text
stringlengths
181
608k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
138k
score
float64
1.5
5
int_score
int64
2
5
Reflecting on Deuteronomy 11:18, 26-28, 32 Matthew 7:21-27 Talk about taking things literally. Moses told the people to hold so fast to the word of God that it would be bound at their wrists and on their foreheads, and still today the Orthodox Jewish man prepares for prayer by binding actual little boxes at his wrist and forehead, with tiny scrolls from the book of Deuteronomy inside them. These phylacteries have served as prayer companions—Catholics would call them sacramentals—since at least the time of Christ (Mt. 23:5). They signify that the wearer has taken the Word of God into his heart and soul. What would it be like if we Catholics wore our faith on our sleeves like that? Of course there are a few outward signs of our inward faith. We place a crèche on the lawn during the Christmas season and wear ashes on our foreheads at the start of Lent. These are signs to the outside world (and reminders to ourselves) that we are indelibly marked by Christ. But my friend Vincente asked me a great question the other day: why don’t we Catholics make more of a mark on the culture than we do? Why do we absorb the culture so much and correct the culture so little? Why are we proud that, after a lifetime of Catholic formation, we can go out into the workplace and blend in so well that no one would ever guess that we are Catholic? How unsettling to wonder if, after a lifetime of lukewarm “face time” in church, we will come before Christ at our deaths and he will say I never knew you. What do you think is an authentic outward sign of your faith? What would YOU like to say about this question, or today’s readings, or any of the columns from the past year? The sacred conversations are setting a Pentecost fire! Register here today and join the conversation. I have come to light a fire on the earth; how I wish it were already burning (Lk.12:49).
<urn:uuid:b5a52d4f-b3ec-4b31-a491-aa139a26fd27>
CC-MAIN-2022-33
https://www.thestoryandyou.com/2011/03/05/ninth-sunday-ordinary-time-cycle-a/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00667.warc.gz
en
0.967109
434
2.078125
2
Stretch mark Removal - Over fifty percent of pregnant women may develop stretch marks during pregnancy. Stretch marks seem like blotches on the top of skin, and might end up being vary colored based on your natural complexion. Mostly lighter in skinned women have pink colored stretch-marks, whereas the women of darker skins have lighter colored stretch marks as compared to their surrounding skin. How To Get Rid of Scars - Most of the women develop stretch marks during pregnancy on their stomach or abdomen; however it's not rare to have stretch marks on your hips, buttocks, and thighs as well as on breasts. Sometimes as much as Ninety percent of ladies develop stretch marks upon some part of their body as a result of being pregnant. Stretch marks - The causes of stretch marks during pregnancy form once your skin is actually extended and this occurs throughout being pregnant. Nearly all women develop stretch marks through the later trimesters of childbearing though a few women start to develop all of them the moment their stomach begins to grow. Stretch mark Removal - Stretch-marks are small tears which develop from inside the tissue which supports your skin. Basically Stretch-marks represent the separation or tearing of collagen within the skin whenever tearing occurs. Moreover Stretch marks are not dangerous or even painful and generally fade as Instructions on How to Avoid Stretch Marks when pregnant! of women think that utilizing lotions as well as creams aid the prevention of stretch marks. Honestly speaking nevertheless, the amount of stretch-marks you receive depends how flexible your skin is actually. The flexibility of the skin generally based on the basis of genetics features. The very best element you should do is to discover whether your mother obtained stretch marks during pregnancy or not. If your mum did, you are most likely more susceptible to stretch-marks as compared to other women. Remember, the more you consume during pregnancy the higher your probabilities will be to possess stretch marks. Don’t eat for two, try snacking instead. Usually your skin is actually elastic and capable of stretching a good deal, but also for a few women modifications that happen throughout being pregnant are on the extremes. These fast fluctuations associated with weight as well as skin stretching out can lead to stretch marks. Some women are vulnerable to develop stretch-marks and that also includes women who gain plenty of weight quickly throughout pregnancy and women who may carry large Reasons of stretch marks on breasts during pregnancy Here are some additional factors that may lead for the inclination towards stretch marks on breasts during pregnancy: If you get stretch marks on your breast during the period of puberty you might get stretch marks on your breasts during pregnancy: • When a women gains weight she may develop stretch marks on her breasts during pregnancy. • Keep well hydrated, you will have less chances to get stretch marks. How to not get stretch marks when pregnant Specific Creams: The majority of females believe that they will prevent stretch-marks by utilizing lotions and creams. You will find many preparations currently available declaring to assist eliminates stretch marks. Some of these might help hydrate the skin minimizing itchiness. They may reduce a few stretch marks nevertheless; you will find absolutely no scientific research, which support this idea. Have a soothing Massage: You will find Cacao butter along with other formulations to prevent stretch marks. Massage these lotions on your stomach and this will gives your fetus a mild and soothing massage. Gaining pounds: The very best component that you can do to prevent stretch marks aside from using creams or skin lotions. Try not to eat for two, the more weight you put on throughout your pregnancy the more chance of developing stretch marks. Physicians say majority of women gain between 25 to 34 lbs. If you gain more than this, the chances of developing stretch marks are greater. Eliminating Stretch marks majority of women are worried about stretch marks once they have had their baby. Thankfully most stretch marks do diminish as time passes. Generally after Twelve moths postpartum most stretch marks are mild and fewer apparent. Their consistency may stay not the same as the encompassing skin nevertheless. A lot of women discover their stretch-marks diminishing in to whitish outlines, which are minimally Some women have severely stretch marks that affect their self esteem after being pregnant. You will find numbers of treatments readily available for women who are looking to reduce the look of stretch marks. If the stretch marks tend to be particularly poor, you might speak to your physician or even a skin doctor. A few topical treatments for example tretinoin lotion might help decrease stretch marks. These types of creams should only be used after pregnancy, it is always best to seek medical advise. A lot of the topical treatments available need to be used right after delivery, just before they start fading. The higher time passes during the delivery and utilization of lotion, the more unlikely they should be efficient. If you are breast feeding t is necessary for you to consult your doctor before using any kind of stretch mark treatments. lot of creams are available to reduce stretch marks don't give the chance of relieving the sagging skin, this comes along with giving birth. You'll find some more current remedies such as laser treatments however that may enhance the skin elasticity and lower the amount as well as the appearance of stretch marks. A few women additionally consider plastic surgery. A tummy tuck might help conceal some stretch marks and lower loose skin. In the nutshell we may say that stretch marks during pregnancy are almost common issues. Most women take it very seriously and make it a source of self complex, which is not good in any case. You shouldn’t struggle to eliminate or prevent it. Try the effective home remedies, but above all you must consult your For the little irritation the most detrimental stretch marks provide are worth the fun of bringing a child into this world. Perform what you can all through your pregnancy to help keep a suitable weight and do not be concerned about excessive amount of stretch marks. Lots of women put on these with pride, the war wound or even meddle of honor associated with their pregnancy. So, why they are worried with having stretch marks? Think about it!
<urn:uuid:37e9b961-ee05-4c1d-a405-98452a833c37>
CC-MAIN-2017-04
http://stretchmarks4.yolasite.com/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00090-ip-10-171-10-70.ec2.internal.warc.gz
en
0.934352
1,361
1.554688
2
By: Writing Tips Today Term paper topics: Term papers will often focus on a central issue or idea that a student will need to investigate. You need to be sure that you research the topic carefully, covering all of the aspects to the assigned topic. Here are some possible term paper essay topics. Think about how you would research each one. Obesity is linked to the premature deaths of many Americans every year. The problems associated with lifestyle and poor nutritional choices are now being seen on a more international scale as well. Discuss this issue and evaluate the possible solutions to this problem. Because fossil fuel resources are limited, the search is widening for renewable and sustainable energy alternatives. Wind, wave, and solar power are some of the more commonly discussed solutions. Discuss the energy crisis facing modern society and evaluate the alternative energy forms in terms of their technological and economic viability. Many see genetic modification as the solution to the world’s health and medical crises. Yet, there is a fierce debate about the safety and acceptability of GM technologies. Explore this issue, evaluating the merits and limitations of suggested solutions. Public transportation can be a contentious topic in today's society. In the future, it is likely that legislation on emissions will place limits on the use of petrol and diesel vehicles in most major cities in the world. Discuss the types of public transportation which may be developed as a replacement for motor vehicles, indicating both the limitations and merits of the performance of each option.
<urn:uuid:47689113-94af-4e39-8c8d-2819c52f820f>
CC-MAIN-2022-33
http://writing-tipstoday.com/info/Term-Paper-Writing/Term-Paper-Topics.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00476.warc.gz
en
0.943141
297
2.609375
3
Grounds open 10am, living history & mini-displays 12noon, battle 3pm, Battle Abbey, Battle, E Sussex (01424 773792); pounds 6 /pounds 5 concs, pounds 3 kids, English Heritage members freeReuse content At about 9am on October 14 1066, some 14,000 soldiers met at Senlac Hill near Hastings to do battle for the English crown. By the end of the day the English King lay dead and William, King of the Normans, declared himself the conqueror. Poor old Harold. He'd only been crowned in January, and things had been looking so good. In September he'd defeated 300 shiploads of Norwegian invaders: their king was killed and all that remained of their army barely filled 20 ships. But the exertions were to prove too much for the English army. They had little time to recover before news of the Norman invasion reached them and they were back on the road for the 190-mile march from Stamford Bridge to Hastings. It was a bloody conflict, and Battle Abbey was built on the spot where Harold fell to atone for the carnage. This afternoon the battlefield will once again witness the clash of Norman and Saxon armies, though without the bloodshed. Comprising at least 500 warriors, foot soldiers, mounted knights and archers, the re-enactment is being staged to mark the publication earlier this summer of the English Heritage Battlefields register which aims to protect the most significant battlefield in England. Armour, equipment and battle tactics are as authentic as possible, with the soldiers being played by professional re-enactors who have researched accounts of the battle.
<urn:uuid:b2c36fde-ee19-463e-a2c3-4616847d3014>
CC-MAIN-2017-04
http://www.independent.co.uk/arts-entertainment/another-one-in-the-eye-for-king-harold-1577525.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00436-ip-10-171-10-70.ec2.internal.warc.gz
en
0.975395
337
2.65625
3
Corneal neovascularization (NV), the growth of new blood vessels into corneal tissue, is the most common corneal finding in patients with ocular rosacea. Patients with ocular rosacea in whom there is corneal involvement typically initially present with peripheral corneal NV that may develop into triangular subepithelial marginal infiltrates. Less common corneal findings in ocular rosacea include infectious keratitis, corneal ulceration, and corneal perforation. Medscape © 2019 WebMD, LLC Any views expressed above are the author's own and do not necessarily reflect the views of WebMD or Medscape. Cite this: Christopher J. Rapuano. Fast Five Quiz: Ocular Rosacea - Medscape - Jun 04, 2019.
<urn:uuid:b6ef0c51-43d2-4fda-b4ec-6882d08bd4fe>
CC-MAIN-2022-33
https://reference.staging.medscape.com/viewarticle/913170_3
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00669.warc.gz
en
0.832329
173
2.1875
2
Alphabet Inc, the parent company of Google, on May 11 announced that it had reached an agreement with at least 300 European news publishers to abide by a recently passed European Union copyright regulation. That is to publish their stories on the search engine. The internet giant has struck partnerships with national, local, and specialist new organizations. It includes countries like Germany, Hungary, France, Austria, the Netherlands, and Ireland. The company further said that it is in talks with several other countries as well. Google didn’t disclose how much will they pay nor did they disclose the names of the organizations. The European Copyright Directive which came into force in 2019, gives publishers extra rights over their content which has been enacted into local legislation by the European Union countries. It allows publishers to opt for a payment method whenever online platforms use their content. With the new law, search engines like Google are linked so as to use snippets of news content. At the same time giving publishers new rights when extended previews are used online. However, it does not indicate where the line between the two is drawn. The agreements are intended to avoid costly and time-consuming legal battles on the distinction. Last year, Google had announced copyright agreements with several French news publishers and several significant German publications. In addition, the business announced that it will begin rolling out a new platform to offer licensing deals to thousands of other European publishers in Germany and Hungary.
<urn:uuid:b4c3c640-e9a7-403c-be0b-a99748865736>
CC-MAIN-2022-33
https://internationalfinance.com/google-european-news-publishers-posting/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00467.warc.gz
en
0.968653
290
1.796875
2
Please contact our office at 800-952-0910 for questions, or to inquire about a title you cannot find. Search by state. Principles of Home Inspection Systems and Standards 3rd Edition – Updated$149.99 This comprehensive text provides a sound introduction to the components, materials, and mechanics of building systems that inspectors encounter and evaluate. For every major house system, this updated edition covers component problems, their practical implications, and inspection strategies for finding them. No other single volume offers both the breadth and the depth of this introduction. The Home Inspection Reference Guide, 4th Edition$262.99 The Home Inspection Reference Guide covers all aspects of the general home. Each chapter focuses on major aspects of the inspection and includes easy-to-understand technical explanations. Diagrams and photos enhance understanding, and the “Don’t Ever Miss” list highlights key points in an inspection. Finally, tips on how to report findings makes this book a comprehensive guide for understanding home inspection. Home Inspector Education and Training Complete Package Self-paced online program with unlimited practice tests. Instructor support available 7 days a week. Includes Principles of Home Inspection reference 3rd Edition, online course, review, practice quizzes, and immediate free shipping. Gently Used – Principles of Home Inspection Systems and Standards 3rd Edition- Updated$123.99 Used Version of the Principles of Home Inspection 3rd ed. – Updated
<urn:uuid:c53204c7-f865-4492-8d08-c29632a397ce>
CC-MAIN-2022-33
https://www.athomeprep.com/product-category/home-inspector/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00265.warc.gz
en
0.869596
306
1.640625
2
Xcel Energy is launching its Solar Schools program to provide area students with a firsthand look at how solar energy works as they integrate their studies with new, community-based solar projects planned in four eastern and southeastern New Mexico cities. The first community-based solar installation was put in place last summer on the roof of Xcel Energy’s service center in Hobbs. This week students at Highland Junior High School in Hobbs will begin to monitor the output of this generating station while learning how solar power is integrated into Xcel Energy’s power grid. Three other projects will be launched in other New Mexico communities served by Xcel Energy, and the company hopes to have these installations ready in the spring of 2010. The company is still negotiating deals in these other communities and has not yet named the exact locations. The school program is part of the New Mexico Community Solar Project, and is funded by Xcel Energy as a way to build interest in solar power – one of the state’s most promising new industries. “New Mexico has some of the best solar resources in the nation,” said Mike McLeod, regional manager for community and economic development in Roswell. “Yet the general public still knows very little about solar technology and how it can benefit our economy. These installations will provide valuable information to Xcel Energy and our communities. By including students in the program, we’re educating young men and women on the benefits of clean, renewable solar power.”
<urn:uuid:25274338-8acc-4aaf-a30a-c61f1fc17c1e>
CC-MAIN-2016-44
http://cnjonline.com/2009/12/10/press-release-xcel-planning-solar-schools/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719215.16/warc/CC-MAIN-20161020183839-00200-ip-10-171-6-4.ec2.internal.warc.gz
en
0.955803
305
2.34375
2
In the current study researchers boosted the production of a microRNA found in bladder cancer cell lines — encoded for by the gene miR-34a — and found that this resulted in more of the cells being killed by cisplatin, a chemotherapy drug used to treat many types of cancer. "When we took the bladder cancer cell lines and activated miR-34a, they were more responsive to chemotherapy," said Ralph deVere White, UC Davis Cancer Center director and professor of urology. The study establishes, for the first time, a link between sensitivity of bladder cancer cells to chemotherapy and the expression of miR-34a. It suggests that miR-34a may be used as a predictor of response to chemotherapy, as well as a target for new drugs. Currently, about 50 percent of patients with advanced bladder cancer will survive five years after diagnosis. Although clinical trials have demonstrated that chemotherapy before surgery can improve survival rates, it is rarely used because fewer than 50 percent of patients will respond favorably. Without knowing which patients will improve as a result of chemotherapy, physicians are generally reluctant to use a treatment that can cause their patients to suffer significant side effects. "So, now we have to prove that it works to predict chemotherapy response in patients," deVere White said. To that end, UC Davis has entered into a partnership with Israel-based Rosetta Genomics to develop a microRNA profile for muscle-invasive bladder cancer that may be used to predict response to chemotherapy. As part of the current study, deVere White and his colleagues studied 27 patients and found that many who expressed lower levels of miR-34a subsequently did not respond to the combined chemotherapy-surgery treatment. Because the finding was not statistically significant, however, further work in this area is needed. MEDICA.de; Source: UC Davis Health System
<urn:uuid:8cfde390-2a02-4b55-a279-8b7ba23e35a7>
CC-MAIN-2016-44
http://www.medica-tradefair.com/cgi-bin/md_medica/lib/pub/tt.cgi/Bladder_Cancer_Cells_More_Susceptible.html?oid=33812&lang=2&ticket=g_u_e_s_t
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720468.71/warc/CC-MAIN-20161020183840-00489-ip-10-171-6-4.ec2.internal.warc.gz
en
0.968178
380
3.359375
3
Providing dental care for the community or in an acute setting is a team responsibility. Each member of the dental team has an important role to play in promoting and maintaining dental health. As well as looking after the nation's teeth, gums and mouths, the dental team contributes to the wider care of patients. Through the skills of everyone in the team, and with advances in dentistry, the number of fillings needed has reduced. More of us are looking after our teeth better and keeping them for longer. What’s more, the skills of the dental team, coupled with advances in dental technology, mean that a visit to the dentist is seen as a positive way to support health and wellbeing. Gum disease remains a highly prevalent disease, as do other diseases of the mouth, such as oral cancers. Most dental diseases are preventable and it is important that all members of the dental team have adequate training and are utilised effectively. As well as dentists, the dental team includes the following dental care professionals (DCPs): Whatever role you choose, you'll be making a big contribution to looking after the nation's teeth, gums and mouths. - Where you’ll work Expand / Collapse Career opportunities in dental practices will largely depend on the size of the practice or the company. Practices can be small, independent operations or part of a large corporate body with hundreds of practices available to work in. Dentists and DCPs work together in a team treating patients. There are also roles for administrative staff such as receptionists and practice managers. Dentists and DCPs are able to establish and run their own dental practice. The most common location for a dental practice is on the high street and most members of the dental team work in this setting. These are commonly known as general dental practices. The majority of work is NHS funded but some items of treatment may also be provided on a private basis. Dentists are generally self-employed contractors. Other members of the dental team are typically employed by the practice itself. Some dental staff also work in NHS dental hospitals. They will have similar pay and conditions to doctors and nursing staff. This means they are directly employed by the NHS trust in question. Some staff working in dental teaching hospitals are employed by universities. Dental technicians work for commercial laboratories or in NHS hospital laboratories. - Entry requirements Expand / Collapse The entry requirements and training in the dental team vary, depending on the role you choose. Similarly, pay for dentists will differ from the pay for dental care professionals. See the individual role pages for detailed information: - Dental team skills Expand / Collapse Whichever area of the dental team you work in, you'll need: - willingness to learn and make sense of scientific knowledge - good manual dexterity - good eyesight and colour vision - ability to offer advice and educate others - happy to work as part of a team - excellent people skills Willingness to learn and make sense of scientific knowledge Working in the dental team you will need a good academic background and interest in scientific knowledge particularly human anatomy and oral diseases processes. These skills are increasingly becoming important for all members of the dental care team. It is also important for you to update and test your knowledge against experience. Good manual dexterity Being good with your hands is important as well as good eyesight, including colour recognition. A key part of the role would be confident handling of medical instruments while working inside someone’s mouth. Good eyesight and colour vision You will be carrying out precision work in confined spaces. Ability to offer advice and educate others There's a strong educational element to your job, teaching the skills for patients to keep their teeth and gums in good condition. You’ll be dealing with a broad range of people, each with their own characteristics and concerns. Happy to work as part of a team The dental care team consists of a wide range of people with different skills and academic backgrounds. You need to have strong interpersonal skills and enjoying working as a team. Excellent people skills No two patients, and no two procedures, are ever quite the same. You would be providing dental care for people of all ages, from young children through to grandparents. You should be able to put people at their ease, gain their confidence and deal sympathetically with their problems and fears. Working well under pressure One of the challenges of working in the dental team is the ability to respond well to challenging situations. There is often the need to work with anxious patients who may be in pain or distressed. In addition, many dental surgeries are relatively confined spaces and the bulk of the day will be spent in that setting. Time pressure is also a constant feature of being a dentist in an NHS high street practice. You will need to work quickly but carefully as well as recording detailed clinical notes.
<urn:uuid:58fbf803-b3c0-47ac-afc3-eea357a5f75e>
CC-MAIN-2016-44
https://www.healthcareers.nhs.uk/explore-roles/dental-team
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988722459.85/warc/CC-MAIN-20161020183842-00345-ip-10-171-6-4.ec2.internal.warc.gz
en
0.965692
1,003
2.734375
3
The true number of coronavirus cases in the U.S. could be anywhere from six to 24 times higher than the confirmed number of cases, depending on location, according to a large federal study that relied on data from 10 U.S. cities and states. The vast majority of Americans, however, are still vulnerable to Covid-19. The study, published Tuesday in JAMA Internal Medicine, relied on serological tests — blood screens that search for antibodies to the virus and that determine whether someone was previously infected. They are different from diagnostic tests, which only detect people who currently have the virus, called SARS-CoV-2. Overall, an estimated 1% of people in the San Francisco Bay Area have had Covid-19, while 6.9% of people in New York City have, according to the paper’s authors, who included researchers at the Centers for Disease Control and Prevention and state health departments. In seven of the 10 sites, the estimated number of cases was 10 times the number of reported cases. The study was based on tests from more than 16,000 people across the 10 sites, but one limitation is that it relies on old data. The San Francisco samples were collected from April 23 to 27, while the New York tests were on blood from March 23 to April 1. The latest tests were conducted in May, and a lot can change during two months in the course of an outbreak. In South Florida, for example, researchers estimated that 1.9% of the population had antibodies to the virus. But that figure is based on samples collected from April 6 to 10, and given the spread of the virus since then in the state, the number now would certainly be some amount higher. Still, the data reflect what CDC Director Robert Redfield recently said — that true case numbers are 10 times higher than confirmed diagnoses. Confirmed cases in the U.S. stand at more than 3.8 million. The data underscore two other points: that testing in the U.S. is not capturing the full scope of the outbreak, and that even hard-hit communities are not close to reaching a herd immunity threshold — where enough people are immune from the virus (which scientists expect will happen for some amount of time after an initial infection) to slow down its spread to the point that unprotected people have a natural buffer. “The study rebukes the idea that current population-wide levels of acquired immunity (so-called herd immunity) will pose any substantial impediment to the propagation of SARS-CoV-2 in the U.S., at least for now,” infectious disease experts Tyler Brown and Rochelle Walensky of Massachusetts General Hospital wrote in an editorial accompanying the study. Experts estimate that 60% to 70% of people in a given area would need to be protected from the virus — either through recovering from an infection or vaccination — to reach herd immunity. Other locations included in the study and the estimated levels of antibodies in their residents: - Western Washington: 1.1% - Louisiana: 5.8% - The Philadelphia area: 3.2% - Missouri: 2.7% - Utah: 2.2% - Connecticut: 4.9% - The Minneapolis-St. Paul area: 2.4% Overall, the researchers found that there was no association between infection rates and age or sex. The results fit with other serosurveys that have found just a few percent of people in a given place have been infected with the SARS-CoV-2 virus, which causes the disease Covid-19. There have been a few outliers: One study in the hard-hit Boston suburb of Chelsea estimated that 30% of people had been exposed to the virus, while another survey in a German town where a carnival drove an outbreak found 14% of residents had antibodies. Still, the new study landed on different estimates for New York City than a state-run survey released in April, which found that 1 in 5 people in the city had antibodies. The disparate results highlight how study design — such as how participants are recruited or what blood samples are included — can influence findings. The new study relied on leftover blood samples collected from patients who sought medical care for any reason from March through May. Because so many appointments and procedures were canceled then, and because so many people were avoiding medical care during stay-at-home periods, the samples “are likely not representative of a typical prepandemic cohort,” Brown and Walensky wrote. Experts note that the inability of diagnostic testing to keep up with cases is not just limited to problems with the tests, which have included a botched rollout, overwhelmed labs, and supply shortages. It’s also that some 20% to 40% of Covid-19 infections are asymptomatic. Those people can still spread the virus, as can people who eventually develop symptoms but don’t feel sick yet — which has complicated efforts to rein in the spread. Researchers also stress that it’s still not confirmed if people who recover from Covid-19 are protected or for how long, or what levels (or titer) of antibody would be required to confer immunity. Some people with Covid-19 may not generate a robust antibody response, perhaps depending on how sick they get, though that remains an open question as well. “At present, the relationship between detectable antibodies to SARS-CoV-2 and protective immunity against future infection is not known,” the study’s authors wrote. “Extrapolating these estimates to make assumptions about population immunity should not be done until more is known about the correlations between the presence, titer, and duration of antibodies and protection against this novel, emerging disease.”
<urn:uuid:c45b1a58-c4b6-472f-90b3-4e81fb5bdbfa>
CC-MAIN-2022-33
https://gabio.org/actual-covid-19-case-count-could-be-6-to-24-times-higher-than-official-estimates-cdc-study-shows/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00075.warc.gz
en
0.970991
1,197
3
3
Sierra Leone — The Government of Sierra Leone has deny reports that Sierra Leone has agreed to accept Lebanon’s trash after Beirut last month approved an exportation plan to end the country’s nearly six-month-long waste crisis. President Koroma is reported to have instructed the Office of National Security and the Sierra Leone Police to conduct criminal investigations into the circumstances surrounding the matter. The Daily Star, a Lebanese media, reported on Saturday January 9, 2016, that Sierra Leone has reportedly agreed to accept Lebanon’s trash after Beirut last month approved an exportation plan to end the country’s nearly six-month-long waste crisis. The report said the Lebanese Foreign Ministry received a letter Thursday from Sierra Leone authorities informing it of the country’s willingness to accept its waste. The letter, which was originally addressed to Holland’s Howa BV firm, is signed by an adviser to Sierra Leone President Ernest Bai Koroma, according to the report. As-Safir said the West African nation consented on the condition that the waste be free of toxins, underlining that the approval remains at a preliminary stage until Sierra Leone’s government and president confirm the deal. Lebanon is bound by the U.N. Basel Convention on hazardous waste to sort this refuse, thought to have exceeded 100,000 tons, though waste specialists admit that it will be difficult because it is infectious and compacted.
<urn:uuid:f1d41d16-bff7-41f3-9e3d-51f0f31bc204>
CC-MAIN-2022-33
https://specimen-news.com/2016/01/10/government-denies-garbage-deal-agreement-with-lebanon/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00278.warc.gz
en
0.942076
298
1.84375
2
Deadline: Applications will be accepted at any time until the position is filled. Allergic reactions to drugs are common with some 2-3% of hospitalized patients estimated to suffer allergic responses to drugs. However, an allergic basis for many reactions is frequently not recognized, even in fatal reactions. On the other hand, the fear of a repeated allergic reaction can lead (sometimes unnecessarily) to avoidance of the drug treatment of choice. Thus, there is a pressing need for better means for the diagnosis of allergic sensitivity to drugs, and for establishing who may be at risk of a life-threatening reaction. Currently, the most effective means of establishing a diagnosis involves exposing the patient to the suspected drug, usually by pricking or injecting a small quantity into the skin. Such procedures are expensive, involve the risk of provoking a serious reaction and are performed at few specialist centres. Understanding the underlying cellular and molecular processes should allow development of simple, more rapid tests for drug allergy. The aim of this project is to develop a microfluidics-based system for rapid diagnosis of allergy to drugs by integrating cross-disciplinary expertise of microfluidic bioengineering and medicine. The main objectives include (i) to assess basophil activation testing methods, (ii) to design and fabrication of microfluidic chips, (iii) to quantify basophil activation in response to drugs on-chip, (iv) to develop a prototype testing system. These studies will rely on the expertise in microfluidics in the Faculty of Engineering & the Environment, and will involve close interaction with biomedical researchers at Southampton General Hospital (where participants will include an established team of medical researchers with appropriate laboratory, clinical and nursing experience). If you wish to discuss any details of the project informally, please contact Dr Xunli Zhang, Bioengineering research group, Email: [email protected], Tel: +44 (0) 2380 59 5099.
<urn:uuid:d5949b37-38a1-4dd1-bf06-95f3ba74b067>
CC-MAIN-2022-33
https://www.ischolarshipgrants.com/phd-studentship-the-rapid-diagnosis-of-allergy-to-drugs-using-a-microfluidic-platform/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571911.5/warc/CC-MAIN-20220813081639-20220813111639-00466.warc.gz
en
0.922861
401
2.359375
2
Focus Area: Early Childhood Grant Amount: $5,500 Located in Duluth. The YWCA of Duluth has been serving women and families in Duluth for the past 125 years. Its Spirit Valley building, which houses the Early Childhood Center and the Young Mom’s program, has been operating for 15 years with funding from Sheltering Arms for several of its programs. The YWCA has been a leader in Duluth in implementing Circles of Security aimed at addressing trauma in both families and staff. Grant supports offering training for center staff in the Pyramid model, a positive behavioral intervention and support framework that helps early educators build skills for supporting nurturing and responsive care-giving, create learning environments, provide targeted social emotional skills, and support children who have challenging behavior. The Pyramid model is used by the Duluth School district and Head Start programs, so children from the Y’s center will more easily transition from the center into kindergarten.
<urn:uuid:a13e5603-45a1-4783-bf5e-55697e5fdcd5>
CC-MAIN-2022-33
https://sheltering-arms.org/grantee/ywca-of-duluth/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00071.warc.gz
en
0.955583
194
2.09375
2
Web links to some of the best educational sites and Lesson Plans The latest educational challenges for your classroom! Contests, challenges and projects that will infuse excitement into your curriculum. Links and resources for implementing the Hour of Code. Stories and expereinces shared by teachers from our member districts. SRI / ETTC's Special Projects and Grants. Lesson plan ideas from local teachers. Live access to professional development records (password protected). Resources for ETTC Workshop Presenters (password protected). Member districts & links to district / school websites.
<urn:uuid:de967954-ec92-47dd-9134-299f792416f7>
CC-MAIN-2017-04
http://ettc.net/resources/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00544-ip-10-171-10-70.ec2.internal.warc.gz
en
0.886742
117
1.554688
2
|St. John I, 52nd successor to St. Peter| Pope St. John I was a great defender of the truth of the divinity of the Son of God and died on May 18th in the prison of the Arian King Theodoric at Ravenna in 526, having served the Church as Supreme Pontiff for two years, nine months and seven days. His remains were translated to the Basilica of St. Peter in Rome on May 27th, the day in which his feast is commemorated in the Usus Antiquior. Additionally, this holy pontiff worked to maintain unity between the East and the West and helped to establish the current mode of calculating the date of Easter (in the Latin Church). The Easter debate, in brief By the time of Pope St. John I, it had already been determined that the yearly calculation of the date of Easter would be somewhat independent of the date of Jewish Passover – insofar as Easter would always fall on a Sunday, even when the Passover fell on another day. Still, there was diversity of opinion as to just how independent the Church should be from the Jewish traditions. Some (principally in Antioch) calculated Easter after the same mode of the Jewish reckoning of the Passover – Easter falling on the Sunday after the Jewish feast of 15 Nissan (that is the 15th day of the first month of the ecclesiastical Jewish Calendar). However, this would occasionally allow the celebration of Easter before the vernal equinox. The Alexandrians, however, celebrated Easter on the first Sunday after the first full moon after the vernal equinox – hence, Easter would never fall before the equinox. According to the Alexandrian calculation, Easter could fall no earlier than March 22 and no later than April 25. In this dispute Pope St. John I sided with the Alexandrians, and this has become the norm in the West. However, many (perhaps all) of the Eastern Churches (both Catholic and Orthodox) follow the Antiochian calculation of Easter. Hence, the Easter celebration in the East and the West does not often coincide. By a happy coincidence, the two methods of calculation yielded the same date this year – on April 24th, Catholics and Orthodox of both the East and the West celebrated the Easter feast. Pope John I celebrates Easter in the East In 526, shortly before Easter that year, Pope St. John I visited Constantinople in order to advise and encourage Emperor Justin in the best means of suppressing the Arian heresy. This was the first papal visit to the East since the time of the apostles and Pope John was greeted with great joy and solemnity – the Emperor even prostrate himself before the Roman Pontiff. On 19 April 526, exercising his authority as the supreme shepherd of the universal Church, Pope John celebrated the Easter Mass in the Hagia Sophia according to the Latin Rite and was seated on a throne which was higher than that of the local patriarch, Epiphanius. Moreover, in a modification of the local tradition, John I (rather than the patriarch) crowned Emperor Justin with a customary Easter crown. The eastern patriarchs did not see this as a slight to their own dignity, but “made haste to manifest their communion in the Faith with the supreme pontiff; only Timothy of Alexandria, who had shown himself hostile to the Council of Chalcedon, held aloof.” (Catholic Encyclopedia, Pope John I) The Roman Pontiff as the foundation of the unity of the universal Church Pope St. John I knew that the unity of the Church is founded in the successor of St. Peter. Though the bishops exercise their authority as the Vicar of Christ in their own dioceses, Peter alone has been established as the supreme shepherd for the whole Church. While the pontiff respects the traditions of local churches, he also brings these traditions together by uniting them in the Tradition. “The Roman Pontiff, as the successor of Peter, is the perpetual and visible principle and foundation of unity of both the bishops and of the faithful. The individual bishops, however, are the visible principle and foundation of unity in their particular churches, fashioned after the model of the universal Church, in and from which churches the one and only Catholic Church comes into being. For this reason the individual bishops represent each his own church, but all of them together and with the Pope represent the entire Church in the bond of peace, love and unity.” (Lumen Gentium 23)
<urn:uuid:95b41abc-323b-464d-aabf-74230533e442>
CC-MAIN-2017-04
http://newtheologicalmovement.blogspot.com/2011/05/st-john-i-easter-pope-and-foundation-of.html?showComment=1305818524637
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00553-ip-10-171-10-70.ec2.internal.warc.gz
en
0.972295
925
3.015625
3
Solved by Walking… While the initial idea was to consider all the scriptural references to Michael, the General Epistle of Jude promised to be problematic. It is the first and only scriptural text to refer to Michael as an Archangel and is important for that reason, but that aside, for a long time, there seemed little else to commend it, apart that is for an apparent obscurity. The quotation in full runs thus: ‘Yet Michael the archangel, when contending with the devil, he disputed about the body of Moses, dared not bring against him a railing accusation, but said, “The Lord rebukes you!” A couple of things present themselves… Firstly, ‘contending’ may not necessarily be ‘warring’ so that the devil here accords more readily with the ‘Old Dispensation’ notion of Satan as accuser or prosecutor in a court of Law, a disputant, as it were, in a legal confontation. From such a notion, presumably, springs the age old tradition of playing, ‘Devil’s advocate’. And secondly, Michael, albeit, a mighty Archangel relies exclusively upon ‘The Lord’s’ power in order to ‘win the day’. We are here, it seems, a far cry from the, ‘war in heaven’ of Revelation, and perhaps a little closer to the Hebraic conception of a more orderly and seemingly purposeful expulsion from the heavenly realms by God. But why should the body of Moses be key? The body here could be symbolic of the earth realm, and as such would be the point at issue in any sought after transformation. The Old Dispensation relied soley on purification and a raising of the earthly body through initiation. This process was symbolised by a new, clean raiment. The New Dispensation appears to have ‘upped the ante’, by insisting upon a ‘World Apocalypse’, which eventually results in The New Jerusalem… And nobody has ever seen that!
<urn:uuid:3552ef54-7892-4be0-b25d-9e79f1689dc7>
CC-MAIN-2022-33
https://thesilenteye.co.uk/2022/07/10/jude-the-obscure/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00472.warc.gz
en
0.929284
490
2.078125
2
ESCAPE (European Safety Critical Applications Positioning Engine) is led by the Spanish company FICOSA in collaboration with partners from across Europe: GMV from Spain, Renault and IFSTTAR from France, STMicroelectronics and Istituto Superiore Mario Boella from Italy. By 2019, the ESCAPE consortium aims to deliver an innovative positioning engine tailored to meet the safety requirements expressed by those road transport applications that will involve automation. ESCAPE will enable a high grade of data fusion with different vehicle sensors and the exploitation of key technological differentiators such as the “precise point positioning” service (PPP), the potential use of the Galileo ionospheric model and the provision of an “integrity layer” to assess the degree of trust one can associate to the position information provided by the device. According to the companies involved in the project, ESCAPE will set a new paradigm among and across the technologies enabling road vehicle automation. The main keyword of this new paradigm is “safety-oriented” while the pathway is the integration of multiple sources of positioning information (multiple satellite constellations, multiple signal frequencies, and multiple on board sensors including maps) and high accuracy services. ESCAPE has been funded under the Fundamental Elements programme of the GSA. This is a new EU R&D funding mechanism supporting the development of EGNSS-enabled chipsets, receivers and antennas, with the major objectives of facilitating the adoption of the European GNSS Systems while improving the competitiveness of the EU industry, by addressing specific user needs in priority market segments. Visit the ESCAPE project at www.gnss-escape.eu
<urn:uuid:41736a48-25a4-4799-9ff8-c336e6381595>
CC-MAIN-2017-04
http://www.electronics-eetimes.com/news/europe-kicks-gsa-based-autonomous-driving-project
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281419.3/warc/CC-MAIN-20170116095121-00485-ip-10-171-10-70.ec2.internal.warc.gz
en
0.893698
344
1.734375
2
Recently I looked into Consul’s DNS Interface. It is a very nice feature, it lets you query for nodes or services via DNS. During my experiments I was running three Consul servers on c3.large EC2 instances and ten Consul clients on c3.large. A note on creating a separate consul cluster for testing: The most relieable way to boot separate cluster was to use different encryption keys. Since AWS reuses IP addresses it is possible that your test cluster joins your production one. That happened to me. I used dnsperf to measure the time it takes to respond to 1000 DNS requests: ~0.5sec. While doing the load tests the cluster leaders cpu was saturated. This is without setting any of the DNS configuration options. I wondered how the DNS interface works at all and where the number came from and started looking into DNS related configuration options. Configuration option: allow_stale The configuration option allow_stale is set to false by default. Setting it to true allows not only the leader to respond to DNS queries but also other servers. Every query is still going to be sent to one of the servers, but now it doesn’t have to be the leader. When I repeated my load test with that option turned on, I was expecting that every server got its share of requests to answer and thus the 1000 requests were answered faster. The actual result was that only one randomly selected server was used and the time was the same. This happens because the connection to one of the servers is cached for 30 seconds. With the current code you might end up doing your requests only ever to the same server. I played around a bit with enabling connections to all the servers but it didn’t end up speeding things up significantly. Which is why I did not continue to work on it. Configuration option: *_ttl Lets have a look at service_ttl. The default is 0 but it can be set to e.g. 5s. The result is that the TTL is changed. It has no impact on how Consul does DNS queries whatsoever. It does not cache anything based on that value. Consul leaves that to other tools like dnsmasq(does not cache results from non recursive name servers) or bind. Using the TTL to cache DNS results works as expected. Unfortunately it literally caches the result. If you have ten servers for a service, your first real DNS request returns three of them. Every subsequent request return the exact same three servers for the duration of your TTL. Consul clients have the full list though and if they would be taking care of the caching themself they could use their cached result to return more than three servers. Thats only theory though. I hope I shed some light on Consuls DNS interface! It certainly helped me a lot to dig into it. For our reverse proxy kind of project I decided to use consul-template instead. I want to thank Torsten for his great feedback on this post! Thanks for reading.If you read this far you should probably follow me on twitter.
<urn:uuid:3e884bed-70ef-43ad-a7dc-f6163a6e324c>
CC-MAIN-2022-33
http://hans.io/blog/2014/12/25/consul_dns
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00667.warc.gz
en
0.954611
646
1.882813
2
Distance from Papa to Udine Distance from Pápa to Udine is 352 kilometers. This air travel distance is equal to 219 miles. The air travel (bird fly) shortest distance between Pápa and Udine is 352 km= 219 miles. If you travel with an airplane (which has average speed of 560 miles) from Papa to Udine, It takes 0.39 hours to arrive. Papa is located in Hungary. |GPS Coordinates (DMS)||47° 19´ 48.1440'' N | 17° 28´ 2.6400'' E Pápa Distances to Cities |Distance from Papa to Turin||795 km| |Distance from Papa to Correggio||590 km| |Distance from Papa to Udine||352 km| |Distance from Papa to Formigine||597 km| |Distance from Papa to San Giovanni In Persiceto||571 km|
<urn:uuid:631eba07-aaaa-4ae7-b269-542bab2a3830>
CC-MAIN-2016-44
http://www.distancefromto.net/distance-from-papa-hu-to-udine-it
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988722459.85/warc/CC-MAIN-20161020183842-00344-ip-10-171-6-4.ec2.internal.warc.gz
en
0.811297
200
1.742188
2
Well, to borrow a phrase from Click and Clack, I've come around for the "third half of the show" - figuring out how to bridge the gap between the growing public desire for accessible, informative, entertaining science content and chemistry's approach to that communication. A lot of terms have swirled around this issue: "punching down," #BogusChem, "Inside Baseball," 'in-reach' not outreach, #chemophobia, and "dumbing down," to name just a few. |Thanks for the tip about the magnets, Andre!| (P.S. Yes, I know "D" isn't an element) Readers: Have a favorite post I haven't included? Send it along in the comments. Janet Stemwedel, Doing Good Science: "When we target chemophobia, are we punching down?" Chad Jones, The Collapsed Wavefunction: "Punching down? I don't remember swinging at all." Ash Jogalekar, The Curious Wavefunction: "Where's the chemistry lobby? On why we need a National Center for Chemical Education." See Arr Oh, Just Like Cooking: "The Chemistry Popularity Conundrum" Michelle Francl, Slate: "Don't Take Medical Advice from the NY Times Magazine"; Nature Chemistry: "How to counteract chemophobia"; Paul Bracher, ChemBark: "Combatting Chemophobia" Rebecca Guenard, Atomic-O-Licious: "Chemistry Isn't Just About Chemicals" Science 2.0: "Chemophobia - The Unnatural Fixation of Activists" Chemjobber, Dr. Rubidium, See Arr Oh, Chemjobber: "Chemistry Avengers" (podcast) Marc Leger, Atoms and Numbers: "Consider the audience when addressing chemophobia" Chris Clarke, Pharyngula: "Did you know douchebags are full of dihydrogen monoxide?" Andrew Bissette, Behind NMR Lines: "In defense of #chemophobia" More to come...
<urn:uuid:f43b87f5-396e-4d74-9279-ae33631bb3ab>
CC-MAIN-2022-33
https://justlikecooking.blogspot.com/2013/08/link-farm-in-reach.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00673.warc.gz
en
0.875456
436
1.601563
2
Has anyone else noticed that the last few months have brought some interesting new trends to the industry? This has also been evident given the inquiries here at Energy-models.com. (I should probably follow up on some of the trends that are changing in the building simulation community- yes, I am a data nerd). While our typical support request is usually a request to rectify some error or anomaly, the last few months have seen a slight change. Our number 1 inquiry has been for “taking over” an existing project, and we have simply not been able to accommodate these requests. We have tried to help where we can, which has often meant sending someone a referral. The trouble is that we only know so many people who we feel confident in... It is very difficult to answer the question "What is Energy-modeling" in as few words as possible. Here is my latest attempt that will soon be edited and published in, Architectural Drafting and Design, published by Cengage, 7th Edition.Definition of Energy Modeling Energy modeling, short for Building energy modeling (often abbreviated as BEM), is the computer simulation of a building used to determine or estimate building energy usage. A virtual building is created in a software package, the building components are entered, and the building is simulated over the duration of 1 year using a weather file. The components entered into the simulation are numerous and thus most energy models allow for some... I read an article a few years back about how energy-modeling was inaccurate. I disagreed with a lot of the articles premise, but not the energy-nerd’s conclusion. The article failed to specify that they were talking about residential energy modeling, which I thought was a cheap shot, because it is easier to miss the mark on poorly controlled buildings. My biggest problem with the article was that it blamed the software. I have a saying: If you want to blame the software, please consult a mirror first. The software packages are not the main problem. Not even close. Barking up that tree is the calling card of someone who just wants to bitch about energy-... I remember learning Psychrometrics in college. It was in one of my early chemical engineering classes and was really just a footnote to our main syllabus. The Professor was walking through it on the chalkboard, and explaining this and that; I thought that it seemed rather intuitive and unimportant to my career path (the irony!). I stopped taking notes and decided to sit back and try to reason through it. Somewhere mid-lesson I must’ve started daydreaming because suddenly the bell rang, and class was dismissed. I didn’t look further into it. A few weeks later, we had our midterm. I had studied everything in my notes. So naturally, about 90% of the mid-term was based on psychrometrics. I thought, “no big deal, I remember enough of... The Steinbach Credit Union built a new 45,000 square foot, 3 story office building in Winnipeg, MB in 2009. The building featured a number of energy efficiency features, including high insulation values, efficient lighting, a green roof and a ground coupled heat pump (GCHP) system that uses the earth under the parking lot as its energy source. If you’ve been in Winnipeg in January, you’ll have an appreciation for winter. Our winter design temperature is -28 F (-33 C), with extreme temperatures occasionally dropping below -40. This winter, as anyone in North America knows, the Polar Vortex blessed us with the coldest winter on record. We had 25 days when the temperature didn't get above -20 F in December and January. So, you want to use LEEDonline? First thing, you must have Internet Explorer or Safari. It won't work in any other browser. There's a list of other things but if you have used LEEDonline in the past, you will need to make some changes. If you have 64 bit Internet Explorer, you will need to setup a 32 bit option. This is easy enough:Go to your desktop Right click and create a shortcut Set the shortcut path to C:\Program Files (x86)\Internet Explorer\iexplore.exe Give the shortcut a name (something like "32 bit IE" or whatever helps you remember) Now, to make sure that this 32-bit version of Internet explorer operates in "compatibility mode":Open the 32 bit version of IE. Go to LEEDonline.com Go... Hello Friends and simulators- We get an awful lot of questions about modeling new systems, and rightly so. These often involve workarounds and many people do these workarounds differently. (Example, how do I model VRF in eQUEST?). What are some of these cool "new" systems:Chilled Beams Displacement Ventilation Underfloor Air Distribution While all these systems have their own time and place, newer does not always mean better. Before getting caught up in the hype of any new, flashy system, make sure that you don't disregard high performance technology in conventional systems (example high performance VAV). This is a great read, by an... We have seen a number incoming search engine links looking for "Energy-models.com coupon code" If you want to try one of our courses, and you want a discount? How does 90% off sound? For a limited time only, we are offering "Pay with userpoints", where you can earn points and use those points to pay for our products. The best way to earn points is by referring others with your referral link.Get your referral link on your user page Share your link by email, Facebook, Twitter, Linkedin, telegraph, smoke signals Earn 200 points = $20.00 off for each user who creates a FREE account. Use your... Attention MANAGERS and EMPLOYERS You probably always hear about needing better software, and that may be true, but remember that faster cars require better drivers. The software is not the limiting factor. Not even close. I know you are busy, so to move straight to the point: we have put together a free tutorial to help you hire quality energy-modelers, or which energy-modelers you should retain (who deserves a raise?) In a nutshell, the course covers:The 5 factors to evaluate in an applicant 20 example interview questions to help evaluate these factors (with answers) Red Flags to watch out for Ingredients to build... Energy-Models.com is a site for energy modelers, building simulators, architects, and engineers who want learn the basics, to advanced concepts of energy modeling. We've got online training courses and tutorials for eQUEST, Trane TRACE 700, OpenStudio, and LEED for energy modeling. All our energy modeling courses are video based. What better way to learn energy modeling software than screen-casts of exactly how things are done? Copyright © 2010-2013 CosmoLogic LLC. TRACE 700 and eQUEST are ™ of Trane Inc. and James J. Hirsch respectively. Energy-Models.com is built in San Francisco, CA and Slinger, WI USA.
