unwilling or incapable of doing itself (through public research institutions, grants, or tax expenditures).
Second, once research progresses in the laboratory, there isn’t a clear link between early-stage development and piloting the technology for the first-time. This gap –called the technology valley of death – often comes down to cost. Developing a pilot-stage, proof-of-concept project is still research, but requires additional funding that private investors and industry are unwilling to provide because of risk and uncertain payoff periods. Potential technologies must show market validity and certainty to investors, but are unable to do so without piloting the technology. It’s a catch-22 that often dooms even the most promising of emerging technologies.
Third, once an emerging technology is demonstrated proof-of-concept, there is often a significant investment gap between piloting and demonstrating the technology at commercial scale. This so-called commercialization valley of death halts development of first-of-its-kind energy technologies that have been demonstrated and tested as prototypes, but still require additional capital to be manufactured. This is particularly the case in the energy industry, as many emerging technologies are often too risky for private firms and investors because developing a first-of-kind production process for a new technology is expensive, but also because competing fossil fuel technologies are ingrained in the industry with a century’s worth of public and private investment and infrastructure.
Policy Framing and Emphasis Matter
Of course, none of this is new in the policy-sense and it doesn’t get at the policy nuance of how you actually support these weaknesses in the energy innovation ecosystem. The policy choices vary from supporting National Labs to R&D tax credits, pilot projects to regional innovation consortia, and everything in between. The policy choices also vary by technology – there is no such thing as a one size fits all energy innovation policy.
What is new is how we frame our energy challenges and its impact on the fundamental design of US climate and energy policy. Today’s dominant policy emphasis among clean energy advocates – carbon pricing, regulations, and direct purchase subsidies – speak more to job creation and pollution regulation than they do technological innovation. While these framing choices may work in niche markets and advocacy groups it largely ignores that our climate and energy challenges are, in fact, technology problems that require science and technology policy.
At best, the wrong framing results in policies not geared for the right goals. There’s no better example of this than Solyndra and loan guarantees – a potentially useful policy investment to support the commercialization valley of death. Yet, instead of being framed as innovation policy, loan guarantees were largely framed as green jobs policy. When the project failed – something that should be expected in the innovation process – a large-scale political war was sparked that weighed down all climate and energy debate.
At worse, the wrong framing results in the wrong policy emphasis. For instance, advocates and policymakers are almost myopically focused on clean energy tax credits and subsidies while early-stage R&D stagnates at funding levels a third of which is necessary to produce a constant wave of next-generation technology ideas to market.
Ultimately, the true definition of energy innovation policy and how it’s framed in the policy debate is important because it’s the only real way the developing and developed world, and not only the US, can switch from fossil fuels to clean energy. It’s a complex problem that requires not only new technologies but a new way of thinking about the policy issues.
The Christian Science Monitor has assembled a diverse group of the best energy bloggers out there. Our guest bloggers are not employed or directed by the Monitor and the views expressed are the bloggers' own, as is responsibility for the content of their blogs. To contact us about a blogger, click here. To add or view a comment on a guest blog, please go to the blogger's own site by clicking on the link in the blog description box above. | <urn:uuid:d210c407-ea6d-41aa-a7b0-0ba9ec24cc02> | CC-MAIN-2017-04 | http://www.csmonitor.com/Environment/Energy-Voices/2012/1217/Amid-energy-crisis-a-need-to-define-and-promote-innovation | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279489.14/warc/CC-MAIN-20170116095119-00015-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.933499 | 1,728 | 2.640625 | 3 |
Najibullah Zazi, a 24-year¬old Afghan entered a plea of ‘not guilty’ this week to charges of conspiracy to use weapons of mass destruction, in what's being called one of the most serious terrorist threats since 9/11. His arrest came amidst a number of other terror-related cases. How serious were these threats? Are the cases a result of improved law enforcement? What role did the Patriot Act play? Also, the US and its allies talk to Iran about its nuclear program, and seismologists analyze several deadly earthquakes that have rocked different parts of the globe. Conan Nolan guest hosts this rebroadcast of today's To the Point.
Banner image: Najibullah Zazi arrives at federal building in Denver, Colorado for a second day of questioning on September 17, 2009. Photo: Marc Piscotty/Getty Images | <urn:uuid:a1b2c7ba-bb62-428c-8252-1aa299a17e6e> | CC-MAIN-2017-04 | http://www.kcrw.com/news-culture/shows/which-way-la/fbi-makes-an-arrest-in-a-case-of-domestic-terrorism | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279489.14/warc/CC-MAIN-20170116095119-00012-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.959218 | 178 | 1.65625 | 2 |
How Are Batteries Recycled?
We accept a variety of rechargeable batteries. Rechargeable batteries are commonly found in home electronics, cars, trucks, boats, and RV’s.
Batteries are collected, sorted, and sent through an EPA approved thermal process to separate metals from other materials incorporated in the battery. These materials are broken down and used to manufacture new batteries or added to stainless steel.
We do not accept leaking batteries. | <urn:uuid:fe53df9f-5888-422d-ae74-64bac3c95ca0> | CC-MAIN-2022-33 | https://bluegrassrecycle.com/items-we-recycle/battery-recycling.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00066.warc.gz | en | 0.920015 | 100 | 2.125 | 2 |
Configure UAC Group Policy Settings
Updated: October 29, 2009
Applies To: Windows 7, Windows Server 2008 R2
You must be logged on as a member of the local Administrators group to configure the User Account Control (UAC) Group Policy settings. You can also perform the procedure as a standard user if you are able to provide valid credentials for an administrator account at the User Account Control credential prompt.
For information about UAC Group Policy settings, see Define the UAC Group Policy Settings in the planning section of this guide.
To configure UAC Group Policy settings
Click Start, type secpol.msc in the Search programs and files box, and then press ENTER.
If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Yes.
In the console tree, double-click Local Policies, and then click Security Options.
In the details pane, right-click the relevant UAC setting, and then click Properties.
Make the desired changes, and then click OK.
|Modifying the User Account Control: Run all administrators in Admin Approval Mode policy setting requires a computer restart before the setting becomes effective. All other UAC Group Policy settings do not require a restart.| | <urn:uuid:df38325f-bdce-481f-a7bd-0d201c2e6d8e> | CC-MAIN-2017-04 | https://technet.microsoft.com/en-us/library/ee732407.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00535-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.796641 | 262 | 1.914063 | 2 |
Arts Strike (n): A targeted event in which celebrated artists engage educators and students, schools and communities, highlighting and sharing the unique power of the arts to empower, enrich, and educate.
ArtStrikes give artists a chance to put their unique abilities to work in contexts beyond performance. They are a means to take a short period of time and put it to use in a school, healthcare facility, or community center to make a positive intervention in the lives of others. They are opportunities to step off the stage and transcend the boundaries of their art.
ArtStrikes were piloted by Damian Woetzel and Yo-Yo Ma, the idea springing from their joint service on the President’s Committee on the Arts and Humanities, specifically with the Committee’s Turnaround Arts Initiative, whose mission is to help narrow the achievement gap in schools through uses of the arts. Both Ma And Woetzel saw an opportunity—and a need—for artists at the tops of their fields to celebrate the essential work that local artists and arts organizations do every day, and to contribute to community building on a local level.
ArtStrikes have taken place in public schools in Chicago, Washington DC, Los Angeles, New York City, and Detroit. | <urn:uuid:76ede81a-e3fb-4705-b7e4-ae4f8dd4d3ce> | CC-MAIN-2022-33 | https://www.aspeninstitute.org/programs/artsprogram/artstrikes/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00666.warc.gz | en | 0.963214 | 259 | 2.734375 | 3 |
SUPPLIES & TOOLS:
- 4 yds Fabric
- Fairfield Twin-size bamboo batting
- Thread to match fabric
- Sewing machine
- Iron & ironing board
- 2 yds 1/2" Grosgrain ribbon
- Basic sewing supplies
- Cut fabric in half to create two pieces 45"x72". Trim selvages off each side to make fabric 44"x72".
- Fold one piece in half vertically and horizontally to find the center of fabric. On the wrong side, draw a rectangle 5-1/2"x7-1/2", centered as shown in Figure
- Using a plate or other round object, draw a curve in each corner to make the neckline.
- Cut as indicated in Figure 1, from the bottom edge of the fabric to the neckline and around the neckline. Note: The dotted lines shown in Figure 2 indicate the stitching lines.
- Cut batting and other piece of fabric to match fabric in step 2. Cut ribbon into 6 pieces, each 12" long.
- Place both pieces of 44"x72" fabric right sides together, then place batting against the wrong side of the piece without the drawn lines. Pin around the edges to hold the layers together for stitching. Place ribbon in side positions indicated in Figure 1 with the long portion of the ribbon towards the center; pin in place. Stitch on all dotted lines as indicated in Figure 2, using a 1/2" seam allowance.
- Turn fabric right side out pulling through the cut edge of the square as shown in Figure 2. Press.
- Fold remaining raw cut edges in 1/4" and topstitch near the folded edge to secure.
- Topstitch around curved opening and outside edges, approximately 1/4" in from edge.
- To keep the layers secure, channel quilt the length of the cover-up every 4" as indicated in Figure 3. | <urn:uuid:7528cfcb-bd50-4075-83fd-1c08928dd161> | CC-MAIN-2017-04 | http://www.joann.com/toasty-throw/P459931.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279224.13/warc/CC-MAIN-20170116095119-00482-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.874998 | 404 | 1.929688 | 2 |
Serum progesterone is a test to measure the amount of progesterone in the blood. Progesterone is a hormone produced mainly in the ovaries.
Progesterone plays a key role in pregnancy. It helps make a woman's uterus ready for a fertilized egg to be implanted. It also prepares the uterus for pregnancy and the breasts for milk production.
How the Test is Performed
A blood sample is needed. Most of the time blood is drawn from a vein located on the inside of the elbow or the back of the hand.
How to Prepare for the Test
Many medicines can interfere with blood test results.
- Your health care provider will tell you if you need to stop taking any medicines before you have this test.
- DO NOT stop or change your medicines without talking to your provider first.
How the Test will Feel
You may feel slight pain or a sting when the needle is inserted. You may also feel some throbbing at the site after the blood is drawn.
Why the Test is Performed
This test is done to:
- Determine if a woman is ovulating
- Evaluate a women with repeated miscarriages (other tests are used more commonly)
- Determine the risk of miscarriage or ectopic pregnancy early in pregnancy
Progesterone levels vary depending on when the test is done. Blood progesterone levels start to rise midway through the menstrual cycle. It continues to rise for about 6 to 10 days, and then falls if the egg is not fertilized.
Levels continue to rise in early pregnancy.
The following are normal ranges based upon certain phases of the menstrual cycle and pregnancy:
- Female (pre-ovulation): less than 1 nanograms per mililiter (ng/mL) or 3.18 nanomoles per liter (nmol/L)
- Female (mid-cycle): 5 to 20 ng/mL or 15.90 to 63.60 nmol/L
- Male: less than 1 ng/mL or 3.18 nmol/L
- Postmenopausal: less than 1 ng/mL or 3.18 nmol/L
- Pregnancy 1st trimester: 11.2 to 90.0 ng/mL or 35.62 to 286.20 nmol/L
- Pregnancy 2nd trimester: 25.6 to 89.4 ng/mL or 81.41 to 284.29 nmol/L
- Pregnancy 3rd trimester: 48 to 150 to 300 or more ng/mL or 152.64 to 477 to 954 or more nmol/L
Normal value ranges may vary slightly among different laboratories. Talk to your doctor about the meaning of your specific test results.
The examples above show the common measurements for results for these tests. Some laboratories use different measurements or may test different specimens.
Progesterone blood test (serum)
Broekmans FJ, Fauser BCJSM. Female infertility. In: Jameson JL, De Groot LJ, de Kretser DM, et al. eds. Endocrinology: Adult and Pediatric. 7th ed. Philadelphia, PA: Elsevier Saunders; 2016:chap 132.
Rink BR, Lockwood CJ. Recurrent pregnancy loss. In: Creasy RK, Resnick R, Iams JD, et al. eds. Creasy and Resnik's Maternal-Fetal Medicine: Principles and Practice. 7th ed. Philadelphia, PA: Elsevier Saunders; 2014:chap 44.
Review Date 5/9/2015
Updated by: Cynthia D. White, MD, Fellow American College of Obstetricians and Gynecologists, Group Health Cooperative, Bellevue, WA. Also reviewed by David Zieve, MD, MHA, Isla Ogilvie, PhD, and the A.D.A.M. Editorial team. | <urn:uuid:88b64603-2155-4d1f-bcb2-ba37bd040a4a> | CC-MAIN-2017-04 | https://medlineplus.gov/ency/article/003714.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00274-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.842731 | 815 | 3.28125 | 3 |
Two huge Cooper’s Hawks race across the morning sky. In hot pursuit of those birds of prey, darting and buzzing ferociously, relentlessly – is a hummingbird. Yes, a hummingbird.
The message is clear: “Get away from my home, my nest, my babies.”
The image stuck with me the whole rest of the morning, and through the rest of the week. Tiny hummingbird, defying any modicum of reason, chasing after those two hooligans.
Life or death does that to us – pushes common sense out the window, replacing it with 100% full throttle, adrenaline filled “NOT ON MY WATCH!”
I was reminded of a conversation I have frequently with community leaders, the most recent of which was with a colleague and friend. She had brought us in to talk about governance with an animal welfare coalition. The group had quickly devolved into ugly arguments over whether or not all their activities should support the No-Kill Movement.
Our colleague took me aside to apologize. I told her, “This level of dispute is not uncommon with animal rights groups. It’s because the issue is about life and death.”
Consider the issues that have for years moved from civil conversation to screaming argument. PETA and animal rights. Anti-abortion demonstrators. Human rights activists protesting the torture of prisoners of war or the conditions of slave laborers half a world away.
Each of these cases is a matter of life or death. But also in each of these cases, the life in question is not the life of the protestor him/herself. The vehemence that often causes supporters of these issues to act directly counter to the message of compassion they espouse – it is related to an overwhelming need to protect others.
Which brings me back to the fierceness with which Mama Hummingbird chased those two hawks across the sky. She wasn’t defending herself – on the contrary, she was putting herself directly into harm’s way. She was defending those about whom she cared passionately. In doing so, she didn’t take even a moment to reflect about whether or not her actions might cause her personal pain (and she certainly didn’t take time to wonder how those actions would make her look on the 6:00 news!).
In the instant of witnessing Mama Hummingbird in action, I came a step closer to compassion to my fellow humans who care so passionately and deeply.
I realized in that moment that their actions come from the honorable instinct to protect others. I don’t have to agree with their positions or condone their approaches to begin to understand the place of pain and passion that leads to those protective actions.
To those who do not share their cause, we see extremism; to those inside that cause, they are feeling the burden of protecting another life. What we see on the outside is only their behaviors. What they feel on the inside is pure experience of pain and suffering on behalf of others.
Regardless of the issue, before we can find common ground, we must be able to communicate. Before we can communicate, we must respect the other party. And before we can respect them, we must understand them.
Last week, a 3″ hummingbird brought me a step closer to that understanding. For that I am overwhelmingly grateful. | <urn:uuid:b32c744f-a3cf-40ad-b170-bcef92f38d0d> | CC-MAIN-2017-04 | http://hildygottlieb.com/2009/08/16/the-hummingbird%E2%80%99s-lesson/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00335-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.9648 | 690 | 1.59375 | 2 |
“Now his father Zacharias was filled with the Holy Spirit, and prophesied, saying: ‘Blessed is the Lord God of Israel, for He has visited and redeemed His people, and has raised up a horn of salvation for us in the house of His servant David, as He spoke by the mouth of His holy prophets, who have been since the world began.'”
“…for He has visited and redeemed His people, and has raised up a horn of salvation for us…”
As I’m writing this I keep thinking of the song, Emmanuel. Sing with me…
His Name is called, Emmanuel.
God with us. Revealed in us.
His Name is called Emmanuel.
If we could only grasp the magnitude of the miracle of our Messiah.
Throughout the Old Testament there are occasions of God’s visitation through His Spirit. His Spirit came upon the people at their point of need. (See Exodus 3:16, Exodus 4:31, Genesis 50:24) In today’s passage of Scripture, Zacharias understands that once again, the Spirit of the Lord has visited earth and this time the Redeemer has been revealed. Can you imagine the awe and wonder Zacharias must have experienced as he witnessed God’s faithfulness to His Word? Wow!
Now, verse 69 thrills me. It reads, “…And has raised up a horn of salvation for us…”
Are you ready?
The Hebrew word for horn is qeren (keh-renn) meaning “strength”. This refers to the horn of an animal such as oxen, goats and rams which, in Jewish tradition, symbolizes strength, power and victory. Throughout the Scriptures the word “horn” is used when referring to the strength of Israel, or the strength of a leader.
Why would Jesus be referred to as the “horn of salvation”? There are probably several reasons for this. Certainly Jesus would come as the Strength of Israel and the world, but there is one reason that fascinates me: the use of horns in the Tabernacle.
While wandering in the wilderness for 40 years, God gave instructions for the Tabernacle – His dwelling place among the people. When entering the gate of the Tabernacle, the first object encountered was the Altar of Burnt Offering where the blood sacrifice of animals was made for the atonement of sin. No one could enter the Presence of a Holy God without this sacrifice.
The Altar of Burnt Offering was a huge bronze structure. Extending from each of its four corners were stone outcroppings overlayed with bronze. These outcroppings were in the shape of animal horns. The sacrificial animals were secured to the altar by these horns. After the slaughter, the priest sprinkled blood on each of the horns so that the sinner who provided the animal could be forgiven for his sins. The priest then washed and entered the Holy of Holies on behalf of the sinner.
Scholars believe that the Altar of Burnt Offering is a type of crucifix for Jesus Christ. HE was the perfect Lamb of God – the sacrificial lamb – secured to the cross. Through His blood we are forgiven of our sins. Through His blood we have been made priests that we might enter the Presence of God! (Revelation 1:6)
“Blessed is the Lord God of Israel, for He has visited and redeemed His people, and has raised up a horn of salvation for us.”
Jesus Christ. The horn of our salvation.
Jesus Christ. God’s perfect plan of Redemption.
And its fulfillment began in a lowly manger.
Blessed be the Name of the Lord.
