text
stringlengths
181
608k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
138k
score
float64
1.5
5
int_score
int64
2
5
In Lithuania, we do not waste time on things that do not matter. Few other capital cities in the world (if any) can offer you 15 minutes transfer time from the airport to your downtown hotel. After you check in, you can be having drinks in Town Hall square five minutes later. It will take you another thirty minutes and you are in a lakeside sauna, or watching sunset immersed in a lake surrounded by dense forests. When you look at Lithuania on the map, you see this tiny blot. Many would believe it should be massively cramped and tight. The truth is, over 65,300 square kilometres is home to just under three million people, making it one of the least densely populated countries in the world. This is what we offer to all our visitors, who quickly come to realize this strange yet pleasing duality: the country is very compact which makes wasting time a thing of the past, and yet when you get where you want to get, you have the place all for yourself. This is true everywhere: even in the Old Town of our capital, Vilnius, you can find empty streets in the middle of the day if you just walk a few hundred yards off the main tourist track. Get out of town, and the feeling starts multiplying and expanding, like ripples in a lake. Lakeside country houses offer the incredible sensation of owning larger space around you than you ever experienced before in your life, real or imaginary. Farm buildings, fields and meadows, little brooks just outside of an old sauna building, and this is all yours. BAROQUE CITY ON THE BORDERLINE BETWEEN TWO WORLDS Vilnius is the only capital in Europe situated on the boundary between two ancient – Latin and Byzantine – civilisations. In this city of ancient and versatile cultures, the spirit of tolerance for different nations and religions has been displayed for some time. Vilnius was first mentioned in written sources in 1323, and by the 15th century it had turned into a beautiful medieval city, the heritage of which is still fascinating. The architecture of the Old Town is the feather in the cap of the city. The baroque buildings of the largest Old Town in Central and Eastern Europe (360 ha), which has managed to preserve the medieval network of streets and typical spaces, remind us of beautiful ancient Italian towns where Baroque was born. Gracious slender towers supporting the sky are the works of the Lithuanian Baroque School. The Old Town of Vilnius, located in an amphitheatre of breathtaking nature, has been on the UNESCO World Heritage List since 1994. SAFE, PEACEFUL AND GREEN Lithuania is one of the safest countries in the world. According to the Global Peace Index, it is safer than the USA, the UK and France. There is less than 3 % risk of being harmed by an earthquake, storm, flood or drought here. Vilnius is rated as the safest capital in the Baltic States with relatively low levels of noise. Nearly half of Vilnius is covered by the green space – about 3 times more than Amsterdam, Berlin and Warsaw. Parks, public gardens, reserves and other green places takes over 46 per cent of the city area. Some of them have been cultivated, and others have preserved their own natural beauty. Drinking water is among the cleanest in Europe and Vilnius can boast of the cleanest air of all major EU cities. LITHUANIA IN A NUTSHELL Official name: The Republic of Lithuania. Area: 65 300 km². Population: 2,922 million (in 2015). Population density: 45,1 people/km² (cf. 72,5 people/km² in Europe). Political system: parliamentary democracy. Head of State – President, Executive Power – Government, Legislative Power – The Seimas. The current president: Dalia Grybauskaitė. Membership: The Republic of Lithuania is a member of the EU and NATO. Joined the Schengen area in 2007. Time zone: GTM + 2 hours. Capital: Vilnius. Population: 526 356 (in 2013). Major cities: Kaunas (population: 306 888), Klaipėda (population: 158 541), Šiauliai (population: 106 470), Panevėžys (population: 97 343) (in 2013). Official language: Lithuanian (the Baltic languages group). The majority of citizens also speak Russian, English. Coat of arms: white Vytis (a knight) on a red background. National flag: The national flag is composed of three equal horizontal stripes: top – yellow, middle – green, bottom – red collors. Neighbouring states: Latvia, Belarus, Poland, Russia (Kaliningrad). Cell phone code: +370… GSM service providers: “Telia”, “Bitė”, “Tele2”, “Eurocom”. Internet: 75,2% of population use the Internet. High-speed wireless Internet connection is available at most supermarkets, cafes, main streets and hotels of larger cities (usually free of charge). Information number: +370 700 55 118. Emergency number: 112. Ethnic groups (in 2012): 86,3% Lithuanian, 5,6% Polish, 5% Russian, 1,4% Belarusian, 1,7% other (Ukrainian, Hebrew, Latvian, Tartar etc.). Religion: 78% Roman Catholics. Other: Orthodox, Christians, Evangelical Lutherans, Evangelical Reformers, Old Believers, Judaists, Muslims etc. Climate: maritime/continental. Average temperature in July is +19,7°C, January -2,9°C. Information prepared together with Lithuanian State Department of Tourism and Vilnius Tourist Information Centre. Photos taken from Lithuanian State Department’s of Tourism website www.Lithuania.Travel and Vilnius Tourist Information Centre’s website www.vilnius-tourism.lt/en/
<urn:uuid:613be3c7-addc-44b4-846d-867d299ebd2a>
CC-MAIN-2022-33
http://www.eread.kf.vu.lt/location/about-vilnius-and-lithuania/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00673.warc.gz
en
0.915953
1,298
1.734375
2
1. A pressure vessel is made of a cylindrical composite part produced by filament winding. Hoop winding is used in which the number of winding layer is 5 and the wall thickness for each layer is 1mm. The diameter of the vessel is 0.5m. The fiber material is known to be S-glass with a tensile strength of 4.5GPa, and the matrix material is polyester with a tensile strength of70MPa. The volume fraction of fiber is 60%. It is also known that the HOOP STRESS is the stress in a pipe wall acting circumferentially in a plane perpendicular to the longitudinal axis of the pipe and produced by the pressure of the fluid in the pipe. S=hoop stress, in MPa P=internal pressure, in MPa D=outside diameter of the pipe, in mm T=normal wall thickness, in mm (1) If the internal pressure is 80MPa, would this pressure vessel be safe in service? (2) If yes, how many layer of winding can be decreased so that the part will be still safe? Or if not, how many more layers needed to be added? Please see attached.
<urn:uuid:e2b2a1c2-1fea-43fb-9a8d-c8522eaf9987>
CC-MAIN-2017-04
https://brainmass.com/engineering/mechanical-engineering/hoop-stress-40237
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00276-ip-10-171-10-70.ec2.internal.warc.gz
en
0.933284
253
2.75
3
1. By this reference under Section 256(1) of the Income-tax Act, 1961, hereinafter referred to as 'the Act', the Income-tax AppellateTribunal, Indore Bench, has referred the following question of law to this court for its opinion : 'Whether, on the facts and in the circumstances of the case, the Tribunal was right in holding that capital gains of Rs. 71,481 realised on the sale of a portion of land within the compound of Jhabua Kothi, which was declared as 'official residence' of the Ruler of Jhabua was not entitled to exemption from tax within the meaning of Para. 15(1)(iii) of Part B States (Taxation Concessions) Order, 1950 ?' 2. The material facts giving rise to this reference briefly are as follows : The assessee is an Ex-Ruler of Jhabua State. During the assessment year 1971-72, the assessee realised a capital gain of Rs. 71,481 on the sale of a portion of land forming part of the compound of Jhabua Kothi which was declared as official residence of the Ruler of Jhabua. The contention of the assessee before the ITO was that the amount of capital gain was exempt from taxation by virtue of para. 15(1)(iii) of Part B States (Taxation Concessions) Order, 1950 (hereinafter referred to as the 'Taxation Concessions Order'). This contention was not upheld by the ITO on the ground that in the Taxation Concessions Order no mention had been made about exemption of capital gains. The ITO, therefore, subjected the capital gain to capital gains tax. The appeal preferred by the assessee before the AAC was dismissed. On further appeal, the Tribunal also upheld the order of the ITO. Hence, at the instance of the assessee, the Tribunal has referred the aforesaid question of law to this court for its opinion. 3. The answer to the question referred to us turns on the construction of the relevant provisions of Para. 15 of the Taxation Concessions Order. That provision reads as follows : '15. (1) Any income falling within the following clauses shall be exempt from income-tax and super-tax and shall not be included in the total income or total world income of the person receiving them : ......... (iii) the bona fide annual value of the palaces of Rulers of Indian States which are declared by the Central Government as the official residences of such Rulers.' 4. From a perusal of the aforesaid provision, it is clear that what has been exempted is the bona fide annual value of the palace of a Ruler of an Indian State which is declared by the Central Govt. as the official residence of such Ruler. The exemption could by no stretch of imagination be held to embrace income in the nature of capital gains realised on the sale of land forming part of the official residence of a Ruler. In this view of the matter, the Tribunal was justified in holding that capital gains realised by the assessee on the sale of a portion of land within the compound of Jhabua Kothi which was declared as the official residence of the Ruler ofJhabua was not entitled to exemption from tax by virtue of Para. 15(1)(iii) of the Taxation Concessions Order. 5. For all these reasons, this reference is answered in the affirmative and against the assessee. In the circumstances of the case, parties shall bear their own costs of this reference.
<urn:uuid:894c5ae3-f081-49aa-9682-e09ca1473d49>
CC-MAIN-2016-44
https://www.legalcrystal.com/case/502973/raja-ajitsingh-jhabua-vs-commissioner-income
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718285.69/warc/CC-MAIN-20161020183838-00105-ip-10-171-6-4.ec2.internal.warc.gz
en
0.966109
740
1.90625
2
Posted by Claire Daviss on December 04, 2014U.S. Congressional Representative Matt Cartwright (D-Pa.) published an op-ed in The Hill this week, explaining the importance of political participation in a democracy. He begins by citing several statistics from the 2014 midterm elections. "[J]ust 36.3 percent (approximately 82 million) of Americans participated in this year's election," he writes. "Only in the 1942 midterm election was turnout lower." He argues barriers to voting are the primary problem and calls for increased access for voters. FairVote's Promote Our Vote focuses on pro-suffrage practices and policies, supporting concrete changes that ensure fair and equitable voting rights. We seek changes that will improve voter turnout, protect voter access, and expand suffrage.
<urn:uuid:59f681a1-1095-47be-a026-c6d8f46d5d5b>
CC-MAIN-2017-04
http://www.fairvote.org/congress_member_highlights_the_importance_of_participation
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00219-ip-10-171-10-70.ec2.internal.warc.gz
en
0.954379
157
2.796875
3
Stories of Home Place, Identity, Exile Devika Chawla (Redaktør) ; Stacy Holman Jones (Redaktør) ; Jennifer L. Adams (Innledning) ; Myrdene Anderson (Innledning) ; Timothy Baird (Innledning) ; Tessa W. Carr (Innledning) ; Devika Chawla (Innledning) ; Erik Garrett (Innledning) ; Craig S. Gingrich-Philbrook (Innledning) ; Sean Gleason (Innledning) ; Anne M. Harris (Innledning) ; Stacy Holman Jones (Innledning) ; Caryn Medved (Innledning) ; Amardo Rodriguez (Innledning) ; Rebecca Mercado Thornton (Innledning) ; Jonathon Wyatt (Innledning) ; Tessa Wyatt (Innledning) - Vår pris Leveringstid: Sendes innen 21 dager Leveringstid: Sendes innen 21 dager In this book, we offer a window into the distinct ways that home is theorized and conceptualized across disciplines. The essays in this volume pose and answer the following critical and communicative questions about home: 1) How do people “speak” and “story” home in their everyday lives? And why? 2) Why and how is home—as a material presence, as a sense and feeling, or as an absence—central to our notion of who we are, or who we want to become as individuals, and in relation to others? 3) What is the theoretical purchase in making home as a “unit of analysis” in our fields of study? This collection engages home from diverse contexts and disparate philosophical underpinnings; at the same time the essays converse with each other by centering their foci on the relationship between home, place, identity, and exile. Home—how we experience it and what it that says about the “selves” we come to occupy—is an exigent question of our contemporary moment. Place, Identity, Exile: Storying Home Spaces delivers timely and critical perspectives on these important questions. Forlag: Lexington Books Format: 23 x 15 cm «Communication scholars Devika Chawla and Stacy Holman Jones have gathered writings that examine the meaning of home. Most of the contributors are communication scholars, but anthropology, art, education, and counseling are also represented. The collection is full of captivating, rich personal stories providing insight into the authors’ lives and the connection between personal experience and their perspectives of the meaning of home. For example, home can be a physical place in which banal chores and habits are performed or an integral part of the self that is constructed, to mention just two of many possibilities. The contributors' varied backgrounds lead to a variety of perspectives that span economic, ethnic, and regional boundaries. Taken together, these musings about home and the diversity of views of what home means to different people offer a coherent and engaging account of home from philosophical and personal perspectives. A valuable resource for those interested in the elusive nature of home. Summing Up: Recommended. Graduate students, researchers, faculty. General readers.» «We often struggle with the meaning of diversity and inclusion, but in Stories of Home, differences across experience, age, race, geography, and sexuality converge and co-exist. The many voices of home speak, sometimes softly and at other times with traces of anger, frustration, tenderness, and longing. This is a beautiful read.» «Complicating and interrogating the meanings of home, this text heightens our awareness of the diverse context- and culture-based stories of home. Each chapter invites reflection about the ways we construct home and carry it with us in our bodies. We resist, embrace, and question what we know, learn, and remember about home, across time, space, and place. mChawla and Holman Jones encourage us to feel the with and withoutness of home—to sense the nostalgia of making home anew in places we travel and to question the disembodying environments where home never was, never will be. The stories remind us of our desire to craft our home in unexpected ways, in unanticipated places.» Chapter 2: Musing on Nomadism: Being and Becoming at Home on the Reindeer Range, Myrdene Anderson Chapter 3: Be(Coming) Home, Jonathan Wyatt and Tessa Wyatt Chapter 4: Childhood Homelessness: A Phenomenologial Reflection, Erik Garrett Chapter 5: Home/less in Appalachia, Timothy Baird Chapter 6: Motown Magic and Haunted Hollers: From One Othered America to Another, Rebecca Mercado Thornton Chapter 7: The Exile Narratives, Amarado Rodriguez Chapter 8: Men Making Home, Caryn Medved Chapter 9: Scott and Helen Nearing and the Narrative of the American Homestead as Retreat, Jennifer Adams Chapter 10: Trashing Home, Sean Gleason Chapter 11: A Kind of Hush: Adoptee Diasporas and the Impossibility of Home, Anne M. Harris Chapter 12: Bodies of Working Class Knowledge, Imaginative Mobilities, and Kinesthetic Homes, Stacy Holman Jones Chapter 13: Finding the Backroads Home, Tessa W. Carr Chapter 14: Becoming Home (Elsewhere): Patriarchy Du Jour and the Resilience of Privilege, Craig Gingrich-Philbrook Conclusion: Home, Again, Stacy Holman Jones and Devika Chawla Stacy Holman Jones is professor in the Centre for Theatre and Performance at Monash University.
<urn:uuid:b0291b69-7a49-4d15-b7a0-932e7fcdac70>
CC-MAIN-2022-33
https://www.bokkilden.no/samfunnsgeografi/stories-of-home-devika-chawla/produkt.do?produktId=14911801
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00465.warc.gz
en
0.874104
1,273
1.90625
2
Try CoffeeScript in your HTML 5 web browser. Edit examples, run programs, solve exercises without installation or plug-ins. Compatible with up-to-date desktop browsers and Mobile Safari even offline. Smooth CoffeeScript is a book about CoffeeScript and programming. Start with programming fundamentals, learn about functional programming with Underscore and problem solving, study object orientation and modularity. It covers client/server web apps with Canvas and WebSockets.