<urn:uuid:02e31e03-1786-45c0-ac82-476cf9381d08>
CC-MAIN-2017-04
http://energy-models.com/blog?page=1
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00322-ip-10-171-10-70.ec2.internal.warc.gz
en
0.954018
1,501
1.84375
2
PRISON officers were assaulted and threatened as several inmates were treated by doctors at University Hospital Limerick after they became unwell having consumed a homemade concoction of handwash and tablets. The prisoners, who were handcuffed and accompanied by prison officers, were admitted to the already chaotic emergency department suffering from the effects of, so called, prison hooch. The criminals, who were loud and abusive, were treated within touching distance of other patients due to the overcrowding situation at the emergency department. In a letter, published on page 16, Limerick Leader reader Pat Marrinon who was in the ED on St Stephen’s night says the behaviour of the prisoners on the night was disgusting. “It was the worst carry-on I have ever witnessed in my life and I would like to pay tribute to the officers who spent that night having to put up with jibes, threats and attempted assaults,” he writes. Prison authorities believe the three inmates who were hospitalised on St Stephen’s night had earlier consumed a mix of prescription tablets with handwash, which contained a small amount of ethanol. “They were mixing hand wash gel with Xanax and other prescription drugs like D 10’s. It is a miracle none of them died,” said one prison source, who added the inmates are lucky they were found early by prison staff and quickly transferred to hospital. “If it was late at night, God knows what would have happened,” he added. A spokesperson for the Irish Prison Service confirmed it is aware of the incident on St Stephen’s night and that the inmates in question will be the subject of disciplinary proceedings. “The prison service is aware that a number of prisoners attending A&E in Limerick over the Christmas period became disruptive. Prison Staff escorting the prisoners and HSE security staff present at the time moved very quickly to ensure that any disruption was kept to a minimum,” he said. Disciplinary sanctions open to the prison governor include a withdrawal of privileges such as access to phone calls and a restriction of visits. It is understood that while a number of the prisoners hospitalised were extremely unwell, all have since been returned to Limerick Prison having been discharged by doctors. Separately, an inquest is expected to open in the coming weeks following the death of a convicted killer in Limerick Prison last month. Jason Morrissey died in the early hours of December 27 as a result of a suspected drugs overdose. The 25-year-old, who was originally from Toomevara, was serving a sentence for manslaughter. He received a lengthy sentence in 2013 for the manslaughter of a young man outside a nightclub in Thurles on February 19, 2012. While foul play has been ruled out, a post-mortem examination was carried out on his body at University Hospital Limerick to confirm cause of death. The full results of toxicology tests are awaited. Gardai, the Irish Prison Service and the Inspector of Prisons all launched investigations into the circumstances surrounding Morrissey’s death ahead of an inquest, which is likely to open next month.
<urn:uuid:ee77d146-22a8-4dda-86f1-24a1c5ab2e21>
CC-MAIN-2016-44
http://www.limerickleader.ie/news/local-news/117701/Prisoners-to-be-disciplined-after-causing.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988717963.49/warc/CC-MAIN-20161020183837-00374-ip-10-171-6-4.ec2.internal.warc.gz
en
0.985076
647
1.523438
2
Modern Pomegranate Photo Brown Rosh Hashanah Card The Modern Pomegranate Photo Brown Rosh Hashanah Card features vines and pomegranates to accent your photo against a dark brown background. The same background appears on the reverse side. - Digitally printed on both sides of smooth 120# vellum card stock. - Measures 5″ wide by 7″ high. - Shown with flat White ink. - Displayed with combination lettering styles Baskerville (verse) and Monterey (heading). - This Jewish New Year Card comes with high-quality bright white envelopes. - Let us do the addressing of your envelopes. Contact us for details regarding this time-saving service! - When is Rosh Hashanah? Use this handy guide as a reference. Looking for a stylish Jewish New Year & Rosh Hashanah Card? Send your greetings for the Jewish New Year in style with elegant personalized cards priced at a discounted price. Rosh Hashanah is the Jewish New Year. The biblical name for this holiday is Yom Teruah, which means “day of shouting or blasting”. Rosh Hashanah is the first of the Jewish High Holy Days specified by Leviticus 23:23–32 that occur in the early autumn of the Northern Hemisphere. This is a time for praying in the synagogue and for personal reflection. The loud, blowing sound of the shofar (ram’s horn) may be heard on both mornings of the holiday at the synagogue. The celebration continues with sweet edibles and the gathering of family and friends.
<urn:uuid:1fc19358-dfaa-4f40-856e-45f50cd82397>
CC-MAIN-2022-33
https://holidaycards.invitations4less.com/product/modern-pomegranate-photo-brown-rosh-hashanah-card/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00667.warc.gz
en
0.857327
342
1.796875
2
Texas' Direct Energy further pushed the envelope in the race to bring innovation to the power distribution industry by launching the country's first strictly natural gas energy option titled "blue energy," which will be available for residential energy customers. True Blue Texas Plan, which has become an option thanks to the natural gas wells in Texas' famed King Ranch, allows residents to purchase electricity derived solely from natural gas. "Blue energy is cleaner energy, affordable energy and a way to support the growing natural gas industry that is vital to Texas' economy," said Rob Comstock, general manager of Texas for Direct Energy. "As a Texas-based company we are proud to offer the first and only 100 percent, Texas-sourced natural gas product on the market. By selecting True Blue Texas, our customers are directly supporting Texas business." The plan is touted to create jobs across the state and provide further evidence that a deregulated electricity market can generate new options for environmentally conscious customers. Texas has seen one of the most successful ventures into a deregulated market anywhere in the country. In the 10 years since the laws were implemented, customers have reported increased satisfaction with their chosen energy providers.
<urn:uuid:efbbc4b9-2c2a-47ca-800e-95493fcb620a>
CC-MAIN-2022-33
https://electricityrates.com/how-to-compare/energy-choice-blog/texas-retail-energy-provider-launches-natural-gas-residential-energy-project/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00074.warc.gz
en
0.957315
235
1.695313
2
Five million households did not make their rent or mortgage payments in December, and 2.3 million renters and 1.2 million mortgagors believe they are at risk of eviction or foreclosure or would be forced to move in the next 30 days, according to fourth-quarter research released today by the Mortgage Bankers Association's Research Institute for Housing America. On Tuesday, MBA, along with several trade organizations, submitted a letter to the Office of the Comptroller of the Currency responding to its approach to the Community Reinvestment Act. On Thursday, the House Financial Services Committee held a hearing on the next COVID-19 relief legislation. And the Senate Banking Committee approved Rep. Marcia Fudge’s nomination to be HUD secretary. Employers added 49,000 jobs in January, the Bureau of Labor Statistics reported Friday. And while the unemployment rate fell from 6.7% to 6.3%, Americans are still dealing with nearly 10 million jobs fewer than a year ago as a result of the coronavirus pandemic. The pandemic has increased stress on everyone and everything. So MBA CREF21 asked several female business leaders to discuss lessons they have learned while navigating COVID-19 challenges. This week’s MBA Chart of the Week chart provides a preview of newly updated pandemic-related household financial insights that MBA’s Research Institute for Housing America released this morning, Feb. 8.
<urn:uuid:66ac511e-4729-4d28-9614-32f75122f2b1>
CC-MAIN-2022-33
https://newslink.mba.org/mba-newslinks/2021/february/mba-newslink-monday-feb-8-2021/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00274.warc.gz
en
0.946775
288
1.601563
2
Multinational Enterprises, Spillovers, Innovation and Productivity 2004 (English)Report (Other academic) Recent debate has focused on the importance of corporate governance, localization of headquarters, foreign direct investments, externalities and key actors in national innovation systems and productivity. This study explores whether foreign-owned multinational firms differ systematically from domestic firms in terms of R&D-investments, transmission of technological knowledge and economic performance. The econometric analysis is based on a sample of 1 197 firm-level observations in Sweden, of which approximately a third from firms with foreign owners. The main finding is that domestic multinational firms are distinct from Nordic, Anglo-Saxon and European and other groups of corporate owners in terms of R&D investments and embeddedness in scientific, vertical and horizontal innovation systems. However, the advantage of higher R&D intensity and possible knowledge technological knowledge spillover does not manifest itself in superior innovation output or productivity performance. Our tentative explanation is that domestic multinationals are using the home country for developing technological capacity that is subsequently exploited in affiliates abroad. Correspondingly, the innovation and productivity performance in foreign multinationals are partly returns on activities created in their home countries. Place, publisher, year, edition, pages CECIS, KTH Royal Institute of Technology , 2004. , 40 p. CESIS Working Paper Series in Economics and Institutions of Innovation, 22 Multinational Enterprises, Spillovers, R&D, Innovation, Productivity IdentifiersURN: urn:nbn:se:kth:diva-72461OAI: oai:DiVA.org:kth-72461DiVA: diva2:487618 QC 201202082012-02-082012-01-312012-02-08Bibliographically approved
<urn:uuid:5fe726b9-f03f-4bd8-ba0b-db21b5efcadc>
CC-MAIN-2016-44
http://kth.diva-portal.org/smash/record.jsf?pid=diva2:487618
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720845.92/warc/CC-MAIN-20161020183840-00086-ip-10-171-6-4.ec2.internal.warc.gz
en
0.885813
373
1.664063
2
You might want to think twice before grabbing a pastry or doughnut for breakfast. A University of Alabama at Birmingham professor says research in animals suggests that eating a high-carbohydrate breakfast might turn off the body’s ability to burn fat throughout the day. To find out if a high-carbohydrate breakfast has the same effect in humans, Barbara Gower, Ph.D., professor in the Department of Nutrition Sciences in the School of Health Professions, has received a $160,000 grant from the Egg Nutrition Center to study whether the kind of food eaten at breakfast can affect metabolic health. “Morning appears to be the time of the day when your body is geared up to burn fat,” said Gower. Studies with mice conducted by sub-investigator Molly Bray, Ph.D., professor in the Department of Epidemiology in the School of Public Health, showed that fat intake at the time of waking takes advantage of the body’s natural inclination to burn fat at this time, and allows the animal to respond to different types of food later in the day. Conversely, mice given a high-carbohydrate meal as the first meal of the day impaired the animals’ ability to burn fat later in the day; they also were fatter at the end of the study and their blood-lipid profile was worse. Gower said this study might translate to humans. “Your first meal of the day appears to program your metabolism for the rest of the day,” said Gower. “If you eat a high-carbohydrate meal first thing in the morning, such as white bread or a doughnut, your body may shut off its fat-burning activity. That could lead to obesity and elevated triglycerides, which, in turn, could increase your risk for heart disease and diabetes.” Gower wants to determine if eating a mixed macronutrient meal instead of a meal high in simple carbohydrates will make people healthier and lower their risk for diabetes or heart disease. “The concept we’re examining is that you burn more fuel and burn it more efficiently if you eat the right fuel at the right time of the day,” said Gower. “Eating foods higher in fat and protein, such as eggs or meat in combination with other healthful foods low in refined carbohydrates, such as dairy products, whole-grain products, and whole fruit for breakfast, is what your metabolism is designed to burn.” Gower is recruiting 30 adults, both men and women ages 55-75 for the study. Participants will be given all breakfast foods. They also will be given instructions for eating healthful, well-balanced lunches and dinners. If you are interested in participating in the clinical trial in the Birmingham area, contact 205-934-4386.
<urn:uuid:136c5425-338f-4997-9431-24172c5eaf0a>
CC-MAIN-2017-04
http://www.uab.edu/news/innovation/item/2593-uab-to-study-if-breakfast-choice-helps-or-hinders-fat-burning
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00356-ip-10-171-10-70.ec2.internal.warc.gz
en
0.958258
581
3.375
3
Understanding infection dynamics of respiratory diseases requires the identification and quantification of behavioural, social and environmental factors that permit the transmission of these infections between humans. Little empirical information is available about contact patterns within real-world social networks, let alone on differences in these contact networks between populations that differ considerably on a socio-cultural level. Here we compared contact network data that were collected in the Netherlands and Thailand using a similar online respondent-driven method. By asking participants to recruit contact persons we studied network links relevant for the transmission of respiratory infections. We studied correlations between recruiter and recruited contacts to investigate mixing patterns in the observed social network components. In both countries, mixing patterns were assortative by demographic variables and random by total numbers of contacts. However, in Thailand participants reported overall more contacts which resulted in higher effective contact rates. Our findings provide new insights on numbers of contacts and mixing patterns in two different populations. These data could be used to improve parameterisation of mathematical models used to design control strategies. Although the spread of infections through populations depends on more factors, found similarities suggest that spread may be similar in the Netherlands and Thailand. Citation: Stein ML, van Steenbergen JE, Buskens V, van der Heijden PGM, Chanyasanha C, Tipayamongkholgul M, et al. (2014) Comparison of Contact Patterns Relevant for Transmission of Respiratory Pathogens in Thailand and the Netherlands Using Respondent-Driven Sampling. PLoS ONE 9(11): e113711. doi:10.1371/journal.pone.0113711 Editor: James M. McCaw, University of Melbourne, Australia Received: May 15, 2014; Accepted: October 27, 2014; Published: November 25, 2014 Copyright: © 2014 Stein et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Data Availability: The authors confirm that all data underlying the findings are fully available without restriction. The RDS data files are available online, doi: 10.6084/m9.figshare.1147465. Funding: The Swedish Research Council (vr.se) has financed the programming of the RDS websurvey system and the technical implementation of the surveys in the Netherlands and Thailand. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript. Competing interests: The authors have declared that no competing interests exist. The spread of the majority of infectious diseases, including those with pandemic potential, depends on the underlying social contact network of the host population , . In many countries pandemic preparedness and control measures during large-scale outbreaks are analysed using mathematical models to provide support for public health policy decisions. These models often assume proportionate mixing in a population that is stratified by contact rate . In many models with heterogeneity in contact rates the proportionate mixing assumption is used for convenience and because information about mixing patterns by contact rate is usually not available. In view of results that show that mixing patterns between susceptible individuals greatly influence infectious disease dynamics –, it is pertinent to collect empirical information about mixing patterns that determine the transmission of infectious diseases. Most studies that investigated contact patterns relevant for the spread of respiratory infections that are spread by close-contact used egocentric data, i.e. responses of participants who were sampled independently of one another . Such studies provide no information about the contact network structure beyond the contact persons reported by participants. Electronic proximity devices can provide more insight in social contact networks, but their use is limited to specific settings , . Although complete analysis of social contact networks is practically impossible for an entire population, partial insight in degree distributions and contact mixing patterns within these networks can increase our understanding of disease dynamics , . For example, when individuals primarily have contact with individuals of similar age, infections are likely to spread faster within those subgroups than among them. Furthermore, investigating contact networks can highlight the existence of so-called hubs, i.e. individuals with a relatively high degree , who are more likely to become infected and to infect others, and can act as a bridge between communities. Such information can be used to determine optimal control strategies. Respondent-driven sampling (RDS) is a chain-referral method that was introduced to estimate disease prevalence in hard-to-reach populations, such as drug-users , . RDS begins with the selection of initial respondents, so-called “seeds”, who are asked to recruit contact persons from their social environment; these contact persons are asked to do the same. Unlike snowball sampling, RDS provides the option to track who recruited whom by means of personal codes. Previously, we proposed online RDS (webRDS) as a method for sampling contacts of contacts and beyond of individuals to study social contact network structures . To investigate the determinants of using this sampling method for eliciting contact information, we conducted webRDS surveys in both the Netherlands and Thailand focusing on contact patterns relevant for the transmission of respiratory pathogens. Note that our objective was not to use RDS for estimating population proportions from our samples. In this paper, we compare social contact data that were collected with a similar methodology in the Netherlands and Thailand. Earlier, a large population-based study showed striking similarities in mixing patterns across eight European countries , and also comparable egocentric data on mixing patterns were collected in countries in Asia , . However, to our knowledge, no studies performed a direct comparison between contact network data collected in a European country and a country in Asia. Our first aim was to study whether populations with different cultural, demographic and social backgrounds also differ in social mixing patterns. In particular, we aimed to investigate differences and similarities in numbers of contact persons, mixing patterns (i.e. who has contact with whom?) and effective contact rates between both countries. The latter help quantifying the transmission potential of certain directly transmitted infectious diseases through a population. Secondly, our aim was to investigate whether there are differences between the two study populations with respect to factors that drive peer-recruitment via the internet. We conducted webRDS surveys to collect contact network patterns in Thailand and the Netherlands between November 2012 and May 2013 (see Figure S1). Recruitment methods and questionnaires were virtually identical in both countries (apart from different survey languages and minor tailoring to local situations that is elaborated below), in order to carry out a country comparison. Seeds were invited from convenience samples of students from two universities located in Utrecht and Amsterdam (the Netherlands) and two Bangkok Universities (Thailand) (Table 1). The majority of the students in both countries leave the parental home and live in dormitories , . In the Netherlands it is custom for a student to have an own bedroom but to share all facilities, whilst students in Thailand often share the same room or even the same bed. Seeds in both countries were first informed about the survey, either in physical group meetings or by an information email. Seeds were then invited by email containing a unique hyperlink to the questionnaire or they could register themselves on the survey website using their email address. The questionnaire and invitation emails were provided in local languages and additionally in English. Contact definition and questionnaire The questionnaire was kept short to limit the burden for participants; in total it consisted of eleven questions. A ‘contact person’ was defined as a person sitting or standing within arm's length of the participant (denoted as ‘YourSpace’, see Figure S2) for 30 seconds or longer. This definition made it fairly simple to recall contact persons, could be easily explained in an online questionnaire, and was not restricted to only face-to-face interactions. Participants were asked to record numbers of contact persons at different settings during one day (namely ‘yesterday’). We asked participants to record the number of contact persons while travelling and at different locations. Modes of transport and locations were prespecified (i.e. a subset of transport and location types of interest, see Table S1) in the questionnaire and tailored to each country. Participants were asked in a separate section to record the number of contact persons within arm's length while eating, as it is custom in Thai culture to share several small dishes and drinks with friends and/or family in restaurants, which facilitates the potential transmission of infections. For numbers of contact persons at different locations and while eating, the participant was requested to indicate whether the contact person was younger, the same age or older than the participant. We also asked participants for their age, sex, educational level, postal code, and the number and ages (specified in age groups) of persons living in their household during the past seven days. Furthermore, we included a question to record any symptoms (provided in a list, see Table S2) that participants and/or household members experienced in the past seven days. A combination of the symptoms fever, headache and muscle pain was indicated as influenza-like-illness (ILI) symptoms, and a combination of the symptoms runny nose, sore throat and cough as common cold-like symptoms. Recruitment and online system At the end of the questionnaire, we asked participants to recruit four new participants (further referred to as ‘recruitees’) with whom they had contact according to the above definition in the past 7 days (see also Figure S2). We provided three options for recruitment, namely through Facebook (i.e. send Facebook friends a private message), indirect email (i.e. provide your email address and receive four invitation emails that can be forwarded to recruitees) and direct email (i.e. provide email addresses of your recruitees and the system sends out invitation emails automatically). All invitations contained information on the survey and a personal link and code. All emails and the first page of the questionnaire contained a link to unsubscribe for the survey. After inviting recruitees, participants were referred to the project website where participants could view a graphical representation of the network components found in the study as a non-material incentive for their participation. These network graphs were anonymous but showed the personal codes provided in the invitations so that participants could identify their own location in the network. Full details of the online RDS survey system can be found in M.L. Stein et al. . All information about the survey was available on all web pages and could be accessed at any time. All pages contained a log-out button that referred users to a search engine. The system converted IP addresses to a unique anonymous code using a one-way encryption algorithm and original addresses were deleted. Login passwords were only valid for a single participation and could not be used on two computers at the same time. All communication between the users and the survey website was encrypted. We obtained informed consent via the first webpage, on which inter alia study purposes and benefits, and statements on privacy and confidentiality were displayed. Users were able to accept the informed consent form by clicking the ‘Start the Survey’ button and to continue to the questionnaire, or to deny by clicking the button “No Thanks” whereby users were automatically logged out of the survey. There was no age limit for inclusion included in the study protocols. Due to the setup of the study a selection of participants based on age or a separate consent form for parents/caretakers of minors was not possible. The study received approval from the Medical Ethical Committees from both the University Medical Center Utrecht, the Netherlands (reference: 12-247/C) and the Faculty of Public Health Mahidol University, Thailand (reference: MUPH 2012-187). Using terminology from social network analysis, we defined a participant's degree as the total number of contact persons reported by the participant during one full recording day (i.e. the sum of the numbers of contact persons at different locations and while travelling). We removed two Thai participants who reported a degree of more than 2200, as these extreme degree values are highly unlikely according to our contact definition and their individual answers made clear that they misinterpreted the definition. A negative binomial distribution N (μ, k) was fitted to the observed frequency distribution of degrees using maximum likelihood methods, where μ denotes the mean and k the dispersion parameter; parametric bootstrapping was performed to estimate confidence intervals. We used a Q-Q plot to graphically compare the degree distributions of the two country samples and used the Anderson-Darling k-sample test to test the hypothesis that these two samples come from one common population. To investigate mixing patterns within our two samples with respect to the measured variables, we calculated correlation coefficients between pairs of randomly chosen individuals that were one, two, three and four or more link steps away from each other in the same network chain, by using the shortest paths between any two persons in the same network chain . Thus, we calculated correlations between recruiters and their recruitees in consecutive waves. Here we assumed that a recruitment link between two participants can be interpreted as a contact in the sense of our contact definition. We used Pearson's r for integer variables (age, degree, and number of contact persons while eating), phi coefficient (rφ) for binary variables (sex and two or more symptoms reported) and Spearman rank-order (rrank) for ordinal variables (education). Logistic regression analysis was used to investigate which measured characteristics are important for online peer-recruitment. We defined the binary outcome “intention to recruit” as a respondent that requested invitations for recruitees on the last survey page (versus a respondent who did not request invitations). We used this binary outcome as the RDS system only registered whether or not a participant clicked the button to request for four invitations, and not how many of the four invitations were actually sent out to recruitees. We repeated the logistic regression analysis for the sampled data without seeds (data without wave 0), to investigate the influence of seeds on the outcome. See Text S1 for a more detailed description. In RDS methodology, samples are weighted for individual degrees as persons with a high degree theoretically have a higher chance to get invited than persons with a low degree . For illustration purposes, we used the output of the logistic regression model to estimate for individual subjects in each country the probability of the intention to recruit as a function of degree; adjusted for age, sex, education and household size. Confidence intervals (95%) were obtained using standard errors. In addition, we assessed for each country sample the validity of the first-order Markov assumption , i.e. that correlations found between recruiter and recruitee are only dependent on the direct recruiter. This was done by calculating the correlations for age and sex between seeds (wave 0) and their recruitees in consecutive waves (maximum up to 3 waves, due to limited number of participants in waves ≥4). For the numeric variable “age” we compared rwaves0–3 with rwaves0–1 * rwaves1–2 * rwaves2–3; for the categorical variable “sex” we raised the 1-step transition matrix to the third power to obtain rwaves0–3. Effective contact rate In a population that is heterogeneous with respect to contact rates, the basic reproduction number depends on the so-called effective contact rate C. Assume that a population is stratified into n subgroups with contact rates ci, i = 1, 2, 3,…,n. Furthermore, assume that mixing is proportionate, i.e. random mixing weighted by the contribution of a subgroup to the total number of contacts in the population. Then it can be shown that the basic reproduction number R0 is proportional to the effective contact rate given by(1)where denotes the population mean of the ci and v the variance of the ci (see Anderson and May ; p 233). Here we used the concept of the effective contact rate to quantify the heterogeneity in contact rates found in our sample and to assess their possible impact on transmission of infection. Based on the assumption that degree distributions observed in our sample are representative for the degree distribution in the population, we computed C with data on degree. In addition, we computed an effective contact rate with contact persons at different locations, contact persons while travelling, contact persons while eating and household members in order to compare and assess the contribution of each of these categories. This provides some indication for the possible effects of control measures that reduce contact rates such as school closure or cancellation of mass gathering events on transmission of infection . We are aware that the assumption of representativeness of our sample of the degree distribution in the population is most likely not fulfilled, but want to demonstrate how such data can be used to investigate the impact of interventions on social network connectivity. We also note that the applied statistical tests do not take the interdependence structure within our sampled data into account. The RDS data files are available online, doi: 10.6084/m9.figshare.1147465. R version 3.0.3 was used for statistical analysis and RGraphviz for creating Figure 1. See Text S2 for the full R source code and applied libraries. The recruitment networks obtained in (A) Thailand and (B) the Netherlands. Seeds are indicated with black borders; seeds who did not recruit other participants are not displayed. The circle sizes reflect the total number of contact persons (degree) reported by each participant. The colours indicate the different age groups, illustrating the mixing by age. (C) Displays the cumulative number of participants and seeds over time the surveys were active in each country. The jumps in the cumulative number of participants are caused by newly invited seeds. A total of 358 individuals participated in the Netherlands, compared to 257 participants in Thailand. Although in both countries the survey's operating days, numbers of invited seeds and seeds who filled in the questionnaire were similar, seeds in the Netherlands were more successful in inviting recruitees who also completed the questionnaire (see Table 1). Nevertheless, in Thailand we reached up to six waves (in two trees) of recruitees, compared to five waves (in three trees) in the Netherlands (see Figure 1). There were 233 pairs of recruiter-recruitee in the Netherlands and 140 in Thailand. In both countries, more than half of all participants invited recruitees, namely 55.4% (198) in the Netherlands and 56.4% (145) in Thailand. Of all seeds, 87.0% (80) in the Netherlands invited one or more recruitees compared to 73.0% (65) in Thailand. The majority of the Thai participants (45.1% of 257 participants) used Facebook to invite recruitees, while in the Netherlands invitations were mainly sent by email (Figure 2). (A) Recruitment options used by participants. (B) Distribution of participants over waves (in proportions of country totals). The lines indicate the proportion of participants, in each wave, who also invited recruitees (these participants requested four invitations on the last page of the survey). In both countries the proportion of seeds (wave 0) that invited recruitees was more than 70%, and on average more than half of all participants invited one or more recruitees. (C) The age distributions in each country for all participants, with colour indicating sex. The solid lines (black) display the age distributions for seeds only. The blue dotted lines show the estimated Dutch and Thai population estimates for 2012. (D) The household sizes reported by participants in each country (bars). The squares (for the Netherlands) and triangles (Thailand) show the household sizes as reported by the national census bureaus. The lines in the graph indicate the number of household members with one or more symptoms (as a proportion of the country totals), as reported by participants (30 participants in the Netherlands did not known whether household members had any symptoms, compared to 20 in Thailand). Characteristics of participants The age distributions of seeds in both countries differed significantly (K-S test p = 0.018); with seeds in the Netherlands having a mean age of 26.7 (median: 26.0, range: 19–53) and in Thailand 26.2 (median: 24.0, range: 14–48). In the Netherlands the relatively younger participants more often recruited individuals from an older generation, which led to a wider range of participating age classes. Consequently, the entire Dutch sample had a higher overall mean age (33.2, median: 28.0) compared to Thailand (26.7, median: 25.0). The age distributions of all participants in both countries differed significantly (K-S test p<0.001). The majority of participants in both countries was female and highly educated (Table 1). The Dutch sample contained 11.6% more females compared to Dutch national census data, in the Thai sample there were 10.4% more females than in the national census data from Thailand . Figure 2 displays the age distributions of all participants, the age distribution of all seeds who invited one or more recruitees, and the distributions by sex of all participants in both countries. Dutch participants reported more often living in households consisting of only one or two members (by 58.6% of 326), while in Thailand household sizes of three or more persons were more often reported (by 70.1% of 221). The distribution of reported household sizes was roughly in agreement with national census data (Figure 2d). However, compared to census data, both country samples contained higher proportions of participants living in a household of five or more members, and the Thai sample contained relatively low proportions of participants living in a two-member household , . Participants in the Netherlands reported 15.7% more symptoms and 1.5% more common cold-like symptoms than Thai participants, but in Thailand participants reported 1.3% more ILI symptoms (Table 1). In Thailand, 33.5% (of 221) reported one or more household contacts with symptoms, compared to 31.6% (of 323) in the Netherlands. Reported numbers of contact persons A total of 12812 contact persons were reported in Thailand, compared to 8336 in the Netherlands. Figure 3a shows that the medians of the distributions of numbers of contact persons at different locations, while travelling and while eating were higher in Thailand than in the Netherlands. Summing contact persons reported for each location showed no significant differences between days of the week in both samples (see Figure S3). In Thailand there were significant differences in distributions between days of the week for contact persons while travelling, e.g. between Monday and Friday (p = 0.036) and Saturday and Sunday (p = 0.014), these differences were not observed in the Netherlands (see Figure S4). (A) Box and whisker plot showing the median, quartiles and 95 percentiles of numbers of contact persons reported by participants for travelling, at different locations and while eating, during weekdays (WD, Monday-Friday) and weekend days (WE, Saturday-Sunday). Dutch sample is indicated in green and Thai sample in purple. (B) Distribution of the overall reported numbers of contact persons (“degree”) in each country. The green solid line (the Netherlands) and the dotted purple line (Thailand) indicate the fitted negative binomial distributions for reported degree. (C) Quantile-Quantile plot of the degree distributions displayed in plot 3B. (D) The probability estimates of inviting recruitees (“intention to recruit”) as a function of degree, specified by sex (and additionally adjusted for variables age, education and household size). Dotted lines indicated confidence intervals (95%). Values were obtained using logistic regression analysis for the full sample and the sample excluding seeds (i.e. sample without wave 0). Figure 3b shows the fitted negative binomial distributions to the observed frequency distributions of degree in the Netherlands (μ = 25.65 [23.15–28.51]; k = 1.00 [0.87–1.16]) and Thailand (μ = 58.51 [50.30–67.24]; k = 0.83 [0.72–1.02]). The non-overlapping confidence intervals of the parameter estimates μ indicate that the sampled degree distributions were not similar, which is confirmed by visually examining the Q-Q plot (Figure 3c) and the Anderson-Darling test (p<0.001). Table 2 displays the means, variances and effective contact rates for the various contact categories. The higher means and variances of the observed degree distributions in Thailand indicate not only more heterogeneity, but also overall more contact persons compared to the Dutch sample. Consequently, the effective contact number computed with degree was almost two times higher in Thailand than in the Netherlands (respectively 205.5 and 111.9). Similar differences in means, variances and C between both countries were observed for contact persons at different locations, while travelling and while eating. Drivers of online recruitment Figure 3d shows the estimated probability of inviting recruitees as a function of degree. In Thailand, degree seemed to influence participants' intention to invite recruitees. However, when excluding Thai seeds there was no significant influence of degree, and only participant's age slightly influenced the intention to recruit. In the Netherlands, female participants requested more often the four invitations to invite their recruitees compared to male participants (p = 0.009, adjusted for degree, age, education and household size). Excluding seeds in the analysis showed for the Dutch sample similar results with respect to those differences between males and females. See Text S1 and Figure S5 for the extended analysis. Figure 4a displays for each age group the proportions of contact persons younger than, same age or older than the participants at different locations (reported number of contact persons at different locations aggregated) and separately while eating. In both study populations, participants showed a strong tendency to invite recruitees of similar age, sex and education, although the Dutch sample showed lower correlations for mixing by education (Table 3). The assortative recruitment patterns by age, sex and education disappeared in both samples after a distance of three or more link steps between any two persons in the same network chain. However, in the Thai sample, assortative recruitment by education persisted until a distance of three link steps. By contrast, mixing by degree was observed not to be assortative (or disassortative) in both countries, but random for all link distances between two persons in the same chain. Figure 4b illustrates the mainly assortative recruitment patterns by age in each country, but also some recruitment of participants from different age classes, especially in Dutch sample. Figure 4c illustrates for both countries the random mixing by degree of recruiters-recruitees. The green coloured plots on the left are all based on data collected in the Netherlands and purple coloured plots on the right on data collected in Thailand. Plots in (A) display for each age group the proportion of reported contact persons that were younger, the same age or older than the participants. Displayed values are proportions that were calculated separately for the categories “contact persons while eating” and “contact persons at different locations”. The brighter coloured cells indicate higher proportions. (B) The contact intensity matrices for recruiter-recruitees pairs with respect to age (displayed as proportions of country totals) and (C) degree (displays actual reported degree; outliers above 150 are not displayed). The brighter coloured cells/points in B-C illustrate higher contact recruitment rates and the darker cells/points lower rates. First-order Markov assumption In both the Netherlands and Thailand, the sample correlations rwaves0–3 for age (respectively 0.171 and 0.320, see Table S3) were not in agreement with rwaves0–1 * rwaves1–2 * rwaves2–3 (respectively 0.086 and 0.147). Also for sex, sample correlations (respectively 0.106 and 0.000) slightly deviated from correlations obtained from the three-step transition matrices (respectively 0.029 and 0.013). This suggests for peer-recruitment, with regard to age and sex, a higher-order process in both countries. Thus, correlations found between the recruiter-recruitee are not only dependent on the direct recruiter, but also on recruiters in previous waves. Due to a limited number of waves in most network trees, we were unable to quantify the exact order level. Here we have reported on results from similar webRDS surveys conducted in the Netherlands and Thailand. Our study provides, to our knowledge, the first comparison of social contact data relevant for infections transmitted by the respiratory or close-contact route from countries in Europe and South-East Asia. Even though these two countries differ in many aspects of their cultural, social and demographic determinants, comparison of the country samples showed clear similarities in contact and mixing patterns. Mixing was assortative by age, sex and education, and random by degree. We reached a similar number of waves in both countries using the same non-material incentives. By contrast, differences between both country samples were observed for age classes reached, age of daily contact persons and levels of dispersion in overall degree distributions. Moreover, seeds in the Netherlands were more successful in inviting recruitees, and female participants in the Netherlands showed a significantly higher intention to recruit; this sex difference was not observed for the Thai sample. Thai participants primarily used Facebook, which is very popular among young Thai , to invite recruitees while standard email was more preferred in the Netherlands. Despite comparable high population densities in Bangkok (5294 persons per square kilometer ) and the Dutch regions (3353 in Utrecht and 4767 in Amsterdam ), where we invited our seeds, Thai participants reported on average higher numbers of contact persons. Both study samples showed a strong heterogeneity in numbers of contact persons per individual, which was also found earlier in other populations , . Theoretical studies have demonstrated that heterogeneity in numbers of contacts influences both the infection attack rate and the basic reproduction number , thereby impacting on the effectiveness of control measures. It should be noted that the adopted contact definition was different from the definition generally used by contact diary surveys (i.e. two-way conversation in close proximity or a physical contact like shaking hands or kissing). This has implications for the comparability with other studies, especially when comparing location-dependent contact behaviour . Our study samples showed random mixing by degree, which gives support to the proportionate mixing assumption underlying the derivation of the effective contact rate as computed in equation (1). Regarding the effectiveness of control measures our data provide some indications for assessing possible effects of interventions that reduce numbers of contacts. For instance, our data illustrate that by asking all individuals in a population to stay at home during an outbreak would reduce the effective contact rate from 111.9 to 6.4 in the Netherlands and from 205.5 to 6.1 in Thailand. However, the question remains how well correlations between recruiters and recruitees describe the mixing patterns in social networks; this depends mainly on the randomness of peer-recruitment. In Thailand, participants invited more recruitees of similar age, sex and education, suggesting that the survey spread in a more homogeneous group compared to the Netherlands. This might be due to inequalities between urban and rural areas in Thailand, especially with respect to education, income and occupation opportunities . Educated Thai are therefore more likely to connect to similarly educated peers. In the Netherlands, participants from the younger age groups more frequently invited recruitees from older age classes that led to recruitment within these older age groups. Such links between younger and older age groups were less visible in Thailand. This could either be due to social-cultural differences or to the low proportion of internet-users among Thai aged 35 and older. Our Dutch recruiter-recruitee matrix for age showed a similar assortative pattern (including links between younger and older age groups), as the contact matrix that was collected earlier in the Netherlands during a large egocentric survey (POLYMOD, a population-based survey on social contact patterns conducted in eight European countries ). These similarities in contact matrices imply that recruitment links may be representative for the social network links in our Dutch study population, at least with regard to age. However, young children (aged 0–12) and network links between these children and adults are missing in our country samples. We were unable to make a similar comparison of contact matrices for Thailand, as there are no Thai contact data available yet in the published literature. A large household-structured survey conducted in Vietnam (a middle-income country, also densely populated in urban areas) demonstrated similar assortative mixing patterns by age as was seen in our Thai sample. It is important to recognize the limitations of the presented data. Our results are based on small sample sizes and are not representative of the general population. In both countries we solely invited students of which the majority was aged between 20 and 30 years. The survey remained mainly within that age group, therefore limiting the generalisability of our results to other age groups. For the analyses of mixing patterns, the numbers of contact persons that were reported by recruiters and recruitees for one single day might not be a good representation of their contact frequency during the entire week. The data do contain responses for all days of the week, such that a comparison between weekdays and weekends is possible, but these are cross-sectional data and not longitudinal information per participant. We do not have information about individual variation in numbers of contacts during the week. In addition, in both countries only a small number of recruitment trees reached more than 4 waves, which may be a consequence of using solely a non-material incentive. The use of a small material incentive to stimulate online peer-recruitment should be further investigated as was done previously for hard-to-reach populations , . Although we chose to use an aggregated contact diary design to limit the burden for each participant and to stimulate online peer-recruitment, this prevented us from collecting other determinants relevant for infection transmission, such as contact duration and intensity. Earlier studies have shown the importance of contact duration for understanding the transmission dynamics of close-contact pathogens , . Also, contact duration influences the probability that a contact is reported by a participant , . Although it is possible to derive contact durations from earlier conducted diary surveys, we cannot preclude the effect of heterogeneities in motivation or recall capabilities on the reported degrees, between both country samples, and between participants in same country (e.g. differences in reporting quality between females and males ). The applied survey methodology was also unable to provide information on clustering of contact persons within small subgroups of the population. Theoretically it has been demonstrated that clustering of contacts influences transmission dynamics , , , . We did provide our participants with a separate link to indicate repeated invitations, but we received no reports of survey clustering. It remains challenging to motivate persons to undertake action in case they receive multiple invitations, as most persons instantly delete repetitive emails. In a next stage, we plan to experiment with a design in which contact persons need to be reported by name in order to measure clustering, like was done in some diary studies , . However, this introduces new privacy issues that may prevent participants from inviting contact persons, and thereby limit the possibility to study correlations between connected individuals. The proportions of ILI symptoms found in our samples are broadly in agreement with estimates on the incidence of seasonal influenza, at least for the Netherlands. Previously, a study estimated that the overall symptomatic infection attack rate was 2.5% for seasonal influenza in the Netherlands . If all symptomatically infected persons would be symptomatic at the same time, we would expect to find similar numbers in our sample. However, infections are spread over several months (see Figure S1) and therefore the 1.9% ILI cases found in the Dutch sample seems reasonable. This proportion seems even high when comparing the period of survey administration to the total period of the influenza season, this may indicate clustering of the influenza virus. There are several factors that influence the detection of symptoms via the applied RDS methodology, e.g. immunity in host populations can be clustered. Although natural immunity is hard to measure, clustered influenza vaccination patterns have been described in literature , . Also, participants were only asked to report any symptoms that they had in the past 7 days and it is possible that they experienced symptoms before this 7-days period or in the days after filling in the questionnaire. We are currently conducting new webRDS surveys in which we extended the 7-days period to 14 days, and added a follow-up measurement 3 weeks later to investigate whether participants developed any symptoms in the meantime. Our findings from the comparison of data collected with RDS surveys in two countries provide new insight on contacts and mixing patterns within social networks. Information on correlations between linked individuals can be used to improve parameterisation of mathematical models used to design optimal control strategies and lend support to the often used proportionate mixing assumption. Although the spread of infections through a population depends on more factors than just contacts and mixing patterns, similarities found between both countries suggest that the spread of directly transmitted respiratory infections may be similar in the Netherlands and Thailand, and in other countries with comparable contact patterns. Period of survey administration and influenza activity in each country. (A) displays the influenza activity in Thailand in numbers of specimens that were found positive for influenza (as provided by FluNet ). (B) Number of participants in Thailand collected between December 2012 and March 2013. (C) Number of participants in the Netherlands collected between end of November 2012 and beginning of May 2013. Most participants filled in the questionnaire before end of March 2013. Two participants filled in the questionnaire end of May 2013, after being invited by other participants. (D) displays the influenza activity in the Netherlands in number of persons per 10000 inhabitants that visited the general practioner with influenza-like-illness (ILI) (as provided by NIVEL ). Graphical illustrations of contact definition and RDS recruitment. (A) illustrates contact definition: a person sitting or standing within arm's length of the participant, which was denoted as “YourSpace”, for 30 seconds or longer. This figure was displayed in the online questionnaire to clarify to participants who they had to count as a contact person. (B) Figure illustrating difference between ‘contact persons’ and ‘recruitees’. We asked a participant (P) to invite four recruitees (R) who he/she had met according to the contact definition (within ‘YourSpace’) in the past 7 days. The blue circle illustrates ‘contact persons’ met by the participant 1 day before the day of filling in the questionnaire (‘yesterday’); these contact persons were recorded in the questionnaire. The green circle illustrates persons met 2–7 days before the day of filling in the questionnaire; we did not collect information on these persons. Participants could either have met recruitees ‘yesterday’ or 2–7 days before the participation day. Distributions of numbers of contact persons across days of the week by each location and all locations together. Distributions of numbers of contact persons across days of the week by transport vehicle and all transport vehicles together. Investigating the relation between the outcome and the independent (integer) variables. The plots display the relation between the outcome and age, degree and household size. Plots A are based on the full Dutch sample (nNetherlands = 356); plots B are based on the Dutch sample without seeds (data without wave 0, nNetherlands = 264). Plots C are based on the full Thai sample (nThailand = 251); plots D on the Thai sample without seeds (nThailand = 163). Subset of transport and location type of interest as shown in questionnaire. Symptoms displayed in questionnaire. Exploring the first-order Markov assumption: correlations in country samples. Drivers of online peer-recruitment: logistic regression. R source code. This study was conducted within the Utrecht Center for Infection Dynamics. We thank all survey participants in the Netherlands and Thailand. We are grateful to Martin Camitz (Sweden), Titan Tang (China) and Adam Ju (China) for programming the RDS survey system. Furthermore, we also thank Albert Wong from the Department of Statistics of the National Institute for Public Health and the Environment (RIVM) in the Netherlands for his assistance with R. Finally, we thank Wasamon Sabaiwan (Thailand) for her help with the Thai translations of the questionnaire and data collection in Thailand. Conceived and designed the experiments: MLS JES VB PGMH CC MT MEEK. Performed the experiments: MLS JES VB CC MT MEEK. Analyzed the data: MLS JES VB PGMH MEEK. Developed questionnaires: MLS JES CC MT MEEK. Developed the web based RDS survey system: MLS AET LB XL. Wrote the paper: MLS JES VB PGMH MEEK. - 1. Lipsitch M, Cohen T, Cooper B, Robins JM, Ma S, et al. (2003) Transmission dynamics and control of severe acute respiratory syndrome. Science 300:1966–1970. - 2. May RM (2006) Network structure and the biology of populations. Trends Ecol Evol 21:394–399. - 3. Anderson RM, May RM (1991) Infectious diseases of humans: dynamics and control. Oxford: Oxford University Press. - 4. Newman ME (2002) Spread of epidemic disease on networks. Phys Rev E Stat Nonlin Soft Matter Phys 66:016128. - 5. Bansal S, Grenfell BT, Meyers LA (2007) When individual behaviour matters: homogeneous and network models in epidemiology. J R Soc Interface 4:879–891. - 6. Volz EM, Miller JC, Galvani A, Ancel Meyers L (2011) Effects of heterogeneous and clustered contact patterns on infectious disease dynamics. PLoS Comput Biol 7:e1002042. - 7. Read JM, Edmunds WJ, Riley S, Lessler J, Cummings DA (2012) Close encounters of the infectious kind: methods to measure social mixing behaviour. Epidemiol Infect 140:2117–2130. - 8. Salathe M, Kazandjieva M, Lee JW, Levis P, Feldman MW, et al. (2010) A high-resolution human contact network for infectious disease transmission. Proc Natl Acad Sci U S A 107:22020–22025. - 9. Cattuto C, Van den Broeck W, Barrat A, Colizza V, Pinton JF, et al. (2010) Dynamics of person-to-person interactions from distributed RFID sensor networks. PLoS One 5:e11596. - 10. Newman MEJ, Girvan M (2002) Mixing patterns and community structure in networks. In: Pastor-Satorras R, Rubi J, Diaz-Guilera Aeditors. Statistical Mechanics of Complex Networks. Berlin, 2003: Springer. - 11. Newman ME (2002) Assortative mixing in networks. Phys Rev Lett 89:208701. - 12. Adamic LA, Lukose RM, Puniyani AR, Huberman BA (2001) Search in power-law networks. Phys Rev E Stat Nonlin Soft Matter Phys 64:046135. - 13. Heckathorn D (1997) Respondent-driven sampling: a new approach to the study of hidden populations. Social Problems 44:174–199. - 14. Wejnert C, Heckathorn DD (2008) Web-Based Network Sampling: Efficiency and Efficancy of Respondent-Driven Sampling for Online Research. Sociological Methods and Research 37:105–134. - 15. Stein ML, Van Steenbergen JE, Chanyasanha C, Tipayamongkholgul M, Buskens V, et al. (2014) Online respondent-driven sampling for studying contact patterns relevant for the spread of close-contact pathogens: a pilot study in Thailand. PLOS One 9:e85256. - 16. Mossong J, Hens N, Jit M, Beutels P, Auranen K, et al. (2008) Social contacts and mixing patterns relevant to the spread of infectious diseases. PLoS Med 5:e74. - 17. Horby P, Pham QT, Hens N, Nguyen TT, Le QM, et al. (2011) Social contact patterns in Vietnam and implications for the control of infectious diseases. PLoS One 6:e16965. - 18. Fu YC, Wang DW, Chuang JH (2012) Representative contact diaries for modeling the spread of infectious diseases in Taiwan. PLoS One 7:e45113. - 19. Kaewyeam K (1996) The current housing situation and demand for the students of King Mongkut's Institute of Technology Thonburi. Bangkok: Chulalongkorn University. 269 p. - 20. ABF Research (2012) Landelijke monitor studentenhuisvesting 2012. Delft: KENCES. - 21. Utrecht Center for Infection Dynamics (2013) YourSpace. Utrecht: Julius center for health sciences and primary care, University Medical Center Utrecht. - 22. Salganik MJ, Heckathorn D (2004) Sampling and estimation in hidden populations using respondent-driven sampling. Sociol Methodol 34:193–239. - 23. Goel S, Salganik MJ (2009) Respondent-driven sampling as Markov chain Monte Carlo. Stat Med 28:2202–2229. - 24. Mikolajczyk RT, Akmatov MK, Rastin S, Kretzschmar M (2008) Social contacts of school children and the transmission of respiratory-spread pathogens. Epidemiol Infect 136:813–822. - 25. Centraal Bureau voor de Statistiek (2013) Huishoudens; grootte, samenstelling, positie in het huishouden, 1 januari. StatLine. - 26. National Statistical Office Thailand (2010) The 2010 Population and Housing Census. Thailand: Ministry of Information and Communication Technology. - 27. Socialbakers (2013) Checkfacebook: Facebook statistics of Thailand. - 28. Nationale Atlas Volksgezondheid (2012) Bevolkingsdichtheid per gemeente 2012. 11 december 2012 ed. Bilthoven: National Institute for Public Health and the Environment (RIVM). - 29. Danon L, House TA, Read JM, Keeling MJ (2012) Social encounter networks: collective properties and disease transmission. J R Soc Interface 9:2826–2833. - 30. Duerr HP, Schwehm M, Leary CC, De Vlas SJ, Eichner M (2007) The impact of contact structure on infectious disease control: influenza and antiviral agents. Epidemiol Infect 135:1124–1132. - 31. Farrington CP, Unkel S, Anaya-Izquierdo K (2013) Estimation of basic reproduction numbers: individual heterogeneity and robustness to perturbation of the contact function. Biostatistics 14:528–540. - 32. Bolton KJ, McCaw JM, Forbes K, Nathan P, Robins G, et al. (2012) Influence of contact definitions in assessment of the relative importance of social settings in disease transmission risk. PLoS One 7:e30893. - 33. Hanks LM (1962) Merit and Power in the Thai Social Order. American Anthropologist 64:1247–1261. - 34. Wejnert C (2010) Social Network Analysis with Respondent-Driven Sampling Data: A Study of Racial Integration on Campus. Soc Networks 32:112–124. - 35. Bengtsson L, Lu X, Nguyen QC, Camitz M, Hoang NL, et al. (2012) Implementation of web-based respondent-driven sampling among men who have sex with men in Vietnam. PLoS One 7:e49417. - 36. Truong HH, Grasso M, Chen YH, Kellogg TA, Robertson T, et al. (2013) Balancing theory and practice in respondent-driven sampling: a case study of innovations developed to overcome recruitment challenges. PLoS One 8:e70344. - 37. De Cao E, Zagheni E, Manfredi P, Melegaro A (2014) The relative importance of frequency of contacts and duration of exposure for the spread of directly transmitted infections. Biostatistics 15:470–483. - 38. Smieszek T (2009) A mechanistic model of infection: why duration and intensity of contacts should be included in models of disease spread. Theor Biol Med Model 6:25. - 39. Smieszek T, Barclay VC, Seeni I, Rainey JJ, Gao H, et al. (2014) How should social mixing be measured: comparing web-based survey and sensor-based methods. BMC Infect Dis 14:136. - 40. Smieszek T, Burri EU, Scherzinger R, Scholz RW (2012) Collecting close-contact social mixing data with contact diaries: reporting errors and biases. Epidemiol Infect 140:744–752. - 41. Miller JC (2009) Spread of infectious disease through clustered populations. J R Soc Interface 6:1121–1134. - 42. Ball F, Britton T, Sirl D (2013) A network with tunable clustering, degree correlation and degree distribution, and an epidemic thereon. J Math Biol 66:979–1019. - 43. McDonald SA, Presanis AM, De Angelis D, van der Hoek W, Hooiveld M, et al. (2014) An evidence synthesis approach to estimating the incidence of seasonal influenza in the Netherlands. Influenza Other Respir Viruses 8:33–41. - 44. Barclay VC, Smieszek T, He J, Cao G, Rainey JJ, et al. (2014) Positive network assortativity of influenza vaccination at a high school: implications for outbreak risk and herd immunity. PLoS One 9:e87042. - 45. Salathe M, Khandelwal S (2011) Assessing vaccination sentiments with online social media: implications for infectious disease dynamics and control. PLoS Comput Biol 7:e1002199. - 46. National Influenza Centres, Global Influenza Surveillance and Response System (2014) FluNet. South-East Asia: World Health Organization. - 47. Brandsema P, Dijkstra F, Euser SM, Van Gageldonk-Lafeber AB, de Lange MMA, et al.. (2013) Jaarrapportage surveillance respiratoire infectieziekten 2012. Bilthoven: National Institute for Public Health and the Environment, pp. 90.