Lord God, You never cease to amaze me! When I think of all the details You put in place in order to deliver Your children from the throws of sin…incredible. Thank You for going to so much trouble for us. And thank You for revealing these truths to us so that our faith and knowledge might increase. We want to spend this Christmas season with You, Lord. Teach us Your wonderful Word. | <urn:uuid:770397e1-dc04-482d-93c6-300398cb887f> | CC-MAIN-2022-33 | https://www.nanjones.com/jesus-horn-of-our-salvation/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00271.warc.gz | en | 0.963295 | 889 | 2.203125 | 2 |
“Lesson on the Garage Roof,” Ensign, Apr. 1988, 55
After the signal from Dad to commence our family’s mock disaster, each person ran in a different direction. We passed each other in the hallways of the house like busy ants, gathering needed items. With no preparation, we were forced to decide on the run just what we needed. Some of us tried to carry too much; others, in haste, forgot essentials. Mother purposely struggled, hoping someone would help her.
Our goal—to reach the safety of the garage roof in ten minutes.
Once assembled there, we looked around self-consciously, hoping our neighbors were all inside. No such luck! There stood Joe, in the yard next door, trying not to be obvious as he observed our every move. How embarrassing!
Earlier, Dad had called us together for home evening and told us that we would work together as a family to see how we would react in the event of a major citywide crisis. It had sounded like fun, because normally we were not allowed on the garage roof. Father had given each of us just ten minutes to gather what we believed were essentials. It had been exciting!
There we sat, wondering what the six of us must look like. Surrounded by our blankets, sleeping bags, crackers, bread, canned food (and no can opener), cookies, books, genealogy records, and scriptures, we soon forgot Joe and the rest of the neighborhood and began concentrating on the lesson.
We reflected on Lehi’s dream as he and his family were ridiculed by those in the spacious building. (See 1 Ne. 8:26–27.) We came to appreciate, at least partially, the feelings they must have had as they were sent from their home on short notice. And we remembered Noah’s persistence amidst peer ridicule. Dad reminded us that our present circumstance was a result of obedience to a father’s guidance, just as Lehi’s and Noah’s families’ had been in days of old.
As we took stock of our provisions, we found that our last-minute scramble had left us ill equipped for such an emergency. Our disjointed, uncoordinated efforts had not only resulted in serious oversights, but had also shown some degree of selfishness and lack of concern for each other.
As we spent that evening on the roof, enjoying a beautiful summer sunset, watching our neighbors cutting lawns and gardening, several lessons were indelibly fixed in our minds because of this unique family home evening experience. We drank our juice, ate whatever food was not in tins, and came to know each other better. We strengthened our family bonds through this evening on the roof.
We were each impressed deeply with the lessons of the evening: the need to follow parents’ inspired counsel, be prepared for emergencies, care for family members, follow commandments—even under the uncomfortable observation of others—and have faith in the Lord.
Some time later, at a stake conference, our father shared our experiences with an amused congregation. Our faces reddened at the time, but we still find today that there are people who remember us as the “garage roof” family. | <urn:uuid:c8b2c9cd-6d8a-4d2f-8600-c8e5fb499901> | CC-MAIN-2022-33 | https://www.churchofjesuschrist.org/study/ensign/1988/04/home-evenings/lesson-on-the-garage-roof?lang=eng | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00667.warc.gz | en | 0.982341 | 670 | 1.992188 | 2 |
In New Mexico, Bennis told the Lannan In Pursuit of Cultural Freedom series why the bloated military budget represents an atrocious investment for our society.
President Obama has the chance to completely retool U.S. policy in the Middle East in the context of the Arab Spring – but it doesn’t look likely that he will.
Under Obama’s new plan, immigrants will have to wait longer, pay more, and enjoy fewer rights.
The attention to military engagement in Libya drowns out the call for negotiations, for accountability, and even for a ceasefire.
On March 17, Hillary Clinton gave a speech at George Washington University outlining her plans to de-escalate U.S. military involvement in Iraq. Stephen Zunes annotates her statements.
In this edition of Annotate This… Stephen Zunes and Erik Leaver analyze Bush’s statements and offer an alternative interpretation of the situation on the ground.
The president’s shift in Iraq will be a climb-down disguised as a step forward.
Vowing to “Stay the Course” the President made clear that the administration still doesn’t recognize that the U.S. occupation is driving the resistance. | <urn:uuid:4e5273b5-db0f-4c02-9936-a78a44b6aa1a> | CC-MAIN-2022-33 | https://ips-dc.org/tag/speech/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00271.warc.gz | en | 0.917591 | 250 | 1.671875 | 2 |
The FDA today gave Novartis ($NVS) the go-ahead for a seasonal flu vaccine that is made from animal cell culture instead of chicken eggs, a process that can turn out vaccine pronto in the event of a pandemic.
Novartis says the technology, which is used with some other kinds of vaccines, can produce product within weeks instead of the months it can take to grow it in chicken eggs. The Swiss company will use a cell-culture system derived from the kidney of a dog, The Wall Street Journal said. This will shave about four weeks off the process compared to using eggs and eliminates the need to keep a stock of eggs.
"Modern cell-culture technology will likely become the new standard for influenza vaccine production and we are proud to lead the way," said Andrin Oswald, who heads the Novartis vaccines and diagnostics division.
According to the FDA, a study found Flucelvax 83.8% effective in preventing influenza when compared to a placebo. It is approved for those who are at least 18 years old. Novartis told The Wall Street Journal a limited amount of the vaccine would be available for this year's flu season.
The vaccine will be moved to Novartis' Holly Springs, NC, plant when it is approved for production. Novartis is building the plant with about $500 million in support from the U.S. government. Novartis and other companies are getting U.S. funds for vaccine production with the agreement that if a pandemic should occur, the U.S. could say how much of what vaccines would be produced. Novartis says the joint investment in the technology and plant is about $1 billion. It said the use of sterile rooms in the plant will also reduce the risk of impurities getting into the vaccine.
While the FDA was touting the new vaccine process in the U.S., in the U.K. there is a debate raging over the effectiveness of the seasonal flu vaccine campaign, The Telegraph reports. It focuses on a report from the Center for Infectious Disease Research & Policy (CIDRAP) in Minneapolis, MN, that says national campaigns that convince citizens that flu vaccines are "highly effective" has kept better vaccines from being developed. Michael Osterholm, CIDRAP director, says he recommends vaccination, "But we have over-promoted this vaccine. For certain age groups in some years, its effectiveness has been severely limited relative to what has been previously reported."
- read the Wall Street Journal story (sub. req.)
- here's the Novartis release
- and here's the FDA announcement
- read The Telegraph story | <urn:uuid:f0a6c9c5-be90-4486-bfa0-5ab6621d7524> | CC-MAIN-2017-04 | http://www.fiercepharma.com/regulatory/novartis-fast-production-cell-culture-flu-vaccine-ok-d-by-fda | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00469-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.956673 | 546 | 2.671875 | 3 |
Michigan Cranberry Company started out as an idea, with some potential, in the mind of Wally Huggett back in 1980. In the middle of his sod fields, in the Thumb of Michigan, Wally first started experimenting with growing cranberries commercially. The peat base soil in that location had been farmed for many years and it proved to be too high Ph for viable cranberry growth. Still wanting to try his hand at cranberry farming, Wally searched throughout Michigan for the exact type of land in which to start a commercial cranberry farm.
An abandoned peat mining operation in Cheboygan County came to his attention. This location, being less than five miles from Lake Huron, supplied a good snow cover for winter frost protection on the vines. A high water table to provide a closed irrigation and flooding system, rich peat soil with a low ph and a good mix of sand, made this land ideal for constructing a cranberry marsh. | <urn:uuid:b363fe3f-a529-4b18-9cc9-6e0b2018a991> | CC-MAIN-2016-44 | http://www.michigancranberry.us/html/about_us.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720845.92/warc/CC-MAIN-20161020183840-00086-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.967325 | 193 | 2.59375 | 3 |
CANADIAN SAFETY COUNCIL ATV TRAINING COURSE
Whether you use an ATV for work or just like to ride the trails this course offers something for everyone. This course will cover everything from how to safely load an ATV to what safety gear to wear to how to assess and overcome challenges with confidence all the time in a safe and controlled manor.
In this course you can bring your own ATV or Okanagan ATV Tours can supply the ATV as well as all the safety gear required making this a “one stop shop to safety”. With classes up to 8 people at a time this is a great environment for the workplace to be trained. The ATV Rider student and instructor courses are nationally recognized programs developed by the Canada Safety Council, for the benefit of both industrial and recreational ATV operators. This course is a must for all new riders as well.
Our instructor is Pat McHugh. Pat has many years of ATV riding, training and classroom knowledge. Pat has been instructing the CSC course since 2001 and is fully certified and insured to teach to the public and industry.
This course is one full day of training to achieve the safety certificate.
Information from the Canadian Safety Council http://www.safety-council.org/training/ATV/atv.htm
British Columbia wide safety information http://www.atvbc.ca/
Okanagan ATV Tours Ltd, (250) 717-0733 E-Mail: email@example.com
©Copyright 2013 Okanagan ATV Tours Ltd. | <urn:uuid:ee3f1cb3-ad56-4c31-9a6f-a5232e89d426> | CC-MAIN-2017-04 | http://www.okanaganatvtours.com/training.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00275-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.937571 | 336 | 1.59375 | 2 |
On October 8, 1944, a 37-year-old Italian priest named Father Placido Cortese exits the Basilica of St. Antonio in Padua and gets into a waiting car which then drives away. He is never seen again. It is World War II and Father Cortese plays a vital role in an underground resistance network ultimately responsible for saving hundreds of lives. Using a secret Vatican fund, Cortese rescued Jews, Slovenians, Croatians, and Americans from the hands of Italy's Fascist regime and from their Nazi allies. This documentary tells the story of their heroic efforts and of Father Cortese's disappearance. Through extraordinary eyewitness accounts and official records, we learn about the young priest's abduction by the Gestapo and of his refusal, in the face of brutal torture, to name his collaborators. | <urn:uuid:518156a4-1905-46ec-9a3b-9bec3edbf4a8> | CC-MAIN-2017-04 | http://www.ignatius.com/Products/FPCO-M/father-placido-cortese.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280761.39/warc/CC-MAIN-20170116095120-00097-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.960456 | 163 | 2.015625 | 2 |
Pronunciation_ProblemsEffective pronunciation is critical to any oral conversation activity inside the classroom and conversations outside the class, yet as noted in “Unit 13 Teaching Pronunciation and Phonology” of the International TEFL and TESOL Training course, phonics is one of the most neglected aspects of english language instruction. Every student learning english faces different difficulties in pronunciation, especially depending on his or her nationality and background. japan
ese learners of english generally have difficulty in two main areas of phonics – suprasegmental, including stress and tone, and segmental, including individual sounds and consonant blends, especially sounds that don’t exist in japanese and those that are similar in english so that they sound the same to the japanese learner. However, with several speaking drilling practices and a focus on phonics in the classroom, these difficulties can be overcome so a japanese student learning english can feel more confident in his or her speaking ability. Learning phonics will also drastically improve reading ability and allow a student to learn more independently.
OVERVIEW OF PROBLEMS
The japanese phonetic writing system consists of hiragana (used for words of japanese origin) and katakana (used for loan words from english or other languages. For example, driving is pronounced doraibu). Katakana does not include all of the sounds in english, nor does it incorporate all of the consonant blends in english (Foxy Phonics, 3). english has many more sounds than japanese and unlike in japanese, there is not a one-to-one relationship between sound and symbol (Bradford, 1). As a result, a japanese student of english will likely face several problems when learning english and will often rely on “Katakana english” when reading and speaking english. For example, it is very common for japanese students to add a vowel at the end of every word since that is the structure of the japanese alphabet (and becomes ando or bread becomes bredo).
Barbara Bradford notes in her publication, “Teaching english Pronunciation to japanese Learners,” that japanese students struggle with several suprasegmental sounds (stress, tone) in english phonetics. For example, they have difficulty knowing when to stress syllables (overall rhythmic sound) because in japanese, all syllables are more or less equally stressed. In addition, linking (for example, “linking the final consonant of a word to the initial vowel of a following word” such as /j/ and /w/) can cause confusion and hinder a japanese student’s pronunciation. In addition, segmental phonology (separate, individual sounds) pose some problems, such as /l/ and /r/; /b/ and /v/; and /w/, especially when followed by a vowel other than /a/. Bradford states that /3:/ is “perhaps the vowel whose mispronunciation causes most misunderstanding, such as “walk instead of work” or “barn instead of burn”). Miki Ikeda points to seven main segmental phonology problems in her publication, “Teaching english to japanese Students.” She notes that, “[l/r], [hw/f] and [y/e] (when followed by [i] or [I] such as wheat/feat, year/ear) are the biggest challenges for the japanese.” Furthermore, several english vowels sound the same to a japanese student, especially [a], [o] and [i]. For example, this might cause them to pronounce hot as hote using the japanese o [???].
In addition these segmental and suprasegmental phonetic problems, some cultural reasons may also hinder a japanese student’s grasp of english phonology. Phonics is rarely taught by japanese teachers and most students are expected to memorize a certain sets of sounds rather than see a phonetic pattern develop between certain blends. Perhaps because of intimidation and a lack of formal training in japanese, a japanese teacher of english will likely focus on reading, writing and memorization. Patrick Bickford, an english teacher in japan
who started teaching phonics in the japanese classroom out of sheer frustration, compares an english class without phonics to “forcing…JHS students to strap on life preservers made of lead and push[ing] them into a metaphorical english swimming pool filled with 946 words.”
The most important thing a teacher can do when introducing phonics is to make a plan. Phonics should be taught in a structured order designated by the teacher, such as introducing single letters followed by consonant-vowel combinations. A common class plan follows this order: single letters; consonant-vowel combinations; consonant-vowel-consonant combinations (dab; tef, giy, etc.); regular C blends; diphthongs, double Vs (ae, ai, oa, etc.) irregular consonant blends (ph, ch, sh, etc.) and magic/silent ‘e’ (cute; tide, tape, etc.). Most educational experts agree that phonics is best taught in short segments rather than for long stretches. Fun games to enforce phonics include tongue twisters, nursery rhymes and word ladders/pyramids.
Bickford, Patrick. “Phonics in the japanese Classroom.” 2007.
Bradford, Barbara. “Teaching english Pronunciation to japanese Learners.”
Ikeda, Miki. “Teaching english to japanese Students.”
Farrell, Mairead & Kannon, Mari. “Phonics” 3-8
Kessler, Erin. “What is Phonics?” Foxy Phonics 3-5
Kreeke, Carlien van de. “english Speaking Problems in japanese Classrooms.” 2010.
Shearon, Ben. “Teaching Phonics in japanese Schools.” 2-12
“Teaching Pronunciation & Phonology.” International TEFL and TESOL Training. | <urn:uuid:d7569b52-1193-4f38-8f29-7f36ac896467> | CC-MAIN-2022-33 | https://www.teflonline.net/tefl-testimonials/cost-all-tefl/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00672.warc.gz | en | 0.933584 | 1,355 | 4.125 | 4 |
[#2 in the RexBlog series, Content that Works.]
The subject line of this post is a bit misleading. There is no one wiki entry that will teach you every thing you need to know about research content. Fortunately, you can pick almost any entry on a well organized and managed encyclopedia-model wiki to learn what I’m about to explain. Typically, I’d use a page from SmallBusiness.com, as many of my theories about research content have come while spending hundreds of evening and weekend hours structuring it and learning what works and doesn’t by serving as “head-helper” to people who’d like to add content to it — or who can’t find something they’re looking for.
However, I’ve decided to use the Wikipedia entry Metal umlaut as the example for today’s “lesson.” If you’re curious why, it’s because many years ago, Jon Udell used this entry’s history to demonstrate what a screencast is. Also, after the first draft, I felt this post needed more cowbell.
So here’s what you can learn from a well-done wiki entry about the elements needed in great “research” content:
A precise title: The name of the article is not clever, nor written in any way to compete for busy readers by using tricks that blog writers are constantly trying, say: “10 ways to lose weight you can learn from metal umlauts.” Nope, it’s just “Metal umlauts” — and that’s even been shortened from “Heavy metal umlauts” at some point in the entry’s history.
The beginning of the article starts with a precise definition of what the title is: Unilke a news report that is structured around rules and metaphors people learn first while working on the high school paper — inverted pyramids and 5-W’s and an H (or is it 4-H’s and a W?) — research content is structured around rules learned by those who volunteered to work in the high school library. So, the first thing you should note (if you worked on the high school paper instead of the library), there is no “lede” — the strangely spelled word that American journalists use for the opening paragraph. In the UK, journalists use the easier-to-comprehend term “intro,” which is, come to think of it, a good description of what the opening of good research content should be: a precise introductory definition of the topic about to be explained.
Here’s the beginning of the Metal umlaut entry:
A metal umlaut (also known as röck döts) is an umlaut mark that is sometimes used gratuitously or decoratively over letters in the names of heavy metal bands, for example those of Mötley Crüe and Motörhead.”
You should note that the opening sentence also displays something about good research content that most people don’t know: it can contain wit, as in the way a contributor threw in the term röck döts using metal umlauts
Overview: After the opening, a well-organized Wikipedia entry has a few sentences of overview — typically filled with words and terms related to the topic, thus, if someone is searching for the topic and doesn’t quite enter into Google the correct word or terms for the subject, they might still find the article.
Table of contents: On the majority of articles appearing on Wikipedia, each section and sub-section title of the article is automatically gathered into a Table of Contents that appears in a box at the top of the page. Let me repeat that: Every article has a table of contents that is automatically created from the subject lines of sections and subsections of the article. Those of us who manage sites built on the MediaWiki platform (the open source software Wikipedia uses) know how to override the default settings of Wikipedia to move — or remove — the “TOC.” However, the default setting automatically creates a TOC, giving the reader (and Google) a precise understanding of all the types of information that can be found on the page — and an article-level navigational tool.
Intra-site links: Just look at all those links on the page that go to other pages on Wikipedia. Not only is this good for the researcher who wants to dig deeper into a new term or concept, it is another human-crafted hint to Google for helping to understand the relevancy of words appearing in the article with content found on other pages of the site. Great online research content is packed with inline links to other pages on the site that provide more understanding of the linked word or term.