<urn:uuid:a183e2f8-fd3e-4af7-bd78-cb90136f198b>
CC-MAIN-2017-04
http://hackershelf.com/book/115/smooth-coffeescript/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00158-ip-10-171-10-70.ec2.internal.warc.gz
en
0.874171
94
1.726563
2
One of the newest features to come to Chrome OS is the ability to unlock your computer using your Android smartphone. Setting it up is pretty straightforward, only requiring that you have both devices in hand. When finished, you will be able to get into your Chromebook by merely unlocking your phone… How to unlock your Chromebook with an Android smartphone | - Tap on your profile picture so that the quick setting panel pops up - Select the gear icon to load the settings menu - Under the People subheading, tap on Screen lock - You will be asked to enter your password - At the bottom of the list, locate Smart Lock for Chromebook (beta). Select the Set Up button - A pop-up will appear asking you to turn your phone’s Bluetooth on and visible - On your Chromebook, tap on the Find your phone button - When it identifies your smartphone, the Chrome will list the device’s name. If that’s the device you wish to use, select Use this phone on the Chromebook - When everything has been set up in the background, you will receive a notification on your Android smartphone and will be asked to tap Next on the Chromebook - You can then select Try Smart Lock to give the feature a try. The Chromebook will then lock itself. Just unlock your smartphone, and you will be able to bypass the Chromebook’s lockscreen password After you have set up Smart Lock for Chromebook, you can use the Smart Lock to sign in to your Google account. You just need to toggle that option on under the Smart Lock section. Additionally, you can set the distance in which your smartphone has to be in for it to unlock your Chromebook. FTC: We use income earning auto affiliate links. More.
<urn:uuid:586a1149-7c1d-43da-aeac-14518bb6c245>
CC-MAIN-2022-33
https://9to5google.com/2017/11/01/how-to-unlock-your-chromebook-with-android-smartphone-android-basics/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00269.warc.gz
en
0.902459
359
1.539063
2
Original post by kordova I'm still shaky about the "instance/instance-of" concept. I mean, I understand it to some extent, but to use your own example, if a an animal is a race-horse, is it's instance-of member (instance-of (horse)), (instance-of (race-horse)), (instance-of (horse race-horse)) ... ? Ok, look closely. I'm going to refer to our structures as frames from here on out. The title of a frame is the name of the symbol which is set to the list of elements which follow it. We might have the following frame: (friends (sylvester tweety foghorn-leghorn yosemite-sam))) is the name of the symbol which is set equal to (use setf) the list which contains two sub lists. Each sublist in the list contains what is called a slot/value pair. The first slot/value pair is . The slot is and the value is . We put in a list, because some slots allow multiple entries, and we can see that in action in the next slot/value pair, where we have four values for the slot . Ok, so we now know how to structure our frames, and what a slot is, and what a value is. Now, forget about , and lets move on to understanding instances. Look at the following frames: (categories (race-horse draft-horse thoroughbred quarter-horse))) (categories (horse dog cat human gorilla tiger))) (categories (mammals reptiles fish insects circus-animals))) (instances (secretariat seabiscuit spectacular-bid ruffian))) ((instance-of (race-horse thoroughbred))) Now, notice that . That's perfectly valid. Also, it is also true that is also an (instance-of (horse mammal animal living-thing)) among others. We could cache these values on the frame if we wanted to. We would get this: ((instance-of (race-horse thoroughbred horse mammal animal living-thing))) For high speed retrieval, caching is better. But we can write code to make these determinations even if we don't cache it. The rule goes like this: If something is an instance-of a category, then it is also an instance-of everything that the named category is a sub-category of. An semi ideal solution is to have a piece of code be run once, at assertion time, to determine everything which , and then cache those values. It gets a little complex though. That's because if we've already created the frame, and later declare that , then for completeness, we must percolate through our entries and update the frame to now mention that . This is absolutely necessary if at query time we only rely on cached values. Obviously, we're digressing from the main thrust of this thread, and delving into the realms of truth maintenance and knowledge bases, but it is all relevant, and allows for some rather amazing generalizations to be made with regard to knowledge, and also it allows for using the knowledge in the knowledge base itself to enforce semantics. The real payoff is where the simple mention of one little fact actually creates a cascade of facts, creating real knowledge and supposed understanding and comprehension. It kind of boils down to this: If I told you Citation was a race horse, you'd actually know a heck of a lot about Citation, certainly a great deal more than the simple fact that Citation is a race horse. [edited by - bishop_pass on November 1, 2003 11:43:51 PM]
<urn:uuid:19eba071-a7ab-400a-bf2b-5a6f7750f2d4>
CC-MAIN-2016-44
http://www.gamedev.net/topic/183571-using-lisp-or-another-language-to-generate-fictional-characters/page-4
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719273.38/warc/CC-MAIN-20161020183839-00066-ip-10-171-6-4.ec2.internal.warc.gz
en
0.88909
776
2.421875
2
101st Airborne Deployed, Six Destroyers to Mediterranean, F-35 Squadrons to U.K. In this outline we will update on the troop and military movements and then explain why the war with Russia is becoming a self-fulfilling prophecy. In many ways this will be the “Climate Change War,” you will see why below. First, the U.S. is moving troops from the 101st Airborne ‘screaming eagles’ into NATO allied countries on the western border of Ukraine. This is the first deployment of the Army’s 101st Airborne Division from Fort Campbell, Kentucky, to Europe in 80 years. As noted by base reporting, “Elements of 2nd Brigade Combat Team, and 101st Headquarters and Headquarters Battalion, 101st Airborne Division, have been assigned to carry out the mission.” [source] “We’re going to check the Russian influence and we’re going to impact the Russians’ decision-making for probably the next 10-20 years,” said Col. John Lubas, deputy commanding officer for operations, 101st Airborne Division, in a pre-deployment briefing. “We’re going to do this with all our partners in NATO, the European Union and the West, and this is an incredibly important mission.” Maj. Gen. JP McGee, commanding general, 101st Airborne Division and Fort Campbell, said the division has been in an increased readiness posture for several months and is just as prepared now as during World War II.
<urn:uuid:f90cc2fc-9d58-49c2-8689-9ee55f650883>
CC-MAIN-2022-33
https://iotwreport.com/biden-sends-more-u-s-troops-to-ukraine-border/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00665.warc.gz
en
0.9512
334
2.015625
2
The impact of ICT on the Italian productivity dynamics The last twenty years have seen a marked slowdown of the Italian productivity growth rate. The literature has underlined the role of international factors, such as globalization and adoption of the euro. In this paper we emphasize the role and dynamics of capital accumulation investigating the impact of the introduction of information technology on capital and production in the Italian economy and the extent to which that is being affected by skills in the labour force. The model is specified and estimated as continuous-time general disequilibrium framework. It presents original features: it analyzes the effects of the introduction of the ICT technology on the Italian economy not in a partial equilibrium context of a single market but from a macro point of view where input markets interact; it does not assume that these markets instantaneously clear but rather that there are imperfections and frictions; it does not impose the condition that the economy necessarily converges to a steady state. The model behaves quite well in replicating the dynamics of the Italian economy. It also shows however that there remains some structural inefficiency that worsened in recent years. In fact, our main finding shows that there exists a permanent gap between “optimal†and actual output which increased in the latter part of the sample period. While a fraction of this gap can be attributed to unavoidable (market and non market) adjustment costs some is associated to efficiency losses. |Date of creation:||Nov 2011| |Date of revision:| |Contact details of provider:|| Postal: Via Del Castro Laurenziano 9, 00161 Roma| Phone: +39 6 49766353 Fax: +39 6 4462040 Web page: http://www.dipecodir.it/ More information through EDIRC References listed on IDEAS Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.: - Daron Acemoglu & Fabrizio Zilibotti, 2001. The Quarterly Journal of Economics, Oxford University Press, vol. 116(2), pages 563-606. - Daron Acemoglu & Fabrizio Zilbotti, 1999. "Productivity Differences," NBER Working Papers 6879, National Bureau of Economic Research, Inc. - Acemoglu, Daron & Zilibotti, Fabrizio, 2000. "Productivity Differences," CEPR Discussion Papers 2498, C.E.P.R. Discussion Papers. - Acemoglu, D. & Zilibotti, F., 1998. "Productivity Differences," Papers 660, Stockholm - International Economic Studies. - Acemoglu, Daron & Zilibotti, Fabrizio, 1998. "Productivity Differences," Seminar Papers 660, Stockholm University, Institute for International Economic Studies. - Francesco Caselli & Wilbur John Coleman II, 2006. "The World Technology Frontier," American Economic Review, American Economic Association, vol. 96(3), pages 499-522, June. - David N. Weil, 1996. "Appropriate Technology and Growth," 96-24, Brown University, Department of Economics. - Paul Beaudry & David Green, 1998. "What is Driving US and Canadian Wages: Exogenous Technical Change or Endogenous Choice of Technique?," NBER Working Papers 6853, National Bureau of Economic Research, Inc. - Rainer Klump & Peter McAdam & Alpo Willman, 2007. "Factor Substitution and Factor-Augmenting Technical Progress in the United States: A Normalized Supply-Side System Approach," The Review of Economics and Statistics, MIT Press, vol. 89(1), pages 183-192, February. - Daron Acemoglu, 2007. "Equilibrium Bias of Technology," Econometric Society, vol. 75(5), pages 1371-1409, 09. - Francis J. Cronin & Elisabeth Colleran & Mark Gold, 1997. "Telecommunications, Factor Substitution And Economic Growth," Contemporary Economic Policy, Western Economic Association International, vol. 15(3), pages 21-31, 07. - Paul Beaudry & Mark Doms & Ethan Lewis, 2006. "Endogenous Skill Bias in Technology Adoption: City-Level Evidence from the IT Revolution," NBER Working Papers 12521, National Bureau of Economic Research, Inc. - Paul Beaudry & Mark Doms & Ethan Lewis, 2006. "Endogenous skill bias in technology adoption: city-level evidence from the IT revolution," Working Paper Series 2006-24, Federal Reserve Bank of San Francisco. - Comin, D. & Hobijn, B., 2004. "Cross-country technology adoption: making the theories face the facts," Journal of Monetary Economics, Elsevier, vol. 51(1), pages 39-83, January. - Comin, D. & Hobijn, B., 2003. "Cross-Country Technology Adoption: Making the Theories Face the Facts," Working Papers 03-04, C.V. Starr Center for Applied Economics, New York University. - Diego Comin & Bart Hobijn, 2003. "Cross-country technology adoption: making the theories face the facts," Staff Reports 169, Federal Reserve Bank of New York. - Gandolfo, Giancarlo & Padoan, Pietro Carlo, 1990. "The Italian continuous time model : Theory and empirical results," Economic Modelling, Elsevier, vol. 7(2), pages 91-132, April. - Enrico Saltari & Giuseppe Travaglini, 2009. "The Productivity Slowdown Puzzle. Technological and Non-technological Shocks in the Labor Market," International Economic Journal, Taylor & Francis Journals, vol. 23(4), pages 483-509. - Wymer, C R, 1972. "Econometric Estimation of Stochastic Differential Equation Systems," Econometrica, Econometric Society, vol. 40(3), pages 565-77, May. - Francesco Caselli, 1999. "Technological Revolutions," American Economic Review, American Economic Association, vol. 89(1), pages 78-102, March. - Atkinson, Anthony B & Stiglitz, Joseph E, 1969. "A New View of Technological Change," Economic Journal, Royal Economic Society, vol. 79(315), pages 573-78, September. - Philippe Aghion & Peter Howitt, 2009. "The Economics of Growth," MIT Press Books, The MIT Press, edition 1, volume 1, number 0262012634, March. - Daron Acemoglu, 2001. "Directed Technical Change," NBER Working Papers 8287, National Bureau of Economic Research, Inc. When requesting a correction, please mention this item's handle: RePEc:sap:wpaper:wp149. See general information about how to correct material in RePEc. For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Luisa Giuriato) If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about. If references are entirely missing, you can add them using this form. If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form. If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation. Please note that corrections may take a couple of weeks to filter through the various RePEc services.
<urn:uuid:c1430b05-4c63-4839-98ff-838827f76919>
CC-MAIN-2017-04
https://ideas.repec.org/p/sap/wpaper/wp149.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00514-ip-10-171-10-70.ec2.internal.warc.gz
en
0.795081
1,726
1.960938
2
Codes of Airport of Rosal in Rosal, Bolivia (BO) |Name||Airport of Rosal| |City||Rosal (Read more about Rosal)| |Country||Bolivia (show all 238 airports in Bolivia)| |ISO country code||BO| |Map of Codes of Airport of Rosal in Rosal, Bolivia (BO):| IATA and ICAO codes of Airport of Rosal Airports of Bolivia have international codes of IATA and ICAO. An IATA airport code is a three-letter code designating many airports around the world (including Bolivia), defined by the International Air Transport Association (IATA). The characters prominently displayed on baggage tags attached at airport check-in desks are an example of a way these codes are used. The ICAO airport code is a four-letter alphanumeric code designating each airport around the world. These codes are defined by the International Civil Aviation Organization. The ICAO codes are used by air traffic control and airline operations such as flight planning. They are not the same as the IATA codes encountered by the general public, which are used for airline timetables, reservations, and baggage handling.
<urn:uuid:e1e55a7a-1b63-4371-ab3f-5e5a32316700>
CC-MAIN-2017-04
http://airportsbase.org/Bolivia/all/Rosal/Airport_of_Rosal
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00439-ip-10-171-10-70.ec2.internal.warc.gz
en
0.899151
251
1.859375
2
In the months after actress and activist Angelina Jolie revealed last year that she had undergone apreventative double mastectomy because of an increased risk for breast cancer, the number of women referred for genetic counselling went up dramatically, a new Canadian study shows. "When we compared six months before the [Jolie] story to six months after, we found the number of referrals doubled," said study author Dr. Jacques Raphael, a medical oncology fellow at Sunnybrook Odette Cancer Centre in Toronto. He is scheduled to present his findings at the American Society of Clinical Oncology's Breast Cancer Symposium in San Francisco. Raphael and his colleagues evaluated the number of genetic counseling referrals at their centre six months before and six months after Jolie made the announcement in May 2013. Jolie had tested positive for the BRCA1 mutation, which greatly increases the risk of breast cancer. She also had a family history of breast and ovarian cancer. Read: Women having risk-reduction surgery While 487 women were referred for testing in the six months before the Jolie announcement, 916 were referred in the six months after it, the investigators found. Even more important, Raphael said, was that the quality of referrals remained high – that is, the women who had reason to be tested were the ones seeking it and being referred. The increase was not just due to women concerned about the risk without a family history or other risk factors. "This is an example of a positive celebrity effect," he said. Findings make sense The Canadian finding echoes those of studies done at other centers, both in the United States and in the United Kingdom, Raphael said. Of the 916 referred after the Jolie news, 437 qualified for genetic testing. That was roughly the same ratio as before, with 213 of the 487 referred qualifying before the news broke. Raphael can't say if the effect will be long lasting. He is continuing to evaluate the referrals. The findings make sense, said Dr. Leonard Lichtenfeld, deputy chief medical officer for the American Cancer Society. "It's what we call the 'Katie Couric effect', " he said, referring to the rise in colonoscopies after the television news personality had an on-camera colonoscopy in 2000 to raise awareness after her husband died of the disease. Read: The importance of a colonoscopy What is also important, he said, is that the women at higher risk get to the genetic counselors. "Genetic counseling is a limited resource," he said. Some small towns, for instance, may not have such counselors. The Raphael study was funded by Sanofi-Aventis. A co-author, Dr. Sunil Verma, reports consulting or advisory work with several pharmaceutical companies. In another study presented at the meeting, researchers reported that more than half of 150 women newly diagnosed with breast cancer considered having a preventative mastectomy on the healthy breast immediately after the diagnosis. The surgery is known as a contralateral preventative mastectomy (CPM). "Many newly diagnosed breast cancer patients are undergoing CPM, but we find many more – over half – are actually considering CPM [at some point] in their decision-making process," said study author Dr. Katharine Yao, director of the breast surgical programme at NorthShore University Health System, in Evanston, Illinois. Read: Mastectomy not always the first choice She is also due to present her findings at the ASCO meeting. In the end, just 12 of the women chose the CPM. Those who consider having it, she said, have more anxiety than the other women. Yao said her study points to the need to do a better job of educating women that the risk of developing cancer in the opposite breast is actually low. Studies presented at medical meetings are considered preliminary until published in a peer-reviewed journal.See breaking news and the hottest health tips before anybody else by joining South Africa’s biggest and best health community, like health24 on Facebook now! Angelina: preventative breast removal Preventative mastectomy has little benefit Preventive Mastectomy in Opposite Breast Boosts Survival Only Slightly Image: Female breast from Shutterstock Copyright © 2016 HealthDay. All rights reserved.