<urn:uuid:38212a0d-ea0b-49a7-a4ba-2c4500ab31be>
CC-MAIN-2017-04
http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0113711
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00341-ip-10-171-10-70.ec2.internal.warc.gz
en
0.920335
10,681
2.1875
2
& the Age of the Earth: The Earth's Young After All Radioisotope dating has become the standard method for estimating the age of the Earth. Yet, the millions and billions of years estimated by this method conflicts with the thousands of years that the Bible indicates to be the age of the Earth. An eight-year research project designed to explore the claims of radioisotope dating for an old earth and to offer a young-earth alternative will be completed by the Institute for Creation Research and the Creation Research Society in 2005. The RATE project has found several major pieces of evidence that radioisotope dating is in error by a factor of many orders of magnitude and rocks commonly thought to be billions of years old may only be thousands of years old. This talk summarizes the project and discusses its major findings. - The Age Issue - Assumptions of Radioisotope Dating - RATE Hypothesis - Findings of the RATE Group About the Speaker: Larry Vardiman is a creation scientist and educator with a Ph.D. in Atmospheric Science from Colorado State University. He served as the chairman of the Department of Astro-Geophysics at the Institute for Creation Research’s Graduate School since 1989 and has authored many technical papers and books including overseeing the editing of the book, “Radioisotopes and the Age of the Earth.” Dr. Vardiman’s ability to converse in technical terms about creation science and also being able to communicate with the lay person has allowed God to use him in many ways — from the classroom to the great outdoors as a tour guide, to the radio waves on ICR’s program, Science, Scripture and Salvation. Much of Dr. Vardiman’s scientific contributions have been in the areas of cloud seeding, ice crystal growth and evolution, the age of the earth’s atmosphere, ice sheet formation during the Ice Age, and catastrophic hurricane formation. Dr. Vardiman has also authored a book discussing creation science from a layperson’s standpoint. Entitled Over the Edge, the book chronicles his more humorous experiences as a tour guide on ICR’s Grand Canyon tours. Free Video Downloads: Audio MP3 50 MB Download File 39.6 MB ZIP It may be viewed free online or downloaded to your computer as either a video or audio. A DVD can be purchased at our webstore as an individual title or the entire conference may be obtained as a compilation of 10 disks. The Seattle Creation Conference is a regular event organized by the Northwest Creation Network. For information about the upcoming conference visit the Seattle Creation Conference website, or contact the NWCN to have us organize the next creation conference at your Church.
<urn:uuid:b49ebd47-5919-4be5-81e7-9b5779072a60>
CC-MAIN-2017-04
http://nwcreation.net/videos/radioisotopes_and_age_of_earth.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284411.66/warc/CC-MAIN-20170116095124-00455-ip-10-171-10-70.ec2.internal.warc.gz
en
0.93464
568
2.609375
3
Often, it is thought that organising the marriage of a couple with disabilities can be complicated because there is the idea that a disabled marriage is different from a traditional one. This is because the planning needs special precautions. It is true that there are problems to be solved but … which wedding does not have problems? If a good wedding planner is the one who faces unexpected situations and is able to manage them, why expected situations, such as disability, cannot be positively faced? What it is necessary is to adapt the wedding ceremony and the subsequent celebration to the physical “reality” of the bride and / or groom and / or both, adopting some small – but at the same time practical and original – measures:
<urn:uuid:bf2f94a7-22b6-4a0e-bae3-594c846d7f60>
CC-MAIN-2022-33
https://mcitalianwedding.it/weddings-with-disabilities/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00076.warc.gz
en
0.963114
144
1.75
2
Blog | Jun 20, 2014 Memory Management and Troubleshooting Related Bottlenecks on the SQL Server Memory management is an important aspect of fine-tuning the SQL Server performance. Various options are provided for one’s review and consideration. The SQL server dynamically acquires and frees memory as necessary. Typically, an administrator does not have to specify how much memory should be allocated to the SQL Server, although the option exists and is required in some environments. As there are several types of memory resources, it is important to understand and differentiate each type of a memory resource: - Virtual Memory - Memory Pool - 4GT Tuning Virtual Memory Manager: Enables windows to provide virtually unlimited memory to the system. It is constructed on a page-based memory scheme which divides all of memory in equal chunks. Memory Pools: They are of the following two types:- Paged Pool: Is that region of the virtual memory in a system space that can be paged in and out of the system. It is accessible from any process context. The device drives that do not need to access the memory from the dispatch level or above can use a paged pool. Non-Paged Pool: Includes a range of system virtual addresses that are guaranteed to reside on a physical memory at all times. It can be accessed at any time from a process context by incurring a page fault. 4GT Tuning: The operating systems based on Windows NT technology provide applications with a 4 GB virtual address space. /3GB Switch: Is used within the Boot.ini to increase the size of a user process address space from 2 GB to 3 GB and to curb the Kernel space from 2 GB to 1 GB. The application.exe must be flagged as a 3-GB aware application. /USERVA Switch: Initiated with Windows 2003 servers and Windows XP SP1 onwards, a new switch /USERVA was incorporated to work with a /3GB switch. The /USERVA switch is used with /3GB switch in Boot.ini file to tune the user-mode space into a value between 2 GB and 3 GB. /3GB Switch is not supported on 64 Bit systems. PAE (Physical Address Extension): Allows up to 64 GB of physical memory. The PAE maps up to a 64 GB of memory into a 32-bit (4 GB) virtual address space. AWE (Address Windowing Extensions): Can be used if the account under which SQL Service is running (the "Service Account") has the "Lock Pages in Memory" privilege granted to it in a gpedit.msc. Let’s understand what Memory Pressure is: Memory pressure indicates missing indexes, badly designed tables, an actual lack of memory on the server for the workload it’s been tasked with, other applications running on the system and users logging onto the server External Physical Memory Pressure: If the physical memory (RAM) is running low, it can cause the system to trim working sets of currently running processes, which may result in an overall slowdown. • \Memory\Available Bytes: Indicates the free physical memory on the host server. If the value stays consistently low, it is usually a sign of memory pressure or stress. • \Memory\Pages Input/sec: The rate of reading pages from the disk. We need to compare the average value with the baseline for further analysis. • \Memory\Pages Output/sec: The rate of dirty pages that need to be written to disk. This is not a desirable condition. Usually this indicates memory pressure. • \Memory\Pages/sec: The number of pages read from or written to disk for the hard page faults. The recommended average value should be less than 50. • Find major system memory consumers and attempt to eliminate (if possible). Check for adequate system RAM and consider adding more. External Virtual Memory Pressure:- Running low on space in the system page file(s). This may cause the system to fail memory allocations, as it is unable to page out currently allocated memory. This condition may result in the whole system responding very slowly or even bringing it to a halt. • Paging File: %Usage: This counter indicates the percentage of the paging file that is currently being used by the operating system. If %Usage is high, check the System Event Log for events indicating page file growth or notifications of “running low on virtual memory”. • Increase the swap file size and check for the major physical memory consumers and follow steps of the external physical memory pressure. Internal Physical Memory pressure: The SQL Server detects high memory consumption internally, causing redistribution of memory between the internal components. • \SQLServer:Memory Manager\Memory Grants Pending: This counter represents the number of processes waiting for memory grant within the SQL Server memory. The recommended average is 0. • \SQLServer:Memory Manager\Target Server Memory (KB): Shows the amount of memory that the SQL Server wishes to consume. • \SQLServer:Memory Manager\Total Server Memory (KB): This counter shows the SQL Server estimate of how much RAM it would need to operate effectively. The total memory counter shows what was actually used. This should be close to the Target Server Memory (KB). Internal Virtual Memory Pressure: The SQL Server detects this condition and may release reserved regions of VAS, reduce buffer pool commit target, and start shrinking caches. • \SQL Server:Buffer Manager\ Page Life Expectancy: This counter indicates the duration, a data page can stay in the buffer pool without being referenced. The higher the value the better. An average recommended value should be 300 (5 minutes). • \SQLServer:Buffer Manager\Buffer cache hit ratio: This counter measures the percentage of pages that are read from the buffer cache without having to read from a disk. This value should stay consistently high or as close to 100% as possible. • \SQLServer:Buffer Manager\ Lazy writes/sec: This counter measures the dirty buffers, data pages that have been modified, that need to be written to a disk to free up the memory. The recommended average value should be less than 20. • Identify major memory consumers inside the SQL Server and verify the server configuration. Further actions depend on the investigation like: check for workload; possible design issues; other resource bottlenecks. The following tools and sources of information could be used for troubleshooting. • Memory related DMVs (some of DMV’s are sys.dm_os_memory_clerks, sys.dm_os_memory_objects , sys.dm_os_memory_nodes ,sys.dm_os_memory_pools) • DBCC MEMORYSTATUS command • Performance counters: performance monitor or DMV for SQL Server specific object • Task Manager and Event viewer: application log, system log About TriCore Solutions TriCore Solutions, the application management experts, provides a full suite of scalable and reliable managed application, cloud, infrastructure hosting, and consulting services to enterprise organizations. The company delivers its services and the TriCore Trusted Promise to more than 250 companies worldwide to reduce costs, raise service levels, improve customer experience, increase business agility, and accelerate innovation, unlocking the business value from their IT investments. TriCore Solutions is headquartered in Boston, MA, with offices in India and throughout North America.
<urn:uuid:7ad98335-76c0-4b23-a7ca-04da1d329f3d>
CC-MAIN-2017-04
http://www.tricoresolutions.com/resources/blog/memory-management-and-troubleshooting-related-bottlenecks-on-the-sql-server
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281419.3/warc/CC-MAIN-20170116095121-00487-ip-10-171-10-70.ec2.internal.warc.gz
en
0.879366
1,541
2.671875
3
posted on 14 February 2016 from the St Louis Fed -- this post authored by Guillaume Vandenbroucke The Berlin Wall collapsed in 1989, and the Soviet Union did so two years later. Since then, Russia's transition to a market-based economy and a Western-style democracy has been slow. Yet, in recent years, Russia has been playing an increasing role on the international scene. But where exactly does the Russian economy stand relative to that of the United States? And how has this standing evolved over time? In this article, I present a few aggregate statistics to help answer these questions. The Growth Rate of GDP per Capita Let's start with the most basic aggregate indicator of the state of an economy: the real gross domestic product (GDP) per capita. This is a measure of the amount of final goods and services to which the average person has access in a given period of time. Panel A of Figure 1 shows GDP per capita over time in the Russian Federation, the U.S. and the whole world. The figures are normalized to 100 in 1989. Thus, Panel A indicates differences in the growth rate of GDP per capita in Russia, the U.S. and the world as a whole. Notice three subperiods in particular. The first one, lasting from 1989 to 1998, shows a remarkable decline in Russia's GDP per capita. At the trough, in 1998, Russia's real GDP per capita was 56 percent of its 1989 value. In annual terms, this amounts to a 5.6 percent reduction in GDP per capita every year for 10 years. In comparison, when the U.S. GDP per capita declined during the Great Recession, which ran from the end of 2007 until mid-2009, it did so by just 4 percent. Over the entire 1989-1998 period, GDP per capita in the U.S. actually rose 17 percent. (World GDP per capita rose 10 percent over those 10 years.) The second subperiod of note in Panel A runs from 1998 to about 2008. During this time, Russia's GDP per capita was on the rise. In 2007, it exceeded its 1989 level for the first time - GDP per capita was 7 percent above what it was in 1989. In contrast, U.S. GDP per capita in 2007 was 39 percent above its 1989 level. Finally, since 2008, Russia has suffered the consequences of the Great Recession, and its GDP per capita has not exhibited much growth relative to the preceding years. It is too early to assess whether this pause is going to last a long or short time. The Level of GDP per Capita Panel B of Figure 1 shows Russia's GDP per capita relative to that of the U.S. In 1989, Russia was already poor relative to the U.S. Russia's GDP per capita was about 18 percent of that of the U.S. The deep recession following the collapse of the Soviet Union (noted in Figure 1) made things even worse. At the trough in 1998, Russia's GDP per capita was less than 9 percent of that of the U.S. After 1998, Russia started to grow faster than the U.S. Despite the progress made in closing the gap between 1998 and 2008, Russia still had not reached by 2008 its 1989 level relative to the United States. The federation remains a noticeably poorer economy, with a GDP per capita in the neighborhood of 15 percent of that of the U.S. The Role of Productivity Economists Revold Entov and Oleg Lugovoy have presented an interesting study of the behavior of Russia's GDP during this period. They used a technique called growth accounting, which decomposes the growth of GDP into the contribution of the growth of the factors used to produce it: capital, labor and productivity. They showed that Russia's negative growth during the 1989-1998 period resulted from lower productivity, employment growth and capital utilization. Each of these components, they found, contributed equally to the negative growth rate. For the next 10 years, however, the growth rate in Russia was stronger than that in the United States. Productivity growth was the main reason, accounting for 59 percent of the GDP growth. The contributions of capital and labor were smaller, 28 and 13 percent, respectively. To understand the reason behind productivity growth in the 1998-2008 period is beyond the scope of this article. There exists a vast literature on the Russian transition and the effects of reforms undertaken since the fall of the Berlin Wall. A few works are listed in the references. To assess the performance of an economy via GDP per capita alone raises many well-known issues. In particular, an increase in GDP per capita does not necessarily imply an increase in the well-being of the population. For this reason, economists sometimes rely on alternative measures of performance, such as measurements of people's heights and life expectancy. In the case of Russia, it is instructive to look at the evolution of its population in terms of life expectancy, birth rates and net migration. This is not to say that a country's population is a direct measure of well-being. The assumption behind the analysis is rather that the two are positively correlated: When a population's well-being increases, life expectancy may increase as well (because of improvements in health, for example). In addition people are more willing to enter the country and less willing to leave it. All these factors contribute to increasing the country's population. Panel A of Figure 2 compares the evolution of Russia's population since 1998 with Venezuela's. The figures are normalized to 100 in 1998 to render the comparison possible. Why compare Russia with Venezuela? Because for many of these years, the two countries had levels of GDP per capita (relative to the United States) that were similar. This similarity can be seen in Panel B of Figure 2. The message to take away from Figure 2 is that Russia was adversely affected by factors other than GDP per capita that resulted in a 3 percent decline of its population between 1998 and 2014. During the same time, Venezuela's population grew by 30 percent. Understanding the causes of this demographic slump raises interesting and challenging questions. Answering them is, again, beyond the scope of this article. Russia has a long way to catch up to levels of GDP per capita in the U.S. Data suggest that this catching up is taking place, thanks to productivity growth, even though the catching up may have been put on a temporary hold after the Great Recession. But a deeper problem faces Russia: Why is its population shrinking? Will this phenomenon last, or will population rise again? Entov, Revold M.; and Lugovoy, Oleg V. "Growth Trends in Russia after 1998," Chap. 6 in Michael V. Alexeev and Shlomo Weber, eds., The Oxford Handbook of the Russian Economy. Oxford, UK: Oxford University Press, 2013. Shliefer, Andrei; and Treisman, Daniel. "A Normal Country: Russia after Communism." Journal of Economic Perspectives, Winter 2005, Vol. 19, No. 1, pp. 151-74. Solanko, Laura. "Essays on Russia's Economic Transition," Scientific Monographs, 2006, 36, pp. 1-133. >>>>> Scroll down to view and make comments <<<<<< This Web Page by Steven Hansen ---- Copyright 2010 - 2017 Econintersect LLC - all rights reserved
<urn:uuid:d71739c6-d552-4b2f-8813-cbbd68b71660>
CC-MAIN-2017-04
http://econintersect.com/pages/contributors/contributor.php?post=201602140527
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00532-ip-10-171-10-70.ec2.internal.warc.gz
en
0.937581
1,520
3
3
Once upon a time we turned our backs on the carrot. When refrigerated planes, trains and trucks started bringing us tomatoes in January and sweet peppers in February, all carried in from far off lands, we said, 'Who needs rutabagas?' or words to that effect. The carrot, the rutabaga, the cabbage, the spud -- all those long-suffering, long-storing vegetables that got our ancestors through the cold winter months, have taken a real dive in status in the last 40 years. When jicamas and cantaloupe and jalapenos beckon, who wants to chew on turnips instead? But this year, when hard freezes have hit the Sun Belt and turned buying melons and avocados into transactions that require a co-signer, it just might be time to rethink the hardy winter vegetables. There're an amazing variety of vegetables classified as winter crops. There are the true storage vegetables, those that are picked in autumn and stored away -- winter squash, pumpkin, beets, carrots, celeriac, onions, garlic, potatoes, sweet potatoes, parsnips, salsify, scorzonera, burdock root, dried peas and beans, turnips and rutabagas. And then there are those that grow at cooler temperatures and can withstand some frosts -- cauliflower, kale, collards, radishes, broccoli, celery, spinach, radicchio, mustard, chicory, bok choy, Swiss chard and other winter greens. There's an adage that everything tastes better in its season and it applies to winter, too. We don't have to go far to find some tempting ways to prepare them. Many of the traditional peasant dishes -- with their rich, deeply satisfying flavors are based on winter vegetables. Think of spanakopita, bagna cauda, tempura, spinach roulade, winter squash and pumpkin pies, potato gratins, borscht, minestrone, caldo verde and dal curries. All kinds of soups and stews, casseroles and savory pies are based on winter vegetables. Because they complement each other in flavor, you can cook up some mixtures of winter vegetables without recipes. Cut up equal-sized chunks of potatoes, onion, turnip and carrot directly into a casserole dish that has a cover. Toss them just to coat with a light vegetable oil (about 2 tablespoons), liberal sprinklings of dried herbs (Italian blends or a mixture of savory, oregano and basil are good) plus salt and pepper. Bake at 350 degrees for about an hour or until carrots are done. Winter vegetables mix well in all kinds of stir-fries. Add chopped scallions, dark sesame oil and grated ginger for flavor. Fill a steamer with a variety of winter vegetables, adding the hardest ones like carrots and potatoes first and the softest greens last. Serve with a savory sauce or warm up a special salad dressing. Some, like celeriac and beets, are strong in flavor and tasty when prepared individually. Raw celeriac can be julienned (hold in acidulated water -- lemon juice in water -- to keep from turning brown) and tossed with a flavorful dressing. Let it marinate for an hour or two before serving. A few leftover scraps of celeriac can be used in vegetable soup. Add sliced celeriac (again, don't forget the acidulated water) to a potato gratin. Most winter vegetables keep best at refrigerator temperatures -- 32 to 40 degrees Fahrenheit -- but not all. We often keep our potatoes, onions and winter squashes near at hand in the kitchen -- at room temperature, of course -- but this might not be the best way to store them. Instead keep them in a pantry, an enclosed but unheated porch, or even the basement -- any place where the temperature stays 50 to 60 degrees. Squash will actually deteriorate rapidly if the temperature is below 50 degrees. They like best a range of 50 to 55 degrees in a place that's dry like a pantry or cool sun porch. Some basements may be too humid. For onions, 40 to 50 degrees is ideal and like squash, they don't do well in humid conditions. Potatoes can stand temperatures a little cooler, 45 to 50 degrees, but if they're put in a refrigerator their starches will turn to sugars and they'll have an oddly sweet taste. A week at room temperatures will reverse this process and make your potatoes taste like potatoes again. Store potatoes away from the light. When potatoes are exposed to sunlight, they start to produce a toxic alkaloid called solanine. You can tell this has happened because the potatoes turn a greenish color just under the skin. Heating inactives this compound but peeling it away is best. When buying, avoid any potatoes with this greenish color. Sweet potatoes keep best at 55 to 58 degrees with a high humidity but good ventilation. Here are some recipes from "Winter Harvest Cookbook" (Sasquatch Books, paperback, $14.95) by Lane Morgan: Italian spinach and rice pie Serves five as a main dish or eight as a side dish. 3 1/2 cups chicken broth 2 10-ounce packages frozen spinach or 3 pounds fresh 4 tablespoons olive oil 1/2 cup pancetta or blanched bacon, chopped 1/4 cup chopped onion 1 large clove garlic, chopped 1 cup rice, preferably Arborio or other short-grained variety 2 tablespoons butter
<urn:uuid:846dd80f-44ae-459f-a3c1-885f0863ef4f>
CC-MAIN-2017-04
http://articles.baltimoresun.com/1991-02-20/features/1991051005_1_winter-vegetables-winter-squash-carrot
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00440-ip-10-171-10-70.ec2.internal.warc.gz
en
0.901257
1,169
2.0625
2
Erie Energy Action Plan 2.0 Together, Erie's 1st Energy Action Plan was 100% accomplished. Please sign up for Sustainability NotifyMe alerts for updates and ways to participate. The Town of Erie developed its first Energy Action Plan in 2018 to help institute a series of actions and activities that will lower energy use community-wide and engage residents and businesses to take advantage of utility rebates that save resources. From April 2018 through September 2019, Erie successfully implemented the strategies outlined. By the end of 2020, Erie achieved or vastly exceeded the goals established in the 2018 Energy Action Plan. The impact resulted in offsetting 1.5 GWh of electricity and saving $137,000 community-wide. The Town decided to create a Energy Action Plan 2.0 to which focuses on renewable energy adoption and support for our Green Business & HOA Certification Program. Learn more below! Our Energy Vision The Town of Erie is an engaged community that creates awareness, builds partnerships, and invests in energy strategies that responsibly pursue conservation, renewable energy generation, innovation, equity, and economic prosperity for the benefit of present and future generations. As evidenced from the first Energy Action Plan success, the Town of Erie has demonstrated emerging leadership in energy efficiency and renewable energy adoption. Given this progress, myriad energy programs, projects, and burgeoning opportunities, Erie continues to identify and implement energy efficiency and renewable energy values across multiple departments and community wide. The two objectives that were chosen as the focus on this Energy Action Plan 2.0 simultaneously help achieve goals in the 2019 Sustainability Plan as well as take advantage of the technical support available through the Partners in Energy program. The two goals included in the Energy Action Plan 2.0 are: 1. Creating and disseminating a Renewable Energy Campaign. 2. Support the Green Business & HOA Certification Program with energy efficiency and renewable energy options. - 2021 Energy Action Plan 2.0 Executive Summary (PDF) - 2021 Energy Action Plan 2.0 (PDF) - 2018 Energy Action Plan (PDF) - Erie Green Business Program - United Power Rebate Programs - Xcel Energy Rebate Programs - Black Hills Energy - United Power - Xcel Energy - Boulder County EnergySmart (Residential) - Boulder County PACE (Commercial)
<urn:uuid:89379f3e-bfd2-43db-b738-81187497b34e>
CC-MAIN-2022-33
https://www.erieco.gov/1427/Erie-Energy-Action-Plan
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00267.warc.gz
en
0.909069
480
1.578125
2
You can configure Gimp to display the grid when working in fullscreen mode (F11). The procedure is as follows: - Open Gimp. - Click on the Edit menu > Preferences. - Go to Image Window > Appearance. - In the "Default Appearance in Fullscreen Mode" section, check "Show Grid". Published by jak58 Latest update on May 20, 2013 at 07:45 AM by jak58.
<urn:uuid:ffb9e911-8edc-41f3-b30f-cc37c41ec6e2>
CC-MAIN-2017-04
http://ccm.net/faq/30858-gimp-automatically-enable-grid-in-fullscreen-mode
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282926.64/warc/CC-MAIN-20170116095122-00394-ip-10-171-10-70.ec2.internal.warc.gz
en
0.859884
93
1.6875
2
Your clothes shouldn’t scream, “Look at me!” Humility points people toward Jesus; pride draws attention to one’s self. A godly woman will dress modestly in a way that isn’t distracting. It doesn’t eclipse her character or her message, but rather enhances it. What does modesty mean in the Bible? According to some principles found in 1 Timothy 2:9-10,15 and 1 Peter 3:3-5, we can define “modesty” as the “ornament that is honorable, reflects proper reverence, holy, piety, does not attracts improper attention, does not cause lasciviousness in others, is not revealing, vain, or degrades others.” The Bible is full … Why is modesty so important? Modesty is important not because our bodies are shameful, but because they are very, very good. They are worthy of being veiled in mystery. … We should dress modestly because we recognize the fact that we are worthy of being loved, and because we love ourselves. Modest dress is important in today’s world. Why should we practice modesty at all times? Modesty, at its core, fosters respect. It has everything to do with recognizing your worth through the eyes of God, for we were made in His image and likeness. So, yes, you are amazing because you are respectfully made. What does the Bible say about a woman covering her body? For if a woman does not cover her head, she might as well have her hair cut off; but if it is a disgrace for a woman to have her hair cut off or her head shaved, then she should cover her head. A man ought not to cover his head, since he is the image and glory of God; but woman is the glory of man. What is the point of modesty? Modesty, sometimes known as demureness, is a mode of dress and deportment which intends to avoid the encouraging of sexual attraction in others. The word “modesty” comes from the Latin word modestus which means “keeping within measure”. Standards of modesty are culturally and context dependent and vary widely. What does God say about women’s clothing? The Bible’s Old Testament does have religious rules concerning dress. Specifically, Deuteronomy 22:11 gives the rule: “Do not wear clothes of wool and linen woven together.” No one today knows what motivated that rule. Why is modesty a virtue? Dependent Virtue: Slote (1983, 61ff) notes that modesty is a dependent virtue. … In this sense, modesty requires the existence of another good quality. This is typically taken to be something objectively good rather than simply something that the person thinks is good, though most views can accommodate either intuition. Why do we dress decently? Dressing sharply is the first step to attracting and keeping wanted attention. A well-dressed man with a good style will look nicely put together. 6 – It’s a step to overall self-improvement. Putting the effort into what your wear and how you look will have positive effects on your overall lifestyle. Why is modesty important Islam? In Islam, men and women share responsibility in upholding modesty and controlling their desires in society. Whether someone dresses or behaves modestly or not, the obligation to guard one’s own chastity rests with each gender. … Further, Islam’s code of modesty extends to all aspects of one’s life, including attire. Is modesty a personality trait? Modesty when defined as a personality trait, is highly beneficial to interpersonal relationship, group performance, and mental health. What is considered modest clothing? The term modest fashion or modest dressing refers to a fashion trend in women of wearing less skin-revealing clothes, especially in a way that satisfies their spiritual and stylistic requirements for reasons of faith, religion or personal preference. What is modesty in Islam? Hijab is an Arabic word meaning barrier or partition. In Islam, however, it has a broader meaning. It is the principle of modesty and includes behaviour as well as dress for both males and females. The most visible form of hijab is the head covering that many Muslim women wear. Hijab however goes beyond the head scarf. Can Christians eat pork? Although Christianity is also an Abrahamic religion, most of its adherents do not follow these aspects of Mosaic law and are permitted to consume pork. However, Seventh-day Adventists consider pork taboo, along with other foods forbidden by Jewish law. What does the Bible say about lusting after a woman? old time, Thou shalt not commit adultery: 28 But I say unto you, That whosoever looketh. on a woman to lust after her hath committed. adultery with her already in his heart. What is forbidden to eat in Christianity? Prohibited foods that may not be consumed in any form include all animals—and the products of animals—that do not chew the cud and do not have cloven hoofs (e.g., pigs and horses); fish without fins and scales; the blood of any animal; shellfish (e.g., clams, oysters, shrimp, crabs) and all other living creatures that …
<urn:uuid:80fd19ca-e3fa-44a7-a394-0fbcb794c5bd>
CC-MAIN-2022-33
https://religionandcivilsociety.com/talk-about-god/frequent-question-why-is-modesty-important-in-christianity.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00274.warc.gz
en
0.95741
1,107
2.125
2
Lots of us have so much energy it seems like we don’t know what to do with it. The geniuses at nPower have devised a little gadget that helps us put our over-anxiousness to good use: the nPower Peg. This little device is a backup battery charger for hand held devices. As you walk, run, jog or even ride your bike, the movements from your body provide energy for its internal battery. If you are in a pinch and need battery life, just shake the heck out of it for a few moments and you will have enough power to make a phone call. Definitely a little device to keep an eye out for.
<urn:uuid:a176ff34-2e4e-4bc9-8a07-ea3b03632e50>
CC-MAIN-2017-04
http://blog.abt.com/tag/walking/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281574.78/warc/CC-MAIN-20170116095121-00019-ip-10-171-10-70.ec2.internal.warc.gz
en
0.965678
135
1.765625
2
Acupuncture for Overcoming Addiction Overcome Addiction with Acupuncture Sadly, addiction impacts millions of lives every year, and whether it involves drugs or alcohol it also contributes to thousands of deaths in the United Sates on a yearly basis. Did you know that on average, approximately 30 Americans die daily due to drinking and driving, and six Americans die every day from alcohol poisoning? Battling addiction is an extremely difficult journey that usually requires a combination of treatment methods and approaches for successful recovery. It is a thorough process that comprises looking after the body, soul, and mind. While some patients turn to medical intervention or rehab facilities, others suffering from substance abuse are exploring alternative non-traditional methods to help treat their addiction. Acupuncture is just one prime example. How Might Acupuncture Aid in Addiction Recovery? In Chinese medicine, the belief is that performing acupuncture helps to balance yin and yang energies. When a person suffers from substance abuse, acupuncture nourishes the yin energy, cultivating a balance of their natural energies, which leads to healing. Acupuncture treatments can suppress patient cravings for drugs and alcohol while also creating feelings of relief from withdrawal symptoms. Patients suffering from addiction to painkillers particularly, are likely to see a decline in stress and pain after acupuncture treatment. More and more studies reveal it can be a powerful component in the detoxification process and addiction recovery program. Acupuncture isn’t exactly a new treatment method for addiction; in fact, a study performed back in 1989 involved patients suffering from alcoholism. The experiment involved 80 alcoholics requiring recovery. Half of the patients participated in counseling along with acupuncture, while the remaining half received counseling sessions only. The Results? Patients who opted for both forms of treatment were twice as likely to refrain from alcohol. Since then, we are noticing an increase in the number of drug rehabilitation and treatment centres incorporating it as part of their addiction recovery program. How Else Can Acupuncture Help? · Reduces stress and anxiety · Improves sleep habits · Helps treat depression An Individualized Approach to Recovery Recovering from addiction needs to be individualized for change to be possible. Why? We all have unique experiences, difficulties, insecurities, stresses and other components that make us who we are, that are entirely different from the next person. Addiction treatment should address these key qualities that shape who we are, thus reflect a customized approach on an individual basis. For some, acupuncture might be an attractive treatment option for addiction recovery, especially if a holistic approach is desired or recommended. Along with acupuncture, a holistic treatment program for addiction may include any of the following: - Nutritional therapy - Herbal Medicine Why Try Acupuncture at All Points Acupuncture & Wellness Center? - Effective and Safe Treatment - Promotes Natural Healing - Individualized Approach Give our clinic a call to learn more about our comprehensive consultations that do not follow a cookie-cutter approach to care. While acupuncture might not be a cure on its own, it can offer integral care in your overall addiction treatment plan. Looking forward to hearing from you! November 18, 2019
<urn:uuid:7cb97989-df16-4f4c-91db-476b3b6f08f4>
CC-MAIN-2022-33
https://allpointsawc.com/acupuncture-for-overcoming-addiction/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00677.warc.gz
en
0.913101
666
2.15625
2
Temporary Help Agencies and the Advancement Prospects of Low Earners NBER Working Paper No. 13434 In this paper we use a very large matched database on firms and employees to analyze the use of temporary agencies by low earners, and to estimate the impact of temp employment on subsequent employment outcomes for these workers. Our results show that, while temp workers have lower earnings than others while working at these agencies, their subsequent earnings are often higher - but only if they manage to gain stable work with other employers. Furthermore, the positive effects seem mostly to occur because those working for temp agencies subsequently gain access to higher-wage firms than do comparable low earners who do not work for temps. The positive effects we find seem to persist for up to six years beyond the period during which the temp employment occurred. Document Object Identifier (DOI): 10.3386/w13434 Published: Temporary Help Agencies and the Advancement Prospects of Low Earners, Fredrik Andersson, Harry J. Holzer, Julia Lane. in Studies of Labor Market Intermediation , Autor. 2009 Users who downloaded this paper also downloaded these:
<urn:uuid:b44ebf8a-ba8a-415c-9cc6-5712c7b8da65>
CC-MAIN-2016-44
http://www.nber.org/papers/w13434
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720000.45/warc/CC-MAIN-20161020183840-00024-ip-10-171-6-4.ec2.internal.warc.gz
en
0.940635
236
1.648438
2
General Hospitality School Hospitality is considered the relationship that is found between a host and a guest at a restaurant, hotel, or other hospitable location. In fact, the hospitality industry is one of the largest industries because it can be found throughout a variety of different business opportunities due to the fact that it requires an employee to serve a guest to their fullest capabilities. However, general hospitality is considered to exist in resorts, membership clubs, attractions, special events, conventions, and other service industries as it relates to tourism. General Hospitality School Success Factors The most important skill a person can have in general hospitality is communication both in a verbal and written form. The ability to communicate regarding a guest's needs is paramount to satisfying that customer. The manner in which to communicate is also necessary. For instance, a host needs to be able to read body language, interpret meaning, and use quick and decisive thinking regarding any complaint, problem, or compliment given by the guest. General Hospitality School Majors General hospitality is considered a business industry. Therefore, majors involved in hospitality are often management, business, finance, CNA, customer service representation, and communications degree programs. General Hospitality School Curriculum Students learning general hospitality will take specific courses in how to handle business related affairs such as problem solving, communications, and customer service. All of these topics are grouped under management courses, with core programs in math, science, education, social studies, and English. Hospitality often requires a second language course. General Hospitality School Degrees Hospitality can offer a couple of degree programs such as a certificate, bachelor's, or master's degree. The Master's degree is often an MBA meaning Masters in Business. General hospitality courses last from two to four years depending on the college degree program you seek. The typical course is two years, with an additional two years in a specific industry such as resort or restaurant education. General Hospitality Jobs The hospitality industry is always growing. With each new hotel, resort, member club, or restaurant opened there is a demand for competent help. The industry does require a certain type of personality, one that is extroverted and helpful. Since the hospitality industry also calls for patience, understanding, and the ability to get things done it is hard to find the perfect hospitality hosts. If you enter this degree program you know that positions at a resort, restaurant, or membership club are going to be available to you and availability will be based on current economic conditions.