Citations: One of the ways Wikipedians have tried to minimize the complaints about fuzzy facts appearing on the site is to require citations that appear as footnotes. If you know about the role journal citations played in the origins of Google, you might think about the possible role such citations might play in the current Google algorithm. For researchers, these citations may be the most valuable content appearing on a Wikipedia entry.
“See also” links: These are links to other pages or related categories on the wiki. Unlike inline links that go to articles related to individual words appearing on the page, these links are related to the topic of the entire article appearing on the page. (Sidenote: On a blog post, I believe inline “external links” are good etiquette and the best practice. However, on a research-oriented site, I believe the only inline links should be to pages on that site, and external links should appear as citations or appear in the “eternal links” section of the page.)
External links: As I have advised my children and anyone who reads this blog, Wikipedia is not “truth,” but it can serve as a gateway to truth. One of the most challenging aspects of managing a quality wiki is policing the external links — they are magnets for link spammers. (They are the reason we have a somewhat high barrier to editing an entry on SmallBusiness.com.) Some of the most hotly debated aspects of collaboration on a wiki entry can be what external links to add. Unlike a directory or search engine, a wiki entry is not a place where you collect all the links on that topic (or worse, links that have no possible relationship to the topic), but rather, where you list the definitive or most useful links related to that topic.
Categories: If you’ve read this far, you’re in luck: Here is the true magic of Wikipedia and the MediaWiki platform. I’ve waited until the end, because it is so incredible that I consider it a trade secret. The taxonomy of a wiki is primarily managed through Categories. Across the bottom of each entry, you’ll see a list of Categories to which that article belongs. Great research content is organized with such structure. The term given to the science and art of categorization is “taxonomy.” In some ways, the use of Categories on a wiki is like “tagging” content, but in a more formal and structured way. And to completely bury the most important thing you can learn in this post (again, I don’t like giving secrets away): Categories turn each page of a wiki into the equivalent of a “site map” for the topic of the article. For the reader — and Google — Categories organize every bit of content on the site on every page, making each entry a micro-site about one topic.
(Coming on Wednesday, March 10: Two more kinds of research content that bloggers and journalists don’t think about much, but that internet users — both business and consumer users — spend lots of time using.)
[A reminder from the sales and marketing directors: If your company wants to help potential customers who are researching whether or not to purchase your product or service, I work with an exceptional team of content creators, analysts and strategists at Hammock, a firm that for 20 years has helped companies create content that works. Email me for more information.] | <urn:uuid:e2e6c5a6-7815-4b5f-b392-72915900cc30> | CC-MAIN-2017-04 | http://www.rexblog.com/2010/03/08/20440 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00338-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.923506 | 1,724 | 2.640625 | 3 |
Britain's antiquated drugs laws stand accused of failing millions of people because they bear little or no relationship to the harm caused by everything from a hit of heroin to a seemingly harmless pint of lager.
The Home Office has been warned by its own senior advisers that alcohol and tobacco are more harmful to the nation's health than the Class A drugs LSD and ecstasy.
Research by medical experts, who analysed 20 substances for their addictive qualities, social harm and physical damage, produced strikingly different results from the Government's drug classification system.
Heroin and cocaine, both Class A drugs, topped the league table of harm, but alcohol was ranked fifth, ahead of prescription tranquillisers and amphetamines.
Tobacco was placed ninth, ahead of cannabis, which has recently been downgraded from a Class B to Class C drug, at 11th.
Alcohol and tobacco, and solvents, which can also be bought legally, were judged more damaging than LSD (14th) and ecstasy (18th).
The warning on alcohol comes amid growing alarm among ministers over a surge of "binge drinking" over the last decade. They fear it is fuelling rising levels of violent crime and creating long-term health problems for the nation.
Methadone, used to wean heroin addicts off the drug, also scored highly, being judged more dangerous other Class A substances.
The research will put more pressure on the Home Office to a rethink the 35-year-old system for classifying illegal drugs as Class A, B or C substances. It reflects the penalties for possessing them or dealing in them, but that means heroin is categorised alongside drugs such as ecstasy.
The analysis was carried out by David Nutt, a senior member of the Advisory Council on the Misuse of Drugs, and Colin Blakemore, the chief executive of the Medical Research Council. Copies of the report have been submitted to the Home Office, which has failed to act on the conclusions.
Professor Blakemore told the BBC Radio 4 Today programme: "Alcohol, on our classification, is the fifth most harmful drug - more harmful than LSD and by a long way than ecstasy and cannabis and a whole range of illegal drugs.
"That's not to say there's any argument that alcohol should be made illegal, but it does give one a feel for the relative harm potential from any drug."
Strongly influenced by the research, MPs on the Commons science and technology select committee demanded an overhaul of the system to give the public a "better sense of the relative harms involved".
They called for a new scale to be introduced, rating substances on the basis of health and social risks and not linked to legality or potential punishments.
They questioned whether ecstasy and magic mushrooms should remain in Class A and called on the Government's drug adviser, the Advisory Council on the Misuse of Drugs (ACMD), to look at the issue.
Phil Willis, who chairs the committee, said the current classifications were "riddled with anomalies" and were "clearly not fit for purpose".
"This research shows why we need a radical overhaul of the current law and a radical review of the classification system," he said.
"It's clearly not fit for purpose in the 21st century, neither for informing drug-users or providing public information."
One committee member, the Liberal Democrat MP Evan Harris, said that putting drugs in the wrong category "undermined the whole system". "Lots of young people know that there's a difference between ecstasy and heroin," he said.
Martin Barnes, chief executive of the drugs charity DrugScope, said: "With ecstasy, although it is a harmful substance and has led to deaths, if you look at its harmfulness with other Class A drugs, it is much less harmful in terms of links to criminality, mortality and poor health.
"But one of the difficulties, if the classification of a drug is changed, is that that then becomes a key issue in terms of politically how it is received."
Cannabis was reclassified from Class B to Class C in 2004 on the advice of the ACMD. The move prompted fierce criticism in some quarters and was later reassessed in light of new scientific data.
Critics said the change sent out a message that cannabis was not harmful, and downgrading it had caused confusion over whether the drug was still banned.
But in January, the then Home Secretary Charles Clarke announced that after an ACMD review of evidence, the decision to downgrade cannabis would stand. His successor, John Reid, has so far made no pronouncements on drugs policy.
Lord Victor Adebowale, chief executive of the social care organisation Turning Point, said: "Our work across the country with people affected by drugs and alcohol tells us that a classification system should take into account the health, social and economic costs of substance misuse."
Reforming the laws
By Jeremy Laurance
More than a third of people claim to have taken illegal drugs during their lifetime, and 10 per cent say they have done so in the last year. Efforts to restrict drug use have failed to curb high rates of consumption in the UK. Though use of heroin and crack cocaine is comparable to other countries, use of recreational drugs is higher.
Britain had a relatively liberal approach to drugs in the 1960s, with heroin prescribed to addicts. The 1971 Misuse of Drugs Act introduced "ABC" classification: Class A drugs such as heroin carry the highest penalties, with lesser penalties for class B and C drugs.
But evidence has shown policies based on enforcement alone have failed. In 2002, the Home Affairs Select Committee, which included the future Tory leader, David Cameron, said this was the "single lesson" that had come from the previous 30 years. It backed a proposal by David Blunkett, former Home Secretary, to downgrade cannabis to class C.
A trial relaxation of the laws on cannabis went ahead in Lambeth, south London, where police guidance was changed from arresting and charging people for possession of small amounts of cannabis, to focusing on dealers. The experiment was extended nationwide with the reclassification of cannabis in 2004. The Government is now considering a proposal for a new lower threshold for a presumption of supply, which sources suggest could be 5g of cannabis and 5 tablets of ecstasy. The proposal has been criticised by the Advisory Council on the Misuse of Drugs as a retrograde step that will lead to more police time being spent on users rather than dealers.Reuse content | <urn:uuid:0a68e3f7-94c7-403a-ad06-70d6a684c206> | CC-MAIN-2017-04 | http://www.independent.co.uk/life-style/health-and-families/health-news/drug-classes-have-little-link-to-the-dangers-410087.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00514-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.967328 | 1,322 | 2.4375 | 2 |
Before the Obama-produced documentary Crip Camp: A Disability Revolution dropped on Netflix in January, it received quite a build-up.
Everyone was praising the documentary — well, the idea of the documentary — for offering a platform for disability representation.
But when Crip Camp dropped, nobody actually seemed to watch it. And it’s a damn shame.
Crip Camp marketed itself as a documentary about a hippie-dippie camp for kids with disabilities in the 1970s. The trailer (below) showed kids with various physical and mental abilities laughing and being free to be children, possibly for the first time in their lives.
But the documentary is about so much more than that and, in fact, the parts about the actual camp itself are probably the least interesting bits.
Because after we leave the camp behind, we follow a few of the camp alums as they get heavily involved in the disability rights movement.
The most impressive by far is the incredible Judy Heumann who becomes a leader in the movement. She organizes sit-ins and protests, one of which basically shut down traffic in New York City.
The second half of the documentary mostly focuses on Judy and her camp friends as they fight hard for Section 504 of the 1973 Rehabilitation Act to be enacted. The law is the very first to grant civil rights to those with disabilities, banning discrimination in any place that receives federal funding (schools, hospitals, etc.).
But even after the law was signed, it took endless fighting for it to actually be implemented. Judy and other disability civil rights leaders led a 20+ day sit-in in San Francisco — an impressive feat for anyone, but especially for a group that included individuals who couldn’t roll themselves over in the night to avoid bed sores or feed themselves. And yet, the activists never wavered.
And the community rallied around them. The Black Panthers sent food every day and a local nurse offered to come and wash anyone’s hair who wanted it.
When those in Washington ignored the sit-in, Judy took a small group to D.C to organize demonstrations and speak with senators (the trip was paid for by community supporters). In 1977, they finally won their first big battle and the Department of Health, Education, and Welfare officially implemented Section 504. This meant that, among other things, every public school, every public hospital, every publicly-funded building had to have wheelchair-accessible bathrooms. Every public sidewalk had to have mini ramps at the corners.
Section 504 was just the first disability civil rights win (remember, it only applied to institutions that received federal funding). It wasn’t until 1990, 13 years later, that the Americans with Disabilities Act was passed and prohibited any kind of discrimination against individuals with disabilities. That including jobs, schools, transportation, and more.
Perhaps what makes this documentary so incredibly special is that instead of using people with disabilities as inspiration porn, it presents people with disabilities as actual people first. And yes, what they’re doing is incredibly inspiring. But it’s not because they are people with disabilities who are living their lives. They’re inspirational for all the amazing things they do and for their amazing tenacity, not because they happen to be disabled.
The most poignant moment of the documentary comes towards the end, after Judy and the movement have won their fight for Section 504. Judy says,
“On the one hand, I’m feeling like I should say everything is wonderful [but] I don’t feel that’s at all what we talked about. And I’m very tired of being thankful for accessible toilets. I really am tired of feeling that way when I basically feel that if I have to feel thankful about an accessible bathroom, when am I ever gonna be equal in the community?”
And it’s true. We treat people with disabilities as second-class citizens. Our world is built for abled bodies and any accommodations otherwise are considered a nuisance (which is one of the ridiculous reasons that the implementation of Section 504 was delayed for so many years).
When we talk about equal rights, we rarely even bother to include people with disabilities, let alone discuss how to make our world more inclusive for them.
If nothing else, Crip Camp serves as an important reminder of the incredible privilege people with abled bodies live with every day and how much we need to open our eyes to the injustices around us.
But as you watch Judy and her friends fight for their rights, I have a feeling you’ll be nothing but inspired to join the fight right alongside her.
For seven years, Judy Heumann served as Special Advisor for International Disability Rights to President Barack Obama. The position has since remained vacant under Trump. | <urn:uuid:91ec80e9-5646-42bc-989f-0ebca6f02cbb> | CC-MAIN-2022-33 | http://www.femestella.com/netflix-crip-camp-documentary-review/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00679.warc.gz | en | 0.966613 | 982 | 2.140625 | 2 |
Every parent wants their children to grow up to be loving, responsible adults. We do everything in our power to teach them right from wrong and how to get along well with their friends. We try to teach them to respect their elders and live a life filled with love and companionship. However, sometimes the words that come out of our mouths don’t reflect the way we act. Have you ever stopped to wonder how your actions could be interfering with the message you are trying to pass on to your kids? Let’s look at some of the ways in which we can be cognizant of better ways to model good behavior.
Keeping Angry Words in Check
It goes without saying that everyone gets angry at some point. We are human. However, all the expletives that come out of our mouths aren’t what we would like our children to parrot. Some parents have made a game of it with their children to show them just how wrong it is to sprout obscenities. They put a piggy bank or coffee can with a slit in the lid on a shelf. Every time an adult breaks the cardinal rule and utters one of the ‘no-no’ words, they put a quarter or even a dollar in the can. At the end of every month, the kids tally the ‘bank’ and get to spend it on a treat or toy. It’s one way to teach the cost of inappropriate language. They surely wouldn’t like to be the one depositing that money!
People of Faith Must Live the Message
Let’s take Christianity as an example. So many families profess to be Christians but don’t live the Gospel message. We forget that Jesus came to teach the message of love. Perhaps we see people in need and walk by as if it’s not our concern. Maybe we talk about God but don’t belong to a faith-filled community. In order to remind ourselves that we truly do believe in the Gospel message of “love one another as I have loved you,” is to perhaps wear a cross around our neck. Any pendant or ring that has an emblem of faith can be our reminder that we are here for a purpose. These can easily be found in online religious stores like holyart.com. However, it is important to use these religious items as a reminder. They are more than jewelry and more than just a sign of our faith. They should be a reminder of how we should be living.
Be Continually on Guard
Even though we live life in the fast lane, it is imperative to be ever mindful of how our actions can be perceived. Bear in mind that little children look up to their parents and will mimic things they say and do. Take the time to regularly assess how you are acting and if it is teaching a message contrary to how you would have your kids behave. It isn’t always going to be easy, but with time and effort, it can be done. You’re doing it for them, after all, so it’s well worth the effort. | <urn:uuid:2b22c82e-617d-4a26-8e3f-a3a060d32fc7> | CC-MAIN-2022-33 | https://shiftedmag.com/importance-of-modeling-good-behavior/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00074.warc.gz | en | 0.966297 | 641 | 2.1875 | 2 |
Facebook CEO Mark Zuckerberg said in an interview at TechCrunch's Disrupt conference yesterday that the U.S. government "blew it" when it comes to spying by the NSA.
Zuckerberg said the government doesn't do a good enough job at balancing citizens' personal privacy and liberties against potential security threats.
His statements carry a lot of weight. Facebook was one of the tech companies named in the documents about the NSA spying program PRISM that was leaked a few months ago. Facebook later denied that it gives the government "direct access" to user data.
More recently, Facebook, Yahoo, and others have asked the government to allow it to be more open about the kind of requests for user data it gets from the government. It's a relatively common practice for tech companies to get requests from the government for user data, but they legally can't discuss much about it.
According to Politico, Zuckerberg will meet with four top Republicans in the House of Representatives next week to discuss NSA spying.
Yahoo CEO Marissa Mayer, who also spoke at TechCrunch Disrupt yesterday, said it would be "treason" if Yahoo shared more details about what kind of data requests it gets from the government. | <urn:uuid:09564cec-1280-474f-a8f7-6ee114656bc2> | CC-MAIN-2017-04 | http://www.businessinsider.com/zuckerberg-says-government-blew-it-nsa-spying-2013-9 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00337-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.969759 | 246 | 1.601563 | 2 |
- Shop Online
- Join and Give
About This Artwork
Oil on canvas
68.6 x 57.2 cm (27 x 22 1/2 in.)
Restricted gift of Alexander C. and Tillie S. Speyer Foundation; Samuel A. Marx Endowment, 1991.27
In this vividly colored self-portrait, Beauford Delaney represented his likeness with a vibrant yet haunting intensity.The son of a Tennessee preacher, Delaney studied art in Boston before settling in 1929 in New York, where he became a familiar fixture in the downtown art scene, befriending such Abstract Expressionist artists as Willem de Kooning and Jackson Pollock. Using bold, thick strokes of paint to render his features, Delaney projected a penetrating, uncompromising view of himself, suggesting an intensive scrutiny of his psyche as well as his appearance. The visionary power of this self-portrait shares many qualities with the expressionistic work of Pollock from this time.
— Permanent collection label
Newark Museum, Against the Odds: African-American Artists and the Harmon Foundation, Jan. 13-Apr. 15, 1990, cat. 25; traveled to Charleston, Gibbes Art Gallery, May 7-July 9, 1990, Chicago Public Library, Cultural Center, July 28-Sept. 29, 1990.
Art Institute of Chicago, In Their Own Right: Images of African Americans, Sept. 27, 1997-Jan. 11, 1998.
Art Institute of Chicago, A Century of Collecting: African American Art in the Art of the Art Institute of Chicago, Feb. 15-Mar. 18, 2003.
Minneapolis Institute of Arts, Beauford Delaney: From New York to Paris, Nov. 20, 2004-Feb. 20, 2005, cat. 5.
Esther E. Grisham, Art Education 46, 4 (July 1993), pp. 25-28, 37-40.
Andrea D. Barnwell, “Self-Portrait,” Art Institute of Chicago Museum Studies 24, 2 (1992), pp. 200-02 (ill.).
Andrea D. Barnwell and Kirsten P. Buick, “A Portfolio of Works by African American Artists Continuing the Dialogue: A Work in Progress,” Art Institute of Chicago Museum Studies 24, 2 (1999), p. 185.
Philippe Briet, ed., Tributary (Edgewise Press, 1999).
Judith A. Barter et al., "American Modernism at the Art Institute of Chicago, From World War I to 1955," (Art Institute of Chicago/Yale University Press, 2009), cat. 149.
Atelier Dore, San Francisco; Salander-O’Reilly Galleries, New York City, by 1991; sold to The Art Institute of Chicago, 1991. | <urn:uuid:4a425952-319b-4ba3-aaf7-a2c37e6a04af> | CC-MAIN-2017-04 | http://www.artic.edu/aic/collections/artwork/111629 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00169-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.862778 | 586 | 1.679688 | 2 |
oh so it means het! they got 1 male and 1 female heterozygous for albino for 500£ Im seriously might be thinking about this!My googles not working atm so I can't link you to a site if you type "heterozygous definition" into google some sites will be able to tell you what it means. It's all to do with genes, alleles and that sort of thing.