<urn:uuid:46280ea2-67e2-4f7b-8cac-0c000c4c45c6>
CC-MAIN-2017-04
http://www.health24.com/Medical/Breast/Real-life-story/Angelina-Jolie-inspires-breast-cancer-risk-assessment-20140904
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00380-ip-10-171-10-70.ec2.internal.warc.gz
en
0.969521
890
1.953125
2
A 12-year-old Sacramento student who already has three community college degrees and has been accepted to two University of California campuses says he plans on studying biomedical engineering and becoming a doctor and medical researcher by the time he turns 18, AP reports. The child genius identified as Tanishq Abraham has now been accepted to UC Davis and received a regents scholarship to UC Santa Cruz, but he has yet to decide which university he’ll attend, Sacramento television station CBS 13 reported on Sunday. “I think I’ll be 18 when I get my MD,” he said. It has been revealed that the boy started community college at age seven and last year he received associate’s degrees from American River College, a community college in Sacramento, in general science; maths and physical science; and foreign language studies. Professors at the college didn’t initially want him in their classes because of his age. But finally a professor agreed to let him attend if his mother, a doctor of veterinary medicine, also took the class. “There were times when I had to explain general relativity and special relativity to my mom,” he said. Speaking about the intelligent boy, Biology professor Marlene Martinez said he was never afraid to ask lot of questions. “In lecture he would always pop up with ‘so, does that mean …’ or ‘what about this?'” Martinez said. Tanishq, who joined the IQ society Mensa at only four years old, has always picked up knowledge quickly, his father, Bijou Abraham, told NBC News. “We tested him and discovered that he was pretty smart,” he said. “We were surprised when we started giving him advanced stuff and he was picking it up really fast.” Tanishq says child geniuses are often seen as odd. “When you think of a genius, you think of a mad scientist kind of thing,” he said. But he pointed out he’s just an ordinary kid who likes learning and microscopes but also playing video games. “I just think learning is fun,” Tanishq said. Make Money Online in Nigeria... Click HERE To Start Now!
<urn:uuid:c036dc11-2168-4e1e-b301-4fdf7045f7bd>
CC-MAIN-2016-44
http://nigeriana.org/general/historic-12-year-old-child-genius-makes-history-hes-start-university/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988717963.49/warc/CC-MAIN-20161020183837-00374-ip-10-171-6-4.ec2.internal.warc.gz
en
0.987926
467
1.867188
2
1 Answer | Add Yours The Infernal Machine is a retelling of the Oedipus tale by Jean Cocteau, designed as a play. The most important quote comes directly at the beginning: THE VOICE: He shall slay his father. He shall marry his mother. This is the essence of the entire Oedipal tale, telling the whole story in two short sentences. Of course, it is more complex than that, but the myth is wholly ingrained in public consciousness, and so leading with those lines instantly sets up the play to follow. THE VOICE: Watch now, spectator. Before you is a fully wound machine. Slowly its spring will unwind the entire span of a human life. It is one of the most perfect machines devised by the infernal gods for the mathematical annihilation of a mortal. With this statement, the theme of the play becomes clear; while all events stem from Oedipus's own follies, in the nature of a tragedy he is unable to halt his own destruction. "The Infernal Machine" of the title is in fact Fate, the events that lead Oedipus to unwillingly play his part. Being without empathy, Fate moves on without care for a single life, only concerned with the final disposition of the prophecies. OEDIPUS: The people of Thebes are looking for a man. If I kill the Sphinx, I will be that man. I will marry Queen Jocasta. She is a widow and... SPHINX: And old enough to be your mother. OEDIPUS: The important thing is: she's not my mother. SPHINX: Do you believe that a queen and a whole people will give themselves to the first man to come along? OEDIPUS: Of course, if he has conquered the Sphinx. What are you laughing about? I'm not just "the first man to come along." I'm a prince, my father is the King of Corinth. Oedipus's arrogance shows in his dismissal of the Sphinx's warnings, although he is not yet aware of her true nature. Finally, his fate is described by Anubis: ANUBIS: Man's time is folded and hidden in eternity. But I, the God of the Dead, see the whole life of Oedipus unfolded, stretched out before my like a picture in one dimension. All the episodes, from his birth to his death, are pinpricks in the fabric of time. (All Quotes: Cocteau, The Infernal Machine, Google Books) Showing again the Infernal Machine, which cannot be stopped or changed, Anubis compares human life to pinpricks in folded fabric, which when stretched out are far apart. Here is set out the predestined fate of Oedipus, and although he was warned, he wilfully blinded himself to the truth, a mental blinding that is echoed literally in the last act. We’ve answered 319,199 questions. We can answer yours, too.Ask a question
<urn:uuid:06dbecff-85cf-49de-8b61-749da823f2b9>
CC-MAIN-2017-04
https://www.enotes.com/homework-help/what-some-important-quotes-318221
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00162-ip-10-171-10-70.ec2.internal.warc.gz
en
0.952372
645
2.25
2
Unless you have actually been living under a rock you have actually probably heard your good friends or member of the family point out something about CBD, particularly if they take place to experience persistent pain or anxiety. As lots of U.S. states start to legislate both medical and leisure cannabis, the market has actually exploded with development in many different types of CBD products. Regardless of this growth and the publicity that comes along with it, lots of people are uncertain of what exactly CBD is, if it’s even legal, and how it would even help them. We are hoping here we can offer you a quick breakdown of what CBD is and point out a couple of various kinds of CBD items that could assist you get relief, specifically if you experience pain and stress and anxiety.CBD Oil Is Making Me Break Out Cannabidiol (CBD) is among many active compounds discovered in the Cannabis plant. Tetrahydrocannabinol (THC) is another active substance and the most well-known, thanks to its psychedelic properties– it’s the one that gets you “high or stoned.” CBD is non-psychoactive however has a number of the exact same medical advantages as THC. This permits you to benefit from the restorative benefits without leaving you with the “high or stoned” feeling that typically goes together with THC. That said, marijuana-derived CBD products, or CBD items which contain THC, may be more effective than fiber hemp. If you however to not reside in a state that hasn’t yet legislated medical cannabis or these pressures are not available, you can still gain from items consisting of industrial hemp-derived CBD. There are various problems that CBD items can assist with. A few of these disorders that CBD can assist treat consist of: discomfort, swelling, depression, stress and anxiety, skin conditions, relief of chemotherapy adverse effects, epilepsy, dependency management, and neuroprotection. Discomfort and Swelling There have actually been lots of research studies that have actually had CBD utilized to treat general persistent pain. Researchers assembled the outcomes of multiple organized reviews covering lots of trials and studies. Their research concluded that there is considerable evidence that cannabis is an effective treatment for chronic pain in grownups. A separate study in the Journal of Speculative Medicine supports these results. This research study recommends that utilizing CBD can reduce discomfort and inflammation. The scientists also discovered that topics were not likely to build up a tolerance to the impacts of CBD, so they would not require to increase their dose over time. They kept in mind that cannabinoids, such as CBD, might provide valuable brand-new treatments for individuals with persistent discomfort. Anxiety and Stress and Anxiety CBD is believed to positively affect the procedures that control our state of mind, sleep, and discomfort perception, to name a few. These processes require to work appropriately, so we feel much better, sleep more soundly, and experience less pain. Stress and anxiety and depression are conditions related to bad sleep, pain, and bad state of mind regulation since the endocannabinoid system isn’t working to the very best of its capability. Experts think careful CBD dosing may assist temper anxiety-induced racing thoughts that can trigger interfered with sleep in addition to panicked awakenings during the night. (In some people, however, excessive can make anxiety even worse, so make sure to dose gradually and thoroughly).CBD Oil Is Making Me Break Out Sleep disruption and depression are also carefully linked. More than 90% of depressed patients complain about difficulties falling asleep, sleep disturbance, or early morning awakenings. CBD may enhance their mood or their capability to manage the condition overall. CBD can also be used to deal with parasomnias, sleep disorders like jaw grinding, sleepwalking, or nightmares, and it also cuts the time it takes to fall asleep. CBD oil has an anti-inflammatory home, which can benefit the skin, and it can likewise minimize oil production, provide wetness and eliminate pain and itching. Topical CBD is safe and works successfully for all skin types. The products are easy to administer. Sufferers of major medical skin conditions and those who are seeking ingenious skin care choices can take advantage of topical CBD use. Anti-inflammatory homes connected with CBD are advantageous in dealing with such dermatologic conditions as acne, psoriasis and eczema due to decrease of dryness, irritation and inflammation. CBD-containing creams, oils, gels and serums not just hydrate and soothe the skin however are likewise showing encouraging results in relieving discomfort caused by specific skin conditions. CBD has actually shown that it applies antioxidant activity. This might position CBD oil as a treatment that repairs skin from free radicals, which might help to smooth wrinkles and reduce breakouts and imperfections. In addition, CBD-containing items are rich in omega-3 and omega-6 fats which improve overall skin appearance and offer a more youthful glow. Topical CBD is considered safe and has no known negative negative effects according to doctors. Just recently, CBD has received a lot of attention due to its prospective to deal with alcohol and drug abuse. Literature concentrates on the pharmacotherapeutic potential of CBD in terms of its relevance in avoidance of regression in substance abuse. It is thought CBD is effective in targeting threat states of drug use relapse by decreasing stress and anxiety and stress related to drug hints and moderating anti-depressant activity. In addition to that, CBD has an effect on the brain circuitry that is responsible for drug craving and seeking habits activated by drug-related context and tension. Thinking about the neuropharmacological and behavioral results of CBD and its effect on the neurocircuitry controlling addiction, the ramifications of CBD for the development of new treatments of drug dependency has brought in the interest in the research study neighborhood examining restorative solutions for drug addiction and regression. There are a few different kinds of CBD items, they can be found in lots of types. You can buy them as Oils and Tinctures, Edibles, Vapes, and Creams and Lotions. Oils and Casts CBD oil and casts typically have a glycerin, oil, or alcohol base. Individuals can take these extracts on their own, typically through a dropper or blend them in a food and drink of their choice. There are numerous strengths and tastes of CBD oils and casts are readily available. CBD edibles contain the above extracts but in a food form. CBD edibles are offered as drinks and food products, such as teas and chocolate. Gummies are a very common form of CBC edible. They come in various strengths and flavors. They are likewise one of the very best choices to help with sleep. For quick action, vapes can provide CBD extracts through inhalation. Vaping comes with added threat, including lung damage. Sublingual extracts placed under the tongue might use a few of the quick action supplied by vaporizers without the threat of vaping-associated lung injury. Creams and Lotions CBD also comes in the kind of topical oils, creams, and lotions. Some individuals might feel the effects instantly, where others may not observe any results for numerous hours. This is one of the best ways to aid with muscle discomfort. It might be best to try a few various types to determine what provides the proper relief. In conclusion as you can see CBD has numerous fantastic usages to assist with different conditions, and it comes a few various types. If you are searching for an alternative method to treat any concerns you may have, you might wish to research some CBD business and items to see what would work best for you.CBD Oil Is Making Me Break Out
<urn:uuid:cac6021e-6666-4159-ba3e-dce8db17327e>
CC-MAIN-2022-33
https://www.g-2systems.com/cbd-oil-is-making-me-break-out-cbd-for-pain-relief/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00278.warc.gz
en
0.960915
1,591
2.078125
2
You see it in every shopping mall: men sitting outside the clothing store waiting for the wife to come out. Why is it that women love to try on every pair of shoes before deciding whether to buy anything at all, and men want to get out of the mall seconds after they get in? It's all in the genes, according to Daniel Kruger, an evolutionary psychologist at the University of Michigan. Kruger argues that it's natural for women to love to shop and men to hate it because of our evolutionary past. Men were the hunters in our ancestral cultures, so when they find a satisfactory specimen, whether it's an elk or a pair of shoes, they want to shoot it and get out before it gets away. Women, by contrast, were the primary gatherers in early hunter-gatherer cultures, so they feel a need to check every berry on the bush to make sure they're getting the best deal. That's why, during this holiday season, you're likely to see a lot of men cooling their heels, and a lot of women shopping until they drop. It's mandated (or should we say human-dated) by the evolutionary progress that guided us out of the woods and into the mall. Kruger, who normally studies gender differences in such things as relationships and roles, is the lead author of a research paper, "Evolved Foraging Psychology Underlies Sex Differences in Shopping Experiences and Behaviors," in the December issue of the Journal of Social, Evolutionary and Cultural Psychology. The idea behind the research began during a trip across central Europe with his wife and a few of their friends. 'Man Hunt, Woman Tend Cave' "We had been visiting quaint little villages in the middle of winter, when there weren't many tourists, and when we reached the tourist mecca of Prague, the guys wanted to go and see all the historical sites and the girls wanted to go shopping," Kruger said in a telephone interview. "We (the guys) couldn't imagine why they would want to do that." There ensued a "heated discussion," he recalled, after which the guys checked out the cultural attractions and the girls went shopping. Why Women Like Shopping. Why Men Hate It "When they came back with all the purchases, it was almost like a conquest, an expedition," he added. "They wanted to show us all the wonderful things they had found." The women, it seems, had gone gathering, and the men, of course, had gone hunting, culturally speaking. Surely, he thought, there must be a deeply rooted reason why girls are so different from boys, even when it comes to shopping. When he returned to the Ann Arbor campus, Kruger and a research assistant, Dreyson Byker, also a male, began poring over the anthropological literature to see if they could find parallels between the ancestral cultures from which humans have continued to evolve, and the current citadel of modern society, the shopping mall. Briefly stated, they found that early hunters, which were usually men, could use the sun to determine directions, like east or west, and likely followed Euclidian navigation, meaning they understood enough about the world around them to go quickly to the beast of prey, slay it, and return home by the shortest route. Sort of like the way a guy picks out an anniversary card. Gathering Is Social, Hunting Is Solitary Ancestral women, however, did most of the gathering, so they navigated by knowing which berry patch was the most productive last season, even if they didn't know the difference between east and west, and they probably gathered food alongside other female members of the tribe, so gathering, like today's shopping, was probably a social event. As Kruger noted in his study, "Gathering is much more conducive to socialization than is stalking game." One reason, the study notes, is "Keeping quiet is much less important when stalking vegetables" than when hunting an elephant. The researchers recruited 467 undergraduate students to take part in an experiment. They were asked which among many statements applied to them. "When in a large unfamiliar shopping center, I try to get my bearings as quickly as possible" (obviously a hunter.) Or "I like to see a large assortment of colors and styles, and then I can pick the ones that are most like what I want" (a gatherer.) And so on. Why Women Like Shopping. Why Men Hate It In the end, Kruger said, they found "strong and striking" parallels along gender lines between the skills that would have aided ancestral hunters and gatherers and modern day shoppers. In other words, the men wanted to kill and get out. The women wanted to look around a little more, continuing the search for that special berry patch. There was, however, one area where the data did not entirely support the hypothesis. The men didn't really think they were out for the kill when asked about shopping. Apparently, there's a lot of difference between the Serengeti and the shopping mall. But by and large, Kruger insists, the data strongly supported the idea that modern women use skills dating back to their days as gatherers while on shopping expeditions. And men really are still on the hunt. All these centuries later, he adds, that difference persists. Not always, of course. Some men love shopping, and some women hate it, he noted, but the masses generally conform to his expectations. Why should anyone care? Kruger hopes this bit of knowledge will help some men and women understand the differences between the genders a little better, thus easing the trauma of shopping. That's apparently already the case in parts of Europe. "In Germany, they have sort of a day care center for men," Kruger said. "They have a place where they can hang out, drink beer and play with power tools while their partner goes shopping." As a male, I think that makes a lot of sense.