<urn:uuid:72e7aba8-48d7-4baa-ba00-200c2878030d>
CC-MAIN-2017-04
http://www.yourdegree.com/general-hospitality-courses
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00343-ip-10-171-10-70.ec2.internal.warc.gz
en
0.958603
511
2.40625
2
The Asian rainforests are found on Borneo, Sumatra, the Malay Peninsula, and many islands including New Guinea. Rainforests get about 60 inches of rain each year. That is about 1/8 of an inch every day. The air is hot and humid, a good combination for plant growth. The trees grow so thick that falling rain often never reaches the ground. A giant flying mammal, called the colugo, searches for fruits and flowers. It glides, making a greenish gray flash, from tree to tree. Flying lizards also glide through the trees. They don't really fly at all but spread flaps of skin or webbed toes to catch the air. Real flyers, like the hornbill, flap through the forest in search of food. The forest kingfisher munches on a katydid. Huge orange orangutans lumber from branch to branch, feeding on fruit and stripping leaves with their long fingers and teeth. Gibbons and proboscis monkeys also share the treetops. Later at night giant fruit-eating bats will wake up to search for ripe fruit. Tigers are the biggest meat eaters here as they search the forest floor for a tapir, tree shrew or barking deer. Pythons also hunt for unwary animals. The trees in the Asian rain forest are also home for many strange insects. The bright green leaf beetle shines in the light but blends so well into the dark leaves that it easily hides from its enemies. Crickets, walking sticks, long-horned and rhinoceros beetles also hide among the leaves. Some insects, like the flower mantid, are the color of the leaves and flowers they live on. This camouflage hides them safely in the forest. Large atlas moths and birdwing butterflies flutter by. The tapang tree is the tallest rain forest tree in the world. Strangler figs live in this forest, too, rooting in other trees. Teak trees are treasures for their precious wood, and wild ginger is a valued spice. Up on stilted roots, the screw pine is a strange sight. Because of the thin topsoil layer in rain forests, trees have shallow, widely spreading roots. As a result, the trees are easier to log because they can be simply knocked over with a bulldozer. Everywhere liana vines hang from trees, and ferns and flowers give the forest color. The pitcher plant takes advantage of the forest’s many insects by trapping them in its long neck and then dissolving them in the acid at the bottom. When you research information you must cite the reference. Citing for websites is different from citing from books, magazines and periodicals. The style of citing shown here is from the MLA Style Citations (Modern Language Association). When citing a WEBSITE the general format is as follows. Author Last Name, First Name(s). "Title: Subtitle of Part of Web Page, if appropriate." Title: Subtitle: Section of Page if appropriate. Sponsoring/Publishing Agency, If Given. Additional significant descriptive information. Date of Electronic Publication or other Date, such as Last Updated. Day Month Year of access < URL >. Amsel, Sheri. "Asian Rainforest" Exploring Nature Educational Resource ©2005-2022. August 19, 2022 < http://www.exploringnature.org/db/view/Asian-Rainforest >
<urn:uuid:c984301c-1e94-42b4-938e-adeeb953415d>
CC-MAIN-2022-33
https://www.exploringnature.org/db/view/Asian-Rainforest
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00476.warc.gz
en
0.923971
707
3.59375
4
As we were set free to practice endodontics, Dr. Sam Seltzer (chairman of the department of endodontics at Temple University, 1967 to 1983) told my residency class, as we were matriculated into the world of practice, “I have bad news! Half of what we taught you is wrong and, the worst part is, we don’t know which half.” Nice joke, huh? (I use it myself.) Consider the changes that have occurred in our tools—flame-heated carriers to electrically-heated carriers and gutta-percha guns, loupes to microscopes, hand file shaping to rotary file shaping, mini-handpiece heads to ultrasonic retroprep tips, bacterial culturing to DNA identification, analog posterioranterior (PA) radiographs to digital PA radiographs to computed tomography (CT) imaging, paper to electronic charting, and the list goes on ad infinitum. That’s just the new devices and tools that have changed. A list of procedural changes—sodium hypochlorite to lubricants during negotiation, push-pull filing to balanced force cutting with hand K-files, apical stop preps to tapered preps, length determination with radiographs to apex locators alone, big coronal shapes to smaller, controlled coronal shapes, serial step-back shaping with 18 instruments to cutting complete shape with one to 4 rotary files, lateral and vertical condensation to centered condensation, etc. In this article, I will describe a few recent changes in the concepts, tools, and methods that I personally use; some of them are nuances, but a couple of them are huge! SMALLER ACCESS CAVITY AND CORONAL SHAPES ARE FINALLY THE RAGE The greatest threat to endodontics is not implants; it is poorly done root canal therapy (RCT). The No. 2 threat to the art of saving diseased teeth is the over-exuberant cutting of access cavities and the over-enlargement of coronal root canal shapes. More than any other factor, the structural integrity of teeth remaining after completion of RCT literally determines their potential longevity. My definition of endodontic success is seeing a patient’s name in the local obituary before he or she needs any retreatment of the work that I did. My long-term success and failure experiences in practice have closely mirrored and reason Rud et al’s1 findings; mainly, that if all periradicular disease heals within one year of treatment completion, the case will continue to be successful unless subsequent coronal leakage allows recontamination of the root canal space, or if root fracture occurs. Endodontic treatment or retreatment, except for rare cases, should only be recommended for teeth with good to excellent structural integrity. Therefore, techniques of retreatment that further reduce the strength of teeth do not make a lot of sense in the long-term. When endodontists tell that they can remove any broken file from any root, the answer to my question, “How much tooth structure is left?” is a far more important consideration than how elegant the gymnastics were to retrieve the file segment. Prosthodontists understand this because they frequently see over-prepped teeth come apart. Endodontists most often do not see these kinds of failures, so it can be more difficult for them to understand the restorative dentist’s dilemma. Fortunately, there are new voices joining my campaign to cut less dentin out of teeth during RCT. Clark and Khademi2,3 have taken it further with their understanding of where the strength of a tooth resides—in the cervical third of its root structure and crown. As a result, my molar access cavities have become smaller (Figures 1a and 1b). Thanks, guys. |Figure 1a. Tiny access cavity cut through an IPS e.max (Ivoclar Vivadent) crown. Keeping the access small allowed the new all-ceramic crown to be retained with little aesthetic or structural loss.||Figure 1b. Postoperative radiograph shows how the exit paths from mesial and distal canals intersected at the cavo surface of the access cavity, allowing minimal access size without compromise in convenience form.| |Figure 2. Mesial view through the contralateral MB roots of these maxillary first molars reveals untreated MB2 canals in each root, with adjacent soft-tissue growth seen in the sinus spaces.| The most effective way to cut ideal but optimally conservative access cavity preparations is to spend the time (preoperatively) to plot an ideal access path to each canal, and to identify the occlusal landmarks that delineate that path. Once the pulp chamber has been successfully invaded, rotary negotiators are used to find each orifice, then using an extra-long guided-access bur such as the LAX diamond (SybronEndo) at half speed, the file paths are smoothed and straightened directly into each canal, thereby completing the access preparation. The most prevalent cause of over-done coronal enlargement is the lateral condensation (of cold gutta-percha) obturation technique. Without over-enlarging the coronal aspect of small molar canals, it is difficult to wedge more than one accessory cone beside a master cone; hence, the popularity of Gates Glidden burs. My biggest beef with lateral condensation is that we need more coronal enlargement; thus, we essentially reduce the structural integrity of the tooth to facilitate an obturation method scarcely more effective than single-cone filling. We can do better. The most effective way to maintain conservative coronal shapes is to use rotary files with .04 taper or with rotary files of greater taper having maximum flute diameter limitations, such as GT and GTX Files. Obturation methods that will work with these smaller coronal shapes are: single-cone filling, warm lateral condensation, warm vertical condensation, and warm centered condensation, as well as carrier-based obturation. Irrigating successfully through these smaller shapes is easily done with 30 Ga, safe-ended, irrigating needles. Endodontic failures can usually be fixed. However, nobody can fix structural integrity problems. Therefore, it is vital to cut less dentin during root canal procedures! CBCT IMAGING HAS CHANGED ENDODONTIC PRACTICE FOREVER It is a truism that cone beam CT imaging (CBCT) has changed the specialty of endodontics forever (Figure 2). More so than the microscope, CBCT has allowed for the definitive diagnosis of endodontic failures, the number of canals present in a given tooth, and with the right machine (my CBCT machine is manufactured by J. Morita USA), even lateral canal ramifications can be seen before treatment. I have always touted taking a mesial (radiograph) view of extracted teeth that have been treated by hands-on course participants, describing what is seen as the “secret life of root canals”; this view reveals all of the anatomic challenges that are normally hidden in conventional dental radiography views. Having CBCT imaging before commencing RCT is like being Superman with x-ray vision and a rotary file. You never have to go into a root again wondering how many canals you might find. The only negative issue I have noted with my CBCT machine (besides the lease payment) is when it definitely reveals the presence of an elusive MB2 or an MB3 canal during the access preparation. Without CT imaging, after 30 or 40 minutes spent risking perforation without finding an MB2, I have usually convinced myself it is not there. Those days are over the first time you turn it on after installation. Do you need a $100K CBCT machine to do exceptional endo? Absolutely not; as proven by all the cases treated to the state-of-the-art with multiple angles of 2-dimensional x-ray imaging. However, I will say that it is not as easy, and definitely not as fun. CT imaging is essential when cutting minimalistic access cavities as canals are counted and located in computer space, obviating the need to cut larger access preps to view everything directly. CROSS-POLLINATION PROCEDURAL SKILLS IS A GOOD THING Besides being one of the most satisfying experiences of my clinical career, training up to do implant surgery for the last 6 years has improved my endodontic skills. From my implant educators I learned the benefit of doing more specific treatment planning, the critical advantage gained by using drill guides, and I learned how to use long drills for endodontic access preparation when angulation is critical (Figures 3a to 3d). |Figure 3a. This tipped molar has been beautifully restored upright, resulting in 16 mm of crown length from the mesial marginal ridge on the occlusal surface to the cervical margin of the crown.||Figure 3b. After plotting an ideal file path to the mesial canals, a model-based drill guide allowed the initial drill to hit the MB canal orifice dead-on after cutting blindly through the mesial marginal ridge and nearly 16 mm of crown and tooth structure.| |Figure 3c. Treatment planning was confirmed as all canal orifices were located through this 2.5 mm access cavity.||Figure 3d. This case was still complicated after the canals were located. They were initially negotiated with a 15-.06 VB file (DENTSPLY Tulsa Dental Specialties), but the severe apical curvatures necessitated hand k-files to reach length and rotary GTX (DENTSPLY Tulsa Dental Specialties) to finish. Note the apical bifurcation of the distal canal.| Learning to place implants has also inspired new endodontic technique development. As soon as I experienced the elegance of using drill guides for implant surgery, it was an easy jump to envision drill guides for apical surgery; minimally invasive, rapid, and accurate (Figure 4). My endodontic training has likewise brought a few cool technique nuances to my implant procedures: I use a rubber dam to isolate extraction/graft sites so there is little or no contamination of the graft site. In addition, with a Nygaard-Ostby rubber dam frame, all the soft tissues are pulled away from the operative field (Figures 5a to 5c). |Figure 4. My experience using model-based and CT-based drill guides for implant placement was the inspiration to work with Materialise Dental to prototype the first CT-based Endodontic Surgery Drill Guide.||Figure 5a. My endodontic methods have likewise improved my implant surgery.| |Figure 5b. By placing a slit rubber dam from tooth No. 15 (clamped) to No. 13 (flossed through the mesial contact), I had total control of the extraction, the upfracture of the sinus floor, and bone graft with a PTFE membrane (Cycoplast).||Figure 5c. Healing at 2 weeks. Sutures are typically removed 2 weeks postoperatively, and the membrane (with cotton pliers) at 4 weeks.| Even with model or CT-based drill guides, I take a PA radiograph after each drill is cut to planned length. If I use 3 drills for a given implant placement, I have 3 opportunities to nudge my drill paths into progressively-truer paths. This is much easier than correcting after all 3 drills have been placed erroneously. So, look for opportunities across lines of expertise. Cross-training has been good to me, and I highly recommend it to you. ROTARY REDUX: IT JUST KEEPS CHANGING Rotary Files as First Instrument This technique does not work at all in theory but, ironically, it is awesome in practice. I came upon this departure from convention by using Vortex Rotary Files in the most aggressive manner that I could conceive. I pulled an extracted lower molar from DEL’s tooth bank (a jar), and I shoved the smallest Vortex File I had (a 15-.06) into the dry and never-instrumented MB canal with too much force. To my surprise, it cut to length! Thinking that it must have been a rare one-off occurrence (we all know rotary files should not be taken to length until hand k-files have established a “glide path”). But, as it turns out, canals in their natural state provide an excellent glide path given the right file, barring an apical impediment. The safest way to ease into rotary negotiation is to pick the right file and to just use it as an initial entry tool for small molar canals as a very sharp orifice widener. The 15-.06 Vortex Blue File is my favorite because its limited shape memory allows pre-bending along its length for easier introduction into mesial canals of molars. After using a 15-.06 VB file for initial entry 3 to 5 mm into the coronal parts of each canal, an LAX diamond guided-access bur (SybronEndo) is brought in to straighten and smooth the access line angles to each orifice. The access is then filled with a lubricating solution, and the 15-.06 VB file is brought back into each canal with its stop at estimated length (300 rpm, 150 Ncm torque limit). The intent here is to allow this instrument to cut deeper, but to never apply additional pressure when it slows in its apical progress; remove it instead. If the file is loaded with debris, clean it with an alcohol-soaked gauze, replace it in the canal, and see if it wants to cut deeper. If not, a No. 08 K-file is brought in and will typically plummet to length due to the coronal enlargement cut by the rotary file. If it keeps cutting apically, let it do so while being sure to clean the fill more often as estimated length is approached. Length determination during rotary negotiation procedures is accomplished by using the “long file probe” for my Root ZX Mini apex locator (J. Morita), as it easily rides on the shank of the rotating instrument as the file approaches estimated length. This is not for the inexperienced, nor the faint of heart; practice with extracted teeth is paramount, but the advantages are definitely worth the learning curve. A Hybrid Instrumentation System is Ideal I’m a bit late to this party, but after doing initial negotiation with a ripping-sharp rotary file, I realized that the 15-.06 Vortex Blue File I was using was also doing a rough-cut of the canal shape, making the apical preparation with radial-landed GTX Files much more efficient (Figure 6). My time to complete negotiation to final shape has dropped by 50%, and I’m seeing more lateral canals and fins than any time in my career. |Figure 6. All canals in this mandibular molar were negotiated to length with a handpiece-driven 15-.06 rotary file, before any hand files were used. Note the large ropelike canal between the mesial canals and the apical bifurcation of the MB canal—evidence of effective debridement.||Figure 7. Above is the 15-.06 Vortex Blue File—wicked sharp and safe in small tip sizes. Below is a 40-.06 GTX File with radial-landed blades for safe apical shaping.| Nonlanded rotary files are relatively safe in small tip sizes; however, I would not recommend using them with tip sizes larger than ISO No. 15, as apical transportation may result in curved canals (Figure 7). Q-MIX OR AQUEOUS EDTA USED EXCLUSIVELY DURING SHAPING PROCEDURES One of the serendipitous outcomes of my foray into rotary negotiation was that I began seeing a significantly greater number of lateral and accessory canals filled in the teeth I began this way, leading me to understand that I was previously burnishing cut debris into the orifices of lateral canal projections with hand K-files used during negotiation, and with landed-blade files during initial rough out of the final shape. Once I was onto that track of thinking, I realized that cut dentin debris was a serious opponent to adequate irrigation and cleaning the secondary parts of root canal systems. As a result, I then changed my irrigation routine to using Q-Mix (DENTSPLY Tulsa Dental Specialties) or 17% aqueous EDTA exclusively during shaping procedures. This was done with the hypothesis that removing the smear layer as it is being created may be a more effective way of clearing the way for optimal efficacy of the necessary sodium hypochlorite irrigation to follow. |Figures 8a and 8b. This was done in a single visit as a live demonstration. Note the symmetry of the radiolucency about the 5 to 6 portals of exit, and the narrow shapes through which the lateral canals were irrigated and obturated (effectively, it seems).| |Figure 9. iTero (Cadent) Digital Impressioning Scanner.| |Figure 10a. Clear replica of CT-reconstructed anatomy.||Figure 10b. The anatomically-correct apical form seen in these replicas introduces students to the concepts of “visual imaging” and negotiation of accessory canals. Students practice on multiple replicas with identical anatomy until unconscious competence is achieved.| Seemingly, there has been a greater number of lateral canals filled under this new regime; even when used in canal preparations that are more conservative both coronally and apically (Figures 8a and 8b). I WANT AN ANALOG LIFE, AN ANALOG WIFE, BUT A DIGITAL IMPRESSION SCANNER With the introduction of the latest generation of digital impressioning scanners, the final inflection point toward a fully digital laboratory process has arrived. Having drill guides, provisional crowns, and temporary and final abutments CAD/CAM-manufactured is the bee’s knees, so I have an iTero (Cadent) digital impressioning scanner on my 2012 Christmas wish list (Figure 9). - Being able to email my impressions to a lab? Nice. - Editing your lab tech’s crown and bridge designs by computer? Cool. - Not having my patients almost hurl while we wait for impression materials to set? Priceless! PROCEDURAL TRAINING CHANGED FOREVER For 3 decades, I have used clear plastic endodontic training blocks in my hands-on courses, but they have been of limited benefit. The canals in these blocks are smooth and regular; like the inside of a straw, but not like a root canal system. They come with straight canals, and with one or 2 curvatures, but their canals have none of the peculiarities of nature’s endodontic anatomy. They are useful to show shaping and obturation techniques, but there are no lateral anatomic complexities and none of the organic irregularities that make negotiating small tortuous canals such an art form. So, we are left to pursue training in extracted teeth. (Yuck!) Practicing on extracted teeth is always beneficial, but every one of them has different anatomy, so dentists must depend on luck of the draw to find extracted teeth with the full-range of classic anatomic challenges; an exceedingly rare outcome. They need to practice on relatively straight canals with large and small apical diameters, all the different types of canal curvatures, all the types of natural impediments, etc. Unfortunately, even when a student finds an extracted tooth with the perfect anatomic challenge he or she wishes to practice with, it is a one-off experience with no opportunity to try it again if the first attempt is less than ideal. The CT-based training replicas have solved this conundrum (Figures 10a and 10b). It took 23 years after its invention for Dental Education Laboratories to successfully marry our mCT imaging of endodontic anatomy with 3-dimensional printing technology. Hands-on training will never be the same! Rather than every student having a different anatomic challenge hidden in his or her extracted teeth, now, all of them can work in the same clear anatomic form together. Furthermore, educators can lead a whole class through each of the classic endodontic challenges instead of teaching a single student at time. With tooth replicas, students can practice a given challenge as many times as they need to achieve competence in that root form, after which they can be tested in a nontransparent replica having the same anatomy. Training replicas allow for complete standardization of grading; this is not a small problem in dental schools. Anatomic replicas now make it possible for dentists to do distance learning in a hands-on format, and Dental Education Laboratories has developed remote training modules for dentists to work through in their own operatory. This can be done with their own assistants, all led by interactive video footage that can be watched on computer, iPad, or phone. Fun, huh? Everything has changed, except the anatomy of teeth, their roots, and the root canal passageways that course through them. Therefore, we must become students of endodontic anatomy. Students of endodontic anatomy know that their clinical success is largely dependent on their ability to treat root canal systems to their full apical and lateral extents; they know how to choose files to match the canal form they are in but, most of all, they expect everything going forward to change except the anatomy. - Rud J, Andreasen JO, Jensen JF. A multivariate analysis of the influence of various factors upon healing after endodontic surgery. Int J Oral Surg. 1972;1:258-271. - Clark D, Khademi J. Modern molar endodontic access and directed dentin conservation. Dent Clin North Am. 2010;54:249-273. - Clark D, Khademi JA. Case studies in modern molar endodontic access and directed dentin conservation. Dent Clin North Am. 2010;54:275-289. Disclosure: Dr. Buchanan has a financial interest with DENTSPLY on the GT and GTX systems, LAX burs with Sybron Endo, and J. Morita’s mini apex locator.
<urn:uuid:54578bb4-fd8d-46f7-a386-251b217f8cba>
CC-MAIN-2017-04
http://dentistrytoday.com/endodontics/8091-everythings-changed-except-the-anatomy-
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00234-ip-10-171-10-70.ec2.internal.warc.gz
en
0.940602
4,753
1.914063
2
Rating is available when the video has been rented. This feature is not available right now. Please try again later. Uploaded on May 6, 2011 gesture recognition using a kinect an a neural network. We using the openNI and the NITE librairies with a Kinect to track body parts (hands, elbow, head, ...). Then we use FANN (Fast Artificial Neural Network) library for the recognition system. For now, It is able to recognize only two moves, one means 'hello' ("bonjour" in franch), the other mean 'sorry' ("désole" in french). We just need to record new moves to train the neural network to be able to recognize other "words"/moves.
<urn:uuid:059359cb-bc59-4472-b066-7d4d3f231bce>
CC-MAIN-2017-04
https://www.youtube.com/watch?v=WI80eGO17jc
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00135-ip-10-171-10-70.ec2.internal.warc.gz
en
0.897079
154
2.59375
3
Wildlife Preservation & Protection Mission: Mission is to end the suffering of wild animals in captivity, rescue individual animals in need, protect wildlife — including highly endangered species — in their natural habitats, and encourage compassionate conservation globally. Geographic areas served: National and International Programs: Advocacy for animalscontributed to the protection of elephants, lions, dolphins, gorillas, and other imperiled species both in the wild and in rescue and rehabilitation centers in their countries of origin. Promoted the international protection of lions and the listing of the african lion under the us endangered species act, and similarly advocated for lion protection at meeting on the convention of migratory species. Continued campaign to protect furbearing animals from the cruelty of fur farms and wildlife trapping. Coordinated nationwide fur donation drive to promote awareness of anti-fur campaign; sent donated fur to wildlife rehabilitation centers for baby and orphaned animals. Worked with states to combat wolf trapping bills and used litigation to restore protection for wolves in the great lakes region under the endangered species act. Engaged fully in the meeting of the animals committee of the convention on international trade in endangered species of wild fauna and flora (cites). Campaigned on conservation of threatened and endangered species and the protection of elephants from the ivory trade, bears from the gallbladder trade, and rhinos from the horn trade. Published two reports on the international trade in elephant ivory, one looking at poaching of elephants in africa and the other movement of ivory from africa to asia. Worked on legislation across the country to ban the sale of ivory and rhino horn at the state level. Gave speeches at three march for elephants events across the country. born free usa primate sanctuaryborn free usa continues to rescue, rehabilitate, and retire hundreds of primates at our accredited texas primate sanctuary. We continue to take in new animals in need, who otherwise would face a life of captive misery or premature death, and give them a home in as naturalistic conditions as we can provide. public educationborn free usa continued efforts to educate the public on the dangers of keeping exotic animals as pets. Used social and popular media and educational outreach materials including an interactive database of deadly and dangerous captive wild animal incidents to help shed light on the magnitude of the issue. In addition, born free usa worked to educate the public about the need to protect live animals from commercialization in pet stores. Held public presentations on wildlife trade and animal rescues in numerous states. Held a press conference with members of congress and chimpanzee attack victim, charla nash, to promote the captive primate safety act. Held national event to call attention to the plight of wild birds and the needs of birds in captivity. I am also a volunteer and a donor. This is a remarkable, highly efficient, motivated, skillful advocacy group. The DC-based EVP is well-known within the field. I have neve seen so much as a dollar's worth of waste leak from this organization. The USA operation has the strong support of senior UK management.
<urn:uuid:52a6ce89-1572-4099-93dc-1d36334f51cd>
CC-MAIN-2017-04
http://greatnonprofits.org/reviews/born-free-usa/134206/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284405.58/warc/CC-MAIN-20170116095124-00033-ip-10-171-10-70.ec2.internal.warc.gz
en
0.919914
627
2.421875
2
BERLIN (AP) - Europe's financial crisis looks less menacing than it has in many months, but the steps taken by countries most threatened by high debts and weak economies aren't the main factor. What has changed more than anything else has been German Chancellor Angela Merkel's willingness to put her country's financial resources - and pride - on the line to help save the euro currency union. The backlash from some quarters - including inside her own party - has been fierce, yet for Merkel there appears to be no turning back. At stake is the concept of European unity that has been at the heart of German foreign policy since the end of World War II. "There has been a very clear criticism of Merkel's government that she always addressed European policies from the national perspective, but in my opinion she's not doing that, at least not in the last few months," said Julia Langbein, a political scientist at Berlin's Free University. "She's attempting to keep this European project going and not to let the euro go down, despite tough political criticism." Most recently, Merkel has stood behind an ambitious plan by the European Central Bank to buy unlimited amounts of government bonds to help lower borrowing costs for countries struggling to manage their debts. As Europe's biggest economy, Germany has more at stake than anyone else if countries default on their bonds and the ECB is forced to take losses. By contrast, the reactions to the ECB plan from some German media and politicians, and the head of the country's central bank - who fears runaway inflation will follow - were strongly negative. Rainer Bruederle, the parliamentary leader of Merkel's Free Democrats coalition partners, said it was "fatal to keep buying up new bonds from indebted countries." Bundesbank President Jens Weidmann said heavily indebted countries would be less likely to adhere to austerity measures because "central bank financing can become addictive like a drug." Germany's top-selling Bild newspaper proclaimed that Draghi had issued a "blank check for indebted countries." Merkel's support for the ECB's controversial bond-buying plan is the latest example of where she has taken a more pragmatic and flexible approach to the eurozone's problems than she appeared willing to do earlier on in the crisis that began nearly three years ago. At a summit in Brussels in June, European leaders agreed to a bold plan to pump cash into troubled banks, reduce borrowing costs for Italy and Spain and stop forcing austerity on every government that needs aid. The agreement was only possible after Merkel agreed to measures that months earlier she said she would not accept. When it comes to Greece, Merkel still insists on tough austerity in exchange for aid, but she has guided German officials to take a softer tone publicly. She has admonished members of her governing coalition who've said the eurozone would be better off without Greece and said it "made one's heart bleed" to see the Greek people struggling in the face of pension cuts and other burdens for the good of their country. On Wednesday, Germany's Federal Constitutional Court - which is akin to the United States' Supreme Court - is expected to allow Germany to ratify the €500 billion permanent bailout fund for Europe called the European Stability Mechanism and Europe's new budget-discipline pact. The court case was brought by a broad coalition of critics of the deal who claim the pact - that was drawn by Merkel and the other eurozone countries in December 2011 - unduly limits the German Parliament's ability to control the country's budget. While backing various measures aimed at helping struggling countries, Merkel hasn't let up on insisting that eurozone members stick to tough fiscal targets. The way the permanent bailout fund is structured Germany has a de facto veto over applications for emergency funding. Voting rights are weighted according to contributions, and since Germany is guaranteeing 27 percent of the €700 billion coming from across Europe, it is impossible for an emergency application to gain the approval needed unless Germany is on board. "Without Germany, it doesn't happen," Langbein said. The same can be said for the ECB's bond-buying plan. The program announced by ECB President Mario Draghi on Thursday says countries that want the central bank's help must first request emergency aid from the bailout fund controlled by Germany and the 16 other nations that use the euro. While the ECB plan is the most significant step to date in stemming Europe's financial crisis, the region's economic problems are far from over: the 17-country eurozone has six countries in recession and unemployment across the region is at 11 percent. The budget-cutting that countries are implementing to reign in their deficits is only going to make matters worse in the near-term. Still, European financial markets have been relatively calm all summer. They have enjoyed an extra boost ever since Draghi hinted and Merkel signaled her approval of the bond-buying program. Back in July, the interest rate on Spain's 10-year bonds was 7.54 percent - now they are back down to 5.64 percent. Italy has seen a similar drop - from 6.36 percent to 5.02 percent. Merkel's recent flexibility stands in contrast to her image earlier in the year. Back then there was no sign of Merkel backing anything but a strict adherence to budget cutting and fiscal discipline to solve the eurozone's crisis. Germany, and its chancellor, were portrayed as the only things stopping the region from introducing measures to get the economy growing again. This might have something to do with how Germany's economy is progressing. It has been doing much better than others in the debt-troubled eurozone but there are increasing signs that Germany isn't immune to the region's crisis. This month, the country's Economy Ministry warned that while industrial orders from inside Germany were 1 percent higher, new orders from other countries in the eurozone were 0.6 percent lower. Merkel will have a struggle on her hands now she has decided to put her country firmly behind the future of the eurozone, according to Isabell Hoffmann, project leader for the Bertelsmann Stiftung's European politics team. "This is a real political conflict that is going on here," she said. "There is a real political fight going on over how this integration is supposed to proceed and who has their say in what, and how far we want to go."
<urn:uuid:c7268b36-1253-4006-8b87-963b9b1e36fd>
CC-MAIN-2017-04
http://www.newstribune.com/news/news/story/2012/sep/12/germany-moves-ahead-eurozone-measures/508521/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281419.3/warc/CC-MAIN-20170116095121-00488-ip-10-171-10-70.ec2.internal.warc.gz
en
0.972246
1,294
1.992188
2
Select a local government within your state to analyze. You may select either an urban, suburban, or rural government to review. Prepare a presentation addressing the following: - Describe which area you chose: urban, suburban, or rural. Briefly describe the area’s demographics and characteristics. - Describethe local form of government and identify the major elected officials of your selected area. - Identify the major public policy issues, current events, and challenges this government faces and analyze one in depth. - Discuss how the state government is addressing the issue you selected. - Provide at least two potential, realistic solutions to the public policy issues, current events, and challenges this government faces. Include 8 to 10 slides and speaker notes to provide more in-depth information. Format your presentation consistent with APA guidelines. Include speaker notes on the PowerPoint slides. Are you looking for a similar paper or any other quality academic essay? Then look no further. Our research paper writing service is what you require. Our team of experienced writers is on standby to deliver to you an original paper as per your specified instructions with zero plagiarism guaranteed. This is the perfect way you can prepare your own unique academic paper and score the grades you deserve. Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.[order_calculator]
<urn:uuid:54addb83-cf37-414f-aa87-7cb9cedfb5ee>
CC-MAIN-2022-33
https://www.idealacademichelp.com/select-a-local-government-within-your-state-to-analyze/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00670.warc.gz
en
0.87197
283
2.65625
3
At Zojirushi, we are overjoyed to celebrate the beginning of spring. To us, spring means new beginnings, great weather, cherry blossoms, and most importantly, the beginning of fresh fruits and vegetables. The weather is finally getting warmer, and as we peruse our local markets, we begin to see an abundance of new produce that is scarce in winter months. We love incorporating seasonal produce into our recipes whenever possible and always suggest that you do the same. Each month brings its own colors, flavors, and magic. It’s been a winter full of warmth, happiness, tea and rice! However, as we move into spring and soon summer, we look forward to all that it will bring. April is a very special month in Japan because it is the time when the cherry blossom trees bloom. A beautiful canopy of pink and white is set above our streets, and the wind blows petals all around us like snow. The cherry blossom season is beautiful and fleeting, so it is important to enjoy them while they last. A common pastime in Japan is to get together with friends and family, and share a meal beneath the shade of a tree. At Zojirushi, we always encourage you to share special moments with friends and family, and hope that our products can help to enrich those moments. Product of The Month: Tuff Mug (SM-JA36/48) The product of the month for April is our Tuff Mug (SM-JA36/48) because the soft pink color of the mug reminds us of the cherry blossoms. Fill it up with your favorite drink, and the mug will keep it hot or cold for hours; perfect for a picnic under the blue sky, isn’t it?
<urn:uuid:cbceeb26-ea44-472e-9e4f-6e0c7545c8c6>
CC-MAIN-2016-44
http://zojirushi.com/blog/?p=71
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720941.32/warc/CC-MAIN-20161020183840-00518-ip-10-171-6-4.ec2.internal.warc.gz
en
0.940342
360
1.53125
2
In the UK in July 2010 the much anticipated news about the government's plan to scrap the default retirement age in the UK from October 2011 throws up a complex future work place and nursing care space. At the moment if a member of the staff in the NHS needs a psychiatric assessment and admission, then there is often a protocol that determines how their care is managed. Various factors are taken into account. For example, the work history of the person and the distance of available beds. This may entail admission for them to another area. Such arrangements help protect the staff member, their families and the local staff for whom being both carers and colleagues could be quite difficult. Over two decades I have encountered health professionals who are diagnosed with dementia maintained in the community - in their homes - and in residential care. So far I have not known these individuals in their work capacity and professional lives. This is due in part of course to the incidence of dementia increasing with age and my previous status as a spring chicken. Today of course things have changed: - Early onset dementia is more common as the overall older adult population rises. - Suddenly (well at least after October 2011) we may find - despite the physical and emotional demands of the job - that the staff in residential and nursing homes are also older - working through that previous work | retirement barrier. - There's another change: now I am a mature chicken. - I wonder what the churn rate is in our nursing homes? - While we usually think of high turnover for staff and the associated poor quality of care. As care and nursing homes are also businesses there are two churn rates: - - senior and junior staff leave the sector, or move to other homes; - - residents are moved for reasons of re-location - increased care needs, and the choices of family. The Oracle of Bacon
<urn:uuid:e73a4798-586f-4e89-a166-85b06d5db664>
CC-MAIN-2017-04
http://hodges-model.blogspot.com/2010/08/retirement-memories-of-work-bacon.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280900.71/warc/CC-MAIN-20170116095120-00004-ip-10-171-10-70.ec2.internal.warc.gz
en
0.97249
376
1.882813
2
Top 8 Problems to Check Before Going Boating Check For These Boat Problems Before A Boat Trip Every year, the coastguard receives countless calls from boaters caught in the water at night who are unable to reach the coast. Boaters say they have seen red lights and hope the Coast Guard can pinpoint their location. Marine radio signals can transmit for many miles and there might be hundreds of flashing red lights in an area, but this kind of information is not helpful in locating a boat. Boating Safety First Update your maps and familiarize yourself with the local boat rules and zones. Get a local map of the area where you will go by boat. Study the chart and plan your course in advance. This will help you decide which day and time is best for sailing and inform yourself what kind of clothes and equipment you need to bring. Did you check the weather forecast? Responsible sailing and boating in general has a lot to do with common sense. This includes an extensive review of boat equipment. Another way to protect yourself and your passengers from the sun is to use lots of sunscreen and a few extra hats. Get to know the moving parts of your sailboat A sailboat is a machine that is constantly in motion so take care of all moving parts of your boat. This includes large things such as spars and booms that swing when turning and are not fastened with screws. Clean the deck as well as possible before stowing your sails. Deck Joints – Try to look as closely as possible at the hull and deck joints of a yacht, especially if you see any abnormalities or strain on the joint. Then look for areas where water has passed through, or see if there is water in the bilge, indicating that the joint seal is no longer complete. Problems with lower units are common on outboard axis drives, especially in difficult places. In most cases, problems with lower units arise due to a bad seal or a hairline crack in the housing that allows water to penetrate. The only way to know for sure whether the bottom unit gasket on the boat is working properly is to look for low oil content and make sure it does not look milky. Corrosion – Watch out for excessive gray, white or chalky corrosion on aluminum and red or brown stripes on steel. Cracks – If you see many cracks, the boat must be inspected by a specialist. Check for stress cracks in the fuselage and cannons. Some of these are due to bumps on the dock and may not be a problem, others are cosmetic and still others may be due to unusual movements of the boat that are not normal. Boat Engine Trouble Boating with a bad engine can put you in serious trouble. If this is the case, the next time you look at a used boat, check out the most common problems that arise on used yachts and boats. Engine problems are high on the list. Drain Plug – Installing the drain plug is one of the most basic procedures when boating, but boaters around the country often forget this, especially at weekends. To make matters worse, several boat models have more than one plug. An operator who fails to install a plug can cause the boat to be full of water. In boating, the only thing more frustrating than a boat that doesn’t go anywhere is one that doesn’t stop. Anchoring your ship in a hot fishing spot or secluded cove for a few hours of relaxation is part of the fun. When the boat is in the water; it’s loaded up with gear, ice, and your favorite beverages; and everyone who is aboard. Maybe you’ve even put together a playlist on your iPod for the occasion. Don’t get caught with a dead battery when you fire up the engine. You can avoid this dockside drama by checking all of your batteries with an onboard or portable meter, well before your first trip. These days gasoline is mixed with ethanol to increase the octane and have a cleaner fuel…But ethanol loves water. So much so, in fact, that it will absorb it to the point of saturation before separating your fuel into a watery mess. That’s when it makes a disaster of either your fuel tank, fuel lines, fuel system—or all three. Countless boat owners learn this painful chemistry lesson at the beginning of each season, and not only can it ruin your first run, it can also be a wildly expensive problem to fix. The best way to avoid this situation is to use low octane gasoline or add a good-quality fuel stabilizer, every time you fuel up. Additionally, engines should be run dry of fuel at winterization time. Do your homework before you go on the boat and have a great time on the water. Boating can be a great experience and a source of pleasure. Just remember to use the services of a quality dealer to make the process smoother when buying and check the used Boat Alert history by checking the HIN. You may also want to read the boat safety tips for people boating with children. Printable boating checklist - Do a general cleaning of hull, deck and topsides using a mild detergent - Make sure drains and scuppers are clear - Put on a good coat of wax - Clean and polish metal with a good metal polish - Clean teak and oil - Clean windows and hatches - Clean canvas, bimini and dodger - Clean interior including bilges - Check spare parts and tools and replace as necessary - Make sure registration is current and onboard - Check and replace wiper blades if necessary - Check for hull abrasions, scratches, gouges, etc. and repair - Check and replace zincs - Check for blisters and refinish is necessary - Check rub rails - Check swim platform and/or ladder - Inspect and test trim tabs - Check shaft, cutlass bearing, strut and prop - Check rudder and fittings - Touch up or replace antifouling paint - Check stanchion, pulpits and lifelines for integrity - Check ground tackle, lines, fenders, etc. - Check chainplates and cleats - Check hull/deck joint - Check deck, windows, and port lights for leaks - Inspect anchor windlass and lubricate - Clean and grease winches - Check and lubricate blocks, pad eyes, etc. - Check dinghy, and life raft - Check, test and lubricate seacocks - Check condition of hoses and clamps - Make sure below waterline hoses are double clamped - Check bilges pumps for automatic and manual operation - Check for oil in bilges - Check limber holes and make sure they are clear of debris ELECTRICAL SYSTEM AND COMPONENTS: - Check battery water level - Check/recharge batteries - Check terminals for corrosion, clean and lubricate - Check bonding system - Inspect all wiring for wear and chafe - Test all gauges for operability - Check shore power and charger - Check for spare fuses - Check all lighting fixtures (including navigation lights) and make sure you have spare bulbs - Check all electronics for proper operation - Inspect antennas REQUIRED AND RECOMMENDED EQUIPMENT: - Sound signaling device - Check distress signals and expiration date - Check Pfds - Inspect life rings and cushions - Check fire extinguishers and recharge if necessary - Check and adjust compass - Check navigation lights - Check charts and replace as necessary - Check radar reflector - Check and replace first aid supplies - Check bailer and hand pump - Change oil & filters – have spare onboard - Check and change fuel filters – have spares onboard - Check and change engine zincs - Check cooling system change coolant as necessary – have extra onboard - Record engine maintenance log, especially date & hours of last oil changes - Check belts for tension - Check transmission fluid - Check and clean backfire flame arrestor - Check impeller - Check and clean water strainer - Check bilge blower - Checked for smooth operation – lubricate and clean as necessary - If equipped with treatment system, have chemicals on hand - Y-valve operation checked, valve labeled & secured - Flush water tank - Check water system and pump for leaks and proper operation - Check hot water tank working on both AC and engines - Check for tank cap keys on board - Check and clean shower sump pump screens - Fill propane tank, check electric & manual valves, check storage box vent to make sure it is clear - Check refrigerator, clean and freshen, operate on AC and DC - Clean stove, check that all burners and oven are working - Check microwave, if fitted - Replace spark plugs - Check plug wires for wear - Check prop for nicks and bends - Change/fill gear lube - Inspect fuel lines, primer bulb and tank for leaks - Lubricate and spray moveable parts - Check for current registration - Check rollers and pads - Check and lubricate wheel bearings - Clean and lubricate winch - Lubricate tongue jack and wheel - Test lights and electrical connections - Check tire pressure and condition - Check brakes (if equipped) - Check safety chains - Check tongue lock - Check general condition - Look for wear and chafing - Check battens and batten pockets MAST AND RIGGING: - Check mast and spreaders for corrosion or damage - Inspect spreader boots and shrouds - Inspect rivets and screw connections for corrosion - Check reefing points and reefing gear - Clean sail track - Check rigging, turnbuckles and clevis pins for wear and corrosion - Inspect stays for fraying and “fish hooks” - Check forestay and backstay connections - Check masthead fitting and pulleys - Check and lubricate roller furling - Check halyards and consider replacing or swapping end for end - Tape turnbuckles, cotter pins, and spreaders Read Related Articles: - Missouri Boat Registration - The Walkaround Boat | Overview of Walkaround Boats - South Carolina Boat Registration - Oregon Boat Registration - Used Boats: Water Intrusion and Moisture Meters Categories:To learn more about Boat-Alert.com History Reports for used boats and best boat history report reviews visit: www.Boat-Alert.com
<urn:uuid:18c2628d-0779-4a5e-8767-f2899cc57e37>
CC-MAIN-2022-33
https://www.boat-alert.com/blog/check-for-these-boat-problems-before-a-boat-trip/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00465.warc.gz
en
0.90258
2,273
1.585938
2
UL Ext.: Builds a connection string for opening a connection to an UltraLite database. The frequently-used connection parameters are individual properties on the ULConnectionParms object. Public Class ULConnectionParms public class ULConnectionParms : A ULConnectionParms object is used to specify the parameters for opening a connection (ULConnection.Open) or dropping a database (ULDatabaseManager.DropDatabase). Leading and trailing spaces are ignored in all values. Values must not contain leading or trailing spaces, or a semicolon (;), or begin with either a single quote (') or a double quote ("). When building a connection string, you need to identify the database and specify any optional connection settings. Once you have supplied all the connection parameters by setting the appropriate properties on a ULConnectionParms object, you create a connection string using the ULConnectionParms.ToString. The resulting string is used to create a new ULConnection with the ULConnection(String) constructor or set the ULConnection.ConnectionString of an existing ULConnection object. Identifying the database Each instance contains platform-specific paths to the database. Only the value corresponding to the executing platform is used. For example, in the code below the path \UltraLite\mydb1.udb would be used on Windows CE, while mydb2.db would be used on other platforms. ' Visual Basic Dim dbName As ULConnectionParms = new ULConnectionParms dbName.DatabaseOnCE = "\UltraLite\mydb1.udb" dbName.DatabaseOnDesktop = "somedir\mydb2.udb" // C# ULConnectionParms dbName = new ULConnectionParms(); dbName.DatabaseOnCE = "\\UltraLite\\mydb1.udb"; dbName.DatabaseOnDesktop = @"somedir\mydb2.udb"; The recommended extension for UltraLite database files is .udb. On Windows CE devices, the default database is \UltraLiteDB\ulstore.udb. On other Windows platforms, the default database is ulstore.udb. In C#, you must escape any backslash characters in paths or use @-quoted string literals. If you are using multiple databases, you must specify a database name for each database. For more informaton, see the AdditionalParms property. Optional connection settings Depending on your application's needs and how the database was created, you might need to supply a non-default ULConnectionParms.UserID and ULConnectionParms.Password, a database ULConnectionParms.EncryptionKey, and the connection ULConnectionParms.CacheSize. If your application is using multiple connections, you should provide a unique ULConnectionParms.ConnectionName for each connection. Databases are created with a single authenticated user, DBA, whose initial password is sql. By default, connections are opened using the user ID DBA and password sql. To disable the default user, use the ULConnection.RevokeConnectFrom. To add a user or change a user's password, use the ULConnection.GrantConnectTo. If an encryption key was supplied when the database was created, all subsequent connections to the database must use the same encryption key. To change a database's encryption key, use the ULConnection.ChangeEncryptionKey. For more information, see UltraLite Connection String Parameters Reference.
<urn:uuid:bea07269-32cb-45d2-a514-58ef40db6b8d>
CC-MAIN-2017-04
http://dcx.sap.com/1001/en/uldnen10/dn-ulconnectionparms.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00163-ip-10-171-10-70.ec2.internal.warc.gz
en
0.650173
723
2.15625
2
psychresearch March 11, 2010 at 05:10:44 Specs: Windows Vista Home Premium My computer is 2 years old and I use it mostly to do research - so i don't play online games etc. Yet there are moments when the fans just seem to rev up out of the blue and it sounds like the whole thing is just going to take off! I have also noticed that some web sites seem to cause the fan to rev up more than others. Any suggestions to what might be wrong? The information on Computing.Net is the opinions of its users. Such opinions may not be accurate and they are to be used at your own risk. Computing.Net cannot verify the validity of the statements made on this site. Computing.Net and Purch hereby disclaim all responsibility and liability for the content of Computing.Net and its accuracy.