I think basically it means that the snake has the genes and stuff for a certain morph but it doesn't have the appearance but it affects the appearance of the babies if they breed.
So if you have 2 normal corns and ones het for something then the babies wouldn't look like normals. | <urn:uuid:1385929c-f96f-48c0-80d0-dfdf38868f74> | CC-MAIN-2022-33 | https://www.reptileforums.co.uk/threads/what-does-heterozygous-meen.135941/?u=9232 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00067.warc.gz | en | 0.946962 | 154 | 1.546875 | 2 |
The Syrian military shot down an unarmed Turkish Air Force RF-4E Phantom fighter plane on June 22, killing its two pilots, captain Gokhan Ertan and lieutenant Hasan Huseyin Aksoy. According to Turkish authorities, the Syrians also fired on a search-and-rescue aircraft attempting to find the wreckage of the destroyed jet, which eventually was located on the Mediterranean sea floor, 3,300 to 4,300 feet (1 to 1.3 kilometres) below the surface.
Turkish officials assert that the aircraft was targeted without warning while inside international airspace, and after straying briefly into Syrian skies. Syrian government sources claimed the shoot-down took place while the plane was inside Syrian airspace and may have been caused by "mistaken identification." Syrian functionary Omran Al-Zubi insinuated on June 27 that the Turkish fighter was mistaken for an Israeli jet: as he said, "they both are from the same factory, from the U.S., maybe Syria thought it was an Israeli plane."
The response of Turkey's Prime Minister Recep Tayyip Erdogan, the neo-fundamentalist leader of the Justice and Development Party, or AKP, has been characteristic: combining harsh rhetoric with limited performance. On June 25, Erdogan denounced the downing of the Turkish warplane as a "hostile act" and said that Turkey would react with military force to any further aggression by Syria. Turkey has since moved tanks and artillery to the Turkish-Syrian frontier.
Turkish-Syrian relations however, are complicated by the violent conflict between the Syrian government of Bashar Al-Assad and its opponents. Some 30,000 Syrians have already sought refuge in Turkey. After promising the Syrian protestors publicly that he would support their struggle, Erdogan reportedly has allowed the main anti-Assad group, the Free Syrian Army, to recruit and train on its soil.
The downed RF-4E Phantom raised tensions between the two countries to a new and dangerous level. Ankara was allied with Damascus until the callous nature of Al-Assad's recent terror against his subjects became obvious to the world. Turkey and Syria, however, have previously approached open war. In 1998, Turkey, then firmly secular, pressured Syria, under threat of direct military intervention, to expel Abdullah Ocalan, leader of the radical Kurdish Workers Party, PKK. Syria expelled Ocalan, but did not hand him over to the Turkish government. Ocalan instead travelled via Russia eventually to Kenya, where, after being sheltered by the Greek Embassy, he was arrested in 1999 at Nairobi's international airport.
How successful Erdogan's employment of military pressure will now be is uncertain. His speech on June 26 to AKP parliamentary deputies was broadcast live by the pan-Arabic news channel Al-Jazeera. In the speech, he declared that Turkey would not accept, with hands tied, an attack on its air force. He went on to say, "However valuable Turkey's friendship is, its wrath is just as strong."
In the same discourse, Erdogan denied any legitimacy to the Al-Assad hierarchy. Erdogan emphasized, "We will offer all possible support to liberate the Syrians from dictatorship… a tyrannical regime that kills its own people" and which is also "a clear and present danger" to Turkish security. He warned that the Syrian rulers would suffer Turkey's "furious anger," and announced that "any military element that approaches the Turkish border from Syria, posing a security risk or danger, will be regarded as a threat and treated as a military target."
Erdogan has sought international support for Turkey's posture on Syria. NATO, of which Turkey is a member, assailed Syria's attack on the Turkish plane. The secretary-general of the Atlantic alliance, Anders Fogh Rasmussen, said, "We consider this act to be unacceptable and condemn it in the strongest terms." Rasmussen referred to it as "another example of the Syrian authorities' disregard for international norms, peace and security and human life."
Unanswered questions surround the episode: as the Turkish RF-4E jet is a reconnaissance craft, Ankara has been accused of testing Syrian air defenses. The Turkish academic Hasan Koni, who is critical of Erdogan's administration, noted on the Turkish television network NTV that the plane, one of the oldest models in Turkey's air arsenal, was brought down near the Syrian city of Latakia, 44 miles (70 kilometres) from the Russian navy base at Tartus, Syria -- the last Russian military facility outside its territory, and the sole refueling station for Russian naval forces in the Mediterranean. Koni suggested that the plane could have intended to observe the Russian installation.
The Turkish public has been, as it has been so often, swept by conspiratorial rumors about the Syrian shoot-down. Many Turks are convinced that the United States wishes to use their country as a proxy against Syria in a war that could deeply harm Turkey. Anti-war sentiment is high, and supported by many in the secular opposition's Republican People's Party, or CHP. In a statement after a meeting with Erdogan on June 25, CHP leader Kemal Kilicdaroglu called the Syrian attack "intolerable," and said, "Nobody should dare test Turkey's deterrence and strength. Turkish foreign policy, at the same time, should not pursue a line that would lead to such incidents." Still, according to the authoritative daily, Hurriyet, Refik Eryilmaz, a CHP deputy for Hatay, the Turkish province on the boundary near where the plane was downed, "reportedly said at his party's closed-door parliamentary group meeting, 'We have to believe our foreign minister. But our past experiences show that we have to be cautious. The [AKP] initially denied secret talks with the PKK, but later they admitted it. That is why we should be very careful.'"
Erdogan projects himself as a patron of the Muslim world. This is the danger in his position. Isolated operations by Turkey against Syria will not resolve the situation. Erdogan appealed to NATO only for talks with its other members based on Article 4 of the 1949 North Atlantic Treaty, which provides for mutual consultations when a member is threatened. He did not invoke Article 5, which describes an attack on one NATO member as an attack on all, in which the entire body must mobilize to defend the member under assault. As he has before, Erdogan employs bluster and intrigue simultaneously, with one single aim: the expansion of Turkish regional power. | <urn:uuid:73adcc4e-de60-4cff-b69f-f72d6433adb0> | CC-MAIN-2022-33 | https://www.gatestoneinstitute.org/3145/syrian-shoot-down-erdogan-response | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571190.0/warc/CC-MAIN-20220810131127-20220810161127-00069.warc.gz | en | 0.975626 | 1,316 | 2.34375 | 2 |
Earthquake Engineering Study Abroad in New Zealand
A group of 18 Purdue students traveled to Christchurch, New Zealand May 23rd through June 1st for the study abroad portion of a CE course on earthquake engineering. The team was led by Ayhan Irfanoglu, Associate Professor of Civil Engineering, and Jill Churchill from the Global Engineering Program at Purdue. The University of Canterbury at Christchurch served as the host institute.
The location was unique in the sense that the city of Christchurch (pop. ~400K) is still trying to recover from a series of earthquakes that shook the city and surrounding area between September 2010 and December 2011. The devastating blow came on February 22, 2011 when a magnitude 6.3 earthquake hit the city during lunch time. It killed 185 people, caused nearly $40B of losses (with nearly 70% of the central business district damaged and to be demolished), and resulted in large areas of town being abandoned due to liquefaction induced settlement (the widest native soil liquefaction observed in modern history).
On the technical side, the group toured Christchurch and visited the town of Lyttelton, epicenter of the February 2011 earthquake. They viewed the devastation to the built environment in greater Christchurch and Canterbury region, and listened to testimonies at the Quake City Museum. The group had an ICOMOS-NZ Chair guided tour of the 19th century Canterbury Provincial Government Buildings (currently stabilized and preserved for the next generation to find out what they want to do as the funds fell short to retrofit them fully), and a lead-structural engineer guided tour of the 19th-20th century Arts Centre - the original site of the University of Canterbury, and where Rutherford developed his theory of the atom - undergoing $290M retrofit and restoration. Other tours of retrofit sites on campus included the Civil Engineering building, the so-called transitional Cardboard Cathedral (with an expected lifespan of 50 years), and the Cashell Mall Re:Start, the main shopping mall made creatively out of shipping containers. They also toured the civil engineering laboratories at the University of Canterbury.
In addition to the tours, the students were able to experience a number of engaging lectures given by Canterbury faculty, engineers (including three engineers from the Christchurch office of Thornton Tomasetti), and experts in seismology, structural and geotechnical earthquake engineering, civil defense and emergency response, recovery planning and field-application, and sociology.
Cultural events included a day trip to the coastal town of Akaroa (at the core of a long-extinct volcano), Okains Bay, and Arthur’s Pass National Park in the Southern Alps. The team unwound during a fun-filled improvisational comedy show “Scared Scriptless,” where one student from the group was brought on stage to assist in the performance. The trip concluded with a farewell dinner followed by a performance of Shakespeare’s A Midsummer Night’s Dream. The show and the play were at the temporary hangar-like site of the Court Theatre, originally located in the Arts Centre the group had toured earlier. It was a pleasant surprise to find out the set, sound, and costume designers of the play were all Boilermakers, and a toast was raised to Purdue during the reception on the other side of the world!
The group was truly able to see a lot, learn a lot, and have a great time on the South Island of New Zealand. A summary of the trip from one of the students states:
“It was truly once in a lifetime, and I will never forget the experiences I had and all of the amazing sites I saw. I really hope that this course continues because I thought it was the perfect balance between lectures that kept me interested and taught me so much, and tourism throughout the Christchurch area. I had so many stories and experiences to tell people about when I came home. I have never seen, in person, the results of a natural disaster such as this, and I have never seen so much civil engineering work in one place to rebuild a city. The work that the civil engineers are doing in Christchurch have made me so proud to one day play such a crucial role in society like them, and be so involved in the community.” | <urn:uuid:ad72b72f-1969-4008-abb9-bd6662fd81fe> | CC-MAIN-2022-33 | https://engineering.purdue.edu/CE/AboutUs/News/Features/earthquake-engineering-study-abroad-in-new-zealand | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00076.warc.gz | en | 0.973742 | 878 | 2.203125 | 2 |
Each 2.5 g of Trepanol contains :
Quinapyramine Sulphate : 1.5 g Quinapyramine Chloride : 1.0 g
Trepanol is a very effective and well tolerated drug used for the treatment and control of Trypanosomiasis in cattle, camels, horses and dogs.
DOSAGE & ADMINISTRATION
Preparation of injection solution Dissolve 2.5 g of Trepanol in 15 ml sterile water.
For the treatment of T. congolense1 ml of injection solution per 45 kg b.w.
For T. evansi, T. equiperdum, T. equinum
2 ml of injection solution per 45 kg b.w.
Trepanol can be administered by subcutaneous route. Behind the shoulder and midline of the dewlap or caudal fold are the common sites for injection in cattle. In horses in front of the shoulder is the usual site for injection.
Trepanol is available in 2.5 g glass bottles along with diluent. | <urn:uuid:4e087f3f-19f5-485a-a286-a58bbf347275> | CC-MAIN-2022-33 | https://vet24x7.com/product/1335/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00069.warc.gz | en | 0.777761 | 242 | 1.8125 | 2 |
The Life and Crimes of Margaret Sanger Part V: Birth Control and Abortion
Posted by Matthew McCusker on 4 December 2012
Margaret Sanger's most concrete legacy is surely the International Planned Parenthood Federation which consists of 150 affiliated organisations working in 172 countries. Together they form the largest organisation in the world dedicated to the promotion of contraception and abortion.
Margaret Sanger's name is therefore inextricably associated with abortion, yet during her lifetime the practice was illegal in most American states and in almost every country in the world. It will be of interest then to consider Sanger's views on abortion and ask why the birth control organisations she led were to become the major abortion providers wherever abortion was legalised, and the major advocates for its legalisation in those nations where it was not.
Sanger was in favour of abortion from an early stage in her career despite her reluctantance to support it publicly. In her 1920 book Women and the New Race she claimed that throughout history societies have feared overpopulation and therefore practiced abortion and infanticide. Accordingly she argued that only the widespread availability of artificial birth control could bring an end to such 'horrors'. Sanger gives examples of women who have been 'forced' into abortion because they could not afford any more children. She used the natural abhorrence of abortion to try to overcome the equally natural abhorrence of contraception. If she was sincere in her profession that abortion was something to be regretted she was nonetheless prepared to support it. In her book Family Limitation she stated baldly that 'no one can doubt that there are times when an abortion is justifiable.' According to Angela Franks there is evidence that her Birth Control Clinical Research Bureau referred at least seventy-five women for abortions1. Indeed Sanger's criticisms of abortion seem to focus on the danger abortion procedures pose to the health of the mother rather than on the rights of the unborn child.
One of the major questions Sanger poses in Women and New Race is 'Contraceptives or Abortion - which shall it be?' Sanger's commitment to radical sexual liberation, which admits no possibility of sexual abstinence or self-restraint, combined with her conviction that overpopulation is the cause of poverty, renders her unable to accept the possibility of any other solutions to the problems that she raises. This refusal to acknowledge that rational human beings can exercise self-control in sexual matters is very prevalent today. Young people are taught to consider themselves as subject to uncontrollable desires which will result either in 'unwanted pregnancy' or sexually transmitted diseases unless they allow themselves to be subjected to a variety of contraceptive methods. Modern sex education therefore strips from young people any sense of self-respect or true understanding of their sexuality.
Ann Furedi, Chief Executive of BPAS (British Pregnancy Advisory Service), has argued that we must either view abortion as a 'problem' or we must "allow people their moments of intimacy, we allow them to enjoy sex, and we allow them to make use of abortion as a back-up to contraception2." In other words, as no limit can reasonably be placed on the pursuit of sexual pleasure (because the right to such pleasure is so fundamental and the desire for it so overwhelming) it is permissible to destroy the 'unwanted' results of such actions, even though they be unique and innocent human beings.
If we have learnt anything in this series of posts about Margaret Sanger it is surely that the origins of abortion lie in an erroneous ideology of sexual liberation which separates sexual pleasure from the procreative and unitive ends of the sexual act. Once this isolation of pleasure has taken place then it becomes 'necessary' for birth control to be used to allow for the maximum pursuit of this pleasure. The failure of birth control to prevent all 'unwanted pregnancy' then renders abortion equally 'necessary'. This is why the birth control movement was brought forth by the movement for 'sexual liberation' and why it has seamlessly developed into the abortion industry that we confront today.
Only by working tirelessly to restore a true understanding of human sexuality can the pro-life movement ensure that all human life will once more be loved, protected and welcomed.
You may be interested in reading the other posts in this series:
The Life and Crimes of Margaret Sanger: Part I
The Life and Crimes of Margaret Sanger II: From Marx to Malthus
The Life and Crimes of Margaret Sanger III: Eugenics and Birth Control
The Life and Crimes of Margaret Sanger IV: Eugenics and Race
1. Angela Franks, Margaret Sanger's Eugenic Legacy: The Control of Female Fertility, p11
2. Ann Furedi, 'Why rising abortion rates are not a problem?', Spiked Online, (31/03/2008) | <urn:uuid:46ccef95-251b-40fa-b2b6-496daef03ac5> | CC-MAIN-2017-04 | https://www.spuc.org.uk/news/blog-archive/2012/december/the-life-and-crimes-of-margaret-sanger-part-v-birth-control-and-abortion | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00146-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.949509 | 972 | 2.5 | 2 |
“Before I came to Hastings College, I hadn’t even dreamed of going to graduate school, now I feel like that's just a natural next step.”
Brian Whetstone, a junior from Kearney, Nebraska, uttered those words fresh off a string of academic successes spanning the past year, from receiving best paper awards at academic conferences to completing an intensive summer program in the heart of Colonial America. But according to Whetstone, all of those successes share one contributing factor: the guidance and genuine support of his professors at Hastings College.
“My professors have raised my academic standards to a point I could never have envisioned coming into college,” Whetstone said. “And in addition to their rigor they genuinely care; about my academics, my success and above all me as a person.”
Reinterpreting the past
Despite crediting Hastings’ faculty for their help along the way, Whetstone has developed quite an impressive record through his own hard work. As a sophomore, his research on the Frank House Museum in Kearney, Nebraska and the changing narratives of the women who lived there earned him Best Undergraduate Paper awards at both the Missouri Valley History Conference in Omaha as well as the Texas A&M History Conference at the University.
Conducting his research as a recipient of Hastings College’s Excelsior Fund Grant, Whetstone spent the summer of 2015 at the Frank House scouring through countless sources, not only on the history of the house, but the history and interpretation of the museum itself. He emphasized the importance of the women who lived there, critiquing their omission in both previous histories and the interpretation purported through the museum.
Dr. Michella Marino, assistant professor of history and Whetstone’s advisor, has worked with him throughout his college career, and directly advised his research on the Frank House.
“As a professor and mentor, it's been extremely rewarding watching each step of Brian's development as a historian--from taking concepts in class and applying them to his work at a museum, to crafting an original research project on the Frank House,” said Marino.
Pursuing public history
Through working at the Frank House and conducting his research on it, Brian developed a keen interest in not only traditional academic history – but public history – the restoration, archivation and interpretation of the past for the benefit of the general public; trading the tweed and elbow pads of a historian for the jeans and t-shirt of a preservationist.
“Of course I’m still interested in traditional history,” Whetstone said. “But as far as my career, I feel a true calling to the preservation of historical buildings. I’ve always been fascinated by architecture, and combining that with my newfound interest in telling their stories, and the stories of the people who inhabited their walls, historic building preservation is a perfect way to combine the two.”
Counting nails in the Carter House
To try his hand at preservation, Whetstone spent the summer of 2016 enrolled in a field school on architectural history at the College of William and Mary in Williamsburg, Virginia. William and Mary is perfectly situated in Colonial Williamsburg, and the restored former capital of the Colony of Virginia became his classroom.
“We spent the first few days learning about architecture and preservation, but then we went right to work on the Robert Carter House in Williamsburg,” said Whetstone. “Our class completed a Historical American Buildings Survey, which included details as fine as counting the number of nails in the floorboards.
At the end of the program, Whetstone and his classmates handed their survey over to Colonial Williamsburg to begin the historical restoration of the house to be opened to the public. Thus, not only did he learn more about preservation, but he truly experienced it in action.