<urn:uuid:a1523b9c-b5f4-4708-b85d-0055841b34ae>
CC-MAIN-2017-04
http://abcnews.go.com/Technology/DyeHard/women-love-shop-men-dont-blame-evolution/story?id=9281875
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00557-ip-10-171-10-70.ec2.internal.warc.gz
en
0.979886
1,245
1.796875
2
Three independent vulnerability researchers have a message for the software industry: Show us the money.Dino Dai Zovi, Alex Sotirov and Charlie Miller first announced their new meme in March at the CanSecWest hacker conference. During one of Miller's talks, Dai Zovi and Sotirov held up a hastily made cardboard sign. It declared: “NO MORE FREE BUGS.” The moment may have been impromptu, but the sentiment had been building for years. Some researchers believe they are getting the shaft from software developers, such as Microsoft, who don't pay the flaw finders. Responsible bug hunters have two avenues from which to choose: Provide the information for free to the affected vendor – which typically will credit the researcher in a vulnerability announcement – or sell to a bug bounty program, such as those from TippingPoint or iDefense. Neither option is particularly attractive, especially one that only offers a thank-you, Dai Zovi said. Bounty programs, meanwhile, can choose which flaws they want and, with few competitors, can pay smaller fees. “Vendors have been getting a freebie for a while,” Dai Zovi said. “[But] why would I want to sit down and volunteer to find a bug in someone's browser when it's a nice, sunny day outside?” If software vendors were forced to pay, they would be more incentivized to build software free of bugs before it is shipped, he said. And it would help keep exploits out of the hands of a black-market buyer. The vendor mindset needs to change, Michael Sutton, VP of security research at Zscaler, said. “We're still treating it as though researchers have a moral obligation to hand over vulnerabilities. We live in a free market and valuable information won't remain free.” But Gunter Ollmann, VP of research at Damballa, said companies already are investing plenty in finding vulnerabilities, which often includes hiring consultants. “If the name of the game is making money – and for most of the research people I know it is – then the way to make real money is to sell your services by the hour or by the day, but not by the bug,” said Ollmann, who knows some white hats earning up to $300,000 a year this way. Christopher Budd, security response communications lead for Microsoft, said the company stands by its policy. “Many times [an] acknowledgement can help drive customers to a particular researcher's site, which can result in a positive public perception for that researcher and even potentially increased business.” – Dan Kaplan
<urn:uuid:20fb8a68-195e-4864-b539-bc6396e6f579>
CC-MAIN-2022-33
https://www.scmagazine.com/news/content/software-bug-researchers-hunt-green
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00265.warc.gz
en
0.962793
550
1.625
2
P. (only perfect tense in , -vav/arta-) A1.-vartate- (Aorist 3. sg./āvṛtsata-; infinitive mood-v/ṛte-) to turn or draw round or back or near ; to turn or go towards ; to turn round or back, return, revolve etc.: CausalP.-vartayati- (Ved. subjunctive-vav/artati-Potential-vavṛtyāt-,etc.) A1.-vartayate- (Ved. Potential-vavṛtīta-,etc.) to cause to turn, roll ; to draw or turn towards ; to lead near or towards ; to bring back ; to turn round or back etc. ; to repeat, recite, say repeatedly ; to pray etc.: Intensive-varīvartti- , to move quickly or repeatedly. A1.-vartate- (Epic also ti-; ind.p.-vṛtya-,or parī-vartam-), to turn round, revolve, move in a circle or to and fro, roll or wheel or wander about, circumambulate (accusative) etc. ; (with hṛdi-or hṛdaye-) to run in a person's mind ; to return, go or come back to (accusative) ; to be reborn in (locative case) ; (also with anyathā-) to change, turn out different ; to abide, stay, remain etc. ; to act, proceed, behave : Causal-vartayati-, to cause to turn or move round or back or to and fro etc. ; (A1.) to roll or bring near (subjunctive-vartayāte-) ; to overthrow, upset (a carriage) ; to invert, put in a reverse order (read -vartya-for -vṛtya-) ; to change, barter, exchange etc. ; to renew (an agreement) ; to understand or explain wrongly (words etc.) ; to turn topsy-turvy id est search thoroughly ; to destroy, annihilate ; to straiten, contract ; (A1.) to cause one's self to be turned round (in having one's head shaved all round) (see-vartana-): Intensive-v/avartti-, to turn (intrans.) continually Sanskrit Dictionary understands and transcodes देवनागर्-ई IAST, Harvard-Kyoto, SLP1, ITRANS. You can type in any of the Sanskrit transliteration systems you are familiar with and we will detect and convert it to IAST for the purpose of searching. Using the Devanagari and IAST Keyboards Click the icon to enable a popup keybord and you can toggle between देवनागरी and IAST characters. If you want a system software for typing easily in देवनागरी or IAST you can download our software called SanskritWriter Wildcard Searches and Exact Matching To replace many characters us * example śakt* will give all words starting with śakt. To replace an individual character use ? for example śakt?m will give all words that have something in place of the ?. By default our search system looks for words “containing” the search keyword. To do an exact match use “” example “śaktimat” will search for this exact phrase. Type sandhi: and a phrase to search for the sandhi of the two words example. sandhi:sam yoga will search for saṃyoga Type root: and a word to do a root search only for the word. You can also use the √ symbol, this is easily typed by typing \/ in SanskritWriter software.
<urn:uuid:18dcdc42-e871-4716-a217-493dc7c5f01b>
CC-MAIN-2022-33
https://sanskritdictionary.com/?q=vartayate&iencoding=iast&lang=sans
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00265.warc.gz
en
0.818231
860
2.171875
2
Earlier this month, a report indicated that Samsung would produce the A9 chip for the next-generation iPhone. Now, KGI Securities analyst Ming-Chi Kuo, a reliable source on Apple's future plans, says that he expects Taiwan Semiconductor Manufacturing Company (TSMC) to supply 30% of the chip orders for the next-generation iPhone. This is the latest turn in what has become a back-and-forth affair in determining the companies that will supply A9 chips for next-generation iPhones. We believe key reasons in Apple’s (US) last minute decision to recruit TSMC are: (1) unstable yield rate at GlobalFoundries (US); (2) TSMC’s 16nm FinFET Turbo has exceeded Apple’s expectations in yield rate and performance; and (3) concerns of insufficient 14nm supply from Samsung LSI (KR) due to better-than-expected market feedback of Galaxy S6 and S6 Edge, which uses the in-house 14nm FinFET-manufactured application processor Exynos 7420. Kuo notes that GlobalFoundries, Samsung's manufacturing partner, has thus far had an unstable yield rate of 30% for the A9 chip, which is below the 50% yield rate that is required for mass production. Bringing TSMC into the chip-supplying fold calms some of the uncertainties of Apple. Additionally, TSMC's 16-nanometer process has exceeded Apple's expectations. Alternatively, the Cupertino company is worried that the success of the the Samsung Galaxy S6 and S6 Edge, which use Samsung's advanced 14-nanometer process for their chips, will mean that Apple won't be able to book enough chips from Samsung for the next-generation iPhone. Thus, Apple is turning toward TSMC to complement the supplies from both Samsung and GlobalFoundries. However, over the past couple of months there has been confusion and conflicting reports over the production of the A9 chip in Apple's next-generation devices. In December, a report indicated that Samsung had begun producing A9 chips. In the same month, another report indicated TSMC would be the main supplier for A9 chips in the next iPhone. Then, in January, Kuo expected TSMC to only provide A9X chips for the next-generation iPad. Finally, earlier this month, another report indicated that Samsung and partner GlobalFoundries would become the supplier for the A9 chip.
<urn:uuid:18956980-110e-440e-9cde-6292286335ec>
CC-MAIN-2022-33
https://www.macrumors.com/2015/04/15/tsmc-a9-iphone-30/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00070.warc.gz
en
0.930991
506
1.828125
2
Hackers Hit Mobile Payment Solution CurrentC The email addresses of an undisclosed number of participants in CurrentC's pilot program were stolen. "Many of these email addresses are dummy accounts used for testing purposes only," MCX said in a statement. "The CurrentC app itself was not affected." "We have notified our merchant partners about this incident and directly communicated with each of the individuals whose email addresses were involved," the company added. "We take the security of our users’ information extremely seriously. MCX is continuing to investigate this situation and will provide updates as necessary." eWeek reports that MCX CEO Dekker Davison said in a press conference on October 29, 2014 that the email addresses were actually stolen from MCX's email provider, not from the company itself. Davison also said MCX had been targeted by cyber attacks for several days after it was first announced that CVS and Rite Aid had disabled their NFC terminals in order to meet MCX's contractual requirement that they not accept any other form of mobile payment. It's not clear at this point whether or not the attacks were launched in response to that announcement. "We're challenging the status quo," Davison said. "When you poke at a large ecosystem, you expect attacks." In the press conference, however, Davison said merchants using CurrentC would in fact be allowed to accept competing payment solutions such as Apple Pay or Google Wallet. "If you're launching a new payment system, you have to project a sense of security and gain confidence," Ablowitz said. "If I was in charge of MCX, I'd be worried about how it appears to the typical consumer." And NSS Labs practice manager for architecture and infrastructure Chris Morales told eSecurity Planet by email that this is likely to be the first of many breaches in this space. "As we come to terms with the massive level of hacks against the retail industry, the adoption of these new technologies will continue to attract the same cybercriminals who are going after credit cards," Morales said. Forrester Research expects the market for mobile payments to reach $90 billion by 2017. Photo courtesy of Shutterstock.
<urn:uuid:475a63fa-47da-4fad-8f43-51a733a4a109>
CC-MAIN-2017-04
http://www.esecurityplanet.com/network-security/hackers-hit-mobile-payment-provider-currentc.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00358-ip-10-171-10-70.ec2.internal.warc.gz
en
0.976957
445
1.570313
2
Morgridge Investigator Anthony Gitter and his team are tackling big problems (and big datasets) with machine learning. A new study demonstrates how these tools can be used to predict new protein sequences that could improve protein function. Morgridge Investigator Anthony Gitter presented at the annual BioForward Biohealth Summit about ways machine learning is having a major impact on the early phases of drug discovery. via The Cap Times Anthony Gitter, a Morgridge investigator, discussed his lab’s promising new efforts to use AI to create custom-fit chemicals — or as he described it, “a brand new recipe” for treating illnesses. Virtual chemical libraries are capable of producing billions of never-before-synthesized chemical combinations, advancing the quest for beneficial new drugs. Machine learning models are helping find the best candidates. Inspired by the need for smarter and cheaper ways to screen chemicals for potential therapeutic targets, Morgridge investigator Anthony Gitter is finding answers with machine learning tools. Morgridge scientists John Brubacher, Anthony Gitter, Brian Bockelman, Ben Cox and Katie Overmyer, joined Gabriella Gerhardt on July 22 for a Fearless Science webinar about rapidly applying technology and methods to answer COVID-19 questions. In light of the COVID-19 pandemic, Paul Ahlquist and Tony Gitter joined CEO Brad Schwartz in a webinar where they discussed COVID-19 and the broader context of viral pandemics and how we respond to them. Morgridge virology investigator Anthony Gitter, an assistant professor of biostatistics and medical informatics at UW-Madison, has co-developed a software tool called Manubot to help orchestrate a rapid expert assessment of COVID-19 diagnostics and therapeutics. Anthony Gitter faced a challenge: How could he translate his work into something children could understand and maybe even enjoy? The answer to that question: ‘protein pinball.’ Bioinformatics professors Anthony Gitter and Casey Greene set out in summer 2016 to write a paper about the “state of the art” in deep learning for biomedicine, a hot new artificial intelligence field striving to mimic the neural networks of the human brain. Anthony Gitter, a Morgridge investigator and assistant professor of biostatistics and medical informatics, says the goal will be to create machine learning tools that dramatically reduce the time and cost associated with screening compounds for therapeutic relevance. Anthony Gitter remembers the mental spark when listening to a recent talk about the discovery of so-called “precocious cells” — a tiny group of cells that lead an advance charge against infection. The tools of modern biology have made it possible to obtain an incredibly detailed picture of how cancer cells differ from healthy cells at the molecular level. Somewhat paradoxically, despite these meticulous portraits of cancer, it remains remarkably difficult to answer the very fundamental question: What caused cancer in this patient? Much of biostatistics involves finding and mapping the predictable pathways that can tell us something about what makes a disease tick. But Anthony Gitter finds equal importance in the statistical back roads that other scientists might ignore.
<urn:uuid:3db8335f-936c-4c4a-bbbb-534cee659fdc>
CC-MAIN-2022-33
https://morgridge.org/story/tag/gitter-lab/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00668.warc.gz
en
0.919312
664
2.1875
2
For more than a decade, people have imagined a future where the sequencing of a person's DNA would be as routine a medical practice as a visit to the doctor. We now stand on the cusp of this future, but the volume and complexity of the data exceed our ability to interpret it. Within this challenge lies a major opportunity for software to make a difference in the future of medicine. In his keynote at OSCON Data 2011, Steve Yegge lamented the fact that so many talented software engineers were working on “ways for people to share cat pictures” instead of the hard problems society faces like the understanding of the human genome. In light of his sentiment, this talk is meant to be a timely introduction for software engineers, data scientists, and technologists to genome sequencing. I say “timely” because at current rates, we are tantalizingly close to the inflection point where it will become more cost-effective to sequence a person’s entire genome instead of using traditional (targeted) genetic testing. Concurrently, in the United States, there is a strong public policy effort driving the adoption of electronic medical records. This confluence of events means that medicine will be facing an unprecedented data deluge shortly and represents a major opportunity for data scientists and software developers to work on interesting problems with a major impact on society. Our group of software developers, analysts, and clinicians at The Children’s Hospital of Philadelphia, in part through a grant from the National Human Genome Research Institute, is researching methods of integrating genomic sequence data with patient care. In this talk, attendees will get a gentle introduction to the topic of genomic sequencing with an overview of just what it means to “sequence” a genome, what information can be obtained, and the ways findings will be used by physicians and patients. I will also discuss the computational challenges associated with genome sequencing including the massive storage requirements, algorithmic approaches used for sequence data analysis and the human computer interface issues associated with displaying this very complex data to busy physicians in a clinical setting. Finally, I will discuss the ways open source efforts can and are contributing to this effort, which offers a major potential inroad to an industry that has traditionally been dominated by commercial enterprise solutions. 16th–20th July 2012
<urn:uuid:2318e4f2-65e0-4c50-868a-d5eee89660d7>
CC-MAIN-2017-04
http://lanyrd.com/2012/oscon/schedule/?day=jul-19&topics=healthcare,genomics
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00129-ip-10-171-10-70.ec2.internal.warc.gz
en
0.950735
466
2.15625
2
I use formal theory and empirical methods to research international politics, conflict, and political economy. My focus is on applying game theory and structural estimation methods to study models of war. My work features dynamic models, models of strategic information transmission, and games on networks. Conflict Management and Peace Science. 2022; 39(5):487-519. The preventive motive for war arises because states cannot commit to limit the use of their growing power. This commitment problem can lead to war when there are not enough resources available today to compensate the declining state for their expected losses. In this article, we show how capital markets affect preventive war incentives by introducing a profit-maximizing bond market to the canonical bargaining model of war. We find that the nature of the power shift and fundamentals of the market for debt interact to determine when a preventive motive is more likely to lead to war. Two main results show that (1) less probable but more extreme power shifts are most dangerous and (2) unlike the direct effect of interest rates on the cost of war, higher interest on sovereign debt makes war more likely. We present evidence for the latter effect by extending Lemke's (2003) study of preventive war for major-power dyads between 1816 and 1992. Maintaining peace is costly. To understand what this implies about war outbreak and frequency, this article provides a dynamic crisis bargaining model where peace is costly and countries can take diplomatic action to compete over the bargaining surplus. Against conventional wisdom, repeated interactions of patient countries can destabilize peace. The likelihood of war relies on fundamentals of the international order, such as the persistence of war outcomes and peace agreements, as well as the severity of competition in diplomatic affairs. Even when countries prefer to cooperate, inadvertent wars are inevitable in the long run due to a coordination problem induced by costly peace. Diplomatic competition reduces the gains from peace and affects the probability of inadvertent war, but does not directly instigate attacks. The model offers new explanations for war, highlights the importance of institutional design in averting conflict, and sheds light on which international orders are most likely to fare well over time. Social structure is an important determinant of political outcomes, yet analyses of vote buying do not account for interdependence between actors. We provide a formal model in which candidates can improve their electoral performance by providing private transfers to policy-motivated voters connected on a social network at the expense of a public good. Advances in spectral graph theory allow us to analytically derive comparative statics explicitly in terms of deep parameters governing social structure. Contrary to much existing theory, equilibrium transfers are not determined by network density, but primarily by group fractionalization and homophily, and are driven by a disproportionate targeting of minorities. In addition, we extend the model to account for heterogeneous information structure, demonstrating density still does not affect candidate strategies on average.