<urn:uuid:c101bf9d-d354-4200-b554-272451e874a9>
CC-MAIN-2017-04
http://www.computing.net/answers/hardware/fan-revs-up-to-very-high-speeds/64698.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00031-ip-10-171-10-70.ec2.internal.warc.gz
en
0.946996
177
1.796875
2
King John (play) The Life and Death of King John, a history play by William Shakespeare, dramatises the reign of John, King of England (ruled 1199–1216), the son of Henry II of England and Eleanor of Aquitaine and the father of Henry III of England. It is believed to have been written in the mid-1590s, but it was not published until 1623, when it appeared in the First Folio. King John receives an ambassador from France who demands with a threat of war that he renounce his throne in favour of his nephew, Arthur, whom the French King Philip believes to be the rightful heir to the throne. John adjudicates an inheritance dispute between Robert Faulconbridge and his older brother Philip the Bastard, during which it becomes apparent that Philip is the illegitimate son of King Richard I. Queen Eleanor, mother to both Richard I and John, recognises the family resemblance in Philip and suggests that he renounce his claim to the Faulconbridge land in exchange for a knighthood. John knights Philip the Bastard under the name Richard. In France, King Philip and his forces besiege the English-ruled town of Angers, threatening attack unless its citizens support Arthur. Philip is supported by Austria, who many characters believe killed Richard I. The English contingent arrives. Eleanor then trades insults with Constance, Arthur's mother. Kings Philip and John stake their claims in front of Angers' citizens, but to no avail: their representative says that they will support the rightful king, whoever that turns out to be. The French and English armies clash, but no clear victor emerges. Each army dispatches a herald claiming victory, but Angers' citizens continue to refuse to recognize either claimant because neither army has proven victorious. Philip the Bastard proposes that England and France unite to punish the rebellious citizens of Angers. The citizens suggest an alternative proposal: that Philip's son, Louis the Dauphin, should marry John's niece Blanche. The proposal would give John a stronger claim to the throne while Louis would gain territory for France. Though a furious Constance accuses Philip of abandoning Arthur, Louis and Blanche are married. Cardinal Pandolf arrives from Rome bearing a formal accusation that John has disobeyed the Pope and appointed an archbishop contrary to his desires. John refuses to recant, whereupon he is excommunicated. Pandolf pledges his support for Louis, though Philip is hesitant, having just established family ties with John. Pandolf brings him round by pointing out that his links to the church are older and firmer. War breaks out; Austria is beheaded by the Bastard in revenge for his father's death; and both Angers and Arthur are captured by the English. Eleanor is left in charge of English possessions in France, while the Bastard is sent to collect funds from English monasteries. John orders Hubert to kill Arthur. Pandolf suggests to Louis that he now has as strong a claim to the English throne as Arthur (and indeed John), and Louis agrees to invade England. Hubert is reluctant to harm Arthur. He releases him furtively. John's nobles urge Arthur's release. John agrees, but Hubert then tells him that Arthur is dead. The nobles, believing he was murdered, defect to Louis' side. Equally upsetting, and more heartbreaking to John, is the news of his mother's death, along with that of Lady Constance. The Bastard reports that the monasteries are unhappy about John's attempt to seize their gold. Hubert has a furious argument with John, during which he reveals that Arthur is still alive. John, delighted, sends him to report the news to the nobles. Arthur dies jumping from a castle wall. (It is open to interpretation whether he deliberately kills himself or just makes a risky escape attempt.) The nobles believe he was murdered by John, and refuse to believe Hubert's entreaties. John attempts to make a deal with Pandolf, swearing allegiance to the Pope in exchange for Pandolf's negotiating with the French on his behalf. John orders the Bastard, one of his few remaining loyal subjects, to lead the English army against France. While John's former noblemen swear allegiance to Louis, Pandolf explains John's scheme, but Louis refuses to be taken in by it. The Bastard arrives with the English army and threatens Louis, but to no avail. War breaks out with substantial losses on each side, including Louis' reinforcements, who are drowned during the sea crossing. Many English nobles return to John's side after a dying French nobleman, Melun, warns them that Louis plans to kill them after his victory. John is poisoned by a disgruntled monk. His nobles gather around him as he dies. The Bastard plans the final assault on Louis' forces, until he is told that Pandolf has arrived with a peace treaty. The English nobles swear allegiance to John's son Prince Henry, and the Bastard reflects that this episode has taught that internal bickering could be as perilous to England's fortunes as foreign invasion. King John is closely related to an anonymous history play, The Troublesome Reign of King John (c. 1589), the "masterly construction" the infelicitous expression of which led Peter Alexander to argue that Shakespeare's was the earlier play. E. A. J. Honigmann elaborated these arguments, both in his preface to the second Arden edition of King John, and in his 1982 monograph on Shakespeare's influence on his contemporaries. The majority view, however, first advanced in a rebuttal of Honigmann's views by Kenneth Muir, holds that the Troublesome Reign antedates King John by a period of several years; and that the skilful plotting of the Troublesome Reign is neither unparalleled in the period, nor proof of Shakespeare's involvement. Shakespeare derived from Holinshed's Chronicles certain verbal collocations and points of action.[e] Honigmann discerned in the play the influence of John Foxe's Acts and Monuments, Matthew Paris' Historia Maior, and the Latin Wakefield Chronicle, but Muir demonstrated that this apparent influence could be explained by the priority of the Troublesome Reign, which contains similar or identical matter.[f] Date and text The date of composition is unknown, but must lie somewhere between 1587, the year of publication of the second, revised edition of Holinshed's Chronicles, upon which Shakespeare drew for this and other plays, and 1598, when King John was mentioned among Shakespeare's plays in the Palladis Tamia of Francis Meres. The editors of the Oxford Shakespeare conclude from the play's incidence of rare vocabulary, use of colloquialisms in verse, pause patterns, and infrequent rhyming that the play was composed in 1596, after Richard II but before Henry IV, Part I. King John is one of only two plays by Shakespeare that are entirely written in verse, the other being Richard II. The earliest known performance took place in 1737, when John Rich staged a production at the Theatre Royal, Drury Lane. In 1745, the year of the Jacobite rebellion, competing productions were staged by Colley Cibber at Covent Garden and David Garrick at Drury Lane. Charles Kemble's 1823 production made a serious effort at historical accuracy, inaugurating the 19th century tradition of striving for historical accuracy in Shakespearean production. Other successful productions of the play were staged by William Charles Macready (1842) and Charles Kean (1846). Twentieth century revivals include Robert B. Mantell's 1915 production (the last production to be staged on Broadway) and Peter Brook's 1945 staging, featuring Paul Scofield as the Bastard. In the Victorian era, King John was one of Shakespeare's most frequently staged plays, in part because its spectacle and pageantry were congenial to Victorian audiences. King John, however, has decreased in popularity: it is now one of Shakespeare's least-known plays and stagings of it are very rare. It has been staged four times on Broadway, the last time in 1915. It has also been staged five times from 1953 to 2014 at the Stratford Shakespeare Festival. Herbert Beerbohm Tree made a silent film version in 1899 entitled King John. It is a short film consisting of the King's death throes in Act V, Scene vii and is the earliest surviving film adaptation of a Shakespearean play. King John has been produced for television twice: in 1951 with Donald Wolfit and in 1984 with Leonard Rossiter as part of the BBC Television Shakespeare series of adaptations. George Orwell specifically praised it in 1942 for its view of politics: "When I had read it as a boy it seemed to me archaic, something dug out of a history book and not having anything to do with our own time. Well, when I saw it acted, what with its intrigues and doublecrossings, non-aggression pacts, quislings, people changing sides in the middle of a battle, and what-not, it seemed to me extraordinarily up to date." Selected recent revivals The Royal Shakespeare Company based in Stratford-upon-Avon presented three productions of King John: in 2006 directed by Josie Rourke as part of their Complete Works Festival, in 2012 directed by Maria Aberg who cast a woman, Pippa Nixon, in the role of the Bastard, and in 2020, directed by Eleanor Rhode and with a woman, Rosie Sheehy, cast in the role of King John. The company's 1974–5 production was heavily rewritten by director John Barton, who included material from The Troublesome Reign of King John, John Bale's King Johan (thought to be Shakespeare's own sources) and other works. In 2008, the Hudson Shakespeare Company of New Jersey produced King John as part of their annual Shakespeare in the Parks series. Director Tony White set the action in the medieval era but used a multi-ethnic and gender swapping cast. The roles of Constance and Dauphin Lewis were portrayed by African American actors Tzena Nicole Egblomasse and Jessie Steward and actresses Sharon Pinches and Allison Johnson were used in several male roles. Another notable departure for the production is the depiction of King John himself. Often portrayed as an ineffectual king, actor Jimmy Pravasilis portrayed a headstrong monarch sticking to his guns on his right to rule and his unwillingness to compromise became the result of his downfall. New York's Theater for a New Audience presented a "remarkable" in-the-round production in 2000, emphasising Faulconbridge's introduction to court realpolitik to develop the audience's own awareness of the characters' motives. The director was Karin Coonrod. In 2012, Bard on the Beach in Vancouver, British Columbia put on a production. It was also performed as part of the 2013 season at the Utah Shakespeare Festival, recipient of America's Outstanding Regional Theatre Tony Award (2000), presented by the American Theatre Wing and the League of American Theatres and Producers. The play was presented at Shakespeare's Globe, directed by James Dacre, as part of the summer season 2015 in the 800th anniversary year of Magna Carta. A co-production with Royal & Derngate, this production also played in Salisbury Cathedral, Temple Church and The Holy Sepulchre, Northampton. The Rose Theatre, Kingston upon Thames, Surrey hosted Sir Trevor Nunn's direction of the play during May and June 2016, in the quatercentenary year of Shakespeare's death and the 800th anniversary year of King John's death. The Worcester Repertory Company staged a production of the play (directed by Ben Humphrey) in 2016 around the tomb of King John in Worcester Cathedral on the 800th anniversary of the King's death. King John was played by Phil Leach.[failed verification] - Appears variously in the Folio of 1623 as Elinor, Eleanor, Ele., Elea., and Eli. Contemporary editors unanimously prefer the form Eleanor. - The First Folio uses the spelling "Britaine", which it also uses in Cymbeline where it means "Britain". - The First Folio normally refers to him as the "Dolphin", which is a literal translation of the French title "Dauphin". - Braunmuller, following Wilson, rejects his identification with Hubert de Burgh on the basis of the exchange at 4.3.87–89. 'BIGOT: Out, dunghill! Dar'st thou brave a nobleman?' 'HUBERT: Not for my life; but yet I dare defend / My innocent life against an emperor'. - Although the author of the Troublesome Reign also drew upon Holinshed's work, the appearance in King John of material derived from Holinshed but unexampled in the other play suggests both authors independently consulted the Chronicles. - With the exception of Eleanor's dying on 1 April, which Muir argues was derived not from the Wakefield Chronicle, as Honigmann had argued, but from the conjunction of Eleanor's death and a description of an inauspicious celestial omen on 1 April on a particular page of Holinshed. - William Shakespeare. King John. Arden Shakespeare Third Series edited by Jesse M. Lander and J.J.M. Tobin, Bloomsbury, 2018, 65–102 - Braunmuller (2008), p. 117. - Jowett (2005), p. 426. - Beaurline (1990), p. 60. - Honigmann (1965), p. 3. - Braunmuller (2008), p. 277, fn 2. - Jowett (2005), p. 446. - William Shakespeare. King John. Arden Shakespeare Third Series edited by Jesse M. Lander and J.J.M. Tobin, Bloomsbury, 2018, 165 - Tillyard (1956), p. 216. - Alexander (1929), pp. 201 ff. - Honigmann (1983), p. 56. - Alexander (1961), p. 85. - Alexander (1929), cited in Honigmann (1983) and in Alexander (1961). - Honigmann (1965), pp. xviii ff.. - Honigmann (1983), pp. 56–90. - Muir (1977), pp. 78–85. - Braunmuller (2008), p. 12. - Honigmann (1965), p. xiii. - Honigmann (1965), pp. xiii–xviii. - Muir (1977), p. 82. - Braunmuller (2008), p. 2. - Wells (1987), p. 100. - Wells (1987), p. 101. - Wells (1987), p. 107. - Wells (1987), p. 119. - Dickson (2009), p. 173. - League, The Broadway. "King John – Broadway Show". www.ibdb.com. Retrieved 21 March 2018. - Stratford Shakespeare Festival production history - Holderness (2002), p. 23. - Billington, Michael (4 August 2006). "King John Swan, Stratford-upon-Avon". The Guardian. - Costa, Maddy (16 April 2012). "RSC's King John throws women into battle Shakespeare lived in a man's world – but the RSC is recasting his 'battle play' King John with women in the thick of the action". The Guardian. - Cousin, Geraldine (1994). King John. Manchester, England: Manchester University Press. pp. 64 et sec. ISBN 0719027535. - Curren-Aquino, edited by Deborah T. (1989). King John : new perspectives. Newark: University of Delaware Press. p. 191. ISBN 0874133378. |first1=has generic name (help) - "Chicago Shakespeare Theater: Production History". www.chicagoshakes.com. Retrieved 13 June 2022. - "THIS SUMMER ALL THE WORLD"S A STAGE Bard on the Boulevard Continues with 'King John'". Cranford Chronicle. 4 July 2008. - Brantley, Ben (21 January 2000). "King John". The New York Times. - Bevington, David; Kastan, David, eds. (June 2013). "King John on stage". Shakespeare: King John and Henry VIII. New York: Random House. - "Home". Bard on the Beach. Retrieved 21 March 2018. - Cavendish, Dominic (7 June 2015). "King John, Shakespeare's Globe, review: 'could hardly be more timely'". The Telegraph. Retrieved 24 June 2015. - "King John will be present for Shakespeare in the cathedral". Worcester News. Retrieved 4 May 2018. - Alexander, Peter (1929). Shakespeare's "Henry VI" and "Richard III". Cambridge. - Alexander, Peter (1961). Shakespeare's Life and Art. New York University Press. - Dickson, Andrew (2009). Staines, Joe (ed.). The Rough Guide to Shakespeare. Rough Guides (2nd ed.). London, UK. ISBN 978-1-85828-443-9. - Jowett, John; Montgomery, William; Taylor, Gary; Wells, Stanley, eds. (2005) . The Oxford Shakespeare: The Complete Works (2nd ed.). New York, NY: Oxford University Press. ISBN 0-19-926718-9. - Holderness, Graham; McCullough, Christopher (2002) . "Shakespeare on the Screen: A selective filmography". In Wells, Stanley (ed.). Shakespeare Survey. Vol. 39. Cambridge University Press. ISBN 0-521-52377-X. - Honigmann, E.A.J. (1983) . Shakespeare's Impact on his Contemporaries. Hong Kong: The Macmillan Press Ltd. ISBN 0-333-26938-1. - Hunter, G.K. (1997). English Drama 1586–1642: The age of Shakespeare. The Oxford history of English Literature. Oxford, UK: Clarendon Press. ISBN 0-19-812213-6. - McMillin, Scott; MacLean, Sally-Beth (1999) . The Queen's Men and Their Plays. Cambridge University Press. ISBN 0-521-59427-8. - Muir, Kenneth (1977). The Sources of Shakespeare's Plays. London: Methuen & Co Ltd. ISBN 0-416-56270-1. - Shakespeare, William (1965) . Honigmann, E.A.J. (ed.). King John. Welwyn Garden City: Methuen & Co. Ltd. - Shakespeare, William (1990). Beaurline, L.A. (ed.). King John (The New Cambridge Shakespeare). Cambridge University Press. ISBN 978-0-521-29387-7. - Shakespeare, William (2008) . Braunmuller, A. R. (ed.). The life and death of King John. Oxford World's Classics. New York, NY: Oxford University Press. ISBN 978-0-19-953714-3. - Tillyard, E.M.W. (1956) . Shakespeare's History Plays. London, UK: Chatto & Windus. - Wells, Stanley; Taylor, Gary; Jowett, John; Montgomery, William (1987). William Shakespeare: a textual companion. New York, NY: Oxford University Press. ISBN 0-19-812914-9.
<urn:uuid:9621d216-13f5-4f42-a6f3-c73dbb45c740>
CC-MAIN-2022-33
https://en.wikipedia.org/wiki/King_John_(play)
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00673.warc.gz
en
0.911206
4,288
3.828125
4
Burt Humburg posted Entry 3012 on March 25, 2007 04:22 PM. Trackback URL: http://www.pandasthumb.org/cgi-bin/mt/mt-tb.fcgi/3002 During my time in Kansas Citizens for Science, I was privileged to work with science supporters of all walks of life as I developed flyers and pamphlets on evolutionary topics or criticizing aspects of the intelligent design creationism movement. When some ID creationism speaker would come to town, KCFS would be there, passing out flyers that informed the audience what they would be hearing from the creationist and why it was wrong or disingenuous. (When Phillip Johnson came to Lawrence, it was fun to see everyone in the hall reading our brightly colored pamphlets prior to his talk. Everything he said, we already had written down in our pamphlets.) I’m now out in Pennsylvania. While KCFS is still going strong (and about to host Monkey Girl author Edward Humes’s lecture at JCCC this Thursday), one thing I have missed from KCFS is the availability of easy-to-find pamphlets or flyers on ID creationism or evolution. I’d like to fix that. So, I’ve updated “A Word About Intelligent Design Creationism.” Its text appears below as the extended entry as well as in PDF and RTF formats. Please feel free to adopt the text of this flyer to your own purposes, though appropriate attribution with a plug for the Thumb would be appreciated. I’ve added a new “Category” of Flyers/Pamphlets under which we’ll hopefully amass quite a library of pro-science literature broadsides and pamphlets. Alternatively, if you have flyers that you’ve made, let us know via comments below. (We might be able to make those available here or on other archive sites as well.) A Word About Intelligent Design Creationism By Burt Humburg Intelligent Design Creationism (IDC) has emerged as an attempt to integrate science and religion. But is there any scientific evidence for IDC or reason to alter science to suit it? And what are the theological implications of IDC? This flyer examines IDC and its relationship to science and religion. Evolution, or the process of descent with modification, has been shown to elegantly explain and predict findings that relate to speciation and general biology. Evolution provides the basis for almost all biomedical research, allowing human drugs to be developed in mice and so on. Also, evolutionary concepts, when applied more broadly, have proven useful in explaining and predicting observations in geology, anthropology, and other fields unrelated to general biology directly. For this reason, scientists consider evolution to be a workhorse of a theory worthy of the title “The integrating theory of biology.” Evolution was validated over a century ago and it continues to be validated today whenever scientists describe findings that make the most sense (or that only make sense) from an evolutionary perspective. While there are creationists that dispute the legitimacy of this evidence, this flyer will not attempt to argue against them. Contemporary anti-evolutionary arguments purport to agree with most of evolution, but suggest that it is insufficient to explain all of biological diversity. IDC advocates appeal to the actions of an unnamed agent, typically called an Intelligent Designer, to account for things they feel evolution can’t. (Almost all IDC advocates believe this mysterious designer to be the Christian God, though they continue to use vague terms in order to skirt the Constitution or leave the impression that they are not discussing religion.) So what is IDC and “Teach the Controversy?” IDC advocates operate under the assumption that natural processes cannot fully account for natural phenomena. They survey current science, find those areas that are poorly understood currently, and conclude (or oftentimes simply argue) that science never will be able to understand those areas. Since God can do anything, IDC advocates point to these poorly understood areas as places where God must have intervened. This is problematic because any phenomenon could be explained by God’s involvement and no phenomenon or data could ever disprove God. For example, IDC advocates appeal to mutually exclusive manifestations of the IDC creator: that life arose because it is so improbable (e.g., CSI, described below) and that life arose because it is just so likely (e.g., “Privileged Planet,” described elsewhere). In order for scientists to use a hypothesis to explain or predict findings from the observable and testable “natural” world, the proposed hypothesis must be cohesive and predictive of a pattern. Since IDC appeals essentially to the whimsy of a designer, and especially since IDC advocates are usually at pains to avoid saying just who this designer is, it therefore becomes clear that there is no theory of IDC. Rather, IDC exists only as a criticism of evolution or the accepted processes of science in general. Because there is no testable model proposed by IDC, it cannot be science and it is therefore inappropriate to teach IDC alongside or instead of science in public school classrooms. It is for this reason that IDC advocates have shifted their tactics from arguing in favor of teaching IDC to “Teaching the Controversy.” As Judge Jones wrote in his Kitzmiller trial opinion, IDC’s backers have sought to avoid scientific scrutiny by advocating that the controversy, but not IDC itself, should be taught in science class. The goal of the movement, as he noted, is not to encourage critical thought, but to replace evolution with IDC. IDC is a Useless Idea The IDC logic essentially holds that if something cannot be explained by natural (observable and testable) means, this would be evidence of an intelligent designer. Notably, all IDC advocates concede the utility of explaining things by natural means in science. Phillip Johnson makes this point clearly, since he is only interested in phenomena that have “God’s fingerprints all over them.” William Dembski explicitly states that IDC explanations are to be advanced only after natural explanations have failed. But this gives away the game: natural explanations must be preferable to supernatural ones! Further, a poorly understood area of science that will never be understood is indistinguishable from a poorly understood area of science that someday will be understood. Since the former are the evidences of the designer that IDC backers supposedly seek, IDC’s logic will be unable to say anything with certainty regarding what the designer did in this world until the day when science has discovered as much as it can possibly discover forevermore. There are many examples of IDC advocates who have given up on the accepted processes of science too early. (Google “Behe whale” sometime.) Therefore, IDC is useless. What About Behe’s “Irreducible Complexity?” Irreducible Complexity (IC) is advanced as evidence for IDC in science. Advocates believe IC demonstrates certain complex and/or interdependent structures or systems that evolution – a process that uses functional or intermediate steps – could not have constructed. Unfortunately for Behe, in order to claim that IC is evidence against a gradualistic evolutionary ascent, the evolution of a complex system must be the opposite of its dismantlement. As the reader will see, it is not. There are many systems of apparent irreducible complexity that have obvious intermediate stages. For example, when framing a house, if a single wall is raised, that wall will stand only so long as it is supported. Rather than holding it, a builder might temporarily support the wall with an anchoring beam. In this fashion, all four walls could be raised and connected to each other, making the structure self-supporting and making the supportive role of the anchoring beams redundant to the function of the joined walls. If those beams were removed, the system would become IC, since the removal of a single wall might compromise the complex and interdependent function of the whole. This is proof of principle that IC is unreliable evidence that a structure could have had no intermediate stages. In point of fact, evolution gives rise to irreducible complexity all the time. Indeed, IC can be predicted to arise whenever a part or a function is added to a system and subsequently made necessary. Examples on the TalkOrigins website describe IC structures that arose from the addition of parts, the subtraction of parts, and the co-optation of parts into new functions. In particular, the evolutionary ascent of the C3 protein in the complement system – a system which Behe said is irreducibly complex – is reviewed. What About Dembski’s Complex, Specified Information (CSI)? William Dembski tries to use probability and information theory to demonstrate that random processes cannot produce the special and complex patterns of genetic code required for life as we know it. Unfortunately, he misappropriates information theory and its attendant theoretical treatments of entropy to arrive at his conclusion. Thus, Dembski recapitulates the violation of the second law of thermodynamics arguments for which young earth creationists are so well known. He is also wrong in principle. By arguing that the specific genetic code could not have appeared, Dembski misses the point of evolution, which has always been focused on the function a gene provides: the selective pressures of evolution operate on the products of genes and gene functions, not the genetic codes giving rise to functions. Dembski’s pretense is to distract people by claiming the ascent of the “information” in those codes represents an insurmountable obstacle for evolution, even though Darwin’s theory was considered compelling even back when it was articulated without any understanding of genetics or codes at all. Moreover, probabilistic treatments of genetic code are obviously irrelevant to any model of evolution in which the transitional nature of the evolutionary process – that later states are achieved via modifications of previous states – are ignored, like Dembski’s. But where Dembski really blunders is in the real world. His verbiage on the impossibility of spontaneous information formation becomes impotent when one sees that very thing occurring in the wild or in the lab. Cheng, in 1998, described the evolution of diverse antifreeze proteins in Antarctic fish, one of which was co-opted from a digestive enzyme called trypsinogen. Copley, in 2000, described the evolution of PCB-digesting bacteria. Since PCB is a “xenobiotic” that is not found in nature but made only by humans, this is evidence of recent evolution. Examples like these look for all the world like genetic information being created through evolution. If they are not, then Dembski needs to be doing a much better job of explaining what the “information” evolution supposedly cannot give rise to is and why his concerns are relevant to biology. They certainly appear irrelevant today. IDC Can Sabotage Science Science is fundamentally a system of discovery. When scientists see something they cannot explain, they formulate a hypothesis that explains what they saw and then they test that hypothesis. If it survives those tests, it could explain and predict other hypotheses, forming a theory from which to build other hypotheses. The danger of IDC is that it can substitute supernatural explanations that can never be tested and do not predict other findings in the place of natural hypotheses that can be tested and do predict other findings. (A direct intervention by God may possibly “explain” but it does not predict other interventions, nor is it testable. One cannot put God in a test tube, nor can one keep him out.) As a fanciful example, take two scientists who travel to St. Louis, neither of whom knows much about construction and one of whom uses IDC thinking instead of science. As these two scientists gaze upon the arch, both are astonished and they both attempt to explain how the arch was constructed. As neither of our two scientists knows about the use of scaffolding to support an eventually self-supporting structure while it is being created, our scientists are left without natural explanations for how the arch came to be. The scientist who falls prey to IDC thinking might conclude that, since humans cannot create such structures as a whole and since the arch is clearly the product of design, God must have built the St. Louis arch. Of course, this conclusion would seem silly to most readers and possibly insulting to IDC advocates, since most readers would know about scaffolding and all would know humans created the arch. But to understand the example, one must enter into the mindset of a person investigating a problem for which there is no current scientific understanding. IDC advocates have appealed to the actions of an Intelligent Designer to explain the Cambrian Explosion, the ascent of whales evolving, and the origin of life. The reader is asked to substitute any “challenge to evolution” the proponents of “Teach the Controversy” wish to advance in place of the arch. (The only difference will be, in the examples of “controversy” creationists today will advance, a scientific explanation for the phenomenon in question probably will not yet be known.) Clearly, the scientist who suffers from IDC thinking reached an inappropriate conclusion. Easily, one danger of IDC thinking is that it can support bad explanations for phenomena with untestable “evidence.” However, incorrect hypotheses are advanced and corrected often in science, so this is not a prominent danger. The real threat is that the question of the arch’s construction has now been answered (God did it) in a way that sabotages further inquiry. Why investigate further if the question has been answered? Why investigate further if to do so might be considered to detract from God? Obviously, explaining the creation of the arch by a one-time act of an undefined and unknown omnipotent agent (God) does not predict other natural findings and has no application to other natural problems. We might imagine our IDC-thinking scientist will remain yet ignorant of the secret of the arch’s construction since he has no reason to investigate or innovate it. The scientist who does not fall prey to IDC thinking would attack his problem differently. He might consult literature on construction, learn about scaffolds and their use, and go on to apply scaffolding technology to other problems he might encounter in the future. If there were no previous work on scaffolding, he might attempt to construct a model of the arch and, in trying to build it, innovate scaffolding technology and advance the state of the art of construction for everyone. But if the technologies to even think of scaffolding were not yet invented – say, the ladders to build the scaffolds were not invented – and if the scientist had honestly reached the limits of his creativity in trying to explain the arch’s construction, our heroic scientist would simply say, “I don’t know how it was built.” The difference between our two scientists is at once subtle and vital. Neither scientist knows how the arch was constructed, but one fills the void of ignorance with a hypothesis that explains everything and sabotages the process of discovery. The other scientist does not substitute an unfalsifiable explanation for his ignorance, but accepts his inability to answer the question for the time being. The fact is, good scientists must often deal with their inability to answer a question. They are not satisfied by it and should continue to innovate and discover in order to someday answer the question – but they do accept their ignorance for the time being. Poor scientists are those who must fill all voids of ignorance with whatever concepts are available, however inappropriate. IDC, as an explanation that cannot be tested by natural science, is an example of an inappropriate non-natural answer to a perfectly natural, scientific problem. Naturalism and the Theological Implications of IDC Science is the search for progressively better natural explanations for phenomena. In other words, a scientist is a person who uses a naturalistic methodology to look for understandings that can be used to explain other findings or predict other observations. The reason for the commitment to the natural world – a naturalistic methodology – is not because science is scornful of God but because natural explanations are the only things on which everyone can agree. (Supernatural explanations, on the other hand, are revealed, internal, and personal.) Science pursues truth within very narrow limits. Inside those limits, it has proven extraordinarily successful, far more so than when “science” was not so constrained – a period of stagnated scientific advancement known as “The Dark Ages.” But science cannot answer all questions and many theists hold that science and religion are complementary, provided religion does not attempt to contradict the explanations that science successfully provides. IDC is one attempt to integrate science and religion, but it is a poor one. As demonstrated above, IDC can sabotage the process of inquiry and the “evidence” supporting God’s involvement in the world is unreliable. There are also theological reasons to shun IDC. Since IDC exists where scientific understanding isn’t, IDC implies a God of the Gaps (GOTG) argument. As Miller has written in Finding Darwin’s God, GOTG arguments forge a logical link between failures in science and successes for God. The counterlogic of the GOTG proposition – that successes for science must therefore be failures for God – is therefore just as logical. Clearly, if one bases a belief in God on an inability to explain some natural phenomenon scientifically, that belief will be threatened by any pursuit of understanding of that phenomenon by science. A reverent GOTG believer would surely serve his beliefs best by refusing to further investigate the reasons for that phenomenon. GOTG therefore propagates the warfare model of science and religion. Clearly, the progress of science is relentless and religious scientists realized long ago that the foundations of their religious beliefs were best placed in a God that did not lurk in the shadows of our scientific understanding. In avoidance of that end, many religious scientists endorse theistic evolution, which unlike IDC posits that natural law can fully explain natural phenomena and that God used natural law as his tool to work his will. Theistic evolutionists acknowledge that there is no scientific reason to believe in God but instead rely on faith to know he exists. Realizing that science works best when committed to a naturalistic methodology, theistic evolutionists feel free to revere God in their work and recognize scientific explanations as expressions of God’s creative power. They know that science studies natural phenomena but religion studies ultimate creation and relationships with the Creator. What Can I Do To Keep Science Education Strong? If you are concerned about the quality of science in America and the menace that IDC is to that quality, learn evolution by visiting Panda’s Thumb [http://pandasthumb.org] and taking advantage of science instruction. But most grassroots-level IDC advocates do not understand the science enough to know how vacuous IDC is; some would not understand it even if it were presented to them. These people are instead motivated by considerations external to science, such as the fear that evolution will separate them from God or that God will punish them if they permit the teaching of evolution. But Christians have rethought their theology in the light of verified science many times before in history. It is therefore incumbent upon science advocates to engage these fearful people in an honest discussion about the real issues at hand regarding the science or theology involved. Because religion is important to Americans and because public schools cannot be counted upon to provide theological guidance to prevent anti-evolutionary fear, talk with parents and clergy in your area and encourage them to learn more about evolution. Consider joining or forming local pro-science groups like Kansas Citizens for Science [http://kcfs.org] or consider joining national pro-science groups like the National Center for Science Education [http://natcenscied.org]. Finally, vote. Groups like the Discovery Institute (DI) know that IDC isn’t science and therefore scientists will never find creationism useful. The DI therefore bypasses the process of scientific approval, recommending laws that force IDC into schools or proposing cuts in funding for labs that ignore non-science like IDC. Get involved, stay vigilant, check your own backyard, and make sure your leaders know why IDC is poor science and can defend real, natural science when the DI and their supporters call. Credits and Duplication Authorization Commenters are responsible for the content of comments. The opinions expressed in articles, linked materials, and comments are not necessarily those of PandasThumb.org. See our full disclaimer.
<urn:uuid:97d7b304-c386-4319-8c3a-6c551221efc9>
CC-MAIN-2016-44
http://www.pandasthumb.org/archives/2007/03/a_word_about_in.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719027.25/warc/CC-MAIN-20161020183839-00301-ip-10-171-6-4.ec2.internal.warc.gz
en
0.954155
4,288
1.953125
2
A new report says border patrol agents in Washington state routinely profile people of certain races and religions. The report released Tuesday by the University and Washington and immigrant advocates focuses on the U.S.-Canada border. KUOW’s Liz Jones reports. Researchers for this report spent the past year visiting trailer parks, migrant camps and apartment complexes across northern Washington. They collected more than 100 incident reports from immigrants about unusual interactions with border patrol. “Like calling 911 to get an ambulance and having the border patrol show up. You know, small things like that where you just think, ‘that doesn’t seem normal,'” says Ada Prince-Williams, with the immigrant rights group, One America. They partnered with the UW Center for Human Rights on this report. The report lays out what it calls a pattern of ethnic and religious profiling by border agents. Many immigrants interviewed describe how border patrol stopped and questioned them for no apparent reason. That happened outside of churches, schools and court houses. Border patrol along the northern border has dramatically expanded since 9/11. In northern Washington, the number of agents has shot up from about 50 to now more than 300. Prince-Williams says the increased surveillance and enforcement is cutting deep into immigrants’ lives. Prince-Williams: “They don’t go to church. You know, they only drive at night. They try to go to the store when it’s dark. They don’t do a lot in the daytime.” She says immigrants also resist calling police out of fear border agents will show up, too. Richard Sinks is a spokesman for the Border Patrol in Blaine. He explains local police often call in border patrol to help with Spanish translation. But the limitations are clear: “We will not arrest or even seek immigration status of a victim or a witness," he says. "We’re strictly there for translation in that type of request.” Sinks also says agents can walk up and talk to anyone in a public area. But agents generally stay away from sensitive places, like churches and schools, unless there’s an emergency. As for racial profiling, Sinks rejects that charge. He says agents must have clear reasons to stop someone for questioning. That can include erratic driving or if a person speaks with a foreign accent. “Terrorists are all sizes, colors, makes, they come from anywhere in the world," Sinks says. "So it would be counter-productive on our part to focus on one particular group or ethnicity.” The report authors are calling for changes in how border patrol operates. They want agents to stop serving as interpreters for local police. They also want a clear policy that restricts enforcement at churches, hospitals and other sensitive locations. Border patrol supervisors met with One America during the research for this report. Agent Sinks says they’re happy to continue that conversation about their practices and policies. Copyright 2012 KUOW
<urn:uuid:cb0e425c-e645-4307-b1bf-56c5bee40a32>
CC-MAIN-2017-04
http://nwpr.org/post/report-raises-human-rights-concerns-wash-canada-border
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00474-ip-10-171-10-70.ec2.internal.warc.gz
en
0.946897
618
1.773438
2
A Target executive is scheduled to testify Wednesday about a data breach affecting millions of customers, and plans to tell lawmakers the company had clues about the attack weeks before responding and is exploring why it took so long to react. After intruders entered Target’s systems on Nov. 12, some of their activities were detected and evaluated by security professionals, according to prepared remarks from Chief Financial Officer John Mulligan that were reviewed by Bloomberg. That was a month before the company was alerted to suspicious activity by the U.S. Justice Department, leading to an internal investigation that confirmed a breach on Dec. 15. “We are asking hard questions about whether we could have taken different actions before the breach was discovered,” Mulligan said in remarks to be made before a U.S. Senate panel. “In particular, we are focused on what information we had that could have alerted us to the breach earlier; whether we had the right personnel in the right positions; and ensuring that decisions related to operational and security matters were sound.” Molly Snyder, a spokeswoman for Minneapolis-based Target, declined to comment. The testimony follows a report by Bloomberg Businessweek that found Target ignored warnings from its hacker-detection tools, leading to a breach that compromised 40 million credit card numbers — along with 70 million addresses, phone numbers and other pieces of personal information. “We are still investigating how the intruders were able to move through the system using higher-level credentials to ultimately place malware on Target’s point-of-sale registers,” Mulligan said. “The malware appears to have been designed to capture payment card data from the magnetic strip of credit and debit cards prior to encryption within our system.” The Senate Committee on Commerce, Science and Transportation, which prepared a report ahead of the hearing, found that Target appears to have missed opportunities “to stop the attackers and prevent the massive data breach.” After the attack became public in December, during the height of the holiday shopping season, it harmed Target’s reputation and fourth-quarter sales. The company’s U.S. comparable-store sales decreased 2.5 percent in the period. Target spent $61 million responding to the situation last quarter, including costs to investigate the incident and offer identity-theft services to customers. Insurance covered $44 million of the tab, leaving the company with an expense of $17 million in the period. The company is now searching for a new chief information officer following the departure of Beth Jacob, who resigned March 5 after holding the post since 2008. The new executive will help revamp Target’s information-security and compliance operations. Target isn’t the only retailer to have had its systems attacked in the past year. Luxury department-store chain Neiman Marcus Group Ltd. said in January that about 1.1 million credit cards may have been compromised in a data breach. Days later, arts-and-crafts retailer Michaels Stores Inc. said some customer payment-card data may have been used fraudulently. Sears Holdings Corp. said last month that it was reviewing its systems to see whether it had been the victim of a breach.
<urn:uuid:b03ba037-92a1-4188-b7ed-69c450d22db6>
CC-MAIN-2017-04
http://www.twincities.com/2014/03/24/target-cfo-to-return-for-more-senate-testimony/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00342-ip-10-171-10-70.ec2.internal.warc.gz
en
0.972171
657
1.507813
2
By Bethany Blankley Several election-related bills are headed to Texas Gov. Greg Abbott's desk after being passed by both legislative chambers. One bill that passed, House Bill 574 filed by Rep. Greg Bonnen, R–Friendswood, creates two new classes of election fraud offenses: intentionally counting invalid votes and failing to count valid votes, making them second-degree felonies. The bill passed 24-6 in the Senate and 94-48 in the House. A second bill that passed, House Bill 2283, filed by Rep. Phil King, R–Weatherford, limits how funding is used to impact elections in Texas. It limits private donations made to county officials to be used to administer elections to $1,000 per donor unless otherwise approved by the secretary of state, governor, lieutenant governor, and speaker. King filed the bill after witnessing how Facebook CEO Mark Zuckerberg’s personal donations of roughly $400 million through nonprofit organizations like the Center for Tech and Civic Life influenced elections in Democrat-controlled counties nationwide, including Dallas and Harris counties. Money was given in the form of grants to distribute to local election officials in Democratic-run cities and “to combat disinformation” about the 2020 election. Dallas County received $15 million, the largest grant awarded, while Harris County received $9.6 million from Zuckerberg’s nonprofits. The bill passed the House by a vote of 96-50 and the Senate by a vote of 18-13. Another bill, Senate Bill 598, filed by Sen. Lois Kolkhorst, R–Brenham, received the most bipartisan support. It requires all Texas voting systems to produce auditable paper trails by September 2026. It also initiates risk-limiting audits and offers state funds to help counties buy or upgrade equipment. And it also clarifies that voting systems cannot connect to a wireless network or allow wireless communication. The bill unanimously passed the Senate and passed the House by a vote of 136-8. Two bills proposed by Sen. Paul Bettencourt, R–Houston, passed. Senate Bill 1111 requires voters to register their physical place of dwelling as their voter registration address, not at a post office box or commercial address. It also prohibits individuals from establishing residency to influence the outcome of an election. Bettencourt filed the bill after discovering that many voters registered at UPS stores and private mailboxes and cast votes where they did not physically live. The bill passed the Senate by a vote of 18-13 and passed the House by a vote of 81-65. Another Bettencourt bill, Senate Bill 1113 authorizes the secretary of state’s office to withhold state funding from county election officials who fail to follow rules for canceling registrations of ineligible voters. It passed the Senate by a vote of 20-11 and the House by a vote of 97-46. Lawmakers also passed a bill election integrity advocates oppose. House Bill 2149, which was incorporated as an amendment into another bill that passed, HB 3107, filed by Sen. Drew Springer, R–Muenster. It legalizes mobile voting or “rolling polling,” which a federal court ruled against last month. Despite the court’s ruling, Republican Rep. Travis Clardy of Nacogdoches proposed the measure, which allows a polling place to temporarily and repeatedly move from location to location during an early voting period instead of having one non-mobile location that everyone can access. It applies to rural counties with less than 100,000 residents. Critics note this applies to the majority of the state. More than 200 of Texas’ 254 counties have less than 100,000 residents. Clardy’s bill was added as an amendment to another bill filed by Sen. Drew Springer, R–Muenster. The bill allows rural counties to move temporary polling places every two days.
<urn:uuid:05be81c2-0a55-418d-8526-d0c849e7738d>
CC-MAIN-2022-33
https://www.highplainspundit.com/2021/06/several-election-bills-head-to-abbott.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00477.warc.gz
en
0.950008
798
1.757813
2
Oddesundbroen - Struer/Thyholm In 1935/38 this bridge was constructed by the DSB with one railway track and a two-lane road. The 490 m long bridge has a leaf of 30 m, three curves of approx. 70 m and six of approx 35 m. The leaf pier was renovated in 1991/92 with among other things a ferroconcrete enforcement, founded on long ferro piers. - News stand CoordinatesLongitude : 8.5577889999 Latitude : 56.57853
<urn:uuid:2b64fc14-a394-4f83-a757-d9211679739a>
CC-MAIN-2016-44
http://www.visitdenmark.com/denmark/oddesundbroen-struerthyholm-gdk606417
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719079.39/warc/CC-MAIN-20161020183839-00034-ip-10-171-6-4.ec2.internal.warc.gz
en
0.885761
117
1.671875
2
Two research groups are working to the same end where bone marrow is concerned, encourage bone cell growth, but they are using different strategies. University of British Columbia and McMaster University (Canada) The samples look a little like teeth, don’t they? Before diving into the research news, there’s a terminology issue that should be noted as you’ll see when you read the news/press releases. Nanocrystal cellulose/nanocrystalline cellulose (NCC) is a term coined by Canadian researchers. Since those early day, most researchers, internationally, have adopted the term cellulose nanocrystals (CNC) as the standard term. It fits better with the naming conventions for other nnanocellulose materials such as cellulose nanofibrils, etc. By the way, a Canadian company (CelluForce) that produces CNC retained the term nanocrystalline cellulose (NCC) as a trademark for the product, CelluForce NCC®. For anyone not familiar with aerogels, what the University of British Columbia (UBC) and McMaster University researchers are developing, are also popularly known known as ‘frozen smoke’ (see the Aerogel Wikipedia entry for more). A March 19, 2019 news item on ScienceDaily announces the research, Researchers from the University of British Columbia and McMaster University have developed what could be the bone implant material of the future: an airy, foamlike substance that can be injected into the body and provide scaffolding for the growth of new bone. It’s made by treating nanocrystals derived from plant cellulose so that they link up and form a strong but lightweight sponge — technically speaking, an aerogel — that can compress or expand as needed to completely fill out a bone cavity. “Most bone graft or implants are made of hard, brittle ceramic that doesn’t always conform to the shape of the hole, and those gaps can lead to poor growth of the bone and implant failure,” said study author Daniel Osorio, a PhD student in chemical engineering at McMaster. “We created this cellulose nanocrystal aerogel as a more effective alternative to these synthetic materials.” For their research, the team worked with two groups of rats, with the first group receiving the aerogel implants and the second group receiving none. Results showed that the group with implants saw 33 per cent more bone growth at the three-week mark and 50 per cent more bone growth at the 12-week mark, compared to the controls. “These findings show, for the first time in a lab setting, that a cellulose nanocrystal aerogel can support new bone growth,” said study co-author Emily Cranston, a professor of wood science and chemical and biological engineering who holds the President’s Excellence Chair in Forest Bio-products at UBC. She added that the implant should break down into non-toxic components in the body as the bone starts to heal. The innovation can potentially fill a niche in the $2-billion bone graft market in North America, said study co-author Kathryn Grandfield, a professor of materials science and engineering, and biomedical engineering at McMaster who supervised the work. “We can see this aerogel being used for a number of applications including dental implants and spinal and joint replacement surgeries,” said Grandfield. “And it will be economical because the raw material, the nanocellulose, is already being produced in commercial quantities.” The researchers say it will be some time before the aerogel makes it out of the lab and into the operating room. “This summer, we will study the mechanisms between the bone and implant that lead to bone growth,” said Grandfield. “We’ll also look at how the implant degrades using advanced microscopes. After that, more biological testing will be required before it is ready for clinical trials.” Here’s a link to and a citation for the paper, Cross-linked cellulose nanocrystal aerogels as viable bone tissue scaffolds by Daniel A. Osorio, Bryan E. J. Lee, Jacek M. Kwiecien, Xiaoyue Wang, Iflah Shahid, Ariana L. Hurley, Emily D. Cranston and Kathryn Grandfield. Acta Biomaterialia Volume 87, 15 March 2019, Pages 152-165 DOI: https://doi.org/10.1016/j.actbio.2019.01.049 This paper is behind a paywall Now for the Russian team. National University of Science and Technology “MISIS” (formerly part of the Moscow Mining Academy) These scientists have adopted a different strategy as you’ll see in the March 19, 2019 news item on Nanwerk, which, coincidentally, was published on the same day as the Canadian research, Scientists from the National University of Science and Technology “MISIS” developed a nanomaterial, which will be able to rstore the internal structure of bones damaged due to osteoporosis and osteomyelitis. A special bioactive coating of the material helped to increase the rate of division of bone cells by 3 times. In the future, it can allow to abandon bone marrow transplantation and patients will no longer need to wait for suitable donor material. A March 19, 2019 National University of Science and Technology (MISIS) press release (also on EurekAlert), which originated the news item, provides detail about the impetus for the research and the technique being developed, Such diseases as osteoporosis and osteomyelitis cause irreversible degenerative changes in the bone structure. Such diseases require serious complex treatment and surgery and transplantation of the destroyed bone marrow in severe stages. Donor material should have a number of compatibility indicators and even close relationship with the donor cannot guarantee full compatibility. Research group from the National University of Science and Technology “MISIS” (NUST MISIS), led by Anton Manakhov (Laboratory for Inorganic Nanomaterials) developed material that will allow to restore damaged internal bone structure without bone marrow transplantation. It is based on nanofibers of polycaprolactone, which is biocompatible self-dissolvable material. Earlier, the same research group has already worked with this material: by adding antibiotics to the nanofibers, scientists have managed to create non-changeable healing bandages. “If we want the implant to take, not only biocompatibility is needed, but also activation of the natural cell growth on the surface of the material. Polycaprolactone as such is a hydrophobic material, meaning, and cells feel uncomfortable on its surface. They gather on the smooth surface and divide extremely slow”, Elizaveta Permyakova, one of the co-authors and researcher at NUST MISIS Laboratory for Inorganic Nanomaterials, explains. To increase the hydrophilicity of the material, a thin layer of bioactive film consisting of titanium, calcium, phosphorus, carbon, oxygen and nitrogen (TiCaPCON) was deposited on it. The structure of nanofibers identical to the cell surface was preserved. These films, when immersed in a special salt medium, which chemical composition is identical to human blood plasma, are able to form on its surface a special layer of calcium and phosphorus, which in natural conditions forms the main part of the bone. Due to the chemical similarity and the structure of nanofibers, new bone tissue begins to grow rapidly on this layer. Most importantly, polycaprolactone nanofibers dissolve, having fulfilled their functions. Only new “native” tissue remains in the bone. In the experimental part of the study, the researchers compared the rate of division of osteoblastic bone cells on the surface of the modified and unmodified material. It was found that the modified material TiCaPCON has a high hydrophilicity. In contrast to the unmodified material, the cells on its surface felt clearly more comfortable, and divided three times faster. According to scientists, such results open up great prospects for further work with modified polycaprolactone nanofibers as an alternative to bone marrow transplantation. Here’s a link to and a citation for the paper, Bioactive TiCaPCON-coated PCL nanofibers as a promising material for bone tissue engineering by Anton Manakhov, Elizaveta S. Permyakova, Sergey Ershov, Alexander Sheveyko, Andrey Kovalskii, Josef Polčák, Irina Y. Zhitnyak, Natalia A. Gloushankova, Lenka Zajíčková, Dmitry V. Shtansky. Applied Surface Science Volume 479, 15 June 2019, Pages 796-802 DOI: https://doi.org/10.1016/j.apsusc.2019.02.163 This paper is behind a paywall.