Conversing about the past
But through his experience at William and Mary, Whetstone developed an appreciation for how unique the faculty at Hastings College truly are.
“One thing that really stood out to me was the relationship between professors and students, and how different that was than what I have experienced at Hastings,” Whetstone said. “I would casually mention how Dr. Marino has brought food to class or how the HC professors and students hang around the lounge in McCormick Hall talking about the past, which absolutely astounded my summer classmates from other schools.”
According to Professor of History Dr. Robert Babcock, the difference is intentional.
“History is not just memorizing names and dates and putting them in chronological order; when we do history correctly, it’s sitting around over coffee and talking intelligently about the past,” said Babcock. “In the Hastings College History Department we try to listen to our students, as students develop their own interests -- even if they’re not our own -- we try to encourage them to pursue those interests, and we have a lot of both curricular and extracurricular ways in which they can do that.”
Proposing panels alongside professionals
Those intelligent discussions about interesting things in the past continue to inspire and push Whetstone to tackle daunting projects of genuine interest to him. Most recently, he put together an accepted panel for the annual conference of the National Council on Public History, titled, “Finding Meaning in the Middle: Reinterpreting the Narratives of Historic Sites through Women's History.” Building on his research at the Frank House and experiences in Virginia, Whetstone sought out other public historians with similar interests, inviting them to be on his panel, all of whom are graduate students or professors holding a doctorate. In fact, Whetstone will be the only undergraduate presenting at the conference at all, let alone to organize an entire panel.
“Brian doesn't shirk away from hard work and consistently challenges himself to try new things and explore various avenues of historical inquiry and methodology, Marino said. “The acceptance of his panel proposal at a national conference with professional practitioners of history is a clear testament to this.”
When looking back on his experiences, Whetstone continues to be surprised at all he has accomplished in only his first two and a half years at Hastings College.
“When I first stepped foot on campus as a freshman, I knew I wanted to major in history, but had no idea where I wanted to go from there,” said Whetstone. “Now I’m not only planning on attending Graduate school, but I feel very well prepared to do so.” | <urn:uuid:93e48bff-971d-403f-9fc6-fff1800783ed> | CC-MAIN-2017-04 | http://hastings.edu/success-stories/restoration-and-reinterpretation-whetstone-combines-love-architecture-and-history-hastings-college | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00070-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.971023 | 1,370 | 1.734375 | 2 |
Readers of the British publication Autocar and of its website have voted on “the greatest British car ever made,” and the results are interesting, if not not entirely unexpected.
2. Range Rover
3. Jaguar E-Type
4. Land Rover
5. McLaren F1
6. Range Rover Evoque
7. Caterham 7
8. Morris Mino
10. London Taxi
Nice touch, that last.
The Mini, designed by Alec Issigonis and first produced by the British Motor Corp. in 1959, had a 41-year run, during which time 5.4-million were sold.
A good example of the thinking of “car guys” vs. “bean counters” is encapsulated in an observation by Steve Cropley, editor-in-chief of Autocar: “The Mini had many faults and was never profitable, but it rewrote the rules and had the biggest impact on Britain’s car industry that any car has had.”
It is worth noting that the top 10 producers of cars in the U.K. today are owned by companies or groups that are not British. They are:
2. Land Rover (Tata)
3. Mini (which, as you may know, is now owned by BMW)
4. Vauxhall (GM)
7. Jaguar (Tata)
8. Bentley (Volkswagen)
9. Aston Martin (a multinational investment group)
10. Rolls-Royce (BMW)
Apparently that “never profitable” part of the Mini didn’t work out so well for that car or for other British companies. | <urn:uuid:44439fa2-28d0-4057-86d8-3745d63c2cd0> | CC-MAIN-2017-04 | http://www.adandp.media/blog/post/mini-and-the-issue-of-vehicular-profitability | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284352.26/warc/CC-MAIN-20170116095124-00191-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.955885 | 354 | 1.992188 | 2 |
Shipper — Whitepaper
From pledge to plan: Six practical steps to reduce shipping emissions and realize your sustainability goals
How to leverage available capabilities and options to cut your transportation emissions
Companies of all sizes are working to reduce their emissions and are making sustainability pledges to signal to stakeholders that they’re serious about meeting their environmental goals. Sustainability and cutting emissions can be good for business – optimizing shipping and fuel costs, and attracting investors, employees and customers who want to work with a company that is focused on environmental progress. Promises to reduce emissions are a great start, but many companies are finding that turning their pledges into actionable plans is easier said than done.
Emissions associated with transportation and shipping are one of the largest sources of greenhouse gas (GHG) emissions for many companies, so optimizing supply chains and the transport of goods is key to meeting sustainability goals.
Emerging technologies like battery electric trucks hold a lot of promise and a sustainable future is certainly electric. However, few places in the country currently have the infrastructure and grid capacity necessary for battery electric trucks to operate at scale. The good news is you don’t have to wait for electric vehicle infrastructure to be built out to start dramatically cutting emissions in your shipping and logistics operations. The key is to be smarter with the resources you have and take advantage of existing technologies.
Understand your baseline: Emissions reporting
Before you start looking at how to cut emissions, it is crucial to understand what your emissions actually are. Take the time to understand the types of transportation you are using to move goods and what your miles per gallon equivalent works out to. Establishing a baseline emissions level will give you a clear picture of what your current environmental impact is and what you can do to reduce it.
Step 1: Network optimization
The first step to reducing the carbon footprint of logistics operations is making sure that available resources are being used as efficiently as possible. Think about how many “empty miles” you’re putting on the road when drivers are pulling empty trailers and consider how you might optimize your routes to avoid this. For customers that book freight through Schneider, our experts leverage artificial intelligence to consider trillions of combinations of routes, vehicles, drivers and endpoints to minimize empty miles.
Step 2: Consider mode selection
Trucks aren’t the only way to move freight, and they’re not always the most efficient. Intermodal and Bulk Express Intermodal rail freight offers per-mile emissions savings of 50% over truck freight, making it a highly attractive option for shippers looking to substantially reduce their carbon output. In fact, rail freight is so efficient that it can move a ton of freight up to 500 miles on just a single gallon of fuel. We have developed an intermodal CO2 and fuel savings calculator, so you can see exactly how much of an impact intermodal would have on your carbon footprint. Rail is also highly reliable and predictable because trains, unlike trucks, don’t have to deal with road traffic and are less susceptible to weather delays.
Step 3: Freight consolidation
Consolidating freight ensures that trucks are as full as possible before they hit the road. The fuller the truck, the lower the per-unit emissions of transported goods. Consider whether several smaller loads can be consolidated into one truckload for part of the journey before dispersing to various endpoints. Having fewer but fuller truckloads is one of the simplest ways to dramatically reduce your carbon emissions. Our supply chain and distribution experts leverage advanced software to determine optimal freight composition, giving you the information you need to ship smartly.
Step 4: Use efficient carriers
Make sure that you’re working with efficient carriers that share your commitments to sustainability. Carriers that are EPA SmartWay certified are guaranteed to be measuring, benchmarking and tracking their efforts to improve their fuel use and limit their emissions. Also, check that your carrier is using up-to-date and efficient equipment. At Schneider, we use up-to-date equipment and perform regular maintenance, in addition to adding technologies like automatic tire inflation systems, trailer aerodynamic enhancements and battery-powered HVAC systems that control the cabin temperature without running the engine.
Step 5: Electric vehicles
Start thinking about how battery electric vehicles (BEVs) can fit into your carrier mix and if there’s anything you can do to support creating the infrastructure needed for BEVs. Steps like adding charging stations at warehouses and considering lengths of haul in your distribution network will be critical. Work with a carrier like Schneider that has expertise and experience developing a fully electric fleet and knows how to engage local utility companies.
Step 6: Buy carbon offsets
Achieving sustainability takes time and carbon offsets are one way to make up the difference if you fall short of your emissions reduction goals. Carbon offset credits are available for purchase from third parties that certify carbon capture. In simple terms, you fund projects that remove as much carbon from the atmosphere as you have emitted. Carbon offsets purchases could fund tree planting, renewable energy projects, energy efficiency projects, or methane capture efforts. While carbon offsets are not a silver bullet, they are a valuable tool to help meet your goals when other efforts can’t quite get you across the finish line.
Taking the next step
At Schneider, we have a team of logistics experts that leverage big data and artificial intelligence to find the optimal mix of routes, transport modes, load compositions and drivers to maximize efficiency every day. Our engineers are constantly working to make our diesel fleet more efficient by implementing cutting-edge fuel saving technologies, making us one of the most efficient fleets on the road now.
Companies are getting serious cutting emissions and have developed business offerings that can help make that a reality. Many companies have already made great progress in reporting and reducing direct emissions (scope 1) and indirect emissions (scope 2). However, as companies begin reporting the emissions of their entire value chain (scope 3), collaboration with logistics partners is key. We have the experience and expertise needed to advise companies on how to understand, measure, and reduce their carbon footprint, turning sustainability pledges into concrete plans. | <urn:uuid:1db2da05-f6bc-4075-86a9-e7239ddb6baf> | CC-MAIN-2022-33 | https://schneider.com/resources/whitepaper/six-steps-sustainability-goals | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00472.warc.gz | en | 0.947572 | 1,253 | 2.375 | 2 |
Watching the events in Japan as a small team of people is working on site to try to stabilize six nuclear reactors in the most difficult circumstances I can't help thinking that an international award that recognizes bravery is needed.
Britain awards the George Cross for "acts of the greatest heroism or of the most conspicuous courage in circumstances of extreme danger", Frenchman could be given the Legion d'Honneur and there is an existing International Maritime Organization award for Bravery At Sea.
But the situation at the Japanese nuclear plant can be viewed as a global threat requiring a global response. The men (and, I assume, women) who are staying at the plant are trying to protect their own land as well as the lives of others in other countries. They are clearly in danger themselves from a very unstable and changing situation.
It might seem exaggerated to think that the Japanese nuclear situation is a global threat, but it's certainly a cross-border threat as we saw with the Chernobyl Accident. And thus international recognition is appropriate. It will not be sufficient for Japan alone to recognize their actions as their actions have international consequences.
Thus, I propose the creation of a Nobel Prize for Valor (or something similar perhaps to be awarded by the UN) to be awarded when necessary to those men and women who have stood between danger and humanity. We should all hope it does not need awarding frequently. | <urn:uuid:2d1f8d7a-deb3-4a43-b6e9-c7e8915e9768> | CC-MAIN-2017-04 | http://blog.jgc.org/2011/03/nobel-for-valor.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283301.73/warc/CC-MAIN-20170116095123-00511-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.974253 | 280 | 2.484375 | 2 |
The Legal Services Panel commenced on 1 July 2002 and was renewed on 1 July 2009. Twenty law firms participate in the current panel arrangement. Seven government departments and 23 statutory agencies are panel clients. Although not a member of the panel, the Victorian Government Solicitor’s Office (VGSO) undertakes work across all areas of panel work and records its activity on the procurement system used by panel members, the Legal Panel Gateway (LPG).
Under the panel arrangement, panel firms must report to government on the use of barristers for government work under the panel contract in accordance with their obligation to adhere to the Victorian Bar Equal Opportunity Model Briefing policy.
Since the panel was renewed in 2009, all legal engagements under the panel must be recorded on the LPG. Direct briefing of barristers by departments and agencies typically occurs when an in-house legal team of a department or agency does not use the services of a panel firm but instead briefs a barrister directly. Direct briefing is not required to be recorded on the LPG system, but some departments and agencies have nevertheless adopted a practice of recording their direct briefs. This data is included in the tables in this report.
Data on Women Barristers Briefing Practices
The Victorian Bar reported that as at December 2014, there were 1,981 Victorian practising barristers, of whom 537 (27%) were female and 1,444 (73%) were male.
Table 1 provides information on the aggregated total of barristers’ briefs from government, sorted by gender, for the period 1 July 2009 to 30 June 2015.
Table 1: Barrister briefings by Gender - 1 July 2009 to 30 June 2015
|Male Barristers||Female Barristers||Total|
|% of total fees||74.6%||25.4%||100%|
|No. of briefs||3,159||1,694||4,853|
|% of total briefs||65.1%||34.9%||100%|
|Average fees invoiced||$7,561||$4,794||$6,595|
The last published report on the Legal Services Panel was in 2008/09. That report provided data on barrister briefings from 2003/04 to 2008/09. There were 21,324 briefs, with fees totalling $59.3M.
The reported fees in Table 1 represent just over half of the fees reported in the previous six years of the former panel while the number of briefs in the current six years of this panel is only 23% of the number reported under the former panel.
It is clear from the differences in the two reporting periods that a large number of barrister briefs have not been entered onto the LPG system during the current panel’s term.
Nevertheless, the number of briefs that have been recorded (4,853) allows some comparisons to be made. In particular, while the proportion of fees paid to women barristers has decreased slightly to 25.4%, the proportion of briefs declined from 46% between 2003 and 2009 to 35% between 2009 and 2015. Given the uncertainty of the data, it is not possible to say whether the decrease of 11 percentage points is an accurate representation of an actual trend.
Table 2 shows briefing by panels and areas of law, sorted by gender. The low numbers of briefs recorded under some panels make the data statistically unreliable (for example, Commercial Projects and Resources).
Table 2 - Female barristers briefed by panel type 1 July 2009 to 30 June 2015
|Component||No. of briefs to female barristers||Total briefs||% briefs to female barristers||Fees to female barristers||Total invoiced||% fees to female barristers|
|FOI & Privacy||11||25||44%||$41,788||$151,148||28%|
|VGSO exclusive matters||143||379||38%||$2,269,544||$5,484,330||41%|
Of the 1694 briefs to women barristers, 917 were direct briefs by in-house government lawyers. The personal injuries panel had the lowest proportion of briefs to women barrister (17%) while the FOI & Privacy Panel had the highest proportion (44%). The VGSO briefed women barristers in 38% of its tied work matters, with women barristers’ brief fees comprising 41% of fees in this category.
Table 3 shows briefing by panel firms and the VGSO on behalf of departments and agencies. It also includes some direct briefs by some agencies. The data is based on previous departmental structures before the machinery of government changes on 1 January 2015.
Table 3 - Briefs to barristers by client agencies 2009-2015
|Department/Agency||Fees invoiced to male barristers||No. of briefs to male barristers||Fees invoiced to female barristers||No. of briefs to female barristers|
|Department of Justice||$4,422,772||406||$1,194,734||224|
|Department of State Development & Business Innovation||$3,975,543||22||$365,761||10|
|Department of Treasury & Finance||$3,236,149||383||$835,042||100|
|Department of Education & Early Childhood Development||$2,140,901||104||$801,941||41|
|Department of Premier & Cabinet||$1,808,335||15||$1,892,695||17|
|Department of Environment & Primary Industry||$1,043,401||88||$436,589||37|
|Department of Human Services||$946,849||899||$932,603||728|
|Department of Transport||$826,396||79||$684,650||99|
|Department of Health||$624,336||10||$6,253||2|
|Department of Planning & Community Development||$167,347||16||$31,991||5|
Note: Agencies with minimal spend on brief fees below $100,000 have been excluded from this table.
Table 4 shows barrister briefing data recorded by the VGSO for the period 2009/10 to 2013/14. This data includes both VGSO panel engagements and tied work.
Table 4 - VGSO Barrister Briefing Data
As part of the Government’s commitment to reinvigorate the application of the Women Barristers Briefing Policy and improve the collection of relevant data, the Department of Justice and Regulation (DJR), at the Attorney-General’s direction, will work with other departments and agencies to ensure that the direct briefing of barristers is properly captured and recorded for reporting purposes.
DJR will also use the opportunity of a new panel, which is currently being established to commence on 1 March 2016, to ensure that briefing data is comprehensively and consistently collected from firms selected to provide services to the government and is published at regular intervals. | <urn:uuid:49e65eb4-ebff-469e-9b96-c92237ec5a91> | CC-MAIN-2017-04 | http://www.justice.vic.gov.au/home/justice+system/laws+and+regulation/civil+law/women+barristers+briefing+report+2009+to+2015 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00547-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.900562 | 1,498 | 1.515625 | 2 |
Edward Snowden’s leaks of top-secret NSA documents has unleashed a wave of very strong feelings of anger and betrayal – of the Fourth Amendment prohibition on unreasonable and unwarranted searches and seizures as well as of President Obama’s promise of more transparency. The stories in the Guardian and the Washington Post have played on the fears of those who understand that our democracy cannot function properly in a climate of excessive secrecy, with overzealous prosecution of leakers, journalists, and others who are fighting to keep information accessible adding to their concerns. Throw in an utterly dysfunctional Congress, a lingeringly unsteady economy and an increasingly acrimonious political atmosphere, and we have nothing short of a serious crisis of confidence on our hands.
It was into this atmosphere of simmering frustration on all sides of the political spectrum that Snowden decided to take action when he contacted documentary filmmaker Laura Poitras in January claiming he had information about the intelligence community. Snowden later told the South China Morning Post that he went to Booz Allan Hamilton in order to collect proof of NSC secret surveillance programs to leak to the media, where he began working in March. So it appears that somewhere between 2003 or 2004, when he attempted to serve his country by joining the Army Special Forces, and the beginning of Barack Obama’s second term as president, Snowden came to the conclusion that the United States had no right to conduct the secretive surveillance it was engaged in and that he was uniquely qualified to commit the crime of stealing top-secret information so that he could expose this wrong to the world.
The purpose of this article is not to criticize the exposure of secret surveillance programs that may be the instruments of abuse of power. Its purpose is to argue that the character, actions, and intentions of the leaker matter – a point that the insistence by Snowden and his supporters that the story should focus on the leaks, not the leaker, denies.
Ecuador and other problems
When WikiLeaks first gained worldwide attention for their publication of the Collateral Murder video in 2010, the idea of exposing all of the wrongs that the government might be hiding behind a wall of secrecy was invigorating. Then the organization’s coordinated publication of diplomatic files gave us an unvarnished look at the arrogance of U.S. diplomats, putting on display not only government corruption but also showing how spying and underhanded manipulation seemed to be more important than actual diplomacy. WikiLeaks, Julian Assange, and Bradley Manning were hailed as heroic defenders of democracy, and a wide public discussion about the damaging effects of overclassification and excessive secrecy was launched.