<urn:uuid:2aea9ef9-2a5c-4b77-b67f-b677a87dc1bb>
CC-MAIN-2022-33
https://josephjruggiero.com/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00277.warc.gz
en
0.922477
591
1.640625
2
A gravel driveway is the perfect choice for a countryside residence and is also your cheapest driveway option. In this driveway guide we will look at the many different types of gravel you can use to create your own unique style. We will also address the cost of gravel driveway installation and what you should look for from a contractor. And we also tackle what you need to know about driveway gravel drainage and edging, as well as maintenance and repair costs. The type of driveway gravel you select for the top layer of your driveway will affect its aesthetics, of course, and to a lesser extent, its performance. Regardless of what the finish layer will be, most gravel driveways have a base layer of 4” to 6” stones followed by a second layer 2” to 3” stones. The best types of gravel for a driveway are as follows: Road gravel driveways: Road gravel is the most affordable type of driveway gravel. Its makeup is clay and small stones, typically crushed or naturally angular stones that hold together better than round, smooth stones. The exact mix, and therefore the color, in road gravel varies from region to region. Commonly blends are medium to dark brown, shades of gray, light brown or yellow and rusty red to reddish pink. Crushed limestone driveways: Crushed limestone has an appealing gray-white color, though it can be dusty, leaving a coating of whitish powder on shoes and cars. It is quite affordable. Crushed stone driveways: Besides limestone, granite, gneiss, dolomite and trap rock are popular for driveways. The stone is screened and sorted for size; the angled rather than round edges cause the stones to support one another to create a stable base. The color of crushed stone for driveways varies widely, and they can be dusty like limestone. Washed stone driveways: Crushed stone that is put through a washer holds like other crushed stone but doesn’t contain the dust, so it is cleaner for you and your vehicle. Quarry process gravel driveways: Also called QP or crusher run, quarry process stone is crushed stone and stone dust that compacts and binds quite well as the dust forms something like cement. Pea gravel driveways: Pea-sized stones in a blend of colors are popular for upscale gravel driveways. The stone is washed. While attractive, pea gravel driveways can form ruts easier than most, and the gravel is easily scattered into the surrounding landscape. White marble chips: This is a crushed, washed stone with a bit of glimmer. Though the cost is higher, it is visually appealing. Here are the basic steps taken by driveway contractors when installing an upgraded or new gravel drive. Note: In lieu of using a base layer of 6” stone and a second layer of smaller stone, some contractors install single 8-9 inches of 2”-3” before finishing the drive with the top layer. Water is the nemesis of gravel because it causes erosion. Gravel drains very well, but standing water alongside gravel softens and weakens forms of it containing clay and/or dust. Running water can wash out softer types of gravel. There are several ways to ensure good drainage around your gravel driveway. A gravel driveway can be dressed up with edging. The most popular edging materials are pavers or blocks, though concrete is sometimes used as well. Driveway edging is also useful to hold crushed stone and pea stone in place rather than it spreading into the yard. The driveway should be excavated wide enough to accommodate the edging material. Then, the base aggregates are poured and compacted the full width of the excavated bed. The edging is installed on top of the base before the top layer of gravel is installed and compacted. How much does a gravel driveway cost? It depends on the scope of the project. Factors that push costs toward the upper end of the spectrum are deeper excavation, excavating wooded property and higher trucking costs for jobs distant from the gravel source. Then, of course, there are potential extras such as drainage and edging. These are national average costs, and costs are per square foot unless indicated. Would you like to compare the cost of a gravel driveway with the price of other driveway types? Take a look at these price guides: Driveway Paver Prices | Concrete Driveway Prices | Asphalt Driveway Prices As you interview contractors as part of the process of getting gravel driveway cost estimates, look for these characteristics: Gravel driveways require ongoing maintenance to keep them in good repair and looking like new. These maintenance tasks are often handled by the homeowner or a handyman rather than by a driveway contractor. When these issues arise, it makes sense to hire gravel driveway experts in order to ensure that the work is done correctly.
<urn:uuid:936c7663-18b1-4447-bd72-f7ec4c6323e1>
CC-MAIN-2022-33
https://www.renocompare.com/exterior/driveway/gravel-driveway/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00271.warc.gz
en
0.94441
1,007
1.585938
2
Published or Revised October 11, 2011 Transferring to a four-year college or university is a goal of many PJC students. The Counseling/Advising Center offers services and information for students planning to transfer. Many transfer resources are provided such as college and university catalogs, course equivalency guides, the Texas University Common Application, and various reference books and brochures. Successful transferring requires careful planning that should begin as soon as possible in your college experience. Begin planning early: The best time to begin planning for a transfer is early in your first semester and before you select your courses for the second semester. Counselors and academic advisors are trained to help you make the right decisions about the transferability of courses. Choose a career direction and make a transfer plan: Before you can settle on a major or a transfer institution, you need to know your career direction. If you have not decided on a career or major, begin the career exploration process with a counselor as soon as possible. Gather information about four-year colleges and universities: The first step is to locate the institution that has the major available that you have selected. Current college tuition rates and other expenses make cost an important consideration when choosing a transfer college. Also, examine carefully such things as location, housing, and available college services. Applying for a Texas college: Students can obtain a wealth of information about applying for public colleges in Texas at http://www.collegefortexans.com. Students may obtain a Texas Common Application at this site. Investigate transfer opportunities for workforce/technical majors: The Bachelor of Applied Science (BAAS), Bachelor of Applied Technology (BAT) and the Bachelor of Science in Nursing (BSN) are some bachelor degree programs in Texas into which the AAS degree, certificate and/or workforce courses may transfer. Consider the advantages of graduating from PJC before transferring: The advantage of completing a degree at PJC will mean a degree in hand in the event that life situations delay your progress toward the completion of your bachelor’s degree. Also, you will spend your freshman and sophomore years in smaller classes with a teaching oriented faculty and have the advantage of many student services to assist you with academic success. In addition, you will be paying a lower tuition rate. Obtain, complete and submit applications and documents: Prospective students may contact a four-year college’s admission office to obtain an application, other pertinent information and a college catalog or go to their web site which will usually provide all this information. Most universities charge an admission fee. Follow up: A transfer application may take up from four to eight weeks to process. If you have not heard from the college by this time, you may contact the admission office to inquire about your application status. PJC may grant credit for courses already completed at other institutions if the coursework was completed at an accredited institution and at least a grade of D was earned. Paris Junior College has created partnerships with four-year institutions and has developed articulation agreements that match courses between the schools. The articulation agreements are designed to help students make a smooth transition when transferring from PJC to a four-year institution. Students are encouraged to explore resources available in all the college libraries as well as the Counseling Center regarding scholarship information. Students searching for financial assistance on the internet may want to try several search engines and type in the words of a particular major area such as agriculture scholarships, business scholarships, or education scholarships. When investigating any internet or printed resource for scholarships, you should consider only those that are free. Never pay to find money. Also, do not use sources that ask for personal information such as your credit card number and home address. Scholarships are usually awarded on the basis of academic, athletic or artistic merit. Students who have demonstrated academic excellence and leadership abilities at the community college are often awarded scholarships at the four-year institution. Maintaining a high GPA is critical to obtaining a scholarship. Also, community college students should get involved in activities such as Phi Theta Kappa because many four year institutions grant scholarships solely based on membership in this organization. Leadership positions in PTK often garner higher scholarships. Students should also seek worthwhile volunteer work which would enhance their scholarships opportunities.
<urn:uuid:4d63f971-6aa3-46ff-9f92-3fe121df1749>
CC-MAIN-2017-04
http://www.parisjc.edu/index.php/pjc2/main/about-transferring/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280899.42/warc/CC-MAIN-20170116095120-00574-ip-10-171-10-70.ec2.internal.warc.gz
en
0.960569
866
2.078125
2
A critical factor that determines whether a startup succeeds or fails is its level of spending, or burn rate. These include decisions about how much to spend on product launches, how much initial funding to raise and how to allocate other funds. Some startups aggressively spend to attract quality employees, get economies of scale early and grab market share from the incumbent. But overspending can also signal bad management and a waste of resources that could be used to compete against rivals. However, being thrifty has its downsides, too: The startup might have trouble meeting demand or is not aggressively exploring opportunities for profit. The key is to reach a balanced rate of spending, according to a research paper titled “Startup Survival and a Balanced ‘Burn Rate’,” co-authored by Wharton marketing professor Ron Berman and Pablo Hernandez, an economics professor at NYU Abu Dhabi. They also found out that the more education entrepreneurs have, the more likely their startups will succeed. However, an entrepreneur’s level of experience generally does not have much impact on a startup’s survival, their research showed. The research was supported by Wharton’s Mack Institute for Innovation Management. Knowledge at Wharton recently spoke to the authors to talk about their research in more detail. An edited version of the conversation appears below. Knowledge at Wharton: Can you tell us about your research? Ron Berman: What our paper looks at is how the burn rate of startups influences the chances of a startup to go bankrupt. The burn rate, which is more of an industry term, is how much money does a startup spend every month per employee. For example, if a company spends $300,000 every month and they have five employees, the burn rate would be $60,000 per employee. It’s a number typically the industry uses to compare different companies and see which ones are burning too much or too little money. Pablo Hernandez: I want to add to that it’s a very simple metric because you just have an amount of money divided by the number of people there. You don’t go into the details of where do you spend the money. Knowledge at Wharton: And why is that important to a startup? “If you spend too much or too little, the companies are more likely to fail. There is a balanced burn rate [they should aim for.]” –Pablo Hernandez Berman: There are two reasons why burn rates are interesting and important for us to look at. The first thing is that startups typically operate on investors’ money and they want to make sure they don’t run out of money until the next time they can fund-raise, so they want to make sure they don’t burn too much money too quickly. And the other reason is that investors from their [viewpoint] are trying to figure out which startups are operating efficiently, but also more successfully. And because the startups are very different types of businesses, the only apples-to-apples comparison is typically how much money they can make or spend. And the burn rate, as Pablo said, is a great metric for that. Knowledge at Wharton: What are your paper’s key takeaways? Hernandez: There are quite a few, but I think that the most important one is [the] notion that if you spend too much or too little, the companies are more likely to fail. There is a balanced burn rate [they should aim for to improve their survival rates]. In addition, we also look at how the entrepreneurial characteristics, in particular human capital, are related to sound decision-making [and] this balanced burn rate. And we find that one dimension of human capital — education — is positively related to a balanced burn rate. And hence, lowering the chances of failure. Berman: Just to give an example, we find that more education actually reduces the chances that a startup will fail. Another interesting takeaway that we find is something we call confidence or optimism of an entrepreneur, which actually helps the startup a little bit. This is a unique part of our research. Knowledge at Wharton: What conclusions, if any, surprised you? Berman: Let me first start with what is not surprising in our findings. A very well-known result is that if companies burn too much money, they’re probably going to fail, and that makes sense. If you’re over spending and if you’re spending lavishly on things the company doesn’t need, you might go bankrupt. The surprising result was that actually under-spending money — spending too little — also increases the chances of failure of a company. We have a few conjectures of why that happens, but this is one surprising result. “We find that more education actually reduces the chances that a startup will fail.” –Ron Berman A second surprising result is that a lot of past research has looked at what’s called human capital, as Pablo mentioned. And typically, human capital used to be two things: experience and education. We find almost no effect for experience. Adding a lot of experience to entrepreneurs doesn’t make the companies fail less. But we find quite a big effect for education. So, there is a big gap between failure of, let’s say, someone with a bachelor’s degree versus someone with a high school diploma or someone with a master’s degree versus someone with a bachelor’s degree. Hernandez: Actually, that effect is significant. If we look at entrepreneurs with a bachelor’s degree versus an entrepreneur with a high school diploma, there is a 5% more chance that the entrepreneur with the bachelor’s degree succeeds or doesn’t fail [compared to] the other entrepreneur. Berman: And although 5% might seem small … it is a big effect. It is a big effect just from the difference between entrepreneurs with a high school diploma to entrepreneurs with a bachelor’s degree. Knowledge at Wharton: What are some practical implications of your findings? How can people use this information to help themselves? Hernandez: You can look at it from the perspective of the investors and the perspective of the entrepreneur. From the investor’s perspective — given that investors are exposed to sometimes a large range of companies — they can estimate how an individual company is spending with respect to the others and they can assess whether the expenditures are balanced or not. For entrepreneurs, it may work in a similar way. For entrepreneurs, they can go and look at the benchmark, the industry benchmark, and see whether they are too different — they’re spending too much or too little compared to what the industry is doing on average. Berman: Given these numbers, for example, investors can say, “I need to look at the portfolio of 50 companies. I cannot give attention to all of them, but I can single out the ones that are very extreme — too little or too much [spending] and maybe look into them and see whether they have problems.” “The surprising result was that actually under-spending money — spending too little — also increases the chances of failure of a company.” –Ron Berman Entrepreneurs, on the other hand, are typically unsure of how much to spend. I don’t know if I should spend more or less. I don’t know what the competition is doing, etc. If you take those numbers, this metric is very simple to look at and it can [show me] how close am I to what the market is doing? And if I am different, it doesn’t mean it’s bad, but they need to have a good explanation for why…. They need to give good reasons. So, this is the practical implication. Knowledge at Wharton: What sets your research apart from other work in this area? Berman: There are a few aspects that make our research unique. The first one is the data source that we’re using. This is confidential data that we received from the Kauffman Foundation, which collected [data from] 2004 to 2011, a long survey on a representative sample of companies that were founded in the U.S. It’s over 3,000 companies. And they asked them to give information about employees and other things. And we’re one of the only researchers that have used this data in this approach. Hernandez: Another important departure from previous literature is that even though the burn rate is a term that is used widely in the industry, there is surprisingly little research, at least to our knowledge on that important metric. Berman: The final thing is that our research looks at the dynamics of the company. A lot of research just says, “These are the companies that started, and we see how many failed.” For us, we’re trying to see what are the chances of failure next year and [subsequent years], which allows us to filter out a lot of causes. For example, in our data we [included] 2008, the economic crisis. Of course, more companies failed during the economic crisis, but we’re able to filter that out and say what is the effect of the burn rate above that? And so, in statistical language, this gives us more power, and we can say [with more certainty] what is going on with those companies. Knowledge at Wharton: How will you follow up this research? “Adding a lot of experience to entrepreneurs doesn’t make the companies fail less. But we find quite a big effect for education.” –Ron Berman Hernandez: We have two major points. The first one is try to see whether our results are robust. So, we are currently trying to find the same effects or looking for the same effects on a data set that’s provided by the government, and that is a research in progress. The other thing is what we were talking about earlier when we mentioned the mechanisms, what’s driving this balanced or unbalanced burn rate. Berman: We have a theory. Again, as I said, the interesting or the surprising result is that spending too little is bad and spending too much is bad. Both sides are bad and you want to stay in this optimal center. And the question is why do you get those extremes? Our current conjecture is that a lot of it comes from the fact that entrepreneurs are unable to predict demand in the future and competition in the future. As a result, they need to plan today for what will happen. And sometimes they over-plan, like they overbuild capacity, which costs a lot of money. So this is spending too much. Sometimes they under-plan. And when they build too little and there’s a lot of demand in the market, they’re unable to supply and make the money they could have made. As a result, other companies are raising the funding, and for this entrepreneur, he [looks at] other opportunities and just decides to close the business. This is our current working theory. Our next steps are basically to validate that, both using the data and using a theory model that would try to explain that. Hernandez: Actually, Ron mentioned a very important point that is fundamental, which is the opportunity cost that we think has a lot to do with this surprising result — spending too little may lead to failure. The entrepreneur might say, okay, I’m making money, I’m not losing money. But I’m spending so much time [on this business]. I probably have a lot of education, a lot of connections that I may [put to] use in another business. And that is something that we conjecture is at the core of our results.