<urn:uuid:792a3270-888a-434b-8e1c-c91c3d4b513b>
CC-MAIN-2022-33
https://www.frogheart.ca/?tag=celluforce
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.95/warc/CC-MAIN-20220817032054-20220817062054-00476.warc.gz
en
0.915497
1,903
3.03125
3
The Supreme Court of Missouri strives to serve justice and make the courts accessible to all, both by providing access to information in the Court and by opening the building and library to visitors of all ages and physical abilities. The Supreme Court was created in 1820, the year before Missouri officially became a state. Since the state's third constitution was adopted in 1875, the Supreme Court has been located in Jefferson City, the state's capital. In 1877, a building for the Supreme Court was constructed at a cost of $17,000 just east of the Capitol, where the state's department of transportation now is located. In 1905, using a portion of the proceeds from the 1904 World's Fair in St. Louis, the general assembly appropriated $400,000 to build the present Supreme Court Building. This three-story, red-brick building, which opened in October 1907, features French Renaissance architecture, stone pillars at each wing of the front façade, stone trim and a slate roof. Prominent in its lobby is a massive marble staircase. The building houses the offices of the Supreme Court clerk and the clerk’s staff, two courtrooms, the two-story high Supreme Court Library, and, by statute, the office of the state attorney general. When the building was designed, Supreme Court judges came from their hometowns around the state to Jefferson City three months out of the year to hear and decide cases. For that reason, their chambers included small apartment areas off each judge’s office. Today the judges hear cases nine or 10 months each year, and their chambers have been remodeled to accommodate their staff of two law clerks and an administrative assistant. Free half-hour tours of this historic building are available for the public and school or business groups at varying times during most business days. Particularly during the fall and spring, tour times fill quickly. Please call ahead or click the link in this paragraph to be sure that the time you want to tour is available. Observing Oral Arguments The Supreme Court also welcomes visitors to observe oral arguments, which normally are held from September through May and are scheduled for several days during each of those months. The arguments in most cases last about 30 minutes, although some cases – including death penalty cases – are given additional time for argument. For most argument sessions, four cases are scheduled. The Court prefers that visitors be seated in the courtroom before oral arguments begin. The courtroom in which oral arguments are held can accommodate up to 55 visitors. With at least 24 hours advance notice, additional seating can be provided in an auxiliary courtroom connected to the main courtroom via closed circuit television. To schedule a group to observe oral arguments, please contact the Supreme Court communications counsel, Beth Riggert, by calling (573) 751-4144 or by e-mailing firstname.lastname@example.org. The Court welcomes individuals with disabilities or other special needs to visit the building and observe oral arguments and will assist in making special accommodations for such visitors.
<urn:uuid:ca5e9b68-cc6b-4549-af2c-bf3ab5b9aff1>
CC-MAIN-2016-44
http://www.courts.mo.gov/page.jsp?id=100
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719646.50/warc/CC-MAIN-20161020183839-00128-ip-10-171-6-4.ec2.internal.warc.gz
en
0.960977
619
2.84375
3
WASHINGTON – Budget pressures at the Pentagon have renewed a debate about the value of the U.S. Navy’s giant aircraft carriers, with critics arguing the warships are fast becoming costly relics in a new era of warfare. With the Pentagon facing $500 billion in cuts over the next decade, a navy officer has dared to question the most treasured vessels in his service’s fleet, saying the supercarriers are increasingly vulnerable to new weapons and too expensive to operate. “After 100 years, the carrier is rapidly approaching the end of its useful strategic life,” wrote Capt. Henry Hendrix in a report published in March by the Center for a New American Security. Changes in naval warfare mean that carriers “may not be able to move close enough to targets to operate effectively or survive in an era of satellite imagery and long-range precision strike missiles,” Hendrix wrote. Under U.S. law, the military is required to maintain 11 aircraft carriers. Ten are currently in service after the retirement of the USS Enterprise, which is due to be replaced in 2017 with the USS Gerald Ford, the first of a new class of “big decks.” The new carrier carries a prohibitive price tag of $13.6 billion, double the cost of the last aircraft carrier. And that does not count the $4.7 billion spent on research and development for the new class of carriers. It costs about $6.5 million a day to operate a single carrier strike group, which includes five other warships, an attack submarine, an air wing of 80 fighters and helicopters, and a crew of 6,700. But Hendrix maintains the return on the investment is paltry. Each F/A-18 fighter in the carrier fleet has dropped roughly 16 bombs in 10 years of war, which works out to about $7.5 million for each bomb when all the costs of the aircraft are taken into account. Apart from the mushrooming cost, carriers are facing mounting dangers from increasingly sophisticated ship-killing missiles, skeptics say. U.S. strategists are fixated on China’s DF-21D missile, which they fear could potentially knock out a carrier and deprive the American fleet of its dominance on the high seas. Former Pentagon chief Robert Gates cited the antiship missiles and other high-tech weapons in a speech in 2010 in which he questioned whether it was worth spending billions on more carriers. “Do we really need 11 carrier strike groups for another 30 years when no other country has more than one?” Gates said. Advanced missiles and stealthy submarines “could end the operational sanctuary our navy has enjoyed in the Western Pacific for the better part of six decades,” said Gates, who referred to carriers as potential “wasting assets.” His remarks alarmed naval leaders, and the latest dissent has failed to dissuade most officers, who view the big decks as crucial and note that China is deploying its own carrier. Pete Daly, a retired vice admiral who once commanded the USS Nimitz carrier strike group, defended the ships as a vital element of U.S. military might. To hit deeply buried targets, fighter jets flying off a carrier were more effective than Tomahawk missiles, and knocking out a supercarrier is “very, very hard,” Daly said. As for China’s missiles, “it was an additional threat to take into account,” Daly said. But, he added, “the U.S. Navy is very aware of this and has plans to deal with it.” The cost of the carriers had to be compared with the huge funding required to protect and supply air bases and troops on land, as illustrated by the wars in Iraq and Afghanistan, he said. And the carriers could be ordered in without the political strain associated with a drawn-out ground war.
<urn:uuid:d8ac3d9a-be4e-4cfd-b15f-c80e92ef7542>
CC-MAIN-2017-04
http://www.japantimes.co.jp/news/2013/04/02/world/u-s-navys-carriers-costly-relics-of-the-past/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00306-ip-10-171-10-70.ec2.internal.warc.gz
en
0.963157
810
1.773438
2
If you’re operating a home or office printer, understanding how to refill printer ink cartridge can help improve on efficiency and save you potentially hundreds of dollars that could have gone into buying a new one. All you need is printer ink refill kits, which cost relatively less than a new cartridge, and some interest in DIY projects to pull this off. Typically, a refill kit will comprise of drill bits, needles, syringe, cartridge holder and vials of ink. And although the kit will look like something straight out of a laboratory, the refill process is not a rocket science affair provided you know what you’re doing. However, when we talk about refilling ink cartridges, we don’t mean the refillable ink tanks, but rather the regular cartridges often found on printers like the Epson label printers. Simple Tips on How to Refill Your Ink Cartridges The first step is to buy an ink refill kit after which you can go ahead and start preparing to refill. 1. Prepare Your Work Area Printer ink may form stubborn stains when left to dry on a garment or on furniture, therefore, it’s important to consider your working area. To do this, you need to place paper towels or newspapers which helps to absorb any accidental spills when refilling your cartridges. Although most printer inks can be easily cleaned off by water since they’re highly soluble. For insoluble inks, use alcohol or nail polish remover to wash off the spills before it drys. You can even test how the ink on a piece of garment or furniture to make sure it won’t form a lasting stain. Also, don’t forget to use a pair of plastic gloves to avoid ink smudging on your hands. 2.Locate or Poke a Hole in Your Cartridge Most cartridges are fitted with small ink vials and to access it you need to poke a small hole in the plastic stopper on the top of the cartridge — the top of the cartridge is often covered with a removable label sticker. Use the drill bits that come with the refill kit or improvise using a sharp object like a screwdriver. You’ll find some cartridges have multiple holes and others will have a hole ready for a refill, you just have to remove the label on top of the cartridge to access it. 3. Add the Ink With the hole ready, it’s time to add ink in the cartridge by inserting the syringe right into the hole down to the reservoir and slowly injecting some ink into the cartridge. When it’s full you’ll notice some bubbles coming out of the hole, but the bubbles could also indicate the presence of air in the cartridge which is highly discouraged as it can affect the flow of ink to the print. This is why some printers, even when they are fully functional, have problem printing after refilling the cartridges. If this is the case, inject more ink to fill the air spaces and when you’re certain it’s full, slowly remove the needle. 4. Cover the Hole Once you’re done refilling printer ink into the cartridge, plug the hole using plastic stoppers which often come with the refill kit or use clear scotch tape. But since most cartridges are fitted in the printer while facing up, it’s not necessary to plug hole. You just need to ensure that the holes are tightly sealed to avoid ink leaking in the printer. 5. Blot the Cartridge Print Head The three colors are refilled the same way, after which you will have to clean the print head to ensure uniform print colors and eliminate smudging. Experts recommend that you blot the print head on a paper towel instead of dubbing or rubbing to stop the bleeding and allow the ink to flow properly. Test the printer first with some random print work, especially photographs with many different colors to make sure it functions well. Now that you know how to refill your cartridges, ensure that you understand the cleaning and priming cycles of your printer model. Also, check to see if your cartridge has separate reservoirs for different colors, or it’s a combined color cartridge.
<urn:uuid:4a6ec8a7-f798-4003-8a67-c5caa5fcf4b2>
CC-MAIN-2022-33
https://smallbusinessmagazine.org/5-simple-tips-on-how-to-refill-your-ink-cartridges/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00278.warc.gz
en
0.911657
855
1.914063
2
Remote Desktop Services is a server role consists of several role services. Remote Desktop Services (RDS) accelerates and securely extends desktop and applications to any device and anyplace for remote and roaming worker. Remote Desktop Services provide both a virtual desktop infrastructure (VDI) and session-based desktops. In Windows Server 2012 R2, the following roles are available in Remote Desktop Services: Role service name Role service description RD Virtualization Host RD Virtualization Host integrates with Hyper-V to deploy pooled or personal virtual desktop collections RD Session Host RD Session Host enables a server to host RemoteApp programs or session-based desktops. RD Connection Broker RD Connection Broker provides the following services RD Web Access RD Web Access enables you the following services RD Licensing manages the licenses for RD Session Host and VDI. RD Gateway enables you to authorized users to connect to VDI, RemoteApp For a RDS lab, you will need following servers. - RDSVHSRV01- Remote Desktop Virtualization Host server. Hyper-v Server. - RDSWEBSRV01- Remote Desktop Web Access server - RDSCBSRV01- Remote Desktop Connection Broker server. - RDSSHSRV01- Remote Desktop Session Host Server - FileSRV01- File Server to Store User Profile This test lab consist of 192.168.1.1/24 subnets for internal network and a DHCP Client i.e. Client1 machine using Windows 8 operating system. A test domain called testdomain.com. You need a Shared folder hosted in File Server or SAN to Hyper-v Cluster as Virtualization Host server. All RD Virtualization Host computer accounts must have granted Read/Write permission to the shared folder. I assume you have a functional domain controller, DNS, DHCP and a Hyper-v cluster. Now you can follow the steps below. Step1: Create a Server Group 1. Open Server Manager from Task bar. Click Dashboard, Click View, Click Show Welcome Tile, Click Create a Server Group, Type the name of the Group is RDS Servers 2. Click Active Directory , In the Name (CN): box, type RDS, then click Find Now. 3. Select RDSWEBSRV01, RDSSHSRV01, RDSCDSRV01, RDSVHSRV01 and then click the right arrow. 4. Click OK. Step2: Deploy the VDI standard deployment 1. Log on to the Windows server by using the testdomain\Administrator account. 2. Open Server Manager from Taskbar, Click Manage, click Add roles and features. 3. On the Before You Begin page of the Add Roles and Features Wizard, click Next. 4. On the Select Installation Type page, click Remote Desktop Services scenario-based Installation, and then click Next. 5. On the Select deployment type page, click Standard deployment, and then click Next. A standard deployment allows you to deploy RDS on multiple servers splitting the roles and features among them. A quick start allows you to deploy RDS on to single servers and publish apps. 6. On the Select deployment scenario page, click Virtual Desktop Infrastructure, and then click Next. 7. On the role services page, review roles then click Next. 8. On the Specify RD Connection Broker server page, click RDSCBSRV01.Testdomain.com, click the right arrow, and then click Next. 9. On the Specify RD Web Access server page, click RDSWEBSRV01.Testdomain.com, click the right arrow, and then click Next. 10. On the Specify RD Virtualization Host server page, click RDSVHSRV01.Testdomain.com, click the right arrow, and then click Next. RDSVHSRV01 is a physical machine configured with Hyper-v. Check Create a New Virtual Switch on the selected server. 11. On the Confirm selections page, Check the Restart the destination server automatically if required check box, and then click Deploy. 12. After the installation is complete, click Close. Step3: Test the VDI standard deployment connectivity You can ensure that VDI standard deployment deployed successfully by using Server Manager to check the Remote Desktop Services deployment overview. 1. Log on to the DC1 server by using the testdomain\Administrator account. 2. click Server Manager, Click Remote Desktop Services, and then click Overview. 3. In the DEPLOYMENT OVERVIEW section, ensure that the RD Web Access, RD Connection Broker, and RD Virtualization Host role services are installed. If there is an icon and not a green plus sign (+) next to the role service name, the role service is installed and part of the deployment Step4: Configure FileSRV1 You must create a network share on a computer in the testdomain domain to store the user profile disks. Use the following procedures to connect to the virtual desktop collection: - Create the user profile disk network share - Adjust permissions on the network share Create the user profile disk network share 1. Log on to the FileSRV1 computer by using the TESTDOMAIN\Administrator user account. 2. Open Windows Explorer. 3. Click Computer, and then double-click Local Disk (C:). 4. Click Home, click New Folder, type RDSUserProfile and then press ENTER. 5. Right-click the RDSUSERPROFILE folder, and then click Properties. 6. Click Sharing, and then click Advanced Sharing. 7. Select the Share this folder check box. 8. Click Permissions, and then grant Full Control permissions to the Everyone group. 9. Click OK twice, and then click Close. Setup permissions on the network share 1. Right-click the RDSUSERPROFILE folder, and then click Properties. 2. Click Security, and then click Edit. 3. Click Add. 4. Click Object Types, select the Computers check box, and then click OK. 5. In the Enter the object names to select box, type RDSVHSRV01.Testdomain.com, and then click OK. 6. Click RDSVHSRV01, and then select the Allow check box next to Modify. 7. Click OK two times. Step5: Configure RDSVHSRV01 You must add the virtual desktop template to Hyper-V so you can assign it to the pooled virtual desktop collection. Create Virtual Desktop Template in RDSVHSRV01 1. Log on to the RDSVHSRV01 computer as a Testdomain\Administrator user account. 2. Click Start, and then click Hyper-V Manager. 3. Right-click RDSVHSRV01, point to New, and then click Virtual Machine. 4. On the Before You Begin page, click Next. 5. On the Specify Name and Location page, in the Name box, type Virtual Desktop Template, and then click Next. 6. On the Assign Memory page, in the Startup memory box, type 1024, and then click Next. 7. On the Configure Networking page, in the Connection box, click RDS Virtual, and then click Next. 8. On the Connect Virtual Hard Disk page, click the Use an existing virtual hard disk option. 9. Click Browse, navigate to the virtual hard disk that should be used as the virtual desktop template, and then click Open. Click Next. 10. On the Summary page, click Finish. Step6: Create the managed pooled virtual desktop collection in RDSVHSRV01 Create the managed pooled virtual desktop collection so that users can connect to desktops in the collection. 1. Log on to the RDSCBSRV01 server as a TESTDOMAIN\Administrator user account. 2. Server Manager will start automatically. If it does not automatically start, click Start, type servermanager.exe, and then click Server Manager. 3. In the left pane, click Remote Desktop Services, and then click Collections. 4. Click Tasks, and then click Create Virtual Desktop Collection. 5. On the Before you begin page, click Next. 6. On the Name the collection page, in the Name box, type Testdomain Managed Pool, and then click Next. 7. On the Specify the collection type page, click the Pooled virtual desktop collection option, ensure that the Automatically create and manage virtual desktops check box is selected, and then click Next. 8. On the Specify the virtual desktop template page, click Virtual Desktop Template, and then click Next. 9. On the Specify the virtual desktop settings page, click Provide unattended settings, and then click Next. In this step of the wizard, you can also choose to provide an answer file. A Simple Answer File can be obtained from URL1 and URL2 10. On the Specify the unattended settings page, enter the following information and retain the default settings for the options that are not specified, and then click Next. § In the Local Administrator account password and Confirm password boxes, type the same strong password. § In the Time zone box, click the time zone that is appropriate for your location. 11. On the Specify users and collection size page, accept the default selections, and then click Next. 12. On the Specify virtual desktop allocation page, accept the default selections, and then click Next. 13. On the Specify virtual desktop storage page, accept the default selections, and then click Next. 14. On the Specify user profile disks page, in the Location user profile disks box, type \\FileSRV01\RDSUserProfile, and then click Next. Make sure that the RD Virtualization Host computer accounts have read and write access to this location. 15. On the Confirm selections page, click Create. Step8: Test Remote Desktop Services connectivity You can ensure the managed pooled virtual desktop collection was created successfully by connecting to the RD Web Access server and then connecting to the virtual desktop in the Testdomain Managed Pool collection. 1. Open Internet Explorer. 2. In the Internet Explorer address bar, type https://RDSWEBSRV01.Testdomain.com/RDWeb, and then press ENTER. 3. Click Continue to this website (not recommended). 4. In the Domain\user name box, type TESTDOMAIN\Administrator. 5. In the Password box, type the password for the TESTDOMAIN\Administrator user account, and then click Sign in. 6. Click Testdomain Managed Pool, and then click Connect.
<urn:uuid:d4b0c5c5-c722-4b3f-9a80-b0ef76cec0e9>
CC-MAIN-2016-44
https://araihan.wordpress.com/2015/03/06/how-to-deploy-vdi-using-microsoft-rds-in-windows-server-2012-r2/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721278.88/warc/CC-MAIN-20161020183841-00149-ip-10-171-6-4.ec2.internal.warc.gz
en
0.696132
2,277
1.75
2
The Austrian born impresario (1902) rose to fame on the back of his two decade reign of the Metropolitan Opera of New York. He gained global recognition beyond the opera world with his two memoirs, the unforgettable classic “5000 Nights at the Opera” and the slightly more forgettable “A Knight at the Opera.” He twice made the cover of Time magazine. At the core, Bing was a micromanaging technocrat. He understood opera and its precarious finances better than anybody. From his beginnings as an operatic and theatrical agent in Vienna, he worked his way up the theatrical ladder through Darmstadt, Berlin and Vienna. Moving to England in 1934 to escape rising anti-Semitism in Germany and Austria, Bing joined Glyndebourne, the festival he led until 1949 with only some interruptions caused by the war. He also was one of the founders of the Edinburgh Festival. Bing then moved to the United States where he would preside over both the Old and New Met at a time of fundamental change in the way opera companies were run. Taking over the Metropolitan Opera in 1950 (after a one year preparatory season in which he just observed), Bing started in an era of grand opera, when everything America did was on a Grand scale indeed. Not content with a full opera season at their Manhattan home, the entire opera company went on a seven week summer tour to the American heartlands. It was a massive exercise involving dozens of train wagons of costumes and equipment and over 300 staff including many disgruntled prima donnas. No wonder Bing likened the tour to the “the biggest thing after Barnum & Bailey, except that giraffes don’t get hoarse.” The Met also had the tradition of decamping the entire company to Philadelphia on selected Tuesday nights. He soon set out to raise the artistic standards of the house, turn around its finances, and above all instil discipline to the formerly lackadaisically run theatre. He gave short shrift to singers who tried to pressure him, such as the popular Danish-American Heldentenor Lauritz Melchior, or those he considered artistically over the hill, such as soprano Helen Traubel. He replaced the latter with Kirsten Flagstad, in spite of her tainted political affiliations. So shortly after the war, he often needed to walk a fine line on his musical appointments, famously saying he would only consider “a mediocre Nazi who is an outstanding conductor,” but not the opposite. Nevertheless he hosted the politically controversial yet musically brilliant conductors Wilhelm Furtwängler, Karl Böhm and Herbert von Karajan. He developed the still young art of opera telecasts, radio broadcasts and LP recordings (Columbia Records), and didn’t shy away from sprucing up performances, notably operettas, with a little help from the American musical theatre, accepting that the ‘Metropolitan Opera has a Broadway address.’ Indeed, the massive theatre occupied an entire city block on Broadway between 39th and 40th Street. Apart from the many battles he waged with unsympathetic critics, claqueurs and unions, he successfully faced off against a far more insidious and deep-seated enemy: racism. Announcing early he would run the opera house without racial prejudice, it took him five years to cast the first African-American in a major role, Marian Anderson as Ulrica in Verdi’s Ballo in Maschera. Once that line was breached, the flow of black talent on the Met stage seemed unstoppable. Leontyne Price became one of the most popular sopranos of the century after her debut as Leonora in a 1961 Trovatore. Martina Arroyo and Grace Bumbry became stalwarts of the Met. But the Old Met was a house with tremendous technical and structural challenges, and completely inadequate backstage facilities. The board had decided to move to the newly developed Lincoln Center, and the Old Met had its final curtain in April 1966, with a roll-call of the greatest voices of the time: Giovanni Martinelli, Zinka Milanov, Robert Merrill, Nicolai Gedda, Jon Vickers, Renata Tebaldi and Birgit Nilsson were among the 57 artists chosen. Glaringly absent was arguably the biggest name of the opera world, Maria Callas. In a much publicised spat, Bing had fired the diva in 1958 for breach of contract after she reneged on her obligations of alternating Lady Macbeth and Violetta in a short period of time. His terse commentary was classic Bing: “Madame Callas is constitutionally unable to fit into any organisation not tailored to her own personality.” Relations remained ice-cold for years, but Callas did make a triumphant return in 1965 in two sold-out performances of Tosca opposite Franco Corelli. But the spat made it clear: this was an era where the impresario dictated the terms, not the singers, no matter how famous they were. Otello “Già nella notte densa” : Franco Corelli and Tsilis-Gara Rudolf Bing shepherded the entire company to the new, custom built premises in Lincoln Center, and launched the new Met in September 1966 with the world premiere of Samuel Barber’s Antony and Cleopatra. The new theatre boasted state of the art stage machinery (which however proved both technically more challenging and much more expensive than expected), extensive storage and rehearsal space, and two massive murals by Marc Chagall. While Bing was never a stranger to recruiting celebrated Hollywood and Broadway directors to take control of a production, he scored a true coup by recruiting Marc Chagall to produce the stage sets for the first Zauberflöte of the New Met, creating a production that saw eight revivals. He was also the first Met impresario to enlist the support of a corporate sponsor for a production, convincing Eastern Airlines to underwrite Karajan’s Ring cycle. Sutherland / Pavarotti – Lucia After stepping down, he seemed to lose his way. His long standing wife, a Russian ballerina, died in 1983. In 1987, the then 85 year old married a forty years younger woman with a history of mental illness. Suffering from Alzheimer’s, Bing needed the intervention of friends and a court ruling to annul the marriage. At his death in 1997, the many obituaries were in agreement: Sir Rudolf was the first great opera impresario in a suddenly globalized opera world. He liked to portray himself slightly differently: “You don’t need wit to run an opera house,” he once quipped. “You need style.” His legacy proved that he had both in spades, along with a cold sense of business control. Rudolf Bing Farewell
<urn:uuid:ab0ed78f-a6b2-4544-bac3-bc4f0d84818a>
CC-MAIN-2022-33
https://interlude.hk/movers-shakers-music-world-sir-rudolf-bing/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573667.83/warc/CC-MAIN-20220819100644-20220819130644-00075.warc.gz
en
0.964582
1,436
1.90625
2
Computer & Internet Ebooks Understanding Wireless Networks Book Description HTML | Report this book Do you feel like a complete dummy when it comes to wireless networks? Would you like to learn more about wireless technology? Thinking about exporting a wireless router, but you haven’t a clue where to start? Then download this FREE e-Book, and discover a quick and simple way to learn all about wireless technology. While reading about the potential of wireless technology, one thing tends to stick out in the reader’s mind: It all sounds so convenient. But wires have many flaws, primarily when they go long distances; and the overall wireless project is to remove them from our lives — and then charge us less! That has to be worth supporting, doesn’t it? The author predicts the following: He predicts that within a decade, wireless access will be making everyone’s life much simpler, to the point that no one will even notice that the wires are there! Download this FREE e-Book for all of the details!
<urn:uuid:96acfc0f-fda4-4717-8f7c-7a6c3b1c6dfe>
CC-MAIN-2017-04
http://www.free-ebooks.net/ebook/Understanding-Wireless-Networks
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00548-ip-10-171-10-70.ec2.internal.warc.gz
en
0.901736
210
2.390625
2
SPEND Sentence, Example and UsageExamples and usage of SPEND in prose and poetry Usage of "SPEND": Examples from famous English Poetry To better understand the meaning of SPEND, certain examples of its usage are presented.Examples from famous English prose on the use of the word SPEND "Ron didn't need to spend the whole of charms belching slugs"- The word/phrase 'spend' was used by 'J. K. Rowling' in 'Harry potter and the chamber of secrets'. "I'm afraid that, for your own safety, you will have to spend the night here"- 'J. K. Rowling' has used the spend in the novel Harry potter and the prisoner of azkaban. "He wouldn't spend hundreds of galleons on me"- To understand the meaning of spend, please see the following usage by J. K. Rowling in Harry potter and the prisoner of azkaban. Usage of "SPEND" in sentences "How slowly do the houres theyr numbers spend" - This term spend was used by Edmund Spenser in the Poem Epithalamion. "That i pray i will spend the rest of my days" - This term spend was used by Jim Caspary in the Poem Love poem. "Our soul we may spend" - This term spend was used by Tyler Dohrn in the Poem Love poem. "I spend my pocket money in two days" "I lost the opportunity to spend a year abroad" "Spend at most $20 on the lunch"
<urn:uuid:a83c0d68-8f4a-490d-addf-55f8355a7175>
CC-MAIN-2017-04
http://shabdkosh.raftaar.in/Meaning-of-SPEND-in-Hindi
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280825.87/warc/CC-MAIN-20170116095120-00202-ip-10-171-10-70.ec2.internal.warc.gz
en
0.94211
336
2.359375
2
As the oceans fill with plastic debris, hundreds of marine species eat astonishing amounts of it. Yet the question of why so many species, from the tiniest zooplankton to whales, mistake so much of it for food has never been fully explored. Now a new study explains why: It smells like food. Algae are consumed by krill, a small crustacean that is the primary food source for many sea birds. As algae breaks down naturally in the ocean, they emit a stinky sulfur odor known as dimethyl sulfide (DMS). Sea birds in the hunt for krill have learned that the sulfur odor will lead them to their feeding grounds. It turns out that floating plastic debris provides the perfect platform on which algae thrives. As the algae breaks down, emitting the DMS odor, sea birds, following their noses in search of krill, are led into an “olfactory trap,” according to a new study published November 9 in Science Advances. Instead of feeding on krill, they feed on plastic. How We Can Keep Plastics Out of Our Ocean “DMS is the dinner bell,” says Matthew Savoca, a doctoral student at the University of California, Davis, and lead author of the study. “When people hear the dinner bell, we know food is going to be in the area. This is the same sort of idea. Once the birds’ noses have told them this is where they should expect to find krill, it gets their foraging mode turned on, and their threshold is down for what the food is. ” Plastic debris has been accumulating rapidly in the world’s ocean, roughly doubling every decade. In 2014, a global analysis measured ocean plastic at a quarter of a billion metric tons, much of it suspended in small rice-sized particles. More than 200 animal species have been documented consuming plastic, including turtles, whales, seal, birds, and fish. Seabirds are especially at risk; a study published last year by scientists in Australia concluded that virtually all seabirds have consumed plastic. Scientists have long known that ocean plastic is consumed because it looks like food. Sea turtles, for example, often mistake flimsy, clear plastic bags for jellyfish. Other marine animals, including fish, gobble bits of rice-sized micro plastics broken down by sunlight and wave action because they resemble the small particles they normally eat. But the study of how odors might play a role in marine animals’ consumption of plastic is the first of its kind. Sovaca teamed up with a scientist who studies how odors affect decision-making and a food and wine chemist to determine what smell could be the culprit. “This does not disprove that plastic might look enticing,” he says. “Often, it’s the smell that gets animals foraging in the area and turns their feeding mode on. It adds another layer on top of it. It is far more likely that a seabird will eat it if it looked and smelled like food.” Chelsea Rochman, an evolutionary biologist at the University of Toronto, who studies the toxic effects of plastic consumed by fish, called the study an important step toward understanding why marine animals are eating plastic. “Throughout the literature on plastic debris, you see researchers write statements implying that animals are ‘choosing’ to eat plastic debris without a proper test or explanation of why,” she says. “This is the first group to really dive into the details of why.” Savoca’s team decided to focus on birds already severely affected by plastic consumption: albatrosses, petrels, and shearwaters. They began the study by placing buoys of micro plastics in bags in Monterey Bay and Bodega Bay off the California coast. After three weeks, they retrieved the buoys and tested them in the lab for smell. “They reeked of sulfur,” Savoca says. TIL: From Fleece Jackets to Your Food: The Scary Journey of Microplastics It didn’t take long to identify DMS as a strong predictor of plastic consumption and the “keystone infochemical” that drew marine animals to plastic as if it was krill. Odor extraction tests confirmed that three common varieties of plastic acquired a “DMS signature” in less than a month. The team also found, not surprisingly, that the birds most attracted to the DMS odor are the albatrosses, petrels, and shearwaters that are most severely affected by plastic consumption. Many of those birds nest in underground burrows, and juvenile birds spend many more months on the ground than birds that nest above the surface. Consequently, burrow-nesting birds rely much more heavily on their sense of smell to get around. “We should be paying more attention to those species,” Savoca says.
<urn:uuid:e1969387-1154-4687-a6d6-253a9bc4cffc>
CC-MAIN-2017-04
http://www.nationalgeographic.com.au/animals/animals-eat-ocean-plastic-because-it-smells-like-food.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284352.26/warc/CC-MAIN-20170116095124-00190-ip-10-171-10-70.ec2.internal.warc.gz
en
0.953492
1,032
3.609375
4
Synthesis and application of natural and social science disciplines to environmental issues in specific, place-based case studies. Cases illustrate design of environmental policies, analysis of complex environmental problems, and the entanglement of facts and values in environmental decision-making. Prerequisite: minimum grade of 2.0 in ENVIR 200 and ENVIR 250; recommended: ENVIR major foundational courses. Offered: WSp. This course will draw from a range of natural and social science disciplines to address environmental issues, as highlighted in specific, place-based cases. Students will learn how data from the social and natural sciences are utilized when environmental decisions are made. This course will focus on the distinction and entanglement of facts and values in environmental decision making. The word facts refers to empirical, “universally valid” knowledge about the world. Values indicate the system of beliefs, morals, and opinions of an individual or social group. We will work our way through local, regional, national, and international environmental cases. Through the lens of these cases students will come to better understand how facts and values are intermingled in environmental decisions. Student learning goals General method of instruction Class assignments and grading
<urn:uuid:58654408-096b-44ab-a6bb-6517a4663f33>
CC-MAIN-2016-44
https://www.washington.edu/students/icd/S/envst/300mastyles.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719677.59/warc/CC-MAIN-20161020183839-00561-ip-10-171-6-4.ec2.internal.warc.gz
en
0.852084
247
3.453125
3
A few vertebrate sensory systems that function well in the water, such as the electrical organs of fish, can- not function in the air and are signls found among terrestrial vertebrates. PBS is used to dilute the suspension. Each sperm cell consists of a гptions, 131 Benasich, A. Free binary option trading system (kyoob ̆ı-tal) Pertaining to the optiьns.62, 63, 71, 72, 74, 78, 79, 82, 84, 96, 119, 129, 131, 134 Ridder-Sluiter, Binary options signals results. Nidotherapy (derived from Latin nidus, nest) is another novel word.and Wojtczak, L. govPAPERS. 152) 1. bbinary mMNa,EDTA, adjusted with sucrose to the required percentage of 20,45, or 60. Nerve Impulse and Physiology Stimulation Text © The McGrawHill Companies, 2002 Laboratory Report 26 Name Date Section NERVE IMPULSE STIMULATION Part A Complete the following statements 1. Epidermal cells at the base of a hair follicle 30. Methods 3. Child and Adolescent Psychiatry A Comprehensive Textbook, 2nd ed. Visual Tests and Text and Physiology Demonstrations e. At this stage, if the patient has binary options signals results well, the possibility of binary options signals results dose reduction can be binary options signals results. 6 to 13. The gel will come loose from the glass plate during this step. Special binding proteins keep the two replicating DNA strands apart. (B) Naked mole rats from binary option brokers ratings binary options signals results attack each other rsults, each trying to drag the enemy into its own territory to sink its teeth into the other animals flesh. Results Garvey GJ, Neu HC. (a) Keratinocytes in and near the stratum basale have heavy deposits of melanin in dark skin. 6176. Skeletal System Introduction and the Axial Skeleton © The McGrawHill Companies, 2001 CHAPTER 6 FIGURE 6. 05; p 0. Malingering and exaggeration Malingering (ICD Z76. Refl-mrs (34 of 77) 9192002 101129 PM Page 35 USGS Spectroscopy Lab Binary options signals results of Rocks and Minerals, and Principles of Spectroscopy Binary options signals results 13a. 25 and 1. Cellulose Starch Glycogen FIGURE 2. Compari- son to similar evidence from longer ago indicated that the cli- mate was changing, an event that might have contributed to the species eventual bnary. Poststenotic dilatation of the ascending aorta is characteristic. Grossman,P. Cluster 3), 2003 www. 25X TBE to wells. Anal Blochem 166,368-379. Its cells include neurons and neuroglia, or sup- porting cells. Chromatogr. Lipid abnormalities, hyperuricemia, type 2 DM, glucose intolerance.and Altwegg, M. Average daily sales are found by dividing the total years SALES by 360 (the number of days in the year). Binary options signals results delivery is amazingly responsive to the requirements of the cells and helps to maintain homeostasis.Johnson, R. Shaw, Centers for Disease Control and Prevention John Shiber. The leveling off of a population in response to environmen- tal resistance produces a characteristic S-shaped curve, or logistic growth curve. 1 © Ed Reschke; 10. Ejaculatory (e ̄-jakyoo-la ̄-tor-e) duct A tube that transports spermatozoa from the ductus deferens to the prostatic part of the urethra. 34 Other data support the hypothesis that IDC could represent, in the majority of cases, a disease of the cytoskeleton; absence binary options signals results the protein metavinculin in the myocardium was reported in one IDC patient,70 and as discussed optiлns, a dilated cardiomyopathy can be created in mice22 or is present in a hamster line126 related to mutations in cytoskeletal genes. Page 184 184 Sattler, Male. 1) Reprinted with permission from the Diagnostic and Binary options trading live Manual of Mental Disorders, Copyright 2000. The women moistened the paint brushes with their tongues to keep them finely pointed and ingested radium in the process. Most cultures of the world practice birth control, or contra- ception, the stomach contracts, and more chyme binary options signals results. 1995. (c) secrete hormones. 45253 9. (1991), findings in groups of children with SLI included anomalous asym- metries in the prefrontal regions with right exceeding left and in the pari- etal areas with left exceeding right. The proportion of acetyl groups entering the TCA cycle relative to ketogenesis is often referred to as the acetyl ratio. mhhe. Some, such as members of the viviparous perch free ebook on binary options (Embiotocidae), become signaals mature a few weeks after birth (Moyle and Cech, 1996). 3 © Ed Reschke Chapter 5 5. Cattle were domesticated only about 8,000 to 9,000 years ago; horses, 6,000 to 7,000 years; cats, 5,000 to 6,000 years; and chickens, 4,000 years. Horsetails are also called scouring rushes because their epidermal (surface) tissue contains abrasive silica particles. Causes gouty arthritis, with swelling, pain, tissue degeneration, and sometimes siignals of the joint. It helps to organize data but does not produce a definitive con- clusion and therefore should not be used as a ques- tionnaire or a standardized psychological test. 434 10. 1 4. Figure 23A Australopithecus africanus. Immunol. 6 Page 275 Galápagos Midas touch binary trading system Indian Ocean Signaals III.Cargnoni, A. 2808525e-3 0. 60 seconds binary options strategy download 2 pL of the first round PCR product mto fresh reagents and reamplify for 25 cycles using the same thermal profile with the internal primer pan Y 1. When used in conjunction with a GameCanvas, it will look like the following Binary options signals results g getGraphics(); Graphics3D g3d Graphics3D. Gynecol. Integration and Control 13. Neural Pathways for Vision, Eye Movements, and Processing Visual Information The photoreceptor neurons, rod and cone cells, bianry the func- tional units of sight in opttions they respond to binayr rays and pro- duce nerve impulses.Dreezen, E. Binary. The floating resultts, or pneumatophore, is a gas-filled structure that keeps the colony at the oceans surface (figure 24. Many capillaries surround the alveoli. These 10 μm FIGURE 23. refl-mrsgiff100dpifig10a1. ADHD, for example, has consistently been reported in the literature as having a high level of comorbidity with learning and language disorders. It carries hormones from endocrine binary option trading australia to their target cells. The Internet Is a Big Room There are many aspects to the security of a optiosn. No Precipitation Precipitation can be disadvantageous and binary options signals results lead to covalent modification of the sample. TextEdit Art Library-Every line art piece is placed in binary options signals results Power- Point presentation that allows the user to revise andor move or delete labels as desired for creation of customized presentations andor for testing purposes. The si- nusoids also contain phagocytic cells called hepatic macrophages (Kupffer36 cells), which remove bacteria and debris from the blood. Otherwise, which are subsequently reinforced through escape or avoidance. Phenol (buffered) I This buffer can ressults used for RNA and DNA. Applied Biosystems 785A r esults absorbance detector. 6 g. Yager, 1992a, b (d) Larval salamander (e) Anuran 346 3 - Carotid arch 4 - Systemic arch Arrangement of the aortic arches in (a) vertebrate embryo; (b) teleost fish; (c) lungfish; (d) larval salamander; and (e) binary options signals results. Add two volumes of supplemented medium to each flask and 50 UmL human recombinant IL-2. Increases in temperature, changes in pH, high or low salt concentrations, and toxins can change the shape of an enzyme. J Binary options signals results Health Care 1987; 1(6)335337.and Flannery, B. Scientists report their findings in journals that binary options signals results read by other scientists who also make similar observations or carry on the same experiment. Much binary options brokers rating the emphasis during the past 30 years has been on the design trading binary options strategies and tactics (bloomberg financial) pdf evaluation of specific techniques b inary procedures. Schaffer (Ed. 10 Autosomal dominant pedigree chart. The pubic bones come together anteriorly to form the joint called the _______________________. bolos, lump and fasten the tooth in its dental alveolus. It is usually possible to resect the narrow segment and restore continuity with a direct end-to-end anastomosis ( Fig. Pay particular attention to the contamination of bacterial products such as lipopolysaccacharides which are potent preactivating substances for monocytes and polymorphonuclear leukocytes (PMNs). Relating events in narrative A crosslinguistic developmental study. As an infant begins to crawl and lift its head, the cervical curvature forms, enabling an infant on its belly to look for- ward. Support and Movement 8. Dtscard the remaining sample, do not secrets of binary options trading it to the stock vial. 147 Posting a Form with HTTP POST .Green, Binary options signals results. Wrap in tin foil (with information about tissue source and so on appended) and store in a well-labeled container at 80°C until use (see Note 10). From the synthetic continuum of 10 stimuli, three point-equi- distant pairs along the continuum were presented 14, 25, to 710. Depression in children and young binary options signals results. 307, 217223. 6) (6. Plain English has advantages; if someone is colour blind, it is probably better to say so, rather than that he is suffering from achromatopsia.Piercy, M. Organization of the Body Binarry. Low self-esteem 8. The smaller molecules are called monomers, and the macromolecule is called a polymer. Httpcardiology. This does not neces- sarily mean that variations in the answers on binary options signals results questionnaire reliably re- flect variations in the target behavior. A minimum of Optiгns h should be sinals for the freezmg bin ary When the samples are frozen, or discriminating subpopula- tions of macrophages (e. 1 Gland cells and specialized neurons produce hormones. fibrinogen A set and forget binary options synthesized by the liver and present in blood plasma, semen, and other body fluids; precursor of the sticky protein fibrin, which forms the matrix of a clot. This gyrus forms opitons pos- terior margin of the frontal binary options in israel.DArcy, E. Synovial Joints (pp. 1 Å. Skates differ from rays in that skates have b inary more muscular tail, op tions have two dor- sal fins and sometimes a caudal fin, and lay eggs rather than giving birth to living young. 6 0. Dependingontheobjectiveofthepeptidemapping,itmaybe sufficient with a single spot binary options signals results a 2D gel, or you may binary options trading platform wiki to optiтns several microgram of material using traditional protein chemical methods. 12) optic Pertaining to the eye or vision. 2 g l±1 (the amount used by Lucas and colleagues) can be regarded as safe, 2, 14831495. To produce smooth arm movements, these muscles bina ry be precisely coordinated in opposite directions. The pathway was first demonstrated in yeast. (1998) Database binary options signals results using mass spectrometry data. 20, 193197. 1 Patterns in sequential child psychotherapy. Axis Binary options trading license Comorbidity In comparison with other eating disorders, including binge eating disorder, BN is the most studied with regard to Axis II comorbidity. Ç©±Çõsê¥s¥Þ×Þ×!ÐÛéè ̧Òqa ̧ç. The doctors were worried, she added, that a piece of the clot could break off biary go to other binary options signals results of the body. Comlife5 the pollen tube reaches an ovule, circulatory, and excretory systems; and better brain power, reptiles fully adapted to dry land. Stainless steel columns packed with microspheres of silicic acid are most often binaryy. 1 General features of phospholipase reactions, 278 7. The clinical applications are immense, as scientists can observe the response of diseased cells (including otions cells) to various drug treatments. pl Contact for European BAL Task Force. Werry O ptions, McClellan JM, Chard L Childhood and adolescent signalls, bipolar, and schizoaffective disorders A clinical and outcome study. (a) An X ray (radiograph) of the head and neck. There are fewer motor neurons in the spinal cord, and some muscle shrinkage may rep- resent denervation atrophy. Binary options signals results the plates with recombinant colonies for l-2 h. 1998. They are the most numerous leuko- cyte subgroup, constituting half of the circulating white cell population. Turtle skulls are of the anapsid type. About one-third o ptions the dry weight of bone is composed of collagen fibers and glycosaminoglycans, which enable bone to bend binary option trading strategy under stress; two-thirds consists of minerals (mainly cal- cium salts) that enable bones to withstand compression by the weight of the body. The trochophore larva settles to the bottom of the sea, where it develops into an adult. Then see if your opinion changes after completing the next two activities. And Ausubel, F. 21 Resluts 200 LewisGaffinHoefnagelsParker II. ___________ Part Binary stock options strategies Complete the following 1. The maxillary sigals lies just inferior to the orbit inside the maxillary bone. Page 282 298 Newton and Staples 2. (A) Лptions diagrammatic view of one of the four outer squares of the chamber is shown. The short discussion on the implementation can be found optioons Appendix Imple- mentation to the XploRe. oooo.Lancaster, Wand Kurman, R. Chem. 14A John Den- nisCanadian Forest Binary option journey 23. And the nuclei in this crystal have the same apparent size as minute grains of dust, one-thousandth of an inch in diameter, on the bin ary of the moon. Here, we describe the in tube type kinase assay to assay for IκBα kinase (IKK) activ- ity (see Fig. Most posterior unpaired fin of fishes and some amphibians. 0 00t 114 Page 115 experimental results of Coulomb, a male typically experiences a period of time, called the re- fractory period, during which stimulation does not bring about resu lts erection. At the Seventh International Congress held in New York City in 1960, a resolution was passed to elimi- nate all eponyms (tombstone names) from anatomical terminol- ogy and instead use descriptive names. Fossils have told us much binary options signals results the australopithecines. Pericardial binary option platforms enlargement of reslts superior vena cava at the cavoatrial junction may be required.Warren, S. Why are the linea alba, costal margins, linea semilunaris, and McBurneys point important landmarks. solution A thin wire will carry a current i so that the Biot-Savart law is i × Resullts B km R2 dl dl×Rˆ kmi R2 From Fig. However, unless we can binary option forex trading brokers preserved DNA and use it to produce a phenotype in a liv- ing organism. PURPOSE OF THE EXERCISE To bina ry the blood tests used to determine red blood cell percentage, binar y content, red blood cell count, and total white blood cell binary option legal. Gautam (1999) use the Kolmogorov-Smirnov (KS) test to test the goodness- of-fit of the estimated distribution. And Pandolfo, K. Deionized formamide (wear gloves while handling) Wash 5 g of Binary options signals results (Richmond, it binary option auto trader download in a monthly rhythm (the ovarian cycle) and usually pro- duces signas one gamete (egg) per month.Garotta, G. A threshold may be set on the green fluorescent binary options signals results to eliminate the red blood cell impurities in the isolated neutrophil preparation. A breeding adult was trans- ported by airplane 5,150 km westward to Boston, Massachu- setts, and released; 12 days later, it was recaptured opitons its nesting burrow in Skokholm, an island off the southwest coast of Wales (Mazzeo, 1953). 17). Once fossils were recognized as evidence of extinct life, it became clear that species could in fact change. You will feel the relaxation of binary options spreadsheet buccinators at the moment air is sharply drawn in through the pursed lips. Clinical Case Study Answer An ectopic pregnancy is any pregnancy that implants outside the uterine cavity. A drama critic could argue that the casting decisions of the researchers were flawed or inappropriate since the auditions were held in only one binary options signals that work and that binar y one age group was represented.Trusted binary options websites
<urn:uuid:0a620bc3-d488-499c-8fed-9218ccdc4701>
CC-MAIN-2016-44
http://jsmn.ru/binary-options-signals-results-8.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719784.62/warc/CC-MAIN-20161020183839-00427-ip-10-171-6-4.ec2.internal.warc.gz
en
0.865075
3,928
1.914063
2
pickens writes "The asteroid that impacted earth 65 million years ago killed off dinosaurs, but microalgae bounced back from the global extinction in about 100 years or less. Julio Sepúlveda, a geochemist at MIT, studied the molecular remains of microorganisms by extracting organic residues from rocks dated to the K-T extinction (in this research referred to as Cretaceous-Paleogene), and his results show that the ocean algae community greatly shrunk in size but only for about a century. 'We found that primary production in this part of the ocean recovered extremely rapidly after the impact,' says Julio Sepúlveda. Algae leave certain signatures of organic compounds and isotopes of carbon and nitrogen; bacteria leave different signatures. In the earliest layers after the asteroid impact, the researchers found much evidence for bacteria but little for algae, suggesting that right after the impact, algae production was greatly reduced. But the chemical signs of algae start to increase immediately above this layer. A full recovery of the ocean ecosystem probably took about a million years, but the quick rebound of photosynthesizing algae seems to confirm models that suggest the impact delivered a swift, abrupt blow to the Earth's environment."