Now, Assange has been holed up in the Ecuadorean Embassy in London to avoid extradition to Sweden on trumped-up sexual assault charges, which, presumably, would lead to his extradition to the United States. This episode has gone beyond exposing the human weaknesses of the man behind WikiLeaks; it engendered a more critical look at what the real objectives might be of an organization that states,
“Publishing improves transparency, and this transparency creates a better society for all people. Better scrutiny leads to reduced corruption and stronger democracies in all society’s institutions, including government, corporations and other organisations. A healthy, vibrant and inquisitive journalistic media plays a vital role in achieving these goals. We are part of that media.”
Unfortunately, Assange has continually resisted relevant scrutiny of himself and his organization. Particularly problematic is his refusal to acknowledge the Ecuadorean president’s squashing of healthy, vibrant journalism, insisting that Ecuador’s status as a small nation with no surveillance network that is not under the thumb of any of the world superpowers is more important.
Ecuador is also the destination of Edward Snowden, who is now being assisted by WikiLeaks lawyers and activists. In the face of similar criticism about the hypocrisy of free-press advocates choosing to take refuge from the United States in a country that has recently taken draconian steps to stem freedom of the press, the same argument is echoed: What is important is the information that Snowden has exposed about the subversive network of private contractors working with secretive government surveillance programs, not the subversive character of li’l’ ol’ Ecuador. The Communications Law, approved by a National Assembly friendly to President Correa on June 14, establishes a government watchdog to regulate media content and faces journalists with civil and criminal charges if they fail to provide “accurate and balanced” information according the agency.
It has been painful to watch the narrative about a potentially dangerous transnational surveillance complex fail, from the beginning, to sufficiently answer to the reasonable criticism of journalists such as Kevin Drum, a blogger and writer at Mother Jones magazine whose level-headed analysis of the complexities at hand has been a breath of fresh air amid a tempest of conspiratorial hysteria. It is obvious from his prolific writing that Drum supports the cause, yet he finishes his blog post titled Jumping the Shark on Edward Snowden by stating his concerns about Snowden, along with some damn good advice:
“I have lingering questions about his motivations, his timing, his actual knowledge of NSA programs, and his judgment. That said, some of the stuff making the rounds of the chattering classes is just crazy. Settle down, folks.”
Even more painful is seeing WikiLeaks spokesperson Kristinn Hrafnsson defending Ecuador against the charges of the Committee to Protect Journalists (CPJ), brushing off their work as painting “too much of a bleak picture.” CPJ has placed Ecuador in its “risk list” of the top 10 worst countries for press freedom in the world, along with Brazil, Ethiopia, Iran, Pakistan, Russia, Somalia, Syria, Turkey, and Vietnam. Not mentioned in the Guardianarticle is the Friends of the Inter-American Democratic Charter letter, signed by dignitaries and human rights leaders from throughout the Western Hemisphere, expressing “deep concerns about restrictions on freedom of expression in the Republic of Ecuador.”
Unexplained motives and unexplored realities
As entertaining as L’affair Snowden has been to observe, it is difficult to imagine that embarrassing the most powerful nation in the world was not among Snowden’s main goals. At a time when the United States is in the midst of delicate negotiations with China on cybercrime and with Russia on nuclear proliferation as well as the situation in Syria, the revelations of spying undercut some good foreign policy that the U.S. government is, for once, engaged in.
Regarding his judgment, a look at the list of repressive governments that he has turned to for protection, appearances point to the philosophy of “the enemy of my enemy is my friend,” a wartime tactic that has a nasty habit of backfiring.
As to the issue of government secrecy, Snowden claims that Obama “closed the door on investigating systemic violations of law” and “deepened and expanded several abusive programs.” However, a Federation of American Scientists’ Secrecy News report titled “Secrecy System Shows Signs of Contraction” tells a different story, pointing to executive order 13526 of December 2009 that sought to reform the security classification processes.
And finally, one might consider the consequences of countries like Costa Rica and Ecuador lacking sufficient crime-fighting capabilities and thus accountability and justice. Both of these small countries are facing increasing problems with drug-related and other organized crime, aided by weak and corrupt public safety institutions, which, because of the new laws, investigative journalists in Ecuador will have little chance of exposing. | <urn:uuid:08f76d6c-6a6b-4af4-a7f6-852aafcadda4> | CC-MAIN-2022-33 | https://truthout.org/articles/with-the-nsa-leaks-character-actions-and-intentions-matter/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00471.warc.gz | en | 0.958506 | 1,538 | 1.851563 | 2 |
UCD sociologist argues against utopian ideal
At a public meeting in Dublin last night, an audience was told of the socialist alternative to capitalism. An outline was also given of the efficiencies in socialist democracies. By Shane Creevy.
Hosted by the Socialist Workers Party (SWP), and led by UCD sociologist Kieran Allen, the audience was told that the need for societal change was unarguable.
But the idea put forward by many socialists, of a utopian world, is a mistake because it mixes up “a model of how to move out of capitalism with a model of how we got in to capitalism”. Capitalist enclaves could exist within socialist enclaves, but not vice-versa, said Dr. Allen.
(Picture: UCD sociologist Dr. Kieran Allen)
(Audio: Full speech of Dr. Kieran Allen, UCD sociologist)
He argued that a genuine alternative to capitalism could only arise through a movement of the working-class.
The first task of a socialist society, Allen argued, is to take over major corporate organisations and fire its board of directors. He outlined three reasons for public ownership:
- Elimination of waste. Socialism would provide the needs of food, for example, that a healthy human needs.
- Elimination of low-quality goods. Capitalist products demand their own finite existence.
- Elimination of externalities. Capitalism always seeks to offload its debt to society.
All this would lead to massive increases in efficiency, Allen said.
After the speech a lively debate took place with one attendee asking the SWP why it had not utilised the massive drop in Fianna Fail support as a catalyst for change.
The question was also asked of the differences between the SWP and the Socialist Party. Dr. Allen replied by saying that there was 80% agreement between the two parties but that there were three main differences.
The first was that the SWP did not believe that the countries of Eastern Europe were truly social. This was also true, in a contemporary context, of Cuba.
The second issue revolved around anti-imperialism. The SWP support anti-imperial movements even if they disagree with their politics. So for example the SWP would support the Hamas government, democratically elected by its people, in their boycott against Israeli goods.
The final difference is related to the growth of the left. The SWP argue for united fronts to encounter capitalism. This will be tangible by the next general election as groups on the left come together to bolster their chances of gaining seats in the Oireachtas. | <urn:uuid:0770e432-5e3c-4693-898e-a0cfa34b8f37> | CC-MAIN-2022-33 | https://magill.ie/politics/ucd-sociologist-argues-against-utopian-ideal | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00070.warc.gz | en | 0.975167 | 563 | 1.875 | 2 |
Now, this question may be incredibly stupid, but it has been bothering me nonetheless. Say you have a basic circuit loop as shown in the picture. Ohm's law: [tex] V = RI [/tex] Now, according to a textbook I'm reading right now, "By Ohm's law, there is no voltage across an ideal (i.e. zero-resistance) wire regardless of the current flowing through it." I'm just wondering what the meaning of that statement is. Yeah, sure, obviously: [tex] V = 0I = 0 [/tex] But when I look at that picture, here's how I see it: there is definitely a potential difference between points A and B, because they are at either end of the battery. But these points are also the two ends of the wire that makes up the loop! So how could there possibly not be a potential difference across the wire?! And if there weren't, why would there be any current at all? Aren't the electrons moving from a point of high potential to low potential, gaining KE along the way? | <urn:uuid:71c3627c-7465-4707-8d61-f95a4e32110a> | CC-MAIN-2017-04 | https://www.physicsforums.com/threads/ohms-law-basics.40689/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00340-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.972346 | 223 | 3.078125 | 3 |
Sweet. Potato. Biscuits.
There is nothing much to say about the amazing biscuits that is not said in their name – Sweet Potato Biscuits. I am not a fan of biscuits… and yes, I was born and raised in the south. Yes, I had grandmothers and great-grandmothers who made biscuits from scratch…. and a great-aunt who performed this magical alchemy of flour and fat with deft of hand as well. However, I just never warmed up to the texture of this moist doughy quick bread even with lashings of butter and spoons of preserves or jam. Toast, yes please.
My disdain for biscuits changed once the earthy yumminess of sweet potato joined in the fun. I love sweet potatoes (in all ways except candied or in sweet potato pie – still Southern!). Here is the part where I can tell you all of the great nutritional facts about sweet potatoes. I include that sweet potatoes are a wealth of beta-carotene, vitamin A, and a generous amount of fiber, especially if you eat their skin as well. I warn that copious amounts of butter and brown sugar can ruin the delicate flavor of the sweet potato. I will wax… sweet potatoes are great in savory preparations and go well with rosemary, thyme, chilies, peanuts, soy, and goat cheese – I can go on and on. On the other hand, we can open up the argument on whether the tuber is an actually a sweet potato or a yam; but, none of that is going to get the sweet potato biscuits made, on the table, and in your mouth.
Some quick notes to ensure success:
The flavor of sweet potato intensifies when roasted and they taste so much better than boiling sweet potatoes. Roast the sweet potatoes the day before or use leftover roasted sweet potatoes, just make sure they are chill. Also, roasting is a better way to manage the water content of the dough.
Managing the moisture content is another key to success. Moisture in the sweet potatoes will vary depending on the sweet potato. If the dough is on the dry side, add a few tablespoons of water to bring the dough together. If the dough is on the wet side, add a few tablespoons of flour to make the down firm. Practice makes perfect on getting the proper texture.
Start with very cold sweet potato mash, buttermilk, and butter. This will ensure flakiness when the cold biscuits go into the hot oven. The butter will melt, releasing steam inside the dough and creating layers flakiness.
To measure the ingredients, use a scale. This is the most accurate way to measure for baking and accuracy is important to manage the moisture and to ensure a light and flakey texture rather than dense and flat.
In conclusion, on the longest quick notes, DO NOT OVER MIX THE DOUGH. It is perfectly okay to see streaks of butter and bits of sweet potato in the dough.
Sweet Potato Biscuits
yield: 12 – 14 2” round biscuits
6.7 oz roasted sweet potatoes, mashed and chilled
2.8 oz buttermilk, chilled
8.8 oz flour, all purpose
1 T baking powder
3 T sugar, granulated
½ t kosher salt
2.5 oz butter, unsalted, cold, and cut into small cubes
melted butter, optional
Line a baking sheet with parchment; set aside
Preheat oven to 400-degrees
Combine all dry ingredients
If the dough is too moist and sticky, add a little more flour, in tablespoon increments until you achieve a dryer dough
If the dough is dry, add a little more water or buttermilk, in tablespoon increments until you achieve a more supple dough
Pour dough onto work surface dusted with a little flour; knead dough until the dough just comes together, approximately 6 – 8 times – DO NOT OVER MIX.
Roll or pat out to 1” in thickness
Cut into desired shape using a cutter; place biscuits on prepared baking sheet
Bake for 12 – 13 minutes or until risen and golden brown
Transfer to cooling rack
Brush with melted butter, if desired
To make vegan sweet potato biscuits, substitute the butter with vegan margarine or vegetable shortening. Substitute the buttermilk with soymilk and a few teaspoons of fresh lemon juice.
Once you master making sweet potato biscuits, get super fancy, and personalize it with a few add-ins. Add fresh chopped rosemary, rosemary, toasted pecans, and/or orange zest, to the dry ingredients for a twist. Before baking, brush with melted butter, and sprinkle with fresh cracked black pepper or even add the cracked black pepper to the dough.
Just keep them simple and serve with or without lashings of butter and preserves or jam – and enjoy the redemptive qualities of the sweet potato in a southern staple.
always in good T.A.S.T.E – cause you gottatastethis! | <urn:uuid:ae1e2157-363d-4786-b784-74ccd09e28aa> | CC-MAIN-2016-44 | https://gottatastethis.wordpress.com/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719041.14/warc/CC-MAIN-20161020183839-00168-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.904066 | 1,046 | 1.679688 | 2 |
- 1 TITLES:
- 2 AUTHORS (order ok?):
- 3 ABSTRACT
- 4 I. Introduction + Motivation
- 5 II. Previous Work
- 6 III. Feature-based Sound Design
- 7 IV. Results
- 8 V. Conclusion and Future Work
- 9 VI. References
- The smartest sound editor ever built
- (Feature-based Sound Design Framework/Workbench/System/null)
- (Feature-aware TAPESTREA: A Integrated/Comprehensive/Smart/Interactive Approach to Sound Design Workbench)
- (TAPESTREA: Augmenting Interactive Sound Design with Feature-based Audio Analysis)
- Interactive Content Retrieval for Intelligent/Template-aware Sound Design
- Interactive Sound Design by Example
- FAT-APE-STREAT: Sound Design by Querying
- Sound Design-by-Querying and by-Example
- Finding New Examples to Sound Design By
- Extending Sound Scene Modeling By Example with Examples
- Integrating Sound Scene Modeling and Query-by-example
- Sound Scene Modeling by Example with Integrated Audio Retrieval
- Facilitating Sound Design using Query-by-example
- Enriching/Extending/Expanding Sound Scene Modeling By Examples using Audio Information Retrieval
- Enhancing the Palette: Querying in the Service of Interactive Sound Design
- Expanding the Palette: Audio Information Retrieval for Intelligent Sound Design
- Expanding the Palette: Audio Information Retrieval for Intelligent Data-driven Sound Design
- Enhancing the Palette: Audio Information Retrieval for TAPESTREA
- Expanding the Palette: Audio Information Retrieval for Sound Scene Modeling by Example
- Enhancing the Palette: Template-based Retrieval for Intelligent Sound Design
- Enhancing the Palette: Using Audio Information Retrieval to Expand the Transformative Power of TAPESTREA
AUTHORS (order ok?):
Ananya Misra, Matt Hoffman, Perry R. Cook, Ge Wang
(no. down with order.)
We integrate music information retrieval technologies with TAPESTREA techniques to facilitate and enhance sound design, providing a new class of "intelligent" sound design workbench.
I. Introduction + Motivation
Sound designers who work with environmental or natural sounds are faced with a large selection of existing audio samples, including sound effects, field recordings, and soundtracks from movies and television, as a starting point. The TAPESTREA system [cite] facilitates the reuse of existing recordings by offering a new framework for interactively extracting desired components of sounds, transforming these individually, and flexibly resynthesizing them to create new sounds. However, the corpus of existing audio remains unstructured and largely unlabeled, making it difficult to locate desired sounds without minute knowledge of the available database. This paper explores ways to leverage audio analysis at multiple levels in interactive sound design, via TAPESTREA. It also considers methods for TAPESTREA in turn to aid audio analysis.
The main goals of this work include: (1) aiding sound designers in creating varied and interesting sound scenes by combining elements of existing sounds, and (2) enabling a human operator to quickly identify similar sounds in a large collection or database. Combined with TAPESTREA's analysis-transformation-synthesis techniques and paradigms, this presents an extended "query by example" framework, where feature-based querying can enhance both the analysis and synthesis aspects of interactive sound recomposition. The constructs discussed here can also be useful in forensic audio applications and watermarking.
The rest of this paper is organized as follows. Section 2 addresses related work, and also provides an overview of the TAPESTREA system. Section 3 discusses the integration of the audio information retrieval with the analysis-transformation-synthesis framework of TAPESTREA. Section 4 provides results. We conclue and discuss future work in Section 5.
- Large corpus of unstructured and largely unlabled audio
(sound effects, field recordings, soundtracks from movies and TV, etc.)
- leverage audio analysis in interactive sound design (via TAPS)
- vice versa
- To aid sound designers in creating varied and interesting scenes (standard TAPS stuff)
- To enable a human operator to quickly identify similar sounds in a large collection of sounds.
- can be also useful for forensic audio applications, watermarking */
II. Previous Work
- see references
- Marsyas, Taps (sine+noise, transient, wavelet), feature-based synthesis
- related systems generally falls into one of two categories, (1) "intelligent" audio editors,
which generally extracted musical information, or (2) sonic browsers for search and retrieval.
TAPESTREA, Techniques And Paradigms for Expressive Synthesis, Transformation and Rendering of Environmental Audio, aims to facilitate the creation of new sound scenes or recompositions from existing sounds. It builds on the notion that most natural or environmental sounds consist of foreground and background components, and these are best modeled separately. It therefore enables the extraction of the following types of components or _templates_ from an existing sound:
(1) Deterministic events: highly sinusoidal foreground events, often perceived as pitchy, such as bird chirps or voices. (2) Transient events: brief, noisy foreground events with high stochastic energy, such as a door slamming. (3) Stochastic background: The background noise or "din" that is heard beneath the foreground events, such as ocean waves or street noise.
Each type of template is detected, extracted and resynthesized using techniques suited to its particular characteristics. Deterministic events are found and extracted by sinusoidal modeling based on the spectral modeling synthesis framework [cite serra]. They are then synthesized via sinusoidal resynthesis, enabling massive real-time frequency and time transformations. Transient events are located by examining energy changes in the time-domain envelope of the sound [cite?], and are resynthesized with desired transformations through a phase vocoder [cite?]. The stochastic background is obtained by (a) removing deterministic events during spectral modeling, and (b) removing transient events in the time domain and filling in the "holes" via wavelet tree learning [cite Dubnov] of nearby transient-free segments. A modified wavelet tree learning algorithm is then used to continuously resynthesize more background texture, controllably similar to the extracted background template.
In addition to this basic template set, TAPESTREA also provides additional templates to facilitate sound analysis and synthesis. These include: (MAYBE CUT SHORT) (1) "Raw" template: A selected segment in time extracted from a recording, bandpass filtered between specified frequency bounds, thus capturing both foreground and background components of the selected time-frequency region. It can be resynthesized with time and frequency transformations. (2) Loop: A structure for synthesizing repeating events, varying parameters such as periodicity, density, and range of random transformations. (3) Timeline: A structure for synthesizing a collection of templates explicitly placed in time relative to each other. (4) Mixed Bag: A structure for synthesizing multiple events repeating at different likelihoods. (5) Script: ChucK [cite] scripts for finer control over the synthesis parameters.
TAPESTREA presents interfaces for interactive, parametric control over all aspects of the analysis, transformation and resynthesis, and can be used to create a wide range of sounds from a given set of recordings. Since templates can be saved to file and reloaded at a later sitting, it also paves the way for building a reusable database of extracted templates and raw sound effects, to be loaded in and used at any time. As this database grows, it becomes worthwhile to include audio analysis techniques for searching through it, visualizing it, and using it to its full potential. Context Aware TAPESTREA addresses some of these topics.