<urn:uuid:d378608d-4339-452b-b27b-9bce196b81fe>
CC-MAIN-2022-33
https://knowledge.wharton.upenn.edu/article/how-a-startups-burn-rate-influences-its-success/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00470.warc.gz
en
0.96164
2,454
2.359375
2
There are no black sheep in God's flock - an idea for creative prayer Sometimes we feel like the black sheep. We can make ourselves believe we don’t belong with all the negative words that we say about ourselves. Which side of the sheep do you believe? Turn it that way up. Or maybe if you believe the negative things but want God’s help to believe the truth, leave the black sheep with the positive statements showing, as a prayer. A creative prayer idea in which we're going to dwell on the beautiful words that the Lord says about us. This idea is part of a complete Sunday school lesson on Psalm 23 and the Bible passage in John 10: 11-18 on Jesus being the Good Shepherd. This creative activity will help the children in your Sunday school lesson, youth ministry, Bible lesson, VBS, kidmin, children’s church or children’s ministry to reflect on this powerful Bible passage. Jesus is the Good Shepherd, the church as a flock, self-image, self-judgement,trusting in the promises of God What you'll need: - a big black sheep made out of cardboard with positive and negative words
<urn:uuid:d39ca34d-3dda-46cb-8902-ba5cb82bb654>
CC-MAIN-2022-33
https://www.creativekidswork.com/all-ideas/328-278-which-side-of-the-black-sheep-creative-prayer-idea-part-of-a-sunday-school-lesson-about-the-good-shepherd
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00671.warc.gz
en
0.932468
251
2.46875
2
Developing an understanding of Artificial Intelligence (AI) is essential for Air Force, and Defence, to enable personnel to make smarter and faster decisions, often in high-risk situations. To effectively and ethically adopt and deploy game-changing AI technology, a fundamental understanding of what it can and can’t do must first be recognised. AI such as data-led decision support systems and Air Force’s Cognitive Assistant Avatar – AIMEE, are force multipliers that have the potential to deliver quicker and safer military effects using fewer resources. Jericho Disruptive Innovation held a series of AI Fluency sessions to assist Air Force’s adoption of these rapidly growing technologies. Credit: Australian Department of Defence November 16, 2021
<urn:uuid:43f66561-2ef4-43f4-9a4a-94303a2e7a9e>
CC-MAIN-2022-33
https://sldinfo.com/2021/12/is-the-raaf-ready-for-ai/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00272.warc.gz
en
0.912224
151
2.6875
3
- Common Cuckoo - обыкновенная кукушка view large, please - it's an uncropped picture. I went for a bicycle ride in the forest south of Akademgorodok and heard a cuckoo. I stopped to look for it and noticed another one sitting in no more than 10 m from me, staring at me. I then saw the one I'd heard at first, perched on a willow nearby, and yet another one further to my right. I sat down on the road with my camera, and one of the cuckoos landed very close to me, then flew around me, then sat on a tall birch stump; I watched it feed - every now and then it would jump down to the ground or fly to the trunks of birches nearby to catch bugs and worms, but stayed very close to me. The sun was setting, but I was still able to take several pictures. I'm starting to get a feeling that cuckoos like me for some reason - they're said to be secretive and elusive birds and I've been seeing them a lot lately!
<urn:uuid:f3cf172f-142f-4639-a1b5-2a67686fd91c>
CC-MAIN-2016-44
http://eol.org/data_objects/13504783
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719547.73/warc/CC-MAIN-20161020183839-00394-ip-10-171-6-4.ec2.internal.warc.gz
en
0.982154
245
2.015625
2
Great Britain gave the world a lot of talented people. Many famous writers and poets were born and lived in Great Britain.One of the best known English playwrights was William Shakespeare. He draw ideas for his tragedies and comedies from the history of England and ancient Rome. Many experts consider Shakespeare the greatest writer and the greatest playwright in English language. William Shakespeare wrote 37 plays which may be divided into: comedies (such as "A Midsummer Night's Dream"), tragedies (such as "Hamlet", "Othello", "King Lear", "Macbeth") and historical plays (such as "Richard II", "Henry V, "Julius Caesar", "Antony and Cleopatra"). Robert Burns represents the generation of Romantic writers. In his poems he described with love and understanding' the simple life he knew. Among his well-known poems are "Halloween", "The Jolly Beggars", "To a Mouse". Lord George Gordon Byron. His free-spirited life style combined with his rare poetic gift makes him one of the most famous figures of the Romantic Era. His famous works such as "Stanzas to Augusta", "The Prisoner of Chillon", "Childe Harold's Pilgrimage", "Manfred" draw readers into the passion, humors and conviction of a poet whose life and work truly embodied the Romantic spirit. Sir Walter Scott wrote the first examples of historical novel, for instance, "Ivanhoe". Lewis Carroll became famous when he published "Alice's Adventures in Wonderland".
<urn:uuid:0876abb5-cd7f-4dfb-8201-0fd8d7557640>
CC-MAIN-2022-33
https://www.native-english.ru/topics/british-literature
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00071.warc.gz
en
0.966592
317
3.46875
3
Retirement brings with it a lot of major decisions, especially for company owners who've grown a successful business over many decades like James Dow, founder, President and CEO of Diversified Plastics Inc. While there are many options, the one that Dow chose to continue the success of his 35-year-old company was to sell to the employees through an Employee Stock Ownership Plan (ESOP). "Knowing that someday I would eventually retire and have to sell the company, the most obvious direction would have been to sell to an outside organization," Dow stated in a prepared release. "But, I found that prospective buyers had no desire in continuing the company. Their only interest was our customer list and equipment, which meant that in all probability, our employees would be out of work."
<urn:uuid:2315fdc1-bb0e-43b2-94e6-cd04e1f18caf>
CC-MAIN-2016-44
http://www.k-online.com/cgi-bin/md_k/lib/pub/tt.cgi/Taking_stock_Diversified_Plastics_employees_invested_in_company_s_success_literally.html?oid=34764&lang=2&ticket=g_u_e_s_t
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718278.43/warc/CC-MAIN-20161020183838-00239-ip-10-171-6-4.ec2.internal.warc.gz
en
0.987089
159
1.625
2
Members of a recently-suspended political party in Burundi could receive life sentences for a political protest that turned violent earlier this month. The case highlights growing political tensions in the country ahead of next year's presidential election. On March 8, demonstrators from the opposition Movement for Solidarity and Democracy (MSD) took to the streets of Burundi's capital, Bujumbura, to protest against what they saw as the government's restrictions on political freedoms. They were met by riot police who fired tear gas to break up the protest. More than a dozen opposition members were injured during clashes that followed, while two policemen were briefly held hostage at MSD headquarters. Now, the party has been suspended for four months and 46 party members are on trial, facing the possibility of life in prison on charges of insurrection, violence against police and rebellion. Another 22 are facing lesser charges. The president of the Forum for Strengthening Civil Society in Burundi, Vital Nshimirimana, says the March 8 crackdown was politically guided. “The police showed that it is not neutral. It is not neutral in the sense that it is kind of led by some part of the ruling party,” he said. Presidential adviser Gervais Abayehu denies there is any deliberate crackdown on the opposition. He tells VOA the protesters violated an order by the interior minister that banned political rallies on that particular day, which coincided with a public celebration of International Women's Day. “Things in this country are such that if you do not go by the law, if you do not respect what the interior minister is saying or the government is saying, it does not matter if you are in the opposition or whether you are in the ruling party, you have to face the full force of the law," he said. The recent violence has grabbed the attention of the international community. U.N. Secretary-General Ban Ki-moon issued a statement after the clashes urging both sides to show restraint, while deploring the “growing restrictions on the freedom of expression, association and assembly" in Burundi. The U.S. State Department condemned the government's use of “heavy-handed tactics” to break up the rally. Abayehu says the overall political atmosphere is not as bad as it is made out to be, noting that the government has set up forums to discuss issues of concern among political parties. He says the international community should not rely on information it gets from the opposition. “If the international community rely on what is really the reality in the country, I think there is no reason, there is no cause for concern in the country. We see the country being stable, being peaceful,” he said. Some activists believe the government is intentionally stifling the opposition in order to place the ruling party in a stronger position ahead of next year's presidential and parliamentary elections. The opposition boycotted the last vote in 2010 because of concerns of vote-rigging, giving an easy victory to President Pierre Nkurunziza. Jean Claude Nkundwa, a Burundian peace activist living in the United States, has concerns about the next vote, given the current political conditions. “There is a need of support of this election process which is coming to ensure it is fair and transparent. And it will not be fair and transparent if the democratic principles are not respected,” he said. Nkundwa is a survivor of the ethnic conflict that took place in Burundi more than 20 years ago, along the same Hutu-Tutsi lines as the genocide in neighboring Rwanda. Since then, political reforms helped promote reconciliation in the country. But now, Nkundwa says he fears Burundi is sliding backwards. “It's getting dangerous because the frustration has always been the cause of war. If people feel the needs of justice are not met, people try to express themselves and they crackdown, then in the end there is [an] explosion,” he said. Civil society groups are also concerned about constitutional changes proposed by the ruling party that would reduce the powers of the vice president, among other changes to the existing balance of power. Activists have accused the ruling party of trying to change the laws to allow a third term for President Nkurunziza. The government, strongly denies the allegation and says the proposed changes will put the country more in line with the political systems of its East African neighbors.
<urn:uuid:9c20b4a4-b932-44a5-86c6-c059258deb8b>
CC-MAIN-2016-44
http://www.voanews.com/a/political-tensions-in-burundi-simmer-after-crackdown-on-opposition/1874610.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721405.66/warc/CC-MAIN-20161020183841-00314-ip-10-171-6-4.ec2.internal.warc.gz
en
0.965191
932
1.867188
2
It is a known fact that developing superior reading skills is an important aspect that inevitably helps children get through school and other aspects of their everyday lives in a successful and streamlined manner. However, the chances of their success can be guaranteed if they’re introduced to reading at a young age, mainly to develop an interest and keen understanding of various aspects and topics. You can read a new children’s book to your children during the day or right before tucking them in for a good night’s sleep. The benefits such an act might bring to your children are countless. The Benefits of Early Reading Reading stories to children is bound to improve their cognitive skills considerably. Their ability to hear and understand improves gradually, and they can distinguish between different elements simply. Reading stories to your children plays a fundamental role in providing them with decent background knowledge of their world. Reading daily to children and teaching them how to read can significantly improve their communication skills and help them understand the language. Considering this, it would be possible for the child to hook on to vocabulary and the language they might hear. Early reading allows children to communicate with their parents and vice versa openly. The greater the words are in the child’s language world, the more they’re likely to learn and develop stronger language skills. Very few children sit idle for extended periods, and this is where another benefit walks through the door. Regular reading can boost the child’s concentration as well as discipline. Children might be uneasy initially, but they’ll most likely adjust to reading over time. Summing up the benefits of reading, it is also known that regular reading would boost the child’s overall creativity and develop a lifelong attitude towards it. Below mentioned is Rock in the Pocket, our best take on an easy-to-read children’s book. Our Take on the Best New Children’s Book Rock in the Pocket is amongst our takes on the best new children’s book to help develop their interest in reading. The Rock in The Pocket is a brand co-developed by a mother and her son, Rocky and Kase ‘Slammy’. Their joint efforts played a considerable role in crafting a new children’s book to deal with all the possible bottlenecks children might face in current times. The Rock in The Pocket is purely written, keeping the interests of the children into consideration. It’s still not a big issue if they’re new to reading. The book makes the best possible use of simple and easy-to-understand graphics and cartoons. Considering how the book represents these graphics and cartoons, they’re pretty simple and not highly detailed.
<urn:uuid:2eec88ac-5cb8-486c-974f-a442cab4c78c>
CC-MAIN-2022-33
https://magazines2day.com/the-benefits-of-introducing-your-child-to-reading/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00479.warc.gz
en
0.966062
551
3.328125
3
On Friday I had to spend some time outside of our flat. So I went to a cinema. I had no expectations towards the film which I was supposed to watch. I haven’t wasted time and I had to think about youth and time of adolescence. It was “Being 17”. It’s interesting to watch which are the relations between a white and not-white young adults in a French mountains’ region. Continue reading “Film about young adults “Being 17” – review from the East European perspective” Interested in digital humanities, Websites and studies related to humanism & Internet? Read these short informations here. I collected them day by day this year and presented first on the facebook fanpage Digital Humanists. I will once a month or for two months present them all together here. Continue reading “Digital humanities, Websites and studies – part I” Have a great time at the end of this year and at the beginning of 2016! And watch the video, if you haven’t seen it: On December, 10 is the International Human Rights Day since 1950. 2015 it seemed to be not so important day in Poland, because there were not planned any events e.g. on behalf of the Ministry of National Education. This year Human Rights Day highlights ‘Freedoms,’ recalling the four freedoms that underlie the Universal Declaration of Human Rights and two major human rights covenants (more about it here). Continue reading “International Human Rights Day” A think tank, other called policy institute or research institute, is an organization that performs research and advocacy concerning topics such as social policy, political strategy, economics, military, technology, and culture. There are a lot of think tanks in every democratic country. A very important think tank in Poland is Centre for Eastern Studies (Ośrodek Studiów Wschodnich im. Marka Karpia). It’s an independent public research institution monitoring the events and analysing the socio-political and economic processes taking place in Russia, Germany, Ukraine, Belarus, the Baltic states, the Visegrad Group states, the Balkan states and Turkey. Continue reading “Being up to date thanks to think tanks” Since 2003 activists in fields of cultural, language and civic exchange in East Central Europe, which are members of an association MitOst, meet annualy – each time in a different city – and develop themselves in different topics. Get to know MitOst here: www.mitost.org. And read here a diary from the 13th International MitOst Festival written by Olga Konovalova: “An old green train #115O that passes daily through Lviv and goes to Ivano-Frankivsk, or Stanislau (an old name of the city which I like more). It goes slowly without stops through the villages, endless picturesque fields and dense forests as it gives time specially for enjoying the landscape. The train has its typical knock sound which I missed in European trains. I ask the train conductor to bring me glass of tea in metal glass-holder, which is possible to find only in trains of post-soviet countries. I was drinking sourse by source the tea, enjoying the landscape and thinking what is waiting on me at MitOst festival. I was going without any expectations or knowledge what is going to happen and looking forward to discover the city, the festival and organization itself. Continue reading “A diary from the 13th MitOst Festival [Olga Konovalova]” Community archives are archival initiatives, which are independent from the state activities. They are a new place, where you can look for unknown historical sources. You can find there e.g. family photos, private documents and diaries. Polish scientists consider sources of community archives to be very important for researches with new approaches, e.g. every day life, cultural life and social life. On October, 24 they met in Warsaw (Museum of History of Polish Jews – Polin) at the 1st Meeting of Community Archives (www.archiwa.org). Continue reading “New historical sources – a meeting” At the weekend parliamentary election takes place in Poland. It is a good moment for the analysis of political campaigns. „Citizens decide” („Obywatele decydują”), „I love Poland” („Kocham Polskę”) and „We can do it” („Damy radę”) are new catchwords of political parties. It could not be antything wrong, but these slogans are slogans of ngo’s projects or other organizastions. Are there conscious actions or spin doctors’s inattention during electoral campaigns? Continue reading “I am looking for a good catchword [Marta Gałązka]”
<urn:uuid:1fc29a45-4e37-4b15-88bb-41a35ca91f67>
CC-MAIN-2017-04
http://agnieszkakudelka.pl/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00448-ip-10-171-10-70.ec2.internal.warc.gz
en
0.932922
1,041
1.765625
2
On 02/09/2012 08:12 AM, Frédéric Danis wrote: RING event should only be sent when callsetup indicator is set to Incoming and there is no active call. If call indicator is set to inactive while callsetup is already set to Incoming (waiting call has generated +CCWA), no RING event should be sent. Ref.: PTS test TC_AG_TWC_BV_02_I src/emulator.c | 18 +++--------------- 1 files changed, 3 insertions(+), 15 deletions(-) After looking at the test case, it seems to be dealing with testing the consequences of CHLD=1. Essentially dropping the current active call and accepting the waiting call. The logic you're changing is also dealing with a slightly different case, namely if the active call is dropped by the remote party during a waiting call. In the case of CHLD=1, the sequence should be one of these: 1. Active Call Index -> Disconnected, Waiting call Index -> Active In the case of remote party dropping the Active call, the sequences can be: 1. Active Call Index -> Disconnected, Waiting Call Index -> Incoming The logic has to be modified to handle the transition state (e.g. call indicator going from 1 to 0, and waiting call present) and send the proper indicators when the final state is reached. Likely our handling of the 'waiting' variable is incorrect, we cannot rely on the values of callsetup and call, but instead should try to find any calls in the I believe that sending a call=0, then callsetup=0, call=1 is acceptable, but ideally in the case of CHLD=1 we should be sending callsetup=0 only.