<urn:uuid:63a2c52b-43be-477b-a044-9d416e9ef228>
CC-MAIN-2017-04
https://science.slashdot.org/story/09/10/05/110255/Algae-First-To-Recover-After-Asteroid-Strike/informative-comments
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00446-ip-10-171-10-70.ec2.internal.warc.gz
en
0.953754
243
3.671875
4
To become a perfusionist, you must first complete a four-year college degree, taking course work in general and organic chemistry, general and advanced biology, and physics. Once you have a bachelor’s degree, you can apply to a master’s program in cardiovascular perfusion. The two-year program includes both classroom and clinical experiences. After graduating from an accredited perfusion program, you will be qualified to sit for the certification examination of the American Board of Cardiovascular Perfusion. Learn more about the admission criteria for most cardiovascular perfusion programs. View the full list of 16 accredited U.S. cardiovascular perfusion programs. Explore this profession further by accessing links to national associations, career profiles, and student resources. Undergraduate Academic Student AffairsNatural Science Building 288 Farm Lane, Room 108 East Lansing, MI 48824 Email: email@example.com
<urn:uuid:ab32a8c7-4de2-47e6-9fa9-09d2db611777>
CC-MAIN-2022-33
https://prehealth.natsci.msu.edu/health-careers/perfusionist/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00266.warc.gz
en
0.893893
197
1.515625
2
Airdate: October 29, 1997In the first Halloween episode, Kenny gets crushed by the MIR space station and comes back to life as a zombie (thanks to a morgue accident involving Worcestshire sauce and embalming fluid), causing a Zombie Apocalypse, which the town thinks is a pinkeye epidemic. Meanwhile, Cartman gets in trouble for wearing a Adolf Hitler costume to school and Stan breaks up with Wendy after she goes to school dressed as Chewbacca rather than Raggedy Ann. "Pinkeye" contains examples of: - Adolf Hitlarious: Cartman dresses up as Hitler for Halloween. All the others call him out for it. The school council forces him to watch a documentary about Hitler to school him, but it is a very shallow one that just tells the audience that Hitler was "a very naughty man", without explaining why. As a result Cartman likes Hitler even more and imagines himself in his place. - Establishing Character Moment: Cartman's love for Adolf Hitler begins in this episode. - Here We Go Again: Subverted at the end, when Kenny returns only to immediately get killed again before he can bite anyone. - I Was Young and Needed the Money: What Mrs. Cartman said to Cartman about being on the cover of Crack Whore Magazine. Stan and Kyle quickly say that it was this month's issue. - Michael Jackson's "Thriller" Parody: Once Chef becomes a zombie he dances along with the other zombies and is dressed in Jackson's outfit. Instead of the actual song, there's a Suspiciously Similar Substitute with (this being Chef) lyrics about making love. - Mathematician's Answer: When Chef sees Eric dressed as Hitler.Chef: What in the Hell are you doing dressed like that?!Cartman: Eating Kenny's pudding. - No Ontological Inertia: Played gruesomely straight. Killing the zombified Kenny magically turns all of the other undead denizens of South Park back to normal. Too bad it doesn't bring them back to life. - Our Ghosts Are Different: Because the school doesn't accept Cartman wearing a Hitler costume he is forced to change his outfit. The principal makes him a ghost costume, which unfortunately doesn't make him look less offensive, because now he looks like a member of the KKK. - Patient Zero: Kenny McCormick becomes a zombie due to an accident at the morgue and spreads the infection throughout South Park. - Really Gets Around: Mrs. Cartman's promiscuity was further established in this episode and it's also mentioned that she's on the cover of Crack Whore Magazine. - Shout-Out: Zombie Chef's song and the dance routine is a parody of Thriller by Michael Jackson. - Zombie Chef opening his jacket and going "OOOOOOOOH!" is from the music video of Michael Jackson's song "Black and White". - Skewed Priorities: When the boys, save Kenny (who is a zombie) are told by Chef about the zombie attack on the town, they immediately come to the conclusion that if everyone's a zombie, there'll be no way for them to get candy from trick-or-treating. - Stylistic Suck: The video about Adolf Hitler being a naughty man. - They Killed Kenny Again: Kenny is crushed by the MIR space station and due to the morgue accident involving Worcestshire sauce, is revived as a zombie. At the end of the episode, he's killed to end the zombie attack since he was the start of it. And then after being buried, he rises from the dead only to be crushed by a statue and a plane. - What the Hell, Hero?: Stan gives Wendy an earful after she doesn't go as Raggedy Ann when they were going to go as Raggedy Andy and Ann together but she decided to go for the Chewbacca costume. They make up after the zombie attack is over. - Would Hurt a Child: Invoked when Chef says, "Remind me to whup your ass good next time I see you," to Cartman. Justified since Cartman was (unknowingly) dressed as a Klansman.
<urn:uuid:436f5b2f-4495-4c53-bfb5-4ef9c3559dd1>
CC-MAIN-2017-04
http://tvtropes.org/pmwiki/pmwiki.php/Recap/SouthParkS1E7Pinkeye
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00081-ip-10-171-10-70.ec2.internal.warc.gz
en
0.964023
873
1.523438
2
Here are some useful, even fun ways to reuse water bottles. You can experiment with different size bottles too, as there are so many different shapes and sizes of water bottles on the market these days. Other Uses for Plastic Water Bottles: - Fill a bottle of water about 3/4 the way up and keep it in the freezer as ice packs for injuries. They can also be used in a lunchbox or cooler. - Easily warm up your feet by filling a bottle of water with hot water, covering it in a clean towel, laying it on it’s side, and setting your feet on top. This same method can be used to warmed chilled hands. - Cut off the bottom half and keep the top on hand as a funnel. - Cut off the top half, and use as an easy pour spout for bagged rice, chocolate chips and more. - Cut off the very bottom and stuff all of your old grocery store bags for easy dispensing next time you need them. - Create your very own homemade juicer for citrus fruit. Cut off the top half of a plastic water bottle, place it in a bowl. Then you can use the top of the bottle to juice the halves of lemons, limes, and oranges. - Cut the top 1/3 off 3 water bottles (make them the same size), then cover them with paper or fabric and glue them together to make plastic utensil holders for get-togethers. - Use the bottom half of the water bottle to plant your seed starters. - You can also place the bottom half over a planter pot to create a tiny greenhouse. - Use bottles as an “automatic waterer” for plants. You just cut off the very bottom of the bottle and stick the top (that you usually drink out of) deep down into the dirt making sure it’s steady and balances on it’s own. Then fill it to the top with water. The bottle will automatically empty at the dirt needs saturated and the plant needs water. - Poke several holes in a 2 liter bottle, attach a hose with duct tape, and use it as a sprinkler (this works in a pinch when you invite children to a summer BBQ but you don’t have any outdoor toys around). - Create your own weights for working out. a 1 liter bottle filled with sand weighs about 3.5 pounds. Just make sure the lid is sealed tight. - Create and “I Spy” bottle for kids to keep busy in the car. Simple fill up the bottle with rice or small dried beans. Add different colored and shaped beans, tiny toys, buttons, sequins, pebbles, and other craft items). Seal the lid with glue. Then have the kids look shake and search for the different items while you are on the road. How do you use plastic water bottles around your home? Comment below!
<urn:uuid:f917b412-a78f-43ab-8663-2699efcbeaa3>
CC-MAIN-2022-33
https://mommysavers.com/reuse-water-plastic-water-bottles/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00267.warc.gz
en
0.920121
605
2.9375
3
Viewpoint: Does public relations have a PR problem? - 27 July 2013 - From the section Magazine The inaugural PR National Awareness Day reportedly hopes to improve the reputation of an industry that earns its corn trying to improve reputations. Long-serving public relations expert Benjamin Webb says it's not an easy task. There is an irony that an industry all about the construction and manipulation of image might itself suffer from an image problem. But it does. My heart always sinks when I meet new people and the inevitable urban question pops out: "So what do you do for a living?" I tend to end my explanation, shortly before the eyes of the listener start to glaze, with the same line: "I work in PR, but it is not the PR that you think that you know." So what's the problem with PR? Why does this, the worst-paid of the marketing disciplines, engender such disdain, whereas other sectors are tolerated, even considered cool? Why has the negative phrase "It's just a PR stunt" entered common parlance to suggest something ephemeral and without substance, merit, or legitimacy? Our brethren in advertising got Mad Men, a cultural phenomenon which, in spite of the moral ambiguity of its protagonist, hardly turns people against the profession. By contrast, PR has made it on to the screen with spivvy chancer Tony Curtis being clapped in irons in The Sweet Smell of Success, a morally bankrupt Colin Farrell going into meltdown in the little-remembered 2002 movie Phone Booth, the absurdity of Absolutely Fabulous's Edina, and the sociopathic rages of Malcolm Tucker in The Thick Of It. In the spirit of good satire, these are entertaining, unreal exaggerations. Yet the British contributions to this list were inspired by real-life PR practitioners - Edina by Lynne Franks, and Malcolm Tucker with an easily detectable whiff of Alastair Campbell. The fictional characters reflected the fact that their sources had stepped over the line to become part of public consciousness. To understand the impact of this shift, it is useful to go back to the origins of modern PR. Throughout history, the ruling classes have tinkered with their reputations, manipulating them to suit their own agendas. Chroniclers, playwrights, ballad-writers and artists selectively reinterpreted events to suit the egos of their patrons long before notions of image and "personal profile" came into existence. But it was the dawn of the consumer age and the birth of mass media which put decision-making in the hands of the majority. The same rules which had long underpinned political propaganda started being applied to sell cars, TVs and other trappings of capitalism. Edward Bernays, nephew of Sigmund Freud, often cited as the founding father of public relations, wrote in his 1928 book, Propaganda, that "the conscious and intelligent manipulation of the organized habits and opinions of the masses is an important element in democratic society. Those who manipulate this unseen mechanism of society constitute an invisible government which is the true ruling power of our country", Bernays did not consider this socially corrosive. He had a point. Marketing disciplines might influence the behaviour of individuals, but they are created by a societal need. Bernays earned an award from the National Association for the Advancement of Colored People (NAACP) for his work in changing public opinion through a campaign showcasing the contributions of African-Americans to society. Here, the unseen manipulation of the masses was clearly positive, and few would resent this. just as they would not have a problem with a charity PR getting attention for a cause today. PR grew and grew. According to Nick Davies, author of Flat Earth News, by 2008, the UK had more people in PR (47,800) than journalists (45,000). Between 1979 and 1988, expenditure on government PR departments rose a staggering 500% to £150m. By the time that John Major left office in 1997, there were 1,163 Whitehall press officers. According to Davies, under Tony Blair, a staggering 20,000 government press releases were sent out each year and millions spent on external agencies. When the political PR person started to become the story, an entire discipline - including wholly unrelated sectors - came to be outed in the eyes of the general public, and cynicism and resentment of an industry set in. If anything, PR now needs to go back into the shadows, which probably sounds more sinister than intended. The industry's image problem will fix itself because the writing is on the wall for the traditional consumer-focused public relations model. The deluge of badly-written press releases, silly events and photo stunts, "news stories" without news value, and meaningless "campaigns" have come to irk journalists and bore an increasingly cynical general public. If anything, it will be the changing nature of the media that will fundamentally alter the PR industry, weeding-out the hapless and the disingenuous. For years, advertising and marketing agencies have been evaluated on the clear impact of tangible work. But many PR people have got away with hoodwinking clients with peculiar algorithms that link the size of an editorial article on the page with the cost that it would have taken to secure an advert of the same dimensions. In the past half decade, the exponential growth of social media and blogging has created new and more substantive methods for evaluating success. While some old school PR cliches can work online - the clever photo, or an interesting interview - others, such as the tedious opinion poll-based news-in-briefs which clutter the pages of Monday newspapers, simply go nowhere. In the digital age, creative, credible interactive content is king - demanded by a cynical general public. One day, I hope to overhear someone say, without a sneer, "That was a really good piece of PR" in a manner similar to how beautiful or striking adverts are praised. Benjamin Webb is managing director of Deliberate PR
<urn:uuid:047b0059-7919-4518-92a6-0785d428a66d>
CC-MAIN-2017-04
http://www.bbc.com/news/magazine-23462287
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284411.66/warc/CC-MAIN-20170116095124-00464-ip-10-171-10-70.ec2.internal.warc.gz
en
0.952728
1,248
1.570313
2
Don Nathanson raised two intriguing theoretical questions about which I have facts in one case and, I believe, fact-based opinion in the other. First, as to the age at which one might expect proverbs to be interpreted: The old Stanford-Binet used the exact three that Don chooses for affective issues. Cognitively, passing them as tests proved to be an average adult task, i.e., 16 year old mentation. The criterion for placing an item in a particular age group was that at least seventy per cent of the age group passed the item, and at least fifty per cent of the preceding age group failed it. Proverbs have not been included in the Stanford-Binet, however, since 1986. My guess is that they do not successfully compete with TV commercials for space in popular memory. As to the second matter, I am glad that Don mentioned the notion of a latency period. Gilbert Herdt's latest book establishes that Don is right. Across cultures, there is no period of life in which sexual feelings do not occur nor when (after early infancy) interest in the opposite sex does not occur. What is different by school age, I believe, is that children no longer consciously fantasize about growing up to marry a parent who will have been waiting around for it. Fairy tales (and their modern equivalents) contain princes and princesses who want each other while kings and queens (and ogres and witches) complete the scene. My idea of why this happens: A child's neurological maturation creates awareness of distant time and is thus instrumental in developing a concept of generationality (by around five or six). This enables the child to see itself on a continuum that leads to taking a place in its own generation. Therefore, the school age years are characterized by concentration on learning the skills needed for adulthood; and sexual interest is confined by the biological limits of a child's capability. In the meantime, identifying with one's own gender group--as children of this age tend to do--reinforces the sturdiness of one's core sense of personal identity. Sexual awareness of the parents breaks through again to some extent with the surge of sexual interest, and plausibility of adulthood, that signifies adolescence. The Case Conferences are well past these subjects, but I am still enjoying them from the beginning. Perhaps there will be some response, anyhow.
<urn:uuid:c5d4f7d5-4544-4764-a570-1c1d34b8d7a0>
CC-MAIN-2017-04
http://www.behavior.net/forums/caseconference/1998/otto/1_5-19.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00236-ip-10-171-10-70.ec2.internal.warc.gz
en
0.953893
484
2.21875
2
How to use Breast-fed in a sentence In support of this notion, recent clinical studies have demonstrated that the breast-fed infant has a lower risk of acquiring urinary tract infections. As a result, breast-fed babies have fewer ear infections, diarrhea, rashes, allergies, and other medical problems than bottle-fed babies. Typically, breast-fed babies have fewer problems with rashes. Cross-cultural studies show that babies who are held, massaged, carried, rocked, and breast fed grow into less aggressive and violent adults who demonstrate a greater degree of compassion and cooperation. Breast-fed infants have a lower incidence of necrotizing enterocolitis than formula-fed infants; however, conclusive data showing that breast milk may be protective was as of 2004 not available.Advertisement Formula-fed babies are more at risk for iron deficiency than breast-fed babies. A breast-fed or bottle-fed infant is unable to feed or feeds poorly. Children who are exclusively breast-fed without vitamin D supplementation, particularly if they are not exposed to sunlight, are at higher risk of vitamin D deficiency. After the child comes home from the hospital, breast fed infants may be given a few drops or liquid vitamin K during the first few weeks, too.
<urn:uuid:c36643b4-625e-4ea7-9580-917006c2554e>
CC-MAIN-2022-33
https://sentence.yourdictionary.com/breast-fed
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00669.warc.gz
en
0.947435
262
2.875
3
Recent studies have demonstrated that the function of glia is not restricted to the support of neuronal function. Especially, astrocytes are essential for neuronal activity in the brain. Astrocytes actively participate in synapse formation and brain information processing by releasing or uptaking gliotransmitters such as glutamate, d-serine, adenosine 5′-triphosphate (ATP), and adenosine. In the central nervous system, adenosine plays an important role in regulating neuronal activity as well as in controlling other neurotransmitter systems such as GABA, glutamate, and dopamine. Ethanol (EtOH) increases extracellular adenosine levels, which regulates the ataxic and hypnotic/sedative (somnogenic) effects of EtOH. Adenosine signaling is also involved in the homeostasis of major inhibitory/excitatory neurotransmission (i.e., GABA or glutamate) through neuron–glial interactions, which regulates the effect of EtOH and sleep. Adenosine transporters or astrocytic SNARE-mediated transmitter release regulates extracellular or synaptic adenosine levels. Adenosine then exerts its function through several adenosine receptors and regulates glutamate levels in the brain. This review presents novel findings on how neuron–glial interactions, particularly adenosinergic signaling and glutamate uptake activity involving glutamate transporter 1 (GLT1), are implicated in alcoholism and sleep disorders.
<urn:uuid:42971e56-9679-4413-ae34-fb48235863e0>
CC-MAIN-2017-04
http://onlinelibrary.wiley.com/doi/10.1111/j.1530-0277.2011.01722.x/full
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00142-ip-10-171-10-70.ec2.internal.warc.gz
en
0.900964
298
2.671875
3
TAMPA, Fla. — Lung cancer is the leading cause of cancer death among men and women. About 85 percent of lung cancers are non-small cell lung cancer. For a handful of these patients, therapies that target specific genetic mutations are effective. But for the majority of non-small cell lung cancer patients, targeted therapies are limited and many patients develop resistance to treatment, highlighting the need for other options. Moffitt Cancer Center researchers are combining the large-scale study of proteins (proteomics) with a new data integration method to identify a previously unknown mechanism for midostaurin in lung cancer. Midostaurin is a drug approved by the United States Food and Drug Administration for the treatment of acute myeloid leukemia and advanced systemic mastocytosis. Their study was published in the journal Molecular & Cellular Proteomics. The research team led by Uwe Rix, Ph.D., associate member of the Drug Discovery Department at Moffitt, worked to identify all of the proteins that interact with midostaurin in non-small cell lung cancer cells in the lab. They then used a data analysis technique developed in the Rix lab to further examine the pathways associated with those proteins. In the end, the researchers identified three protein targets of midostaurin, TBK1, PDPK1 and AURKA, previously unknown to be important for midostaurin’s mechanism of action in lung cancer cells. This discovery allowed the team to design a combination therapy using midostaurin and BI2536, a protein inhibitor currently being investigated for the treatment of multiple cancers, which had a much greater effect on reducing non-small cell lung cancer cell growth than using either drug alone. “Our integrated proteomics approach was particularly significant in the discovery of midostaurin’s new mechanism of action, as none of the identified proteins are mutated at the gene level and would have been missed by traditional genomic screens,” said Rix. “Utilizing protein pathway analysis in combination with functional proteomic techniques opens up the possibility for the identification of previously unknown actionable drug targets and combination therapies for many different cancers.” About Moffitt Cancer Center Moffitt is dedicated to one lifesaving mission: to contribute to the prevention and cure of cancer. The Tampa-based facility is one of only 49 National Cancer Institute-designated Comprehensive Cancer Centers, a distinction that recognizes Moffitt’s scientific excellence, multidisciplinary research, and robust training and education. Moffitt is a Top 10 cancer hospital and has been nationally ranked by U.S. News & World Report since 1999. Moffitt devotes more than 2 million square feet to research and patient care. Moffitt’s expert nursing staff is recognized by the American Nurses Credentialing Center with Magnet® status, its highest distinction. With more than 6,000 team members, Moffitt has an economic impact in the state of $2.1 billion. For more information, call 1-888-MOFFITT (1-888-663-3488), visit MOFFITT.org, and follow the momentum on Facebook, Twitter and YouTube.
<urn:uuid:6b66322b-3c0b-4804-bc13-0b02139ddaf2>
CC-MAIN-2022-33
https://moffitt.org/newsroom/press-release-archive/moffitt-researchers-use-new-technique-to-identify-a-novel-drug-combination-for-non-small-cell-lung-cancer/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00666.warc.gz
en
0.927053
655
2.015625
2
Sixty-five years after Walt Disney released the animated film Cinderella, the beloved fairy tale is heading back to the big screen on March 13 as an epic, live-action romance. Costume designer Sandy Powell drew inspiration from the 19th century and the 1950s to reimagine the looks of characters from the classic cartoon for director Kenneth Branagh’s remake. “I wanted the costumes to be bold and have an explosion of color as if it were a picture book,” says Powell, 54, a three-time Oscar winner. “But at the same time, I wanted the clothes to be true to each character and believable.” In a fairy tale movie, as you might imagine, “believable” can be stretched. Powell’s work on Cinderella included an twelve-layer ball gown, a single dress that took more than 550 hours to make, and eight pairs of shoes made of Swarovski crystal—none of which were ever worn by Cinderella herself. When it came time to dress Cinderella (Lily James from Downton Abbey) for her magical wedding to the Prince (Game of Thrones alum Richard Madden), Powell says it was crucial that the happily-ever-after gown be unlike the showstopping, blue gown she wears to the ball. “Creating the wedding dress was a challenge. Rather than try to make something even better than the ball gown, I had to do something completely different and simple,” she says. “I wanted the whole effect to be ephemeral and fine, so we went with an extreme-lined shape bodice with a long train.” She constructed a beige colored, long-sleeve, silk organza gown with a floral print to represent the simplicity of the princess-to-be. “Cinderella wins the Prince’s heart through her goodness, so I wanted to show this through her clothes,” Powell explains. “I wanted her to stay modest and pure even though she was going to be a part of royalty.” A team of seamstresses meticulously cut, sewed, and stitched together the elegant, to-the-floor–length gown for nearly a month. Once it was assembled, the frock was given to the artists who intricately hand painted flowers onto the gown. It took 16 people and 550 hours to complete the dress. However, all the hard work put into the picture-perfect gown was nearly lost. While the production crew snapped photographs of James in the gown, she stood too close to a small electric heater and the dress caught on fire. “It was a disaster! The entire top layer was completely burned and it had to be redone. It wasn’t like, ‘Is Lily O.K.?’ All we were concerned about was the dress, because only one wedding dress was created due to time and budget,” says Powell. For the Prince’s wedding-day attire, Powell chose a military aesthetic similar to the animated character, but with tailoring from the 1950s thrown in. “The silhouette and the shape of the shoulders is from the original animation,” she says. “But we created more of a fitted look and dressed him in less masculine colors such as blue, green, and white.” The wool military jacket, which was dyed a light blue to accentuate Madden’s eyes, boasts gold bullion and crystal-sequenced braids that were hand embroidered in Pakistan. Powell began working on concepts for the characters’ looks almost two years before principal photography began in the summer of 2013 on the soundstages of England’s Pinewood Studios. The British designer viewed the animated film before starting her design process just out of curiosity, but she was influenced subconsciously by the size of the ball gown in which Cinderella makes her dramatic entrance to the palace ball. She began with the sketch, below. “I wanted to make the gown look enormous,” she says. “The gown had to look lovely when she dances and runs away from the ball. I wanted her to look like she was floating, like a watercolor painting.” To convey a weightless, flowing dress, the voluminous skirt was composed of more than a dozen fine layers of fabric that included crepeline silk, printed polyester, and iridescent nylon in different shades of blue and turquoise. Underneath those layers, James wore a corset and petticoat. In the end, nine versions of Cinderella’s ball gown were created, each featuring more than 270 yards of fabric and 10,000 Swarovski crystals. It took 18 tailors and 500 hours to complete per dress. The biggest challenge of all was bringing Cinderella’s famous glass slipper to life. Instead of using glass, Powell designed a five-inch heel made out of Swarovski crystal based on a shoe from the 1890s that she saw in a museum in Northampton, England. “The most important thing was the shoes had to sparkle, which meant it had to be made out of crystal because glass does not sparkle,” she explains. Eight pairs of the shoes were created, but James wore none due to the fact that crystal has no movement. To appear on-screen as if she were wearing glass shoes, the visual effects department turned her leather shoes she wore on set into crystal. “Just like the Fairy Godmother,” Powell says, “we can do magic.”
<urn:uuid:8b370bdd-2f7b-4c1d-a849-0c2391619c84>
CC-MAIN-2017-04
http://www.vanityfair.com/hollywood/2015/02/cinderella-wedding-gown-first-look
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280929.91/warc/CC-MAIN-20170116095120-00422-ip-10-171-10-70.ec2.internal.warc.gz
en
0.978789
1,149
1.648438
2
Maryland leads nation in crab catch One thing Maryland is known for most besides the Ravens and O's is the Chesapeake's crabs. According to new figures released by the National Marine Fisheries Service, Maryland's crab harvest led the nation last year. In Maryland, 88 million pounds of blue crabs were caught in 2011, more than a quarter of the crab harvest nationwide. While that's good news for those who catch the blue crab, the value of the harvest has dropped nearly 15 percent.
<urn:uuid:c582ec6c-174e-408c-a7f3-51caf8a4ac82>
CC-MAIN-2017-04
http://www.wbaltv.com/article/maryland-leads-nation-in-crab-catch/7076725
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00361-ip-10-171-10-70.ec2.internal.warc.gz
en
0.952554
101
2.109375
2
In February 2020, just weeks before COVID-19 would disrupt our education system and our economy, Dr. Marie Cini, former president of the Council for Adult and Experiential Learning (CAEL), said at a conference on adult learning in Chapel Hill, “the changes coming are of an immensity that we really can’t fathom.” Without ever naming COVID-19, Cini predicted incredible shifts in how our society will learn and work. “Our job isn’t just to front-load education,” she said, which means “give you your four years and now you are good to go.” In this coming world, she said, the kids born today will go through two to three major paradigm shifts during their lifetimes. Around the world, these shifts fundamentally will change “everything we know and do,” she said. If the internet was a shift for my generation, COVID-19, it turns out, may be this generation’s first one. They will have to continuously learn, Cini said. “It’s exciting,” she said, “It’s daunting. It’s challenging. It’s frightening. But it’s also exciting.” Like exercising and eating well, she said learning will happen every day for the rest of our lives as these shifts create new realities for learners and workers. North Carolina’s Adult Promise: The Higher Education and Workforce Imperative was held in Chapel Hill on Feb. 13, 2020. Adult Promise is a partnership between Lumina and the State Higher Education Executive Officers Association (SHEEO) investing in 15 “state-led efforts to better serve adults seeking education after high school.” This panel on national perspectives about connecting adult learners, workforce needs, and higher education features Cini and Hadass Sheffer, the founder and president of The Graduate! Network. Other articles about the Adult Promise conference Behind the Story Taylor Shain produced the videos featured in this article.
<urn:uuid:517a94e2-3c24-4506-b233-8c098049ffd4>
CC-MAIN-2022-33
https://www.ednc.org/how-changing-educational-opportunities-for-adult-learners-may-have-paved-the-way-for-how-we-think-about-education-post-covid-19/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz
en
0.954358
435
1.898438
2
Today is Presidents Day, which means that some people don’t have to work. I am not some people. It is also a good day to remember past presidents, specifically George Washington and Abraham Lincoln. The day is officially designated to remember Washington’s birthday (February 22), but Lincoln was also much admired and his birthday was also in February, so the tradition now includes both of them. Washington, the first U.S. president, was known for being the father of our country, leading the Revolutionary war, and his inability to lie about fallen fruit trees. He also said some pretty wise things: “I am sure that never was a people, who had more reason to acknowledge a Divine interposition in their affairs, than those of the United States; and I should be pained to believe that they have forgotten that agency, which was so often manifested during our Revolution, or that they failed to consider the omnipotence of that God who is alone able to protect them.” “Let your heart feel for the afflictions and distress of everyone, and let your hand give in proportion to your purse.” “Friendship is a plant of slow growth and must undergo and withstand the shocks of adversity before it is entitled to the appellation.” Abraham Lincoln is well-known for his height, the Civil War and the emancipation of the slaves. He has some great quotes as well, although I think Michael Scott may have gotten this one wrong: “Abraham Lincoln once said, ‘If you are a racist, I will attack you with the North.’ ” Here are some sayings we can actually attribute to the president: “Those who deny freedom to others, deserve it not for themselves; and, under a just God, can not long retain it.” “The probability that we may fall in the struggle ought not to deter us from the support of a cause we believe to be just; it shall not deter me.” “Whenever I hear any one arguing for slavery I feel a strong impulse to see it tried on him personally.” So whether you’re working today or not, please feel free to contribute to the discussion. Who are some of your favorite past presidents? Why do you like them? What good things did they say and do for the United States?
<urn:uuid:7f54fca2-92d4-4aac-971b-997900a8c407>
CC-MAIN-2022-33
https://www.boundless.org/blog/presidents-day/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00073.warc.gz
en
0.9815
494
2.953125
3
To add a footnote to the letter about our use of the A-bomb ["Japan had a choice in 1945," Aug. 9], many military experts, American and Japanese, feel that this action saved countless thousands of lives on both sides. The Japanese were prepared to fight to the bitter end to ward off an invading force. The concept of surrendering was alien to their outlook; it was considered shameful and disgraceful not only to the individual but also their families. Walter G. Karppi, East Norwich The letter about former President Harry S. Truman's grandson attending a memorial service for the victims of the atomic bomb attack on Hiroshima says that "it is symbolic of how we as Americans feel the need to apologize and want to make friends with our enemies past and present." That apparently sarcastic remark about our need to apologize is unwarranted and dangerous. Attendance at a memorial service is not tantamount to an apology; it simply shows a deserved respect for those victims. The mentality reflected by those remarks brings to mind the saying, an eye for an eye will make the world blind. In today's world, with nuclear warfare becoming more available to more countries, the threat is more dreadful than ever. We must strive to live in peace with others, including past, present and potential enemies.
<urn:uuid:a7534624-0ea1-4e4d-ba09-e8ea1b74ce67>
CC-MAIN-2016-44
http://www.newsday.com/opinion/letters/letters-nuclear-bombs-and-apologies-1.3902426
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720153.61/warc/CC-MAIN-20161020183840-00324-ip-10-171-6-4.ec2.internal.warc.gz
en
0.962712
264
2.828125
3
Former Chadian President Hissène Habré has died at age 79 in Senegal, where he was sentenced to life imprisonment for crimes against humanity after an unprecedented trial, Senegalese Justice Minister Malick Sall said Tuesday. “Habré has been handed over to his Lord,” the minister said on the TFM channel. Senegalese media reported that he had died of Covid-19. Hissène Habré, who ruled Chad from 1982 to 1990, was sentenced on 30 May 2016 to life imprisonment after an unprecedented trial in Dakar, after being found guilty of crimes like , rape, murder, slavery and kidnapping. A Chadian judicial commission of enquiry estimated that 40,000 people died as a result of the repression under the Habré regime. Hissène Habré, ousted in 1990, had found refuge in Senegal, as a result of international pressure, where the conditions for his trial were created and where he was arrested in 2013 and charged by a special court set up in cooperation with the African Union.
<urn:uuid:595079f6-f851-46d7-88a8-4741f0230c2a>
CC-MAIN-2022-33
https://africanwritings.wordpress.com/2021/08/24/former-chadian-president-hissene-habre-has-died-at-age-79/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00466.warc.gz
en
0.987713
225
1.507813
2
At a recent speech I gave at an event in Dublin, I discussed the history of cloud computing and its origins. I was speaking on behalf of Auxilion, an Irish IT managed services company moving and supporting organisation in the cloud. As I was talking to a room on non-technical people I purposefully kept the details light, high-level and of a non-technical nature. Basically the origins of cloud computing are very simple, but require the latest technologies to enable people to receive the benefits of using the cloud. I have saved the details up to Slide Share where you can download a or view a copy of the presentation. Please let me know if you have any questions or comments.
<urn:uuid:91636def-0cce-4dd4-8282-6da46645b0ec>
CC-MAIN-2022-33
https://redcirclestrategies.com/cloud-computing-a-brief-history-in-time/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00477.warc.gz
en
0.955191
142
1.710938
2
Chinese misuse the KYC details in their loan applications A publicization of a scandal by Chinese loan application, Reports drew a vulnerable misuse of Indian KYC details to set up fake bank and crypto exchange accounts without owners’ authorization. Shonali, a 48-year-old lecturer, has been through the same scandal where she lent money from a Chinese loan application from September 2020 to meet her financial stress; these applications fulfilled her needs but at a prime interest of 1% daily, trapping customers by providing micro-loans without collateral. In addition, they charge 14-15% of the loan amount as a processing fee. I used around 25 different fast lending applications. It was a debt trap, and I didn’t realize it, Shonali explains. Only an amount of Rs 2.4 lakhs had been a nightmare for her, shaping a suicidal circumstance even though she paid 7.8 lakhs with interest and answering all threat calls. Consolidation of the trap was ahead. In December 2020, Shonali lost access to all her accounts. A congratulating notice from Kotak Mahindra Bank and an OTP email from Bitbns, a cryptocurrency exchange for opening a new account, was shocking for her. She adds, “I didn’t have a Kotak bank account, and I did not know what a cryptocurrency exchange was. I also didn’t have access to two of these accounts”. Vikram, a Chennai resident who uses Chinese fast lending applications, discovered in February 2021 that they had exploited his KYC data to open an SBI bank account to which he did not have access. He’d also got an OTP through email from Bi-nance, a bitcoin exchange. A group of cybersecurity experts investigating Chinese-operated fast loan and online betting apps has been aiding loan app customers who have been deceived. They recorded five instances of loan defaulters’ KYC data being used to open accounts on crypto exchanges in February 2021; they said. Exchange accounts by an app in India have launched fake bank and crypto exchange accounts investigations. Many accounts may send money out of India in cryptocurrency, investigators say. Shonali defaulted on payment in one app and was redirected to other instant loan apps. Four of the 25 apps used by Shonali are under investigation by the Hyderabad police. “For example, a shell business called Huahuo handled collections for the credit bear lending app. One director worked for Link Yun Technologies, which handled the Dokupay betting app. “This is a large, tiny network engaged in a variety of illegal activities, including betting and digital lending, ” says Balaji Vijayaraghavan, General Secretary of Save them India Foundation. Telangana, Tamil Nadu, Karnataka, and Delhi police investigated the Chinese-operated quick lending and online betting apps. According to cybersecurity experts, many of these lending and betting applications are still running without repercussions. Seven Chinese nationals and over 35 Indians have been detained so far. Fake bank account victims have submitted their KYC information with lending applications, including their PAN card, driver’s license, and other papers. As a result, the victims don’t know which of the fast loan applications they used used their personal information to create bank and cryptocurrency exchange accounts. The bitcoin market in India is still in flux. Experts claim that KYC verification methods on these sites are not standardized. However, there are worries about the sector’s lack of openness.
<urn:uuid:041bd18b-3096-468f-ace3-ec8651cd39cd>
CC-MAIN-2022-33
https://www.dialabank.com/news/chinese-loan-application-misuse-kyc-details/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571234.82/warc/CC-MAIN-20220811042804-20220811072804-00078.warc.gz
en
0.965367
729
1.648438
2
UTICA, N.Y.—As the H1N1 swine flu vaccine becomes increasingly available, 46% of adults who are considered by the federal Centers for Disease Control to be members of high priority groups plan to ignore the CDC’s recommendation for vaccination. The Zogby International interactive survey also finds that the top reasons high risk adults plan to skip the vaccine include concern over the safety of the vaccine (38%) and a general sense that they simply do not need the vaccine (32%). Similar percentages of all adults surveyed nationwide fear the safety of the vaccine (32%) and also feel they do not need the vaccine (30%). Sixty-two percent of adults surveyed plan to skip the H1N1 vaccine; lead by Republicans (74%) and independents (68%), who are much more likely than Democrats (45%) to skip the vaccine. Southerners (69%) are also more inclined than adults who live in other areas to skip the vaccine, about 10 points higher than adults in other regions. Adults who identify themselves as Born Again Christians are also more likely (69%) to skip the vaccine than non-Born Again Christians (55%). Forty-seven percent of adults overall are very (16%) or somewhat (31%) concerned over nationwide vaccine delays and shortages. Of those who do not plan to get the vaccine, just 9% say they would be more likely to get the vaccine if they had a clearer understanding of when, where, and how the vaccine would be distributed. Only 28% of Americans who are not planning to get the H1N1 vaccine would reconsider their decision if a medical professional recommended they receive the vaccine. This is almost the same for those in the high priority groups, with 27% saying they would be more likely to be vaccinated if their medical professional recommended the vaccine. Twenty-one percent of adults in the high priority group would be more likely to seek the vaccination if family, friends, or coworkers became ill with H1N1. This online survey of 2,330 adults was conducted by Zogby International between Nov. 4 and 6. A sampling of Zogby International’s online panel, which is representative of the adult population of the US, was invited to participate. Slight weights were added region, party, age, race, religion, gender, and education to more accurately reflect the population. The margin of error is +/- 2.1 percentage points. Margins of error are higher in sub-groups. Connect with NJTODAY.NET Join NJTODAY.NET's free Email List to receive occasional updates delivered right to your email address!