III. Feature-based Sound Design
In order to augment TAPESTREA with audio information retrieval capabilities, two areas were addressed. Firstly, we integrated a feature-based similarity query engine as a component into the TAPESTREA system, and established well-defined points of interface to the analysis, synthesis, and template library components (Section 3.1). Secondly, we designed and integrated a new user interface devoted to and specialized for similarity retrieval of TAPS templates and raw audio files, and for interactively visualizing and browsing the feature-space in regions of interest (Section 3.2). Additionally, several retrieval-aware hooks were embedded into the existing user interfaces to allow the query and marking of sound events during analysis (Section 3.3).
Interactive template-based similarity search (database)
(figure for interface)
quering/marking recorded sounds for template discovery
V. Conclusion and Future Work
The most obvious next step toward improving the relevance of our query results is the incorporation of more features, particularly features capturing information the time domain dynamics of our sounds. At the moment our only two primarily time-domain-oriented features (low power and feature variance) do not consider any potential long-scale periodicity or order-dependent qualities present in sounds, which could be potentially quite relevant. A finer-grained set of spectral features might also provide better results.
One advantage to using a relatively small number of features, however, is that it remains practical for a user to manually set the weights to give each feature when ranking similarity. When using large numbers of features, many of which may be strongly correlated with each other, choosing the relative importance of each feature becomes both increasingly important (lest one set of features dominate the distance calculation) and increasingly difficult and time-consuming. An approach to dealing with this problem is to use machine learning algorithms such as [schapire rankboost] to try to infer how a user would rank the similarity of a set of sounds to one another from feature data. However, such an approach requires a substantial amount of human-labeled data, and presupposes that a general mapping is possible.
A disadvantage to query-by-example systems is that, by definition, they require the user to have an example on hand of the sort of sound they wish to find. It may be possible to circumvent this problem using the feature-based synthesis techniques we are currently developing, as described in [hoffman, these proceedings fingers crossed]. Using feature-based synthesis, we can synthesize audio matching arbitrary feature values specified by the user in real time. Once the sound generated in this way begins to resemble what the user is looking for, the features used to specify that sound can be passed as a query to the database, which should return a sound resembling what the user had in mind.
Finally, we hope to use machine learning techniques to better predict appropriate source separation parameters for TAPESTREA based on the feature values we extract for each sound. Since we have and continue to build a large library of extracted template files recording good separation parameters for a wide variety of sounds, it may be possible to leverage the features we extract and classify sounds into broad categories for which certain separation parameters are most appropriate. This in turn would allow us to do sinusoidal analyses of batches of sound files, and extract new features based on statistics about the deterministic, residual, and stochastic components of those sounds as automatically separated.
Bregman, A. Auditory Scene Analysis. MIT Press, Cambridge, 1990.
* NOT what taps does.
Chafe, C., B. Mont-Reynaud, and L. Rush. (1982). "Towards an intelligent editor of digital audio: Recognition of musical constructs," Computer Music Journal 6(1): .
* 1st paper to deal with transcription without dealing with identifying notes
Dubnov, S., Z. Bar-Joseph, R. El-Yaniv, D. Lischinski, and M. Werman (2002). "Synthesizing sound textures through wavelet tree learning,". IEEE Computer Graphics and Applications 22(4).
Fernstrom, M. and E. Brazil. (2001)."Sonic Browsing: an auditory tool for multimedia asset management," In Proceedings of the International Conference on Auditory Display.
* deals more with musical structures and notes
Foote, J. (1999). "An overview of audio information retrieval," ACM Multimedia Systems, 7:2(10).
Jolliffe, L. (1986). Principal Component Analysis. Springer-Verlag, New York.
Kang, H. and B. Shneiderman. (2000). "Visualization Methods for Personal Photo Collections: Browsing and Searching in the PhotoFinder," In Proceedings of the International Conference on Multimedia and Expo, New York, IEEE.
Kashino, Tanaka. (1993). "A sound source separation system with the ability of automatic tone modeling," International Computer Music Conference.
* uses of clustering techniques for identifying sound sources
Misra, A., P. Cook, and G. Wang. (2006). "Musical Tapestry: Re-composing Natural Sounds," International Computer Music Conference. Submitted.
Misra, A., P. Cook, and G. Wang. (2006). "TAPESTREA: Sound Scene Modeling By Example," International Conference on Digital Audio Effects. Submitted.
Serra, X. (1989). "A System for Sound Analysis Transformation Synthesis based on a Deterministic plus Stochastic Decomposition," PhD thesis, Stanford University.
Shneiderman, B. (1998). Designing the User Interface: Strategies for Effective Human- Computer Interaction. Addison-Wesley, 3rd edition.
Tzanetakis G. and P. Cook. (2000). "MARSYAS: A Framework for Audio Analysis" Organized Sound, Cambridge University Press 4(3).
Tzanetakis, G. and P. Cook. (2001). "MARSYA3D: A prototype audio browser-editor using a large scale immersive visual and audio display," In Proceedings of the International Conference on Auditory Display. | <urn:uuid:ee83600f-6788-4572-9600-bcf3dd699692> | CC-MAIN-2022-33 | http://wiki.cs.princeton.edu/index.php?title=Taps_ISMIR&oldid=2151 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz | en | 0.865607 | 3,061 | 2 | 2 |
Types of Stem Cells, Their Research and Use in Regenerative Medicine
Stem cells and derived products offer great promise for new medical treatments. Learn about stem cell types, current and possible uses, ethical issues, and the state of research and practice.
You’ve heard about stem cells in the news, and perhaps you’ve wondered if they might help you or a loved one with a serious disease. You may wonder what stem cells are, how they’re being used to treat disease and injury, and why they’re the subject of such vigorous debate.
Here are some answers to frequently asked questions about stem cells.
What are stem cells?
Stem cells are the body’s raw materials — cells from which all other cells with specialized functions are generated. Under the right conditions in the body or a laboratory, stem cells divide to form more cells called daughter cells.
These daughter cells either become new stem cells (self-renewal) or become specialized cells (differentiation) with a more specific function, such as blood cells, brain cells, heart muscle cells, or bone cells. No other cell in the body has the natural ability to generate new cell types.
Why is there such an interest in stem cells?
Researchers and doctors hope stem cell studies can help to:
Increase understanding of how diseases occur. By watching stem cells mature into cells in bones, heart muscle, nerves, and other organs and tissue, researchers and doctors may better understand how diseases and conditions develop.
Generate healthy cells to replace diseased cells (regenerative medicine). Stem cells can be guided into becoming specific cells that can be used to regenerate and repair diseased or damaged tissues in people.
People who might benefit from stem cell therapies include those with spinal cord injuries, type 1 diabetes, Parkinson’s disease, amyotrophic lateral sclerosis, Alzheimer’s disease, heart disease, stroke, burns, cancer, and osteoarthritis.
Stem cells may have the potential to be grown to become new tissue for use in transplant and regenerative medicine. Researchers continue to advance their knowledge on stem cells and their applications in transplant and regenerative medicine.
Test new drugs for safety and effectiveness. Before using investigational drugs in people, researchers can use some types of stem cells to test the drugs for safety and quality. This type of testing will most likely first have a direct impact on drug development first for cardiac toxicity testing.
New areas of study include the effectiveness of using human stem cells that have been programmed into tissue-specific cells to test new drugs. For the testing of new drugs to be accurate, the cells must be programmed to acquire properties of the type of cells targeted by the drug.
Where do stem cells come from?
Researchers have discovered several sources of stem cells:
Embryonic stem cells. These stem cells come from embryos that are three to five days old. At this stage, an embryo is called a blastocyst and has about 150 cells.
These are pluripotent stem cells, meaning they can divide into more stem cells or can become any type of cell in the body. This versatility allows embryonic stem cells to be used to regenerate or repair diseased tissue and organs.
Adult stem cells. These stem cells are found in small numbers in most adult tissues, such as bone marrow or fat.
Until recently, researchers thought adult stem cells could create only similar types of cells. For instance, researchers thought that stem cells residing in the bone marrow could give rise only to blood cells.
However, emerging evidence suggests that adult stem cells may be able to create various types of cells. For instance, bone marrow stem cells may be able to create bone or heart muscle cells.
Adult cells are altered to have properties of embryonic stem cells (induced pluripotent stem cells). Scientists have successfully transformed regular adult cells into stem cells using genetic reprogramming. By altering the genes in the adult cells, researchers can reprogram the cells to act similarly to embryonic stem cells.
This new technique may allow researchers to use reprogrammed cells instead of embryonic stem cells and prevent immune system rejection of the new stem cells.
Perinatal stem cells. Researchers have discovered stem cells in amniotic fluid as well as umbilical cord blood. These stem cells also have the ability to change into specialized cells.
Amniotic fluid fills the sac that surrounds and protects a developing fetus in the uterus. Researchers have identified stem cells in samples of amniotic fluid drawn from pregnant women to test for abnormalities — a procedure called amniocentesis.
Note: In our therapies, we use only fat-derived adult stem cells of the patient themselves.
This article is created for informational purposes, but if you’ve got any concerns, you can contact our team at any time!
Why is there a controversy about using embryonic stem cells?
Embryonic stem cells are obtained from early-stage embryos — a group of cells that forms when a woman’s egg is fertilized with a man’s sperm in an in vitro fertilization clinic. Because human embryonic stem cells are extracted from human embryos, several questions and issues have been raised about the ethics of embryonic stem cell research.
The National Institutes of Health created guidelines for human stem cell research in 2009. The guidelines define embryonic stem cells and how they may be used in research and include recommendations for the donation of embryonic stem cells. Also, the guidelines state embryonic stem cells from embryos created by in vitro fertilization can be used only when the embryo is no longer needed.
Where do these embryos come from?
The embryos being used in embryonic stem cell research come from eggs that were fertilized at in vitro fertilization clinics but never implanted in a woman’s uterus. The stem cells are donated with informed consent from donors. The stem cells can live and grow in special solutions in test tubes or Petri dishes in laboratories.
Why can’t researchers use adult stem cells instead?
Although research into adult stem cells is promising, adult stem cells may not be as versatile and durable as embryonic stem cells. However, researchers have found that adult stem cells are more adaptable than was first thought.
What are stem cell lines and why do researchers want to use them?
A stem cell line is a group of cells that all descend from a single original stem cell and are grown in a lab. Cells in a stem cell line keep growing but don’t differentiate into specialized cells. Ideally, they remain free of genetic defects and continue to create more stem cells. Clusters of cells can be taken from a stem cell line and frozen for storage or shared with other researchers.
What is stem cell therapy (regenerative medicine) and how does it work?
Stem cell therapy, also known as regenerative medicine, promotes the repair response of diseased, dysfunctional, or injured tissue using stem cells or their derivatives. It is the next chapter in organ transplantation and uses cells instead of donor organs, which are limited in supply.
Researchers grow stem cells in a lab. These stem cells are manipulated to specialize into specific types of cells, such as heart muscle cells, blood cells, or nerve cells.
The specialized cells can then be implanted into the human body. For example, if a person has heart disease, the cells could be injected into the heart muscle. The healthy transplanted heart muscle cells could then contribute to repairing defective heart muscle.
Researchers have already shown that adult bone marrow cells guided to become heart-like cells can repair heart tissue in people.
Have stem cells already been used to treat diseases?
Yes. Doctors have performed stem cell transplants, also known as bone marrow transplants. In stem cell transplants, stem cells replace cells damaged by chemotherapy or disease or serve as a way for the donor’s immune system to fight some types of cancer and blood-related diseases, such as leukemia, lymphoma, neuroblastoma, and multiple myeloma. These transplants use adult stem cells or umbilical cord blood.
Researchers are testing adult stem cells to treat other conditions, including a number of degenerative diseases such as heart failure.
What is therapeutic cloning, and what benefits might it offer?
Therapeutic cloning also called somatic cell nuclear transfer, is a technique to create versatile stem cells independent of fertilized eggs. In this technique, the nucleus, which contains the genetic material, is removed from an unfertilized egg. The nucleus is also removed from the cell of a donor.
This donor nucleus is then injected into the egg, replacing the nucleus that was removed, in a process called nuclear transfer. The egg is allowed to divide and soon forms a blastocyst. This process creates a line of stem cells that is genetically identical to the donor’s cells — in essence, a clone.
Some researchers believe that stem cells derived from therapeutic cloning may offer benefits over those from fertilized eggs because cloned cells are less likely to be rejected once transplanted back into the donor and may allow researchers to see exactly how a disease develops.
Got some more questions? Be sure to get in touch with our qualified experts for a free consultation! | <urn:uuid:570f00d0-d81a-49b0-a575-2360ab84dd70> | CC-MAIN-2022-33 | https://albuquerque.eswt-ed.com/stem-cell-therapy/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00468.warc.gz | en | 0.932607 | 1,884 | 3.6875 | 4 |
According to Goode, there are several dozen sites on Earth containing so called "Stasis Beings", who are apparently in a time dilation chamber able to slow down time relative to the outside world. David Wilcock discussed them briefly in the below article.
Related David Wilcock Major Update: History of 'Old One's', Draco's, SSP, Plan for Disclosure in 2015, Cabal Surrender, Sphere Beings, and Much More
According to Wilcock, some of these beings were either from ancient Atlantean era races or even ET's who came to Earth to participate in the Solar and Planetary evolution taking place. This energetic upliftment is so powerful that it apparently draws the attention of many different ET races for various purposes.
What we do know is that this energetic shift is acknowledged by the Cabal and there is a staggering amount of mainstream evidence to support it.
Related The Natural Law Basis of Harvest | The Spiritual Evolution of Gaia and All Who Dwell In the System of Sol
Related All Life is Connected via EMF Entrainment | Solar Revolution Documentary (2012) - Reveals the Science of Entrainment, along with the Sun and Galaxies Influence on Human Affairs
Related Is This A Sign of Increased Energy Affecting The Earth? | Global Earthquake and Volcanic Activity Spiked Last Week
Related What Is The Schumann Resonance? | The Science of: Tesla, Free Energy, "Storms of Life", Scalar or Standing Waves, Energetic Evolution & Interconnectedness
It seems that the prophesied workings of many cultures, that point to an 'end times' are more accurate then mainstream academia would like to admit. And so called scientific institutions have covered up evidence of Giant Humans in the past.
Related Evidence of Giant Humans | The Great Smithsonian Cover-Up: 18 Giant Skeletons Discovered in Wisconsin
Synchronistically, we were working on a post detailing the Iranian discovery of these beings, as well as, the Russian news article covering this story. The archeological community made every effort to discredit the finds in Iran, and apparently changed the official dating from 10's of thousands of years old, to only several hundred.
Clearly there is a coordinated effort to suppress this information. When one considers the science surrounding the changes in our solar system and its resulting effects on life, a very clear picture begins to form. There does appear to be a long standing knowledge of this energetic shift taking place, and if the "Stasis Beings" are here for that purpose, it only ads one more link in a long chain of evidence supporting the notion that this time in history is truly prolific.
Source - Exopolitics
In the latest Cosmic Disclosure episode on Gaiam TV, Corey Goode makes some startling claims about sleeping giants located in stasis chambers hidden all around the world. He says that during his down-time in secret space program assignments (1987-2007) he would review information on “smart glass pads.” The pads were a Wikipedia-like repository of information that personnel in the Solar Warden and other secret space programs could access about various aspects of ancient Earth history, extraterrestrial life, advanced technologies, etc. Goode described seeing information about giants that once lived on Earth, now sleeping in stasis chambers.
Goode described stasis chambers as being originally built by an “Ancient Builder Race” who used crystal technologies to create time bubbles in which the flow of time on the inside is much slower than the outside. Thirty minutes can elapse inside the time bubble, while 30,000 years speed by on the outside according to Goode. He said that these stasis chambers with perfectly preserved giants inside them had been found all over the world.
According to Goode, the smart glass pads revealed that Abraham Lincoln had seen one of the stasis chamber giants in one of the ancient mounds found across the United States. This is supported by Lincoln himself who said:
The eyes of that species of extinct giants, whose bones fill the mounds of America, have gazed on Niagara, as ours do now.In support of his remarkable claims, Goode discussed two youtube videos which he had earlier shared with the host, David Wilcock. Goode said he believed they were examples of sleeping giants that had distinctive red hair and white skin. The videos were released on Youtube and are in the Russian language. In the first video (below) Goode believes the stasis giant has died due to human interference.
The two videos cited by Goode have been subjected to much internet discussion. One of the videos dates to a discovery in 2008 following excavations for a building in the Kurdistan region of Iran. A google translation of a Russian article about the discovery follows:
According to data obtained from the presumptive enough reliable data source photos show found the sarcophagus and find in it the body of an ancient magician. All information supposedly obtained verbally, I have not been tested. Detection time — Spring 2008. As a result of the displacement of ground tomb came to light and the cultural layer of the remnants of the ancient city.A poster on a discussion forum was able to find a Russian article that discussed the discovery of the bodies in the videos released by Goode. The article gave a revised estimate for the age of the sarcophagus:
On the territory of Iran (formerly Persia, even earlier Perunova Rus) … The above-mentioned artifacts discovered by accident, when building a house. The builders found an underground mausoleum built 10-12 thousand years ago, with three sarcophagi. (later corrected to be about 850 years old)The name of the ancient magician or magi was “Jaromir” who was said to be “biologically active” – i.e., in some kind of dormant/stasis state. Ancient manuscripts and an ancient map of Russia were also found in the sarcophagus.
CONTINUE READING @ exopolitics.org
Sign-up for RSS Updates: Subscribe in a reader
View and Share our Images.
Curious about Stillness in the Storm?
See our About this blog - Contact Us page.
If it was not for the galant support of readers, we could not devote so much energy into continuing this blog. We greatly appreciate any support you provide!
We hope you benefit from this not-for-profit site
It takes hours of work every day to maintain, write, edit, research, illustrate and publish this blog. We have been greatly empowered by our search for the truth, and the work of other researchers. We hope our efforts
to give back, with this website, helps others in gaining
knowledge, liberation and empowerment.
"There are only two mistakes one can make along the road to truth;
not going all the way, and not starting." - Buddha
If you find our work of value, consider making a Contribution.