<urn:uuid:5dd62425-a97e-40ca-875b-504894ae2be0>
CC-MAIN-2022-33
https://lists.01.org/hyperkitty/list/ofono@ofono.org/message/EVB7AQ5VZGUXY3GYHY6MXB2VLZQRDJKR/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00667.warc.gz
en
0.871052
415
1.546875
2
Why Should You Build a Fence on Your Property? Fencing can add a range of benefits to your property such as: - Aesthetic Value - Pet Protection - Noise Barrier - Home Protection - Ability to add a pool Determining why you want to build a fence will help you decide on the size, materials, colours, and style of your fence. If you are trying to block out noise, then a high solid wood fence is best. To improve the aesthetic value of your property then a smaller fence would work well. If you would like to still see through the fence, but keep out unwanted guests (or pets inside the barrier), then a wrought iron fence may work well for you. Once you have decided on what type of fence you want, you can then lay out a budget and timeline. Common Challenged for Building New Fences Here are some of the most common challenges people have faced when dealing with new fencing projects. Knowing the fencing size will help determine your project’s timeline and budget. Larger fences will require more time and more materials while smaller fences require less time and materials. When deciding to build a fence, you should also keep your neighbours in mind as to not pose a potential hazard to their property. Depending on where your house was built, you may have neighbourhood regulations regarding the type of fence you are allowed to have. As well, many times the cost of fencing between two homes can be split between neighbours, and built between the property lines. This conserves the most amount of yard space for both sides of the fence. It is a good idea to check with your neighbours and see what their thoughts of building a new fence would be if this is applicable for your property. Choosing a material is one of the most important steps because you have to keep Calgay’s climate in mind to make sure it can fare well in our winters. The following are some common fencing materials: Wood is a popular fencing material and stands up well to Calgary’s climate. It also comes in a large variety of sizes and designs so it can be very customizable to match your properties aesthetic. To keep up its durability, make sure you use a waterproofing sealant. Without sealant the wood will rot and weaken faster. As well, depending on if the fence is painted or stained, it could require yearly maintenance to keep up its appearance. Vinyl, unlike wood, won’t fade or rot over time. It has great durability, very little maintenance, with no paint or stain required. Since it doesn’t hold paint very well, there are however a limited number of styles to choose from. Vinyl can also be more expensive than wood. Wrought Iron fencing is a great option if your main purpose is to improve the aesthetic appeal of your yard. It has high strength, durability, and good security with the iron points at the top. This material is more expensive than others, as it has to be custom made. This type of fencing also gives minimal privacy, and is not the greatest for keeping small pests like rabbits or foxes out of gardens as they can slip through the pickets. City of Calgary Bylaws There are four steps laid out by the city for when you are planning on building a fence on your Calgary property: Step 1: Review the Rules for Your Fence - Typically a permit is required if any of these conditions apply: - In the rear yard higher than 2 m - In the front yard higher than 1.2 m - Inside a corner visibility triangle and higher than 0.75 m - Gate higher than 2.5 m - In most situations a fence doesn’t require a building safety approval (building permit). If your design or location does not meet land use bylaw specifications you will require planning approval (development permit) - Any new fence construction is not permitted to extend onto City property. - If you are planning to have a pool/spa/hot tub on your property additional features must be added in order to comply with the Alberta Building Code - Height of fence should not be less than 1.8 m above the ground - Any opening to the fenced area must feature a gate that is the same height of the fence and has a self-closing, self-latching device and can be locked. - The distance between fencing pickets is limited to 10 mm Step 2: Prepare Your Application - Using this Fence Permit Checklist you can determine the requirements for your application - This checklist explains what needs to be written up on your site plan and elevation sketch which includes: address, property lines, location of fencing, fencing material, outline of any other structures on the property,etc Step 3: Apply - You can apply online using this link: https://apply.calgary.ca/. - You can also apply in person by taking all your necessary documents to the Planning Services Centre. Step 4: Inspections and Managing Your Permit Application - Your permit won’t be given until your project has passed all the required inspections which verify the building safety or approval standards - To book an inspection with the city visit Residential Inspections - If you want to change or cancel your permit visit manage your permit application. Always make sure you plan well ahead. Building a new fence on your property requires certain steps which must be followed for your safety. It also may take longer than you expect, so if you are serious about this type of project take your time and make sure everything is in order.
<urn:uuid:451ebf3f-6d4f-495d-89db-00ad655efd61>
CC-MAIN-2022-33
https://yycreadvisors.com/blog.html/what-to-know-before-building-a-fence-7721490
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572304.13/warc/CC-MAIN-20220816120802-20220816150802-00475.warc.gz
en
0.948218
1,156
1.5
2
Ever wonder how world-class innovators think? Or how to help your researchers think less like professors and more like inventors? An interview published in technology blog xconomy offers a look inside the head of Intellectual Ventures’ global head of technology, Patrick Ennis. The Bellevue, WA-based firm, founded by Nathan Myhrvold and Edward Jung, is sometimes called an “invention company.” It has stirred controversy in tech transfer circles by buying up large numbers of technology patents worldwide, but maintains that it is anything but a “troll” and is spending plenty of time developing not only purchased IP but generating its own innovations. Ennis, a physicist by training and a former VC exec with Arch Venture Partners, described how invention sessions work at the firm. Quoting from the xconomy article: He was fiddling with the Saran Wrap on his sandwich, wondering about its material properties and how they might relate to thin-film coatings for medical stents, say. “Inventors see inventions everywhere,” he says. “Invention is not taught, except for kids. When you’re a little kid on the playground, you’re allowed to do this. But as an adult, this would be viewed as weird — ‘this person is not focused.’ But that’s what inventors do.” He ran through a hypothetical thought process with his sandwich. “Before we go to bed, we’d know if there are opportunities to invent a better film for food. I suspect we’d find the only opportunities are to reduce a little bit of cost, and maybe to change the marketing of it. A lot of the times at IV [Intellectual Ventures], we look at things like this and it turns out — because it was boring, or viewed as pedantic or mundane — people missed something obvious,” Ennis says. “You want to do a realistic market study. If it turns out there’s only 5 million a year of this sold around the world, it’s not worth your time to invent it. We’d quickly get a number for how much Saran Wrap is sold around the world….Then, someone will raise a hand. ‘You’re just talking about food preparation. These thin films are used for insulation to cover houses.’ Hmm, that’s 100 times bigger than a hamburger…That’s how invention sessions go.” Ennis also shared his views on the patent system, gave high marks to Arch Venture for its approach to investing in and helping to develop early-stage ideas, and commented on U.S. global competitiveness. Go to: Xconomy
<urn:uuid:e5d69555-4bb2-4fff-b6bc-ef0d018cc5db>
CC-MAIN-2017-04
http://techtransfercentral.com/2008/12/17/inside-the-mind-of-a-prolific-innovator/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00071-ip-10-171-10-70.ec2.internal.warc.gz
en
0.966538
571
2.3125
2
Stephen Leahy* – Tierramérica HAVANA TIMES, Dec 8 (IPS) — The main cause of climate change is the burning of fossil fuels, so why are billions of dollars being invested to find and produce more oil, coal and natural gas? That is the question posed by Canadian indigenous representatives at the alternative civil society meet, Klimaforum, held parallel to the United Nations-sponsored climate summit under way in the Mexican resort city of Cancun. “Canada’s tar sands project emits 40 million tons of carbon every year, with ambitious growth plans pushing that to nearly 140 million tons by 2020. The entire country of Denmark emits just 52 million tons,” said Melina Laboucan- Massimo. The activist comes from the Lake Lubicon Cree band of First Nations in the province of Alberta, where thousands of square kilometers of tar-laden soil and sands underlying pristine boreal forests and marshes are being mined. Canada is not being censured for this flagrant disregard for the global climate at the 16th Conference of Parties (COP 16) to the UN Framework Convention on Climate Change, she said. The nearly 200 national delegations gathered for COP 16 (Nov. 29-Dec. 10) aim to stabilize emissions of greenhouse- effect gases to prevent climate change, but there is little hope of success. In fact, at the Cancun summit no country is being challenged for expanding operations of oil, coal or natural gas or looking for new deposits. Burning just one-quarter of the proven reserves of oil, gas and coal will push the global climate beyond the two degrees Celsius of average warming, scientists have predicted. “We shouldn’t forget that a two-degree global mean warming would take us far beyond the natural temperature variations that life on Earth has experienced since we humans have been around,” Malte Meinshausen, climate researcher at Germany’s Potsdam Institute for Climate Impact Research, told Tierramérica in an interview last year. According to Laboucan-Massimo, also an activist with Greenpeace Canada, “There is no investment in solar energy in Alberta, the region of Canada with the most sunshine.” She spoke to a small group of activists and members of the public this week under a nylon awning at El Rey Polo Country Club, outside Cancun. The gathering was part of the Klimaforum, civil society’s alternative summit “to promote and debate true sustainable and socially just solutions to climate change.” Held in the middle of the coastal jungle, 20 km from the COP 16 official negotiations, there were in fact polo players mounted on horseback galloping across a huge field while Laboucan-Massimo told people about the impacts of the world’s most capital-intensive project. Not only is Alberta’s tar-sands mining the world’s biggest industrial project, it is the most destructive and wasteful, with carbon emissions three to five times higher than conventional oil production, said Laboucan-Massimo. Millions of liters of fresh water are boiled, using natural gas, in order extract the tar from the soil. That water is so contaminated that it kills birds when they land in the wastewater-lakes, which cover more than 50 square km, she said. “It’s insane. It is really scary to see how much the land has changed in my lifetime, and I’m not even 30 years old,” said the Canadian activist. Most of the 2.7 million barrels of oil produced each day from the tar sands goes to the United States. That is why both Canada and the U.S. have lobbied other countries to prevent a moratorium on fossil fuel expansion from coming up at these meetings, said Clayton Muller-Thomas, of the Mathias Colomb Cree Nation in northern Canada and organizer at the Indigenous Environmental Network. “They and other industrialized countries prefer techno-fixes like REDD (Reducing Emissions from Deforestation and Forest Degradation), biochar and carbon capture and storage rather than real reductions in emissions,” Muller-Thomas told Tierramérica. If the REDD mechanism is approved, the wealthier nations can pay to conserve forests in tropical regions as a way to offset their own greenhouse gas emissions. The rich countries would then obtain carbon credits that would help them achieve their emissions reduction targets set out in the Kyoto Protocol. “These market-based mitigation mechanisms are highly alarming to indigenous peoples,” said Thomas-Muller. Such strategies are “false solutions” to the problem of climate change, and threaten the rights, lands and cultures of indigenous peoples who have been asking for a moratorium, he said. If most people are against the privatization of water, why we would agree to the privatization of the atmosphere through carbon markets, he asked. Bolivia tried to bring a proposal for a moratorium to Cancun, along with other parts of the Cochabamba “People’s Agreement” that came out of a gathering in that Bolivian city last April. Known as the World Peoples Conference on Climate Change and the Rights of Mother Earth, it drew some 35,000 participants from around the globe. At that meet, the participants agreed to call for an oil moratorium and for governments of the world to recognize the rights of Mother Earth. The key aspects of the Cochabamba platform were included in the texts for negotiating a new binding agreement, but set apart in brackets, as were so many other items about which consensus has not been reached. However, the COP 16 chair, Mexico’s Foreign Minister Patricia Espinosa, submitted a draft proposal to the negotiators in Cancun that excluded the Cochabamba issues. In reaction to a complaint from Bolivia it was reported that the text was her personal initiative and not the official text for the negotiations, but it was enough to prompt this response from Thomas-Muller: “It’s business as usual here at the COP 16.” It is also business as usual for energy giant British Petroleum (BP), which announced last week it will proceed with its first project in Canada’s tar sands. BP, the company responsible for the massive oil spill this year in the Gulf of Mexico, along with a Chinese-owned partner hopes to extract 3 billion barrels of oil through their massive Sunrise project. More than 3 billion dollars is to be invested to get the oil out within three years. “If we burn the oil from the tar sands we have little chance of preventing runaway climate catastrophe,” said Jess Worth, an activist with the UK Tar Sands Network. “BP knows this, but it doesn’t care,” Worth said in a statement. (*This story was originally published by Latin American newspapers that are part of the Tierramérica network. Tierramérica is a specialized news service produced by IPS with the backing of the United Nations Development Program, United Nations Environment Program and the World Bank.)
<urn:uuid:eefb20e4-41a8-48ac-8947-c43394d67d3c>
CC-MAIN-2022-33
https://havanatimes.org/latin-america/cancun-summit-gives-fossil-fuels-a-free-pass/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571234.82/warc/CC-MAIN-20220811042804-20220811072804-00076.warc.gz
en
0.944229
1,472
2.953125
3
CAUSE: The Kind Campaign is bringing awareness to the negative and lasting effects of female bullying. The founders, Lauren, 25, and Molly, 24, first met at Pepperdine University. Together, they have created a non-profit organization, a school assembly program, and a documentary film called Finding Kind. Lauren and Molly have embarked on three national tours to initiate open and honest conversations between girls and create change in communities. EFFECT: Lauren and Molly have spoken at about 400 schools in America and Canada, and each assembly averages an audience of 200 to 500 girls. They have screened their documentary at thousands of venues across the country, and impacted even more girls through their website and social networks. GET INVOLVED: Set up a Kind Campaign assembly or screening of Finding Kind at your school, share your story and participate in the interactive parts of the Kind Campaign's website and social networks, or donate to the campaign. The Finding Kind documentary trailer.