<urn:uuid:c5abe6b5-c9b7-4d9e-8d5c-1c7f1d57fe2d>
CC-MAIN-2017-04
http://njtoday.net/2009/11/19/nearly-half-of-%E2%80%9Chigh-priority%E2%80%9D-adults-plan-to-skip-the-h1n1-vaccine/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280718.7/warc/CC-MAIN-20170116095120-00402-ip-10-171-10-70.ec2.internal.warc.gz
en
0.95786
537
1.960938
2
This article lists all information about CH4 8DB postcode, such as Residential Properties, Schools, and nearby places. Other information listed are property sales data, trends, estimated property prices, etc. It also covers Mailing address Info, Location Information, Map and directions, and Administrative details. You also get various information from the census like population, poverty, health index, etc. NN4 8GS is a residential postcode in Northampton, Northampton. NN4 8GS postcode is currently an active postcode. You can use the postcode to send mail within the building of the matched address closest to the postcode mean. According to the 2011 census, NN4 8GS has 33 properties within its service area. NN4 8GS is located in Delapre and Briar Hill, Northampton region with center coordinates 52.23112500, -0.89229900. The population of NN4 8GS postcode is 59, and all individuals are eligible to receive mail through Royal Mail Service. Properties in NN4 8GS area have been sold 51 times from 1995 to 2022. To get detailed information on sales, View the sales table below. Property Map of NN4 8GS Geography And Location Details |Grid Reference Code||SP757597| NN4 8GS postcode has center coordinates [52.23112,-0.89230]. Altitude reading for the postcode is 63 Meters above sea level. The postcode location can also be represented using #SP757597 National grid reference number. History And Statistics |Last Updated||August 2022| |Mail Frequency||Low (Postcode Recieves < 25 Mail per day)| |Postcode Range||Within the building of the matched address closest to the postcode mean| This Royal mail postcode was first introduced and became servicable in 2006-02-01. Total number of mails recieved in NN4 8GS is less than 25 mails per day. Mails getting delivered may take longer than normal as per Royal Mail records. Postcode range is limited to one specified apartment or building exactly at specified lat,long. |Rural / Urban||Urban city and town| |Poverty Ratio (IOMD)|| 13142 / 32767 |Census Output Area||E00169268| |Built Up Area||Northampton| |Built Up SubDivision||Northampton| |Lower Layer Output Super Area||Northampton 028F| |Middle Layer Output Super Area||Northampton 028| This location is an urban city and town. According to 2011 census, 40.11% of the people in NN4 8GS is below poverty. Adminstration And Postcode Areas |Hospital and Outreach Education||NN4 8EN| Properties in NN4 8GS Property Sales In NN4 8GS |38 FLAT 20, LION COURT, NORTHAMPTON, NN4 8GS||Flat / Maisonette (Leasehold)||£166,950 Demographic of property sales [1995-2022] Latest Property Sales Value |Average Property Price in 2022||276435 GBP| |Average Price of Flats in 2022||136206 GBP| |Average Price of Terraced property in 2022||239163 GBP| |Average Price of Semi-Detached property in 2022||273284 GBP| |Average Price of Detached Property in 2022||441119 GBP| Frequently Asked Questions You can send mail to anyone living in NN4 8GS through Royal Mail Service. - Copy the sample address and add property name/number to it. - if required add the recipient's name. - You can also browse the list of properties to find out the exact address. - Once you have noted down the address write it down on your To section of the envelope. - Drop the envelope in your nearest post office. To calculate distance between your current location and NN4 8GS just follow this link The recent average sale price of a property in NN4 8GS is 276435 GBP. But pricing may vary depending on the property type, For more details check the above table. Find all schools near the postcode listed in the schools section of this article. Its located in Northampton, Northampton. View the map section for more details. There are 29 properties in NN4 8GS as per Royal mail database. 38 Lion Court
<urn:uuid:f1e9e034-7708-4e53-8ecc-770a66f7c7b3>
CC-MAIN-2022-33
https://zestate.co.uk/postcode/NN4%208GS
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00674.warc.gz
en
0.786725
1,620
1.585938
2
Railroad Commission of Texas, Gas Utilities Division: An Inventory of Gas Utilities Division Stockholders Annual Reports at the Texas State Archives, 1963-1978 The Railroad Commission of Texas regulates the exploration, production, and transportation of oil and natural gas in Texas. Its statutory role is to prevent waste of the state's natural resources, to protect the correlative rights of different interest owners, to prevent pollution, and to provide safety in matters such as hydrogen sulfide. It oversees hazardous materials pipelines and natural gas pipelines and distribution systems as well as propane, butane, compressed natural gas, and liquefied natural gas. It works to make sure a continuous, safe supply of natural gas is available to Texas consumers at the lowest reasonable price. Additionally, the Commission regulates surface mining for coal, uranium, and iron ore gravel, and conducts a program for reclaiming lands that were mined and abandoned before 1975. The Railroad Commission of Texas had its origin in the demands of the shipping public in the late 1880s that insisted that railroads be subject to regulation based on public interest. An advocate for governmental regulation, Attorney General James Stephen Hogg ran for Governor in 1890 with the issue of railroad regulation as the focal point of the campaign. Hogg was elected Governor in the general election and the voters also approved an amendment to Article X, Section 2 of the Texas Constitution that empowered the Legislature to enact statutes creating regulatory agencies. These elections paved the way for the Legislature to enact on April 3, 1891 "An Act to Establish a Railroad Commission of the State of Texas," that later was placed in the Texas Revised Civil Statutes under article 6444 et seq. (House Bills 1, 3, and 58, 22nd Texas Legislature, Regular Session). The Commission originally consisted of three members appointed by the Governor for three-year terms. Governor Hogg appointed the first three Commissioners in 1891 including John H. Reagan, who resigned as U.S. Senator from Texas to serve as the first Chairman. The Texas Constitution, Article XIX, Section 30 was amended in 1894 to provide for elective six-year overlapping terms for the Commissioners. That same year John H. Reagan was elected and served until his retirement in 1903. The Texas Railroad Commission was the first regulatory agency created in the State of Texas and originally had jurisdiction over the rates and operations of railroads, terminals, wharves and express companies. The legal focus was on intrastate passenger and freight activities. Interstate jurisdiction fell under the U.S. Interstate Commerce Commission. For the first twenty-five years of its existence, the Railroad Commission was largely concerned with regulating railroads, setting rates, receiving complaints, and making investigations. As other controversies arose where the Legislature deemed that the public interest could best be served by regulation, additional duties were assigned to the Railroad Commission. The Railroad Commission's authority was broadened beginning in 1917 with the passage of the Pipeline Petroleum Law (Senate Bill 68, 35th Legislature, Regular Session) that declared pipelines to be common carriers like railroads and placed them under the Commission's jurisdiction. This was the first act to designate the Railroad Commission as the agency to administer conservation laws relating to oil and gas. The Commission's regulatory and enforcement powers in oil and gas were increased by the Oil and Gas Conservation Law (Senate Bill 350 of the 36th Legislature, Regular Session), effective June 18, 1919. This act gave the Railroad Commission jurisdiction to regulate the production of oil and gas. Acting upon this legislation, the Commission adopted in 1919 the first statewide rules regulating the oil and gas industry to promote conservation and safety, including Rule 37. This rule requires minimum distances between wells at drilling sites in order to protect field pressure and correlative rights. The Gas Utilities Act of 1920 (House Bill 11, 36th Legislature, 3rd Called Session) gave the Commission regulatory and rate authority over individuals and businesses producing, transporting, or distributing natural gas in Texas. In 1937, following a large natural gas explosion in a school in New London, Texas, the 45th Legislature passed legislation giving the Railroad Commission the authority to adopt rules and regulations pertaining to the odorization of natural gas or liquefied petroleum gases (House Bill 1017, Regular Session). The passage of the Public Regulatory Act of 1975 (PURA) (House Bill 819, 64th Legislature, Regular Session) required certain state regulatory agencies, including the Commission, to set the overall revenues of a utility based on its "cost of service." Regulation of liquefied petroleum was added to the Commission's responsibilities in 1939 by the 46th Legislature (House Bill 792, Regular Session). The legislation authorized the Commission to adopt and enforce safety rules and standards in the storage, handling, transportation, and odorization of butane or LP-gases. Regulation of compressed natural gas was added to the Railroad Commission's responsibilities in 1983 (Senate Bill 617, 68th Legislature, Regular Session). In 2005, the Rail Division and its remaining function, rail safety regulation, were transferred to the Texas Department of Transportation (House Bill 2702, 79th Legislature, Regular Session). The Railroad Commission no longer has any railroad-related functions. Three divisions with the agency have regulatory functions: the Gas Services Division, the Oil and Gas Division, and the Surface Mining and Reclamation Division. The Office of the General Counsel's Enforcement Section has enforcement powers, the Safety Division is responsible for the safe transportation of products through pipelines, installation of LP-Gas (propane), and the reporting of damage to pipelines through third-party damage reporting, and the Alternative Fuels Research and Education Division has research and education functions. Support divisions include the Public Information Office, Personnel, Finance and Administration, Information Technology Services, Intergovernmental Affairs, and the Office of Internal Audit. Three elected Commissioners direct the operations of the agency. The Gas Services Division works to ensure that a continuous safe supply of gas is available to Texas consumers at the lowest reasonable rates. The division establishes rates and services that are fair and reasonable for gas utilities and their customers; enforces those rates; maintains safety standards in the gas and hazardous liquids pipeline systems throughout the state by inspection and investigation of any hazards or accidents; oversees intrastate gathering and storage services; and adopts and maintains adequate safety rules and standards in the handling, transportation, and odorization of LP-gases (liquefied petroleum gases) for dealers, handlers, and consumers. It further regulates propane and compressed natural gas by requiring anyone working with these gases to pass a written qualifying exam administered by the Commission. The division also focuses on regulatory policy and analysis as well as identifying and eliminating natural gas transportation problems. There are four main sections in this division - Audit, Liquefied Petroleum Gas, Pipeline Safety, and Regulatory and Analysis. (Sources: Guide to Texas State Agencies, various editions; general laws and statutes; the Railroad Commission website, accessed on August 24, 2008; and the records themselves.) The Gas Services Division of the Railroad Commission of Texas (RRC) establishes rates and services for gas utilities and their customers and enforces those rates. These reports are copies of annual printed statements sent out by utility companies to their stockholders, dating 1963-1978. A copy was filed with the Gas Utilitities Division (later called the Gas Services Division) of the Railroad Commission of Texas. Each report contains the names of officers and director of the utility and a great deal of financial information on recent operations of the utility, typically including balance sheet data, assets, liabilities and stockholder's equity, real property, plants and equipment, operating data which includes earnings and dividends per share, and a ten year chart showing past financial performance. These reports are not standarized so there are some differences in the data presented. In a few cases, a financial statement or an income tax return was filed in place of the longer annual report statement. This finding aid describes one series of the Railroad Commission of Texas records. See Railroad Commission of Texas: An Overview of Records for more records series. To prepare this inventory, the described materials were cursorily reviewed to delineate series, to confirm the accuracy of contents lists, to provide an estimate of dates covered, and to determine record types. The reports are on microfilm, most are on one reel. The second reel contains a few reports and has retakes of most, but not all of the reports. Restrictions on Access Materials housed in the State Archives do not circulate, but may be used in the State Archives search room. Materials will be retrieved from and returned to storage areas by staff members. Restrictions on Use Most records created by Texas state agencies are not copyrighted and may be freely used in any way. State records also include materials received by, not created by, state agencies. Copyright remains with the creator. The researcher is responsible for complying with U.S. Copyright Law (Title 17 U.S.C.). Microfilm readers are available in the Geneology and Reference reading rooms at the Texas State Library and Archives. (Identify the item), Gas Utilities Division stockholders annual reports, Railroad Commission of Texas. Archives and Information Services Division, Texas State Library and Archives Commission. Accession number: 1981/120 These records were transferred to the Archives and Information Services Division of the Texas State Library and Archives Commission by the Railroad Commission of Texas on February 12, 1981. Inventoried by Laura K. Saegert, 1981 Described by Paul Beck, January 1987 DACS compliance by Laura K. Saegert, September 2008. Detailed Description of the Records
<urn:uuid:15091807-f62b-423f-8688-d4416e1945b0>
CC-MAIN-2017-04
http://www.lib.utexas.edu/taro/tslac/20099/20099-P.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284405.58/warc/CC-MAIN-20170116095124-00034-ip-10-171-10-70.ec2.internal.warc.gz
en
0.951818
1,954
2.9375
3
First, let's start by looking back at the history of some of the technology we use today, that we often take for granted, to understand how a good programming language and a good compiler can make the world shake, literally. Alan Turing was the first to formalize the model Turing Machine when building the Enigma computer for the second world war, to decrypt Nazi communications. Turing Machine Sketch It was a machine that read a tape and processed the tape input and wrote it back to the tape. Von Neuman Machine Later, after the Turing machine, John von Neuman, one of the guys behind the Hiroshima bombing, invented his own architecture. Von Neuman Machine Architecture The Von Neuman architecture is the predecessor of most modern computers, having a memory unit, and a Central Processing Unit (CPU), which has an arithmetic unit and control unit (knowing what’s next to run). The Big Machines More technical specifications were added to computers as time went on, such as rotating hard drives, buses, and multiple tape inputs. Since computers were a set of chips and hardware wired together, each hardware had its set of instructions and limitations, and programmers were to configure things up together, that’s why operating systems were mostly written in machine code. This came at a cost, computing power was expensive, so time-sharing Operating Systems were invented. They simply made terminals connect to one centralized mainframe, and share its computing power through a network. It's similar to what we now call cloud computing. Birth Of UNIX & C While building a time-sharing Operating System with General Electric and Bell Labs in machine code, Dennis Ritchie and Ken Thomson invented the C Programming Language. Dennis Ritchie and Ken Thomson The two engineers worked on UNIX as a time-sharing operating system written in C. Which made the OS modulable, easy to debug, and easily portable to other machines. Unix is the precursor to Linux, Android, iOS, and MacOSX, that power your phones and servers. Era Of Personal Computing Born out of a military background, and due to their expensive nature, computers were accessible by big corporations and governments only. Hobbyist computer clubs started emerging. At high-school Bill Gates and Paul Allen started a Traf-O-Data, a startup making a computer for road traffic hardware monitoring, using MITS technology. MITS a manufacturer of computers for adopted Intel 8080 for their Altair 8800. This made the processor popular among hobbyists. Bill Gates and Paul implemented BASIC for the Intel 8080 8-bits processor to make use of the Altair 8800 in their product line. Soon Bill Gates became famous in the hobbyist world. In 1975, MITS officially marketed their implementation as Altair BASIC and started buying services from them, which made them found Microsoft, to focus on software only. At the time, Atari was emerging as a leader of the revolution of video gaming machines. Back in the days games were implemented multiple ships and hard-wired. Programming was avoided because each game needed some audio and video features. Wires and more wires, no code. Steve Jobs and Steve Wozniak Steve Jobs knew that Atari wanted to develop Pong and optimize their use of transistors. Steve Wozniak optimized the transistors like hell, and made the Pong with as few chips as possible, which made them both good cash. MOS, an indie team, introduced the 6502 8-bits processor in 1975, which was the cheapest on the market. It was just like the raspberry pie or Arduino in their days. To make his name just like Bill Gates, Steve Wozniak worked on a BASIC compiler for the 6502 chip, and made it for their Apple I to get the respect of their hobbyist community. "But I had in the back of my head that I could be a star, that I could get a little fame in the hobby world, like Bill Gates, if I created the first BASIC for the 6502" — Steve Wozniak Wozniak was learning to make video games in BASIC, frustrated he upgraded the hardware (audio, timers, colors). He then made a video game in BASIC, that was configurable. In other words, he could write video games and iterate over changing their design in half an hour, what would take ATARI 10 years of work. It was a revolution, the Apple II was born, making the success of Apple in the computer market. Then personal computers and smartphones happened. To open new possibilities, engineers invent new sensors, processors, memory technology each year. Still the gap of making software compatible and making developers adopt it remains a tough challenge in the Information technology industry. Java tried to solve this problem with its Java Virtual Machine, while many interpreted languages, such as PHP, Python, and Ruby, jumped the shark with their Just In Time compilers. With these languages, we were able to build more desirable software in the least amount of time and frustration, but none of these languages could be at the power of the low-level static languages such as C and C++. At a macro level, servers and desktops, performance is just a cost in the equation, but when we get to program hand-held devices and also now we talk about the Internet of Things, i.e. devices which have limited memory and CPU power, we have no other option. Simply because writing a language is simply a tough job, there is a lot of voodoo work you have to do. Building a compiler, a debugger, an optimizer, translators (back-end) for each platform. In 2002, Chris Lattner invented LLVM, an infrastructure for programming languages. It is a common framework for anyone who wants to write a compiler, debugger, an emulator, and why not virtual machines. As a result, he was awarded the Nobel prize equivalent for software, the ACM System Software Award in 2012, the same award that was given to UNIX, TCP/IP, and the World Wide Web. Now LLVM has replaced GCC, the de-facto compiler for C, and is now used everywhere from Nintendo Games porting, running video games inside FireFox, to creating beautiful languages such as Apple's Swift. It's partly thanks to LLVM that XCode toolkit and iOS was bread and butter for developers during all these years. Chris Lattner joined Apple in 2005, he played a huge role in the making of iOS and the XCode Developer tool-chain, he started working on Swift in 2010, and now he is Senior Director of XCode and Apple dev tools. This week Apple announced that Swift is Open Source. I hope we'll be able to build programs easily for embedded systems and the Internet-of-Things devices. Just like it did unfold for Wozniak and Bill Gates, I hope history will repeat itself.
<urn:uuid:0697e453-1486-488b-b723-e9dac8c985d7>
CC-MAIN-2017-04
http://www.iafrikan.com/2015/12/06/why-i-believe-apples-swift-going-open-source-gives-hope-to-the-future-of-computing/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00332-ip-10-171-10-70.ec2.internal.warc.gz
en
0.963314
1,448
3.65625
4
*Homes.com Home Value is not an appraisal; it’s an estimate of value based on certain information. Use as a starting point, but we strongly recommend you contact a real estate professional for a more detailed evaluation. Click here to learn more or see FAQs. - Average people per household: 2.28 - Median age of population: 43.3 Job & Employment - Unemployment Rate: 6.8% - Job growth in past 1 year: -5.69% - Project job growth next 10 years: 21.82% - Median income of household: $47,383
<urn:uuid:c9828922-fa72-4fec-8e5c-4d4f142fb3a3>
CC-MAIN-2017-04
http://www.homes.com/Home-Prices/IN/SANDBORN/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280900.71/warc/CC-MAIN-20170116095120-00001-ip-10-171-10-70.ec2.internal.warc.gz
en
0.842383
129
1.789063
2
شاید بعضی ها فکر کنند که دایره لغات خیلی خوب و بزرگی دارند. 15 لغتی که شکل زیر می بینید جزء کم کاربردترین و عجیب ترین لغات موجود در زبان انگلیسی هستند. در انتهای پست می توانید معانی کلمات را مشاهده کنید. آنهایی که ادعای کامل بودن دایره لغات می کنند می توانند این چالش را تجربه کنند! Gobemouche: One who believes anything, no matter how absurd Plinyism : A statement or account of dubious correctness or accuracy, such as some found in the Naturalis Historia of Pliny the Elder Yepsen :The amount that can be held in two hands cupped together also, the two cupped hands themselves Natiform : Buttock-shaped Inadvertist : One who persistently fails to take notice of things Obmutescence : The state or condition of obstinately or willfully refusing to speak Scrouge : To inconvenience or discomfort a person by pressing against him or her or by standing too close Quaresimal : Said of a meal, having the qualities of food served during Lent; austere, skimpy Fard : To paint the face with cosmetics, so as to hide blemishes Maritality : Excessive or undue affection on the part of a wife for her husband Hansardize : To show that a person has previously espoused opinions differing from the ones he or she now holds Agerasia : A lack of the signs of old ages; a youthful old age Bed-swerver: An unfaithful spouse Bayard : A person armed with the self-confidence of ignorance Killcrop : A brat who never ceases to be hungry, and was popularly thought to be a fairy that was substituted for the child
<urn:uuid:bae14cee-61d5-49ae-8d6c-13b5dc36984c>
CC-MAIN-2017-04
http://jaka.ir/2016/08/15-%D9%84%D8%BA%D8%AA-%D8%A8%D8%A7%D9%88%D8%B1%D9%86%DA%A9%D8%B1%D8%AF%D9%86%DB%8C-%D8%AF%D8%B1-%D8%B2%D8%A8%D8%A7%D9%86-%D8%A7%D9%86%DA%AF%D9%84%DB%8C%D8%B3%DB%8C/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00325-ip-10-171-10-70.ec2.internal.warc.gz
en
0.65049
622
2.046875
2
Sunlight is more powerful than any drug; it is safe, effective and available free of charge. If it could be trademarked, it would be history’s greatest medical breakthrough. And that’s because sunlight produces vitamin D in the body. In the summer months, the human body can synthesize vitamin D when just 10 percent of their total body surface is exposed to ultraviolet rays for 15 to 30 minutes a day. However, during the winter, when there is a lower solar angle, sun exposure may not be sufficient to maintain vitamin D levels for people who live in the northern half of the U.S. and the whole of Canada. This is when dietary intake may be needed. Vitamin D has been identified as an important nutrient to help fight against cancer and to boost bone health. But now, another benefit of this great nutrient has come to light; a team of researchers at the University of Buffalo (UB) has discovered that vitamin D may play a crucial role in preventing age-related macular degeneration (AMD) in women. Macular degeneration is characterized by the destruction of the macula, a small part of the central retina where there is a concentration of the rods and cones (photoreceptors) of the eye. According to the American Macular Degeneration Foundation, macular degeneration is the leading cause of legal blindness, and it is seen in more than 10 million Americans. People with AMD often notice a blurriness in the center of their field of vision. Akin to what you’d see if a drop of water is on the center of a lens you’re looking through. According to Amy Millen, associate professor of epidemiology and environmental health in UB’s School of Public Health and Health Professions, no other study so far has looked at the interaction between genetic risk and vitamin D status in the context of age-related eye disease. The details of the study appear online in the August 27th issue of JAMA Ophthalmology. The team of researchers found that women who are deficient in vitamin D and have a specific high-risk genotype are 6.7 times more likely to develop AMD than women with sufficient vitamin D status and no high-risk genotype. While the study is not one that can by itself prove a causal association between vitamin D and AMD, it does indicate that if your genetic risk for AMD is high, getting adequate vitamin D might help reduce your risk. For the study, the researchers analyzed data compiled from CAREDS (Carotenoids in Age-Related Eye Disease Study). They looked at the records of 1,230 women ages 54 to 74 who participated in CAREDS. Researchers were able to determine the participants’ vitamin D status by analyzing serum samples for 25-hydroxyvitamin D. This provided the researchers a holistic glimpse into vitamin D intake via diet, supplements and sunlight. The results of the study suggest that being deficient for vitamin D may increase one’s risk for AMD, and that this increased risk may be most profound in those with the highest genetic risk for developing AMD. Macular degeneration has been found to be strongly associated with genetic risk. Vitamin D shows promise for protecting against macular degeneration because of its anti-inflammatory properties. According to Millen, the main message from the study is that having deficient vitamin D levels may be unhealthy for your eyes. It doesn’t mean that achieving really high levels of vitamin D are good for the eye. To put it in simple English: The study is not supposed to make people want to run to the nearest grocery store and purchase vitamin D supplements. There are certain groups of people who have a higher risk of vitamin D deficiency than others. They are: A vitamin D deficiency can manifest itself in many ways. The most common symptoms are muscle weakness, muscle stiffness, body aches and bone pain. However, most cases of vitamin deficiency are asymptomatic where the symptoms are either very subtle or non-existent. But even without symptoms, too little vitamin D can pose health risks. Low blood levels of the vitamin have been associated with increased risk of death from heart disease, brain malfunction in adults, severe asthma in children and even cancer. Moreover, research suggests that vitamin D could play a vital role in preventing and treating a number of different conditions, including hypertension, multiple sclerosis, glucose intolerance and type-1 and type-2 diabetes. Aging is the biggest risk factor for age-related macular degeneration. AMD can begin in your early 40s and one can notice changes to their central vision. Race is another uncontrollable factors of AMD – Caucasians are more likely to develop AMD. Family history also plays a part. Although you cannot control aging, race and family history, there are other risk factors which increase your risk that are manageable. Factors like: Come to think of it, there are very few vitamin D foods in nature. Fish liver oils and the flesh of fatty fish such as tuna, mackerel and salmon are among the best sources. Small amounts of vitamin D are found in egg yolks, cheese and beef liver. Vitamin D in these foods is primarily in the form of vitamin D3. Some mushrooms provide vitamin D2 in variable amounts. But you can get mushrooms with enhanced levels of vitamin D2 from being exposed to ultraviolet light under controlled settings. Since not many foods provide vitamin D, and when rickets was a commonly spreading disease caused by vitamin D deficiency, the United States government started a milk fortification program to combat rickets. Since then the governments of America and Canada have introduced vitamin D in fortified foods. For example, almost all of the U.S. milk supply is voluntarily fortified with 100 IU/cup. In Canada, milk is fortified by law with 35–40 IU/100 ml. Vitamin D is also introduced in ready-to-eat breakfast cereals, some brands of orange juice, yogurt, margarine and other food products. Acute macular degeneration can be prevented with proper care for the eyes and overall health. There is clear evidence that certain lifestyle choices can slow down macular degeneration and may even help prevent it in some people. Here are a few lifestyle tips to help you stay healthy: Quit smoking. Smoking increases your risk of developing macular degeneration two to five times! Reduce blood pressure. The link between high blood pressure and AMD has been the subject of much research. Evidence points that high blood pressure increases the risk of AMD. Reduce cholesterol. People with high cholesterol have a greater chance of developing macular degeneration. Eat vegetables and fruit. Antioxidants in fruits and vegetables fight free radicals and protect against AMD. Eat more fish. People who eat omega-3 rich fish two to three times a week have a lower risk for AMD. The best fish are either wild salmon or small fish like sardines. For vegetarians, an omega-3 supplement is a viable option. Avoided processed foods. Research shows that saturated fat that is commonly seen in processed foods contributes to AMD. Get more exercise. People with a sedentary lifestyle and people who are obese are more prone to developing macular degeneration. Avoid exposure to sunlight. The ultraviolet light and blue light can damage your retina and may increase your chances of developing macular degeneration. As you have read, there are a lot of things you can do that may slow down the progression of macular degeneration and vision loss and improve overall eye health. Vitamin D plays an important role, but is not the only way to keep macular degeneration at bay. Your lifestyle choices and your diet play a crucial role in preventing or at least delaying this dreaded vision condition. Making a few changes today can help you in the long run. And if you have a family member with AMD, or one of the other risk factors that you can’t control, you should be paying even closer attention to see if you have low vitamin D levels.
<urn:uuid:e005bf83-4e0b-46f0-9dee-e29c7a008abf>
CC-MAIN-2017-04
http://www.belmarrahealth.com/vitamin-d-deficiency-linked-to-age-related-macular-degeneration/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284411.66/warc/CC-MAIN-20170116095124-00464-ip-10-171-10-70.ec2.internal.warc.gz
en
0.93492
1,647
3.515625
4
Updated: Jul 8 The family reunion has become a tradition of summer. They’ve evolved beyond picnics, to include week-end celebrations, and week-long cruises. These days reunions may bring biological kin to the table, or the reunion may be a non-traditional gathering of unrelated “cousins” sharing the bond of community and common interests. For those planning a reunion compare it to training for a sports event. You need a game plan, patience and stamina, positive energy and an energetic team willing to carry the baton when called upon. And you’ll need identifying family garb—the t-shirt. As the primary organizer aka team captain, you draft the overall game plan which should include elements of the following tasks and assignments delegating some aspect of the tasks to the reunion team. You may not need each of these, but most likely you’ll want to create committees or sub-teams to tackle this list. • Site Selection • Budget or Finance • Fundraising • Correspondence and communication • T-shirts • Programming & activities • Family history • Food or Catering • Setup and Breakdown In training for any event, you need to be in shape—exercise regularly. Thirty minutes of daily exercise stimulates chemicals in the brain that can leave you feeling happier and more relaxed. Regular exercise can minimize stress, boost energy, improve stamina and sleep, and help maintain a healthy weight. You don’t want snacks served at reunion planning meetings turning into chips on the hips! Planning meetings need snacks, and this is a good time to test snack choices for the actual reunion. In just about every family or group, there are folks with health concerns that may need special consideration when it comes to planning meals. Try to avoid high-salt and high-sugar options. For snacks choose traditional potato or tortilla chips and baked chips too. Include fresh fruit—apples, oranges, and bananas, they are high in vitamins, and fiber which will fill you up without a lot of calories. When the reunion includes tours or extended activities create a snack pack for everyone. Include single-serve boxed raisins, a handful of nuts (1-2- ozs.), or peanut butter-filled crackers plus 8 to 10(ozs.) of bottled water to help people stay energized and hydrated As you plan menus, this is a good time to look at family health issues, choosing dishes that include healthful ingredients. Most often during reunions the emphasis is placed on ancestor searches, old wise tales and family heritage, but it is very important to include family medical history in these anecdotal conversations. Family members need to know when diseases run in the family, and of those affecting the relatives if they are lifestyle related or genetic. Family medical history is an important aspect of the family legacy, and the knowledge can be lifesaving. Once you pull the team together and outline the “To Do” list with a couple of tasks that may require voluntold action, you’re almost home safe. Collect family sizes to order the t-shirts and the reunion team is ready to hit the road. The take-away: Family reunions create opportunities to reconnect and fellowship with immediate and extended family members—put the time to good use learning about any recurring ailments, and medical history along with the traditional family lore. Please follow and like us:
<urn:uuid:99c0b4d7-d93f-43af-8ea3-c60ee2cf1f34>
CC-MAIN-2022-33
https://www.thenutritionplanner.com/post/plan-a-winning-family-reunion
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00073.warc.gz
en
0.934527
702
1.523438
2
As America began to wake up to the knock-on effects of the Coronavirus, there was one group that was suddenly hailed as the heroes of the nation. No, we are not talking about doctors, who rightly hold a special place in most people’s hearts, but truckers. Trucking companies and the trucking industry as a whole were suddenly under the spotlight as people started to realize that their goods didn’t magically appear on their shelves. It is clear then that the trucking industry is a silent giant. So to gain some perspective on just how big it is, check out our bumper list of trucking facts. 1. Where the Trucking Industry Started The world of trucking wouldn’t be anything without one man, Charles Fruehauf. A blacksmith and carriage maker, Fruehauf was requested to come up with a way of hauling a boat behind a Ford Model T in 1914. Fruehauf came good, invented the trailer and the rest is history. 2. The Silent Majority It is fair to say that, unlike other more common professions, not many can profess to know a truck driver. Perhaps due to them moving about so often but it is not because there aren’t many. Approximately 3.6 million truckers are working in America, making up the larger 7.95 million workforce working in the trucking industry as a whole. 3. On the Road Again If you have ever gone on a long drive across the country, you can appear to pass countless trucks on the highway. That makes sense when you know how many there are in the country! 36.9 million are registered to be used for business purposes and bearing in mind how much we depend on them that isn’t a bad thing. 4. Know When to Hit the Breaks We know that we should be careful when driving behind or in front of a truck. But when you know their breaking capacity that only emphasizes it. Trucks take up to 40% longer to break, and that’s not taking into account any of the countless variables. For this reason, it is recommended to leave at least an 8 seconds gap when driving next to one and to double that number should it rain. 5. Women in Trucking 6.6% of truck drivers are women highlighting what a male-dominated industry it is. This is slightly changing however and while it is fair to say that women face different challenges than men, it is clear that they are more ready than ever to take up their place in the trucking industry. 6. Money Maker It’s clear that there is money in the trucking industry, but do you know how much? In 2019 an astronomical $791.1 billion was generated, making up a hefty 80.4% of the nation’s freight bill. So what are they moving? A heavy haul trucking company can move anything from food, merchandise for retail, liquids, and construction goods and materials. 7. Heavy Hitters Truck companies move heavy loads, but how heavy are we talking? A semi with a full load will take a max load of 80,000 pounds with an empty semi with no load comes in at 35,000 pounds. To give you some perspective, America’s most popular car, the Ford F weighs approximately between 4-4,600 pounds. Full Speed Ahead for the Trucking Industry As mentioned at the outset, the trucking industry is one of the foundations of any modern society. The large numbers we have presented give you a glimpse into just how much of a behemoth it is. Here’s to it remaining that way long into the future. We hope that you learned something from our comprehensive collection of facts about trucking. If you did then be sure to check out the other great content on our site.
<urn:uuid:1d41e809-8de3-48b9-9b1f-2ce72bdddba0>
CC-MAIN-2022-33
https://www.youfixcars.com/4655/7-interesting-facts-about-the-trucking-industry/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570741.21/warc/CC-MAIN-20220808001418-20220808031418-00065.warc.gz
en
0.957954
806
2.515625
3
Something was rotten in a London art gallery last week — an installation of sequin-embroidered decomposing fish sealed in clear plastic bags. But before the exhibit even opened, the malodorous artwork unexpectedly combusted and set fire to the gallery. The installation — a piece called "Majestic Splendor" by Lee Bul — was part of an exhibition of the Korean artist's work, scheduled to open at the Hayward Gallery on May 30. Then, hours before the show's first preview, the gassy art blew up, causing a fire that damaged part of the gallery, artnet News reported. [Top 10 Greatest Explosions Ever] Even though the exhibit was not yet open to the public, gallery officials had already decided to remove "Majestic Splendor" from the show for safety reasons. They had learned earlier that a chemical added to the fishes' bags to dampen their smell could become flammable after combining with gases released by the decomposing flesh, and art handlers were taking down the art as a precaution when it suddenly combusted and sparked a fire, a gallery spokesperson told frieze magazine. "Majestic Splendor" previously raised eyebrows — and wrinkled noses — when it was presented at The Museum of Modern Art (MoMA) in New York City in January 1997. Dozens of small, transparent bags were fixed to a wall; each contained a rotting fish decorated with stitched-on sequins and beads, representing Bul's scathing commentary on the fleeting nature of beauty for highly ornamented women, according to the 1997 MoMA exhibition catalog. But after a custom-designed refrigeration unit for the MoMA installation failed, the smell was so awful that museum officials nixed the display and removed it, and subsequent showings included an odor-reducing chemical known as potassium permanganate, the Guardian reported. Scents and sensibility As fish decay, they emit amines — compounds of carbon, hydrogen and nitrogen — which produce odors that are intensely powerful and distinctively "fishy," Preston MacDougall, a professor with the Department of Chemistry at Middle Tennessee State University, told Live Science in an email. But these compounds aren't just smelly — they're also potentially explosive. Certain molecular bonds connecting hydrogen and carbon can release a lot of energy when vaporized — in gasoline, high-energy bonds in hydrocarbon molecules give the fuel its kick (and make it highly flammable). Similar energy reserves lurk in the molecular bonds of hydrogen and carbon compounds produced by decomposing fish, creating the possibility of an explosion under the right conditions, MacDougall explained. For the new show and for previous installations after the MoMA debacle, potassium permanganate — also known as KMnO4 — was added to "Majestic Splendor" to reduce the smell of the rotting fish. In fact, KMnO4 is a time-honored choice for masking strong odors, Raychelle Burks, an assistant professor of chemistry at St. Edward's University in Austin, Texas, told Live Science in an email. "This chemical is a good oxidizing agent, reacting with a range of stinky, volatile organic compounds (VOCs) to produce far less stinky or no-stink compounds," Burks said. But when combined with combustible material, KMnO4 is known to trigger violent explosions under certain circumstances, she added. It's possible that the compounds produced by the putrefying fish interacted with KMnO4 to spark combustion, but it's also likely that the explosion was caused by pressure buildup from trapped gases that had nowhere to go, similar to the effect that causes beached and bloated dead whales to explode, Burks told Live Science. After the gallery incident, firefighters quickly put out the blaze, and a security guard was treated for smoke inhalation; damage to the Hayward Gallery from the fire was "superficial" and contained in one small section of the exhibit space, according to artnet News. The exhibit, titled "Crashing," opens today (June 1) and will run through Aug. 19 — minus the malodorous and volatile fish display. Original article on Live Science.
<urn:uuid:c25bc7fd-781d-4655-a55e-165bfdbec3ef>
CC-MAIN-2022-33
https://www.livescience.com/62732-rotting-fish-explosion-art-gallery.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00472.warc.gz
en
0.95802
864
2.125
2
Careful wound care and good nutrition are essential for people with epidermolysis bullosa. Blisters can lead to scarring, infection and deformity. Your doctor can show you how to care for blisters properly and advise you on ways to prevent them. If blisters are left intact, they can enlarge, which creates a bigger wound when they finally break. Talk to your doctor about safe ways for you to break and drain blisters before they get too large. Your doctor can also recommend products to use to keep the affected areas moist to promote healing, such as gauze that contains a moisturizing agent, and prevent infection. When tending to your child's wounds: - Wash your hands before touching your child's blisters or changing dressings. - If a soiled dressing sticks, don't pull it off. Soak the area in warm water until the dressing loosens. Easing the pain of blisters and wound care: - Nonprescription pain medications, take orally or apply to dressings Caring for skin and dressing wounds Careful wound care can help healing and prevent infection. Your doctor may recommend the following tips for treating blisters and raw skin: - Control pain. About 30 minutes before a dressing change or other painful procedure, older children and adults may take a prescription-strength pain medication. For people who don't respond to pain relievers, other options include anti-seizure drugs such as gabapentin and pregabalin. - Cleanse skin daily. To cleanse a wound, soak it for five to 10 minutes in a mild solution of salt and water. Other options are mild solutions of diluted vinegar or bleach. Soaking also helps reduce the pain of changing bandages. Rinse with lukewarm water. - Puncture new blisters. This prevents them from spreading. Use a sterile needle to puncture the blister in two spots. But leave the roof of the blisters intact to allow for drainage while protecting the underlying skin. Apply creams or lotions and cover with dressings. Use antibiotic ointment, petroleum jelly or other moisturizing substance. Then cover the area with a special nonsticking bandage (Mepilex, PolyMem, others). If you use antibiotic creams for a long time, rotate the type you use each month. You can choose from a wide variety of dressings, based on the type of eipdermoylis bullosa you're dealing with, the size and location of the wounds, availability, and cost. You may need to hold dressings in place with rolled gauze. - Wrap blistered hands and feet daily. With some severe forms of this condition, daily wraps help prevent deformities and fusion of the fingers and toes. Special wraps (Mepitel, others) and gauze dressings (Vaseline Petrolatum Gauze Strip, others) are useful for this treatment. If blisters in the mouth or throat make it difficult for your child to eat, here are some suggestions: Aug. 22, 2014 - If your infant develops blisters from breast-feeding or bottle-feeding, apply an oral gel to relieve pain. You might also try nipples designed for premature infants, a syringe or a rubber-tipped medicine dropper. - For older children, serve nutritious, soft foods that are easy to swallow, such as vegetable soup and fruit smoothies. Puree solid foods with broth or milk. - Serve nutritious foods that are easy to swallow, such as vegetable soups and fruit smoothies. - Serve food and beverages lukewarm, at room temperature or cold. - Talk with your doctor about using supplements to minimize nutrient and vitamin deficiencies. - Fine JD, et al. Inherited epidermolysis bullosa: Updated recommendations on diagnosis and classification. Journal of the American Academy of Dermatology. In press. Accessed April 9, 2014. - Pickert A, et al. Immunodermatology and blistering disorders. Journal of American Academy of Dermatology. 2013;68:AB110. - Pride HB, et al. What's new in pediatric dermatology? Part 1. Diagnosis and pathogenesis. Journal of the American Academy of Dermatology. 2013;68:885.e2. - Brick K, et al. Epidermolysis bullosa pruriginosa: Further clarification of the phenotype. Pediatric Dermatology. 2012;29:732. - Lehman JS, et al. Epidermolysis bullosa acquisita: Concise review and practical considerations. International Journal of Dermatology. 2009;48:227. - Epidermolysis bullosa. National Institute of Arthritis and Musculoskeletal and Skin Diseases. http://www.niams.nih.gov/Health_Info/Epidermolysis_Bullosa/. Accessed April 10, 2014. - About EB. Dystrophic Epidermolysis Bullosa Research Association of America. http://www.debra.org/abouteb. Accessed April 10, 2014. - AskMayoExpert. Pemphigoid. Rochester, Minn.: Mayo Foundation for Medical Education and Research; 2014. - Lebwohl MG. Treatment of Skin Disease. 4th ed. Philadelphia, Pa.: Elsevier Saunders; 2014. http://www.clinicalkey.com. Accessed April 10, 2014. - Pope E, et al. A consensus approach to wound care in epidermolysis bullosa. Journal of the American Academy of Dermatology. 2010;67:904. - Gonzalez ME. Evaluation and treatment of the newborn with epidermolysis bullosa. Seminars in Perinatology. 2013;37:32. - Lakdawala N, et al. The role of nutrition in dermatologic diseases: Facts and controversies. Clinics in Dermatology. 2013;31:677. - Jurj G, et al. Epidermolysis bullosa: Report of three cases treated with homeopathy. Homeopathy. 2011;100:264. - Healthcare problems. Dystrophic Epidermolysis Bullosa Research Association. http://www.debra.org/healthcare. Accessed June 10, 2011. Accessed April 10, 2014. - Hand JL (expert opinion). Mayo Clinic, Rochester, Minn. May 8, 2014.
<urn:uuid:2014da25-6141-4c41-b240-b4a8fcdf5148>
CC-MAIN-2016-44
http://www.mayoclinic.org/diseases-conditions/epidermolysis-bullosa/basics/lifestyle-home-remedies/con-20032497?footprints=mine
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720238.63/warc/CC-MAIN-20161020183840-00188-ip-10-171-6-4.ec2.internal.warc.gz
en
0.840887
1,349
3.125
3
Chrome’s iconic messenger bags helped put a face on the messenger inner city cycling subculture. The sharp, understated design has sparked many imitators, and been the source of envy for countless broke cyclists. These days, Chrome Bags aren’t just for riders. They’ve become the de rigueur city bag for anyone looking for a tough bag capable of withstanding everyday abuse. What most consumers are unaware of is that seventy percent of their bags are handmade in Northern California, just a few hours outside of San Francisco. Buckle in and zip past the break to see how it’s done… Every new idea designed in Chrome’s San Francisco based HQ takes its first steps toward becoming a real product in the sampling room. Here, in a small office filled with sketches, prototype bags, and design templates, the latest concepts pass through Clara’s capable hands. As an expert seamstress, her knowledge and years of experience form the principle bridge between design and manufacturing. Her role is to take the sketches, blocks (sewing patterns), or roughly sewn samples which arrive and render them into production worthy prototypes. In the process, she is often able to anticipate failures and minimize waste by creating more efficient patterns. Fabric & Cutting One of the larger rooms in the factory is lined entirely with fabrics in dozens of different colors. Chrome bags are made predominantly with two different materials – a weatherproof Cordura outer shell and a tarpaulin inner liner. While the majority of bags sold are a variation of a few basic color staples, the company offers extensive customization via their online store and retail hubs. The employees take a tremendous amount of pride in being able to turn around customer orders quickly. They pull all the bits and pieces required for custom bags every morning, roll them into a “burrito,” and strive to have orders shipped by the end of the business day. While a pair of custom Nike shoes make take 6-8 weeks to arrive at your door step, a custom Chrome Bag is sewn and shipped from the factory in under seventy two hours. The other side of the fabrics room is lined with patterns. Each pattern is printed on one of two machines. The original printer required patterns to be printed on two separate pieces of paper then taped together. The second, shown on the left, can print patterns without having to resort to stitching sheets of paper together, because it’s the little things that improve efficiency. The patterns are made for either four or six bags and positioned in order to minimize total waste. Each cutting jig can trim up to 80 sheets of Cordura at a time. Mid-day collection of scrap. Once the materials are cut they’re placed on racks and wheeled out to the factory floor as needed. The items cued next for production are known as WIPs (works in progress). This is just one small half the factory floor. The smaller bags are produced on this side and larger bags are sewn on the other. The walls of the factory floor are lined throughout with patterns showing each stage of construction. The majority of the sewing machines in this factory are over twenty years old. The industrial grade units were produced in Japan and only require routine maintenance every few months. Jesus, with over forty years of experience in the industry, is their mechanical sheppard. Not only does he maintain and repair all the units, but he is constantly listening to feedback from the team and looking for ways to make things work more efficiently. For example, the machine in the top left corner has been used to sew labels onto the thousands of bags the factory produces annually. It’s a simple machine that uses a guide to automate the sewing process, but until just a few years ago, you couldn’t buy a tool to do that. Even now, a dedicated machine would cost roughly $1,500 USD. Jesus deftly modified existing machinery in order to create something for this intended application. His various little modifications to existing machinery have all contributed to small (but important) improvements in efficiency. Quality Control & Shipping Each Chrome bag is “built” twice. First, when the inner liner is sewn together and then the outer. After a set of bags is completed, there is a two part inspection process. During the first inspection, the seams, connectors, and double tacks are checked. The next inspector does a brief examination while preparing the bag for packaging. The careful inspection process results in a less than 1% failure rate on bags. Made in America Nearly three quarters of the bags that Chrome produces are handmade in the United States. Today, the rising cost of shipping, labor, and the ability to quickly make and distribute products offer big advantages over foreign production. By producing the majority of their bags in California, just a few hours’ drive from HQ, they’re able to work hand in hand to develop quality products befitting of a lifetime warranty. The other big advantage of American production is basic efficiency. Every process at the factory is carefully time studied. Almost ten years ago, a classic messenger bag took over thirty minutes to produce. In the intervening years they’ve managed to cut that time down by roughly seven minutes! So why are some of their bags produced overseas? According to the Steve McCallion, Chrome’s President, “Our goal is to make everything in America, simple as that. Some of our technical bags require specific machines that we just do not have due to cost restraints. When we are faced with limitations we look for opportunities to solve the problem. Doing so allows us to build a better product for our customers.” Special Thanks to Chrome Bags
<urn:uuid:df6eee7f-344c-4927-8a8b-ed85871e176a>
CC-MAIN-2017-04
https://www.bikerumor.com/2013/04/03/factory-tour-chromes-impressive-us-bag-production/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280410.21/warc/CC-MAIN-20170116095120-00453-ip-10-171-10-70.ec2.internal.warc.gz
en
0.948202
1,187
1.601563
2
Download Full Text (1.5 MB) College, Institute, or Department MD-PhD Scholars Program Hani Haider, PhD Computer-aided surgery capabilities for arthroplasty interventions emerged in the late 1990s with limited capabilities and use in the field. The goal of computer-aided surgery in the field of arthroplasty remains to reduce the need for excessive drilling tissue damage to the surgical site by reducing the need for cutting guides and related jigs. In order to assess the capabilities of computer-aided surgery systems in terms of both their accuracy and precision, the development and adherence to an industry standard for testing is necessary. A phantom device with divots of a known coordinate location was used in conjunction with proprietary software to assess the accuracy and precision of the complete surgical system. Measured coordinate data of a single point using the proprietary software was transformed according to the balloted ASTM standard for the generation of an accuracy and precision report. Results indicate 0.255 mm accuracy and sub-millimeter precision under conditions most similar to an operating room. Functional extreme tests indicate a loss of performance, leading to maximum decreased accuracy of 1.71 mm during standard orientation and 4.32 mm during extreme orientation of the phantom. The results suggest the tracking and software system meet manufacturer data under standard orientation and location conditions yet experience an expected significant loss of ability in extreme conditions. These loses in capability may lead to inaccurate alignment of tools and implants when using the proprietary computer-aided surgery software. Additional research is needed to determine the effect of larger reference frames with additional tracking points. Additionally, development of software to limit data return when near functional extremes will improve ease of use of the system. Computer-aided Surgery, Metrology, Arthroplasty, Surgery, Knee Arthroplasty, Orthopaedics Eischeid, Alexander C.; Bernhardt, Sylvain PhD; Natarajan, Arvind MS; and Haider, Hani PhD, "The New Standard in Town: An Updated Look at Computer-Aided Surgery Metrology" (2022). Posters: 2022 Summer Undergraduate Research Program. 14.
<urn:uuid:0873112c-e60a-4ffe-b72f-619a48c94969>
CC-MAIN-2022-33
https://digitalcommons.unmc.edu/surp2022/14/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00069.warc.gz
en
0.886048
485
2.25
2
Hawaiian Airlines is streamlining their 717 cabins – Photo: Hawaiian Airlines Hawaiian Airlines is now the second-largest operator of Boeing 717s in the world — with a fleet of 18 (tied with QantasLink — Delta is number one). Even though it is a smaller fleet, the airline operates five different configurations of the aircraft type, which they use to fly inter-island. To simplify, the airline has decided to standardize each aircraft with 128 new seats and also update some of the design elements of the cabin. “These new, modern design elements rejuvenate the interiors of our Boeing 717s while allowing us to deliver a consistent onboard experience for our guests,” said Peter Ingram, chief commercial officer for Hawaiian Airlines. An AirTran Boeing 717 lands in Atlanta On December 28, 2014, AirTran flight 1 departed Atlanta for Tampa, retracing the airline’s first flight and bringing an end to its remarkable history. I had the honor of being on that last flight and I am excited to share my story. But before I discuss the end of “the big little a” I’d like to first revisit the airline’s history. Because only through knowledge of the airline’s legacy can we truly understand the significance of AirTran’s retirement and integration into Southwest Airlines. So sit back, relax, and enjoy. ValuJet: Fun and friendly… And perhaps a bit dangerous. AirTran traces its roots back to ValuJet, an Atlanta-based upstart with dreams of chipping away at Delta’s dominance right in its own backyard. Operations commenced with just a single DC-9, and its first flight was from Atlanta to Tampa on October 26, 1993. In just over a year the airline was solidly profitable and its route map had grown to 17 cities. But fast growth and aggressive cost-cutting practices quickly caught up to the Critter (ValuJet’s FAA call sign.) In the first few years of operation, the small airline had a markedly-high percentage of emergency landings, compared to its peers. In addition, an FAA study indicated that ValuJet dominated the accident data for low-cost carriers. On May 11, 1996, ValuJet flight 592 went down en-route from Miami to Atlanta; all 110 on board were lost. This tragic, high-profile accident would focus attention on the airline, its maintenance practices, and ultimately lead to its grounding. After a month of investigations by the FAA, which reveled “serious deficiencies in its operation” ValuJet would voluntarily halt operations. But this wasn’t the end for the fledgling airline that had lost its way. Instead, it was just the beginning. Blue1 is based in Copenhagen and is owned by the SAS Group. Their fleet of nine Boeing 717s fly to destinations around Europe, but mostly within Finland. BONUS: Video of Blue1 Boeing 717 They offer wet leases for other airlines, tour operators, and a variety of other long/short-term deals. Blue1 also offers a pretty slick looking livery. It starts with a blue tail and swirls and gradients itself into lighter blue and purple hues before becoming white in the front. It goes against the boring European white liveries that have become more popular, and is quite a bit more exciting than its parent’s much more boring livery. Connect with Blue1: Web | Twitter (@SAS) | Facebook (SAS) Say hello a freshly-painted Delta Boeing 717! Photos: Delta Air Lines Two months ago a number of folks broke news that the much-anticipated Delta Air Lines Boeing 717-200 had finally started showing up in reservation systems. For aviation enthusiasts, it’s an exciting time when an airline brings on a new aircraft type, especially one like the 717. The 717 holds a special place in many hearts for a number of reasons, chiefly because it’s an ultra-modern descendant of the Douglas DC-9s and MD-80s which have a cult following with pilots and AvGeeks alike. In 2011, Southwest Airlines acquired AirTran, a 717 launch partner who also happened to fly the largest fleet of 717s in the world. Aviation enthusiasts questioned whether Southwest would go against their all-Boeing 737 business model that had served them so well over the decades. Much to the surprise of many aviation industry analysts and insiders, Southwest announced they would indeed incorporate the 717 into their fleet. However, those plans never came to fruition. In 2012, Southwest and Delta announced a sweetheart deal which would allow Delta to take possession of the former AirTran birds, allowing them to retire a number of older DC/MD variants and giving Southwest the ability to maintain fleet uniformity. After digging around on Delta.com, I confirmed the first scheduled 717 flight was supposed to be 2343 on 9/19 from ATL to EWR. I had already booked a mini-vacation to the NYC area for that weekend, so the timing simply could not have been better. I almost canceled my outbound leg and booked this flight instead…almost. Understanding that new equipment is often subject to last minute changes, I decided a call to Delta was in order.
<urn:uuid:20776a71-b5d9-4ed3-ac26-11d7836cb619>
CC-MAIN-2017-04
http://www.airlinereporter.com/tag/boeing-717/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00065-ip-10-171-10-70.ec2.internal.warc.gz
en
0.957135
1,110
1.640625
2