This website is supported by readers like you.
This website is supported by readers like you.
[Click on Image below to Contribute] | <urn:uuid:d1b496c9-15a1-4110-b7d2-18699815719f> | CC-MAIN-2017-04 | http://sitsshow.blogspot.com/2015/08/videos-of-sleeping-giants-in-stasis.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00565-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.943055 | 1,446 | 1.765625 | 2 |
Bitcoin is entering uncharted waters as it trades against a backdrop of global economic turbulence, and so far it has held up surprisingly well – posting year-to-date gains while the equities market continues trading well below where it started the year.
It now appears that the “perfect storm” for Bitcoin could be brewing, as two rapidly unfolding events could act as catalysts that spark both widespread adoption and accumulation – potentially bolstering the crypto in the months and years ahead.
These events come as the crypto is showing signs of underlying strength, signaling that an extension of its ongoing upswing could be imminent.
Bitcoin Sees Perfect Storm Form as Argument for “Hard Money” Grows Pertinent
Bitcoin’s deflationary and decentralized nature make it the archetypal form of so-called “hard money,” and its intense growth in the time following its genesis in 2009 shows that the world has recognized this.
In the past, the need for a decentralized digital asset like Bitcoin has always been theoretical, but the recent events seen throughout the past few months have made this need both relevant and all too real.
Per a recent report from Arcane Research, the actions undertaken by the Federal Reserve to curb the economic impacts of the Coronavirus pandemic have led its balance sheet to bloat.
“The Federal Reserve’s balance sheet is climbing to new highs this week, now surpassing $6.5 trillion… [it] expanded by another $205.2 billion in the past week, to $6.57 trillion. It has ballooned by $2.4 trillion, or 58%, since the end of February,” they noted.
BTC the Antithesis of This Loose Monetary Policy
The massive growth of the Fed’s balance sheet is the result of monetary injections into the economy aimed at propping the markets. Although in the near-term this has been highly effective, the long-term implications could prove to be dire.
This shines a bright light on the need for forms of hard money and comes just weeks before Bitcoin sees its mining rewards halving event – which drops the crypto’s annual inflation rate by over 50%.
Arcane Research spoke about the timing of this event, explaining that it may attract a torrent of new investors into the cryptocurrency.
“While FED is printing money, Bitcoin has different plans with an upcoming halving in just three weeks. This will cut the yearly production in half, from 12.5BTC to 6.25BTC per block. This quantitative hardening may attract new investors to bitcoin, as ‘the money printer’ keeps running at full speed,” they said.
Couple this with the growing on-chain network activity and recent surge in accumulation rates amongst investors, and it seems probable that this “perfect storm” could give Bitcoin a serious boost.
Featured image from Unsplash. | <urn:uuid:f5793a14-69a3-4f4f-abbc-0d7751f6625b> | CC-MAIN-2022-33 | https://www.newsbtc.com/news/bitcoin/the-perfect-storm-is-brewing-for-bitcoin-because-of-these-two-trends/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00666.warc.gz | en | 0.955692 | 602 | 1.515625 | 2 |
Automobiles are self-propelled machines used to transport people and luggage. They have plenty of space inside for the passengers as well as their luggage. There are many benefits of an Auto, and this article will discuss them. After all, who doesn’t want to be on the road? If you’ve been commuting for years, you’ve probably heard the term “automobile” – and may even be driving one today!
Autos are a self-propelled machine
An auto is a self-propelled machine powered by electricity, which can be sourced from a variety of sources. Batteries convert electrochemical energy to mechanical energy, while internal combustion engines release chemical energy. While most self-propelled vehicles use internal combustion engines to produce motive power, some vehicles use steam-powered engines that burn fuel to convert water into steam. An autonomous vehicle could be a life-changing innovation in last-mile delivery and urban distribution.
Self-propelled vehicles can perform a variety of labor activities, and are popular in the mining industry, agriculture, and utilities industries. In order to operate, self-propelled vehicles must have a certification issued by a state-sanctioned authority. To ensure compliance with safety and environmental regulations, these vehicles must meet a series of standards and technical specifications, and are characterized by several categories of tolerance.
They provide space for passengers and baggage
Automobiles are a type of transportation. A passenger car is a vehicle that has space for passengers and luggage. They have a variety of uses. They are used for short distance travel, for commuting, and for leisure and sport. Automobiles are typically four-wheeled vehicles, but there are also semi-trailers and trailers. Most modern vehicles are complex technical systems with thousands of components and subsystems. These innovations resulted from advances in existing technology, new technologies, and competition between automobile manufacturers around the world.
They are a self-propelled machine
Whether you’ve always considered them such, or not, automobiles are self-propelled machines. These vehicles use the power of gravity to propel themselves, and are characterized by their ability to perform a variety of labor activities. While most self-propelled machines use internal combustion engines to generate mechanical energy, other self-propelled vehicles use steam, electricity, or other sources of power. These machines are also characterized by the presence of several tolerance categories.
A typical automobile contains thousands of parts. The word automobile derives from the Latin word cars, which means “movable.” Most modern vehicles are self-propelled. The term “automobile” refers to vehicles with seven seats or more. In earlier days, autos were powered by steeds and were therefore called cars. Modern automobiles are self-propelled and usually have four or more wheels. | <urn:uuid:8b1228fe-304e-4520-8c21-36a9851ed95d> | CC-MAIN-2022-33 | https://battleofnysports.com/benefits-of-automobiles/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00677.warc.gz | en | 0.966988 | 580 | 3.25 | 3 |
Preschool Teachers and Staff:
Early Childhood Center Preschool
The 2017-2018 School Year
It is the goal of the Early Childhood Center Preschool to provide a program for three and four-year-olds that is nurturing, allows children to grow through their natural instinct to explore, lays a solid foundation of self-confidence and prepares them for elementary school.
Our program, licensed by the Department of Children and Family Services, is based on the philosophy that children learn through play and experience. When given the opportunity, children will naturally explore, discover, learn to cooperate with others and develop strong self-esteem. Through a wide variety of experiences, children also develop their social, emotional and physical skills.
At the Early Childhood Center children are offered a chance to learn in a place where each individual meets with approval and success. Our teachers offer children a variety of small and large group activities. We do this because we believe it is important that every child have a positive learning experience. Utilizing the Creative Curriculum approach, endorsed by the National Association of Education of Young Children, each classroom conducts weekly studies, offering areas for blocks and dramatic play, small and large motor activities, quiet time as well as experiences with music, art, literacy and science/discovery.
While our Early Childhood Center staff offers each class an environment that gives children the opportunity to grow to their fullest potential, we also serve as a support system, helping to meet each individual family's needs.
The Early Childhood Center offers a unique five-morning program for older 3-year-olds to accommodate the rapid development of fine motor and cognitive skills within this age group. This is a multi-age class that combines the older 3-year-olds with 4-year-olds for a special classroom experience with many learning opportunities available to the children. Children must be 3-years-old by March 1, 2017 to enroll in this program.
The Early Childhood Center follows the Wilmette Public Schools District 39 calendar of full days off, as well as two Park District staff in-service days. Children must be 3-years-old by September 1, 2017 and toilet trained. Pull-Ups and diapers are not permitted.
A non-refundable deposit of $100 and billing information is required at registration. Fees are collected in nine equal payments, due on the 20th of each month, with the first payment due on August 20, 2017. Please contact Olga Miklasz at 847-920-3910 for additional program information.
The Wilmette Park District Early Childhood Center offers high quality preschool education with extended coverage to provide a full-day program option. Children may join us for 2, 3 or 5 days at 11:30 a.m., after their preschool day ends, for a hot catered lunch and extended classroom activities.
Activities will include art, music, science, literature, outdoor playtime and free exploration. The afternoon will also include a rest/naptime. Note: Children must be enrolled in the Wilmette Park District Preschool program, and must be toilet trained.
In addition to closures on Thanksgiving, the Friday after Thanksgiving and Memorial Day, the Full-Day Preschool program will be closed for two weeks over Winter Break, one week for Spring Break, two staff in-service days and during summer vacation. A non-refundable deposit of $100 and billing information is required at registration. Fees are collected in nine equal payments, due on the 20th of each month, with the first payment due on August 20, 2017. Full monthly tuition is due for all months, including months with days off and holiday breaks.
This program is licensed by the Department of Children and Family Services. Please contact Olga Miklasz, Early Childhood Supervisor at 847/920-3910 for additional program information.
For FULL-DAY PRESCHOOL Fees, click here
Lunch Bunch for the 2017-18 School Year
A nice opportunity to extend a child’s time at school through the lunch hour, this program is a great option for children who are ready for a fuller day and more enriching Preschool experience.
Lunch Bunch is open to children participating in our four-year-old morning Preschool program. Children will be served a hot, catered lunch (as required by DCFS) and then enjoy a variety of activities such as music, gymnastics, art, drama and science.
Lunch Bunch will follow the Wilmette Public Schools District 39 calendar of full days off, as well as two Park District staff in-service days. A deposit of $50 is required at registration. Fees are paid in nine equal payments, due on the 20th of each month, with the first payment due by August 20, 2017. Please contact Olga Miklasz at 847-920-3910 for more program information.
For LUNCH BUNCH Fees, click here | <urn:uuid:402a8ff1-96f0-432e-9193-5cf3a262f269> | CC-MAIN-2017-04 | http://www.wilmettepark.org/early-childhood/preschool | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00334-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.9554 | 1,010 | 1.898438 | 2 |
Myths and Legends of Ancient Greece and Rome
Page: 136Arrived at the island of Naxos, Theseus had a dream, in which Dionysus, the wine-god, appeared to him, and informed him that the Fates had decreed that Ariadne should be his bride, at the same time menacing the hero with all kinds of misfortunes should he refuse to resign her. Now Theseus, having been taught from his youth to reverence the gods, feared to disobey the wishes of Dionysus. He accordingly took a sad farewell of the beautiful maiden who so tenderly loved him, and left her on the lonely island, where she was found and wooed by the wine-god.
Theseus and his companions felt keenly the loss of their benefactress, and in their grief at parting with her, forgot that the ship still bore the black sails with which she had left the Attic coast. As she neared the port of Athens, Aegeus, who was anxiously awaiting the return of his son on the beach, caught sight of the vessel with its black sails, and concluding that his gallant son had perished, threw himself in despair into the sea.
With the unanimous approval of the Athenians, Theseus now ascended the vacant throne, and soon proved himself to be not only a valiant hero but also a wise prince and prudent legislator. Athens was at this time but a small city surrounded by a number of villages, each of which possessed its own separate form of government; but by means of kind and conciliatory measures Theseus induced the heads of these different communities to resign their sovereignty, and to intrust the administration of public affairs to a court which should sit constantly at Athens, and exercise jurisdiction over all the inhabitants of Attica. The result of these judicious measures was, that the Athenians became a united and powerful people, and that numbers of strangers and foreigners flocked to Athens, which became a flourishing maritime port and a commercial centre of great importance.
Theseus renewed the Isthmian Games, and also instituted numerous festivals, the principal of which was the Panathenæa, held in honour of Athene-Polias.
It is related that Theseus upon one occasion arrived during a voyage at the Amazonian coast. Anxious to ascertain the object of his visit, the Amazons sent Hippolyte, one of their number, with presents to the stranger; but no sooner did the fair herald set foot on board his vessel than Theseus set sail and carried her off to Athens, where he made her his queen. Enraged at this indignity the Amazons determined to be revenged. Some time afterwards, when the whole affair would appear to have been forgotten, they seized the opportunity when the city of Athens was in a defenceless condition and landed an army in Attica. So sudden was their attack that they had penetrated into the very heart of the city before the Athenians could organize their forces; but Theseus expeditiously collected his troops and commenced such a furious onslaught upon the invaders that, after a desperate encounter, they were driven from the city. Peace was then concluded, whereupon the Amazons evacuated the country. During this engagement Hippolyte, forgetful of her origin, fought valiantly by the side of her husband against her own kinsfolk, and perished on the field of battle. | <urn:uuid:28668b97-7a13-484e-99f6-04118f80feb2> | CC-MAIN-2017-04 | http://www.greekmythology.com/Books/myths_and_legends_of_ancient_greece_and_rome/136/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280899.42/warc/CC-MAIN-20170116095120-00574-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.984804 | 697 | 3.015625 | 3 |
Books: Semantic Structures, Communicative Principles and the Emergence of Language: Schouwstra
Editor for this issue: Rebekah McClure
Date: 12-Feb-2013 From: Mariëtte Bonenkamp <lotuu.nl> Subject: Semantic Structures, Communicative Principles and the Emergence of Language: Schouwstra E-mail this message to a friend
Title: Semantic Structures, Communicative Principles and the Emergence of Language
Series Title: LOT Dissertation Series
Publisher: Netherlands Graduate School of Linguistics / Landelijke - LOT
Author: Marieke Schouwstra
Paperback: ISBN: 9789460930966 Pages: Price: Europe EURO 20.59 Comment: only available through internet
How did human language become so structurally complex? This dissertation presents evidence that complex syntactic rules in modern human language emerged via a pre-syntactic stage that was governed by semantic principles. This dissertation investigates the influence of meaning in evolutionarily early language by looking at situations in which people cannot use or learn a language normally. The systems that arise in those situations are called restricted linguistic systems, and examples of such systems are the language of unsupervised adult second language learners and home sign. This dissertation relates observations from restricted linguistic systems to a novel approach taken up in the laboratory, in which participants are asked to communicate about simple events using only gesture and no speech: improvised communication. Together the two branches of evidence constitute a picture of evolutionarily early language in which semantic principles take a central position: they precede and ultimately drive syntactic rules.
Because of its interdisciplinary approach, this book targets a wide audience, and it will be relevant to linguists (and non-linguists) interested in meaning, language and evolution. | <urn:uuid:1e987071-daa0-43e2-845c-3f1c9d0a54e8> | CC-MAIN-2016-44 | http://linguistlist.org/issues/24/24-780.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720972.46/warc/CC-MAIN-20161020183840-00251-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.849202 | 372 | 1.929688 | 2 |
Mashable asked the question that many of you may have had when you learned one of the more recently reported details of the Marriott/Starwood hack. “Why do hotels collect and store passports?”
The answer they came up with turned out to be something that some of us started talking about a few years ago, but it might surprise some of you:
Moussouris explained that hotels collect identity information so they can run background checks, as well as to serve as a reference for the government should anything criminal happen. That law enforcement element means that hotels may need to store, not just check, identification.
“It’s the fact that it might need to be checked against a criminal database, and different countries vary in their regulations about that,” Moussouris said.
The European Union requires hotels in member states to collect passport information. However, what they do with that information varies. For example, in Italy, hotels automatically give this to the authorities. But that’s not the case throughout Europe. Policy on ID collection varies between cities and states in the US.
In the rash of post 9/11 rule changes, not to mention the Las Vegas mass shooting, there have been calls for both private companies and public entities to gather up information about anyone and everyone who passes through their area. Passport information, motor vehicle license plate data, driver’s license information, credit card receipts, internet browsing, etc. have all become part and parcel of what is being tracked, collected and stored in the name of law enforcement. We can argue about the legality of that, or even the effectiveness of that, but the one thing that was never in question was the need for that information to be kept secure and not misused.
In this case, we now have the possibility that people have had their passport information, and therefore their travel movements tracked, by foreign intelligence services. That’s not good at all. But this is hardly the only situation where this kind of thing is likely happening. This is just the one that impacted millions of people worldwide and made headlines. How many other instances are there of someone either hacking, or misusing their access to this kind of information to stalk, harass, or illegally track innocent civilians? All made possible by the laws meant to keep us safer, because once you start collecting and keeping that much data, you create a target. A very inviting, almost intoxicating target.
All that personal information is just sitting there, waiting for someone to search it. Why would we expect that would only ever happen when officially sanctioned?
Human nature tells us otherwise. | <urn:uuid:446bfa31-f443-4422-8467-5c361b0c0590> | CC-MAIN-2022-33 | https://www.mikemcbrideonline.com/2019/01/marriott-hack-shows-the-risk-of-our-surveillance-society/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00271.warc.gz | en | 0.969474 | 539 | 2.3125 | 2 |
2 Yes and 3 No, For A Better Taiwan
Say YES to harmonay, respect and love, please vote Yes to Referendum No. 14 and 15
2 YES and 3 NO, let us grant Taiwan a happy future
In response to this ruling, opponents of same-sex marriage and conservative groups petitioned for a referendum. The so-called “Vote to Family” referendum includes three questions, with the main purposes of excluding same-sex couples from the definition of marriage stated in the Civil Code and removing LGBTQ-related contents from the national curricula for gender equity education, which was brought to life by the Gender Equity Education Act enacted in 2004.
Facing such a challenge, supporters of marriage equality in Taiwan have chosen not only to defend LGBTQ equal rights by voting NO to the ""Vote to Family" referendum, but also to actively fight for love, respect and democracy. The “Equal Rights” referendum involves two questions, defending same-sex couples' right to be included in the Civil Code's definition of marriage as well as demanding gender equity education for Taiwanese children and youth.
This November, vote 2 YES and 3 NOs, let us grant Taiwan a happy future!
2 YES and 3 NO, Create Harmony and Love
Say YES to Happiness
Let loving couples be together. Every citizen is entitled to the protection provided by the Civil Code.→ Vote YES to Referendum No. 14
Say YES to Respect
Gender equity education is to teach our children how to protect themselves and respect others.→ Vote YES to Referendum No. 15
Say NO to Regression
Same-sex couples wish to get married in order to take care of each other and build a loving, committed, stable home. Excluding same-sex couples from the Civil Code is a differential treatment, and a big step backward for the Taiwanese democracy.→ Vote NO to Referendum No. 10
Say No to Harm
Only by providing our children accurate and diverse gender-friendly knowledge could we prevent campus bullying and potential physical or emotional harms to our future generations.→ Vote NO to Referendum No. 11
Say No to Discrimination
A special law that defines a legal status different from marriage will prevent same-sex couples from making long-term commitments like heterosexuals, which will be a discriminating treatment.→ Vote NO to Referendum No. 12 | <urn:uuid:cc6f917a-2a1b-4d41-b73c-56b11347e49e> | CC-MAIN-2022-33 | https://nofear.equallove.tw/en | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00672.warc.gz | en | 0.925339 | 486 | 2.109375 | 2 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.