<urn:uuid:34f0d835-1e7a-4d8c-9c91-9a99942eec73>
CC-MAIN-2017-04
http://www.teenvogue.com/gallery/lauren-parsekian-and-molly-thompson-kind-campaign?slide=1
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280483.83/warc/CC-MAIN-20170116095120-00292-ip-10-171-10-70.ec2.internal.warc.gz
en
0.947856
195
2.078125
2
Framed photograph, Portrait of Margaret Poole; Unknown photographer; 1900-1920; ... Framed photograph, Portrait of Margaret PooleAbout this object A hand-coloured portrait of Mrs Margaret Poole (neé Arthur) of Isla Bank. Margaret Morrison Arthur was born on 12 August 1865 in North East Valley, Otago, She married Edward Samuel Poole on 15 April 1886 in Otago. They farmed at Isla Bank, where Edward also ran a threshing mill. They had 14 children over 20 years. She died on 29 September 1938 in Tuatapere, at the age of 73 and is buried in the Calcium cemetery at Isla Bank. 1900-1920Inscription and Marks On a printed label glued to the front: 'Mrs. Edward POOLE MARGARET nee Arthur ISLA BANK'. Handwritten on reverse: 'MRS MARGARET POOLE nee ARTHUR WIFE OF EDWARD POOLE ISLA BANK'. Handwritten on reverse, twice: '317'. Handwritten on revere and adjacent on a yellow sticker: '98/6'. Stamped on reverse: 'WALLACE EARLY SETTLERS MUSEUM RIVERTON'.Measurements h 610 mm x w 410 mm x d 30 mmObject Type organic, processed material, paper organic, processed material, paper, cardboard organic, vegetal, wood inorganic, processed material, glass
<urn:uuid:de645039-247f-4cf0-a035-8b095c64400a>
CC-MAIN-2022-33
https://nzmuseums.co.nz/collections/3278/objects/1417298/framed-photograph-portrait-of-margaret-poole
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00273.warc.gz
en
0.877791
324
1.882813
2
There are two categories of commands. For the commands acting on the display itself used in conjunction with sendCommand() you can find a list here https://github.com/ScruffR/ITEADLIB_Nextion/blob/master/src/NexHardware.h (based on ITEAD’s original lib) https://github.com/ScruffR/ITEADLIB_Nextion/blob/master/src/NexCommands.h (added commands that weren’t exposed by ITEAD’s original) And for commands applying to widgets you can find a matrix here Does your font include a degree symbol? You may need to use the Nextion Editor to “create” a font that does. BTW, there is no need for the \0 in your string. The double quotes implicitly cause the compiler to add that for you. The font I’m using was created using the Font Editor. I’m assuming the Font Editor picks up a list of fonts that are already on the PC. I used the default choice, Microsoft Sans Serif, at 40 pt. Checking with the Windows Character Map tool, I see that this font does in fact have a degree sign. But that doesn’t seem to be the problem. I tried TempF.setText ("\0x41") ; (an uppercase “A”) and that also failed to print anything. Perhaps setText doesn’t handle hex characters? That’s not surprising \0 terminates the string immediately and hence the rest will not really be sent to the display. That’s what I keep telling about the uselessness of \0 in a string literal. DOH!! (sound of head banging on the table). TempF.setText ("72\xB0") ; works perfectly. Thanks. Here’s my latest problem. I used the Nextion editor to set the background to blue. It looks blue in the editor and it compiled OK. But when I download it to the display I get this. The text label backgrounds are correct, but the global background is screwed up. What am I doing wrong now? If I say I can set the display background to blue, but it also erases all of the text labels. If I say setBackColor (49) ; it fails to compile: /src/nextiontest1.cpp:63:16: error: expected constructor, destructor, or type conversion before '(' token setBackColor (49) ; What object are you calling There is no global function like that? Your screen looks as if you had an incompatible bitmap set as background. Can you post a link to your HMI file (e.g. Dropbox)? None. I thought it was a global function, like setCurrentBrightness. Anyway, that was just an attempt to work around the corrupted background. I’m not setting any bitmaps. My background is plain default with only a color change, set like this: What’s weird is that if I click in any text box I created, the background looks OK in the editor. But if I click anywhere in the background, it changes to this: with those strange white vertical lines. But if I start a new project and set the background to the same color, it looks OK. Do you see these on the actual display too? I’d think this is something you should rather be asking on the ITEAD forum, as this isn’t anything Particle related. No, what I see on the display is the screenshot above with the rainbow noise background. The vertical white lines are what I see on the PC using the editor’s Debug function. At this point, you’re right. This may simply be a consequence of using a program whose version number starts with a zero. Thanks very much for looking at it anyway. Well after accusing me of hacking their HMI file and then denying it’s an editor bug, I got a solution to this problem from a rather surly individual over at Itead who we’ll just refer to as John Smith. That’s not his real name. (His real name is Patrick Martin). So for the benefit of anyone still following this thread, here’s what to do: - Create a new page with the + icon in the Page Pane - Go to the offending page, select all components on page - Control-C to copy - Go to the new page created in step 1 - Control-V to paste - Delete page0 with the x icon in the Page Pane - Double click page1 to enable editing of page name - rename page1 to page0 and enter to save - Save HMI project and rebuild with the Compile button. Yup, I had the “honour” of not fully agreeing with him before too. I might be biased, but I think this community tends and wishes to be a friendlier place Thanks for reporting back on the “solution” / workaround Ha ha. It gets better. After Herr Martin’s missive, some churl by the name of Gerry Kropf just had to take a gratuituous shot at me for good measure. Then to guarantee they had the last word, they locked the thread. In contrast, I have found that in the nearly a year I’ve been here I’ve found everyone to be knowledgable, unfailingly helpful, and downright civilized. Now if I could just get my weather code to compile (https://community.particle.io/t/solved-spark-dallas-temperature-library-compatibility-with-libraries-2-0/29183/4) It’s been a long time coming but I finally have the Nextion serial display working with my Photon weather station. It did have one final trick though. The default baud rate for theSparkfun serial LCD is 115,200. That is also the default for the RN-41 (aka BlueSmirf) Bluetooth module, so all was good. However, Itead inexplicably decided to make the default baud rate for their display to be a pokey 9600, so it won’t work if you just swap it in for the Sparkfun display. For the benefit of anyone else trying to do this conversion, you have to connect the Nextion directly to the Photon’s Serial1 pins and then issue the following command: Serial1.print ("bauds=115200\xFF\xFF\xFF") ; Then connect the Nextion to the RN-41 and it should be able to receive data from it. This command only needs to be done once. The Nextion will remember it across power cycles. Finally got around to using the Particle library for this rather than my old, hacked one derived from the original Arduino code. It looks like NexText::setBackColor() is defined in the header file, but missing from the .cpp file. So I just added it to my .ino file as a workaround: // Missing from library! bool NexText::setBackColor(uint32_t number) return NexObject::setValue("bco", number); Good catch. The Nextion display has many advantages over the Sparkfun serial display, but user-friendliness is not one of them. Thanks for the heads-up I’ve just pushed v0.0.16 which now also contains the implementation for
<urn:uuid:ec3e032c-1fd2-406b-917b-c088c8acdf54>
CC-MAIN-2022-33
https://community.particle.io/t/nextion-serial-display-fail/28204?page=3
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00074.warc.gz
en
0.895678
1,749
1.78125
2
As college admissions start to come in some students are receiving letters telling them that they are accepted beginning next spring term rather than fall term. Why is this done and what should you think about it? Colleges often get more applications that they want to accept then they have room for in the fall term. They also know that a certain number of students will be gone by spring term so there will be some open spots. The solution is to accept some students beginning in the spring term rather than the fall. Some students fell insulted that they are not accepted until the spring. But that is the wrong way to view things. You are accepted into the college and that is all that really matters. The bigger issue is whether you want to wait to start until the spring and if so what will you do this coming fall. Fall term can be spent doing almost anything from taking classes at another college, traveling or volunteering. Any of these options is acceptable and the decision really depends on what you find most interesting. So what should you do? You should evaluate this type of acceptance in the same way that you evaluate all of your other acceptances.
<urn:uuid:76936b0a-757f-4cf8-8841-45658e0e51ec>
CC-MAIN-2022-33
https://www.collegeadmissionspartners.com/college-admissions-counseling/youre-accepted-but-not-until-spring/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00078.warc.gz
en
0.976424
231
1.640625
2
Oats are among the most nutritious cereals. One serving of instant oatmeal (without sugar) has only 83 calories. Most importantly, oats are rich in dietary fiber and antioxidants, like selenium. Find out more about the health benefits of this nutritious food. Oats have two kinds of fiber: soluble and insoluble. Both are beneficial for your health, but each type has different functions. Soluble fiberhelps lower LDL cholesterol (“bad cholesterol”)in the blood. This is the fraction of total cholesterol that accumulates as plaques on arterial walls (especially of the ones that carry blood to the heart and brain) so it may increase the risk of a heart attack. In addition, soluble fiber can help manage blood glucose levels and insoluble fiber improves intestinal function, so it may also contribute to prevent constipation. One serving of oatmeal (1/2 cup of cooked oatmeal) contains around 7 micrograms of selenium,a strong antioxidant. This mineral plays an essential role in the production of antioxidant substances that prevent cell damage in the body. This cell damage can contribute to the development of many chronic conditions, like heart disease and cancer. You can eat oatmeal for breakfast, or add it to cookie doughs, fruit smoothies, and muffins. Moreover, oats can be a useful ingredient when it comes to thickening a pasta sauce or improving the consistency of a pie crust. Now that you know some of the health benefits of oats, make yourself a hot bowl of oatmeal and fruits every morning, just like the one we describe below. ½ cup strawberries, finely chopped 1 teaspoon honey 1 cup low-fat milk ½ cup oatmeal 1 tablespoon low-fat strawberry yogurt 1 teaspoon almonds cut into thin slices In a small bowl, place the chopped strawberries with the honey and let stand for 10 minutes. In a small saucepan, heat the milk and add the oatmeal, stirring constantly, until the mixture becomes soft and thick. Add the cooked oatmeal to the strawberries and then add yogurt and almonds. Protein: 12 grams Fat: 6 grams Carbohydrates: 59 grams Fiber: 6 grams Sodium: 81 milligrams LDL and HDL Cholesterol: What´s Bad and What´s Good? (2008). American Heart Association.Retrieved on December, 2008 from: http://www.americanheart.org © 2016 HolaDoctor
<urn:uuid:6e58f1a4-3fc5-481e-8a6c-842dac9c8a71>
CC-MAIN-2016-44
http://holadoctor.com/en/myths-and-facts/oats
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719843.44/warc/CC-MAIN-20161020183839-00291-ip-10-171-6-4.ec2.internal.warc.gz
en
0.84115
511
3.03125
3
Felicity Masefield, Development Executive at Native Land explains why Native Land wanted to set a new standard in sustainability for major mix-use developments and how they are achieving this. The real estate sector is one of the most carbon intensive in the world. It is responsible for approximately 40% of global greenhouse gas emissions. The World Bank has previously estimated the real estate sector must reduce CO2 emissions by 36% by 2030. Everyone from investors to developers, architects to engineers must re-think how we shape the built environment to make meaningful changes that support the collective effort to decarbonise. Earlier this year, Native Land shared its sustainability strategy, which will make Bankside Yards the UK’s first major mixed-use development to be fossil fuel free. The entire 1.4m sq ft central London development will be net zero carbon in operation. This will be achieved this by using energy-efficient technology on an unprecedented scale. Our strategy is part of an integrated, site-wide, multi-building strategy for carbon reduction and biodiversity, and will shape all our future developments. Bankside Yards marks an important step as it will set a new benchmark for sustainability in large, mixed-use regeneration schemes. The entire 5.5-acre site will be served by a low-temperature, ‘5th Generation’ energy sharing network on a scale not yet seen in the UK, balancing thermal energy across all of its 8 new buildings and 14 restored railway arches. Each building will ‘extract’ or ‘reject’ energy into a single thermal network serving the entire development, significantly reducing operational energy consumption. The use of all-electric energy through heat pumps, optimised facades and high efficiency building services systems, combined with Native Land’s commitment to a green energy purchasing agreement, will achieve net zero carbon in operation. The carbon reduction achieved is 40,000 tonnes over 30 years, the equivalent of 20,000 trips from London to New York on a Boeing 747. We would not have achieved any of this without replacing what originally occupied the site. The former buildings, Sampson House and Ludgate House, were constructed when thermal performance was well below today’s standards. They also acted as a barrier to an important river frontage and provided very little biodiversity. However, refurbishment and re-use of real assets will also play a key role in supporting net zero carbon for the long-term. Another Native Land project in partnership with Ashby Capital is a 76,000-sq-ft office building on Judd St in the heart of London’s Knowledge Quarter. The building offers a rare opportunity for the creative re-use of a well-located asset in a thriving area, through substantial refurbishment. This project will look to keep 75% of the existing structure, retaining 2,500 tonnes of embodied carbon which is the equivalent to 103,896 sq m of native forest. The coming years will be vital if the real estate sector is to make meaningful changes to combat the potentially catastrophic effects of climate change. Those investing in the built environment hold real influence in the transition to a low-carbon future. Our sector therefore needs to play a critical role in hitting environmental targets to secure a sustainable future.
<urn:uuid:489f87ca-e514-4e1e-a164-170893a056c8>
CC-MAIN-2022-33
https://www.lref.co.uk/bankside-yard/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572304.13/warc/CC-MAIN-20220816120802-20220816150802-00466.warc.gz
en
0.937427
666
2.40625
2
The Retirement Back-Up PlanIf you have not done any retirement planning or if you have not saved enough for retirement, tomorrow, decide which kid you want to live with in your old age. This is Plan B. Your Savings PlanMany people equate saving with some sort of deprivation, but you can have your cake and eat it too. Save Is Not A Four Letter WordThe key years for saving for retirement are between the ages of 20 and 35. Here's why... The Over The Hill BonusCongress increased the amount workers could contribute to their retirement plans but then realized that older workers closer to retirement were in rough shape so they passed another law allowing catch-up contributions for anyone over age 50. Waiting To Start Saving For RetirementI've heard from many retirees who wished they had started saving sooner for their golden years, that way they would definitely be golden! Most Americans Not Saving Enough Money For Retirement, Survey ShowsIn a new survey, a majority of Americans say they saved the same amount of money, or less, for retirement this year compared to last. Saving For Your RetirementOnce your high interest debts are out of the way, start saving for retirement. It’s National Save for Retirement Week!I know we have weeks dedicated to so many different things. Did you know we have a donut week? So we should have a Save for Retirement week! Your Savings PlanMany people equate saving with some sort of deprivation. If you deprive yourself of all of the fun stuff in life you will never stick to a savings plan. “Save” Is Not A Four Letter WordLast month Bankrate.com conducted a survey on Financial Security. Thirty-six percent of those surveyed had not begun to save for retirement. Where Are You Going To Live When You Retire?If you are in the retirement planning stage now, the amount of money you've saved will dictate where you can live. Mid-Year Tax Planning For College GradsThere is tax planning for the recent graduate or their parents who want to give them advice.
<urn:uuid:07ab3e8a-6f0d-4d85-8b16-8398154d7130>
CC-MAIN-2016-44
http://boston.cbslocal.com/tag/retirement-savings/page/2/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719416.57/warc/CC-MAIN-20161020183839-00363-ip-10-171-6-4.ec2.internal.warc.gz
en
0.953026
422
1.898438
2
The primary reason for this limit is the maximum allowed round-trip delay. If USB host commands are unanswered by the USB device within the allowed time, the host considers the command lost. So in order to meet the USB specification, cable length should be not longer than 5 or 3 meters as described above. The limitations one may face while using USB cable: 16 feet (5 m) is the farthest USB cables signal can go without running into timing problems. This is built into the USB Specification, and can't be changed. And of course it is impossible to bypass this limit by connecting several USB cables to make a long one and plug in a USB device that is so far away from your host PC. A "node" is a hub, switch, or repeater, allowing another set of devices to be attached to the USB network. You can't plug a scanner into your computer via 6 hubs, because that's six "nodes" between your scanner and the PC. There's not enough space in the addressing scheme for the computer to send or receive data from the scanner to the computer. This rule cannot be disobeyed. It is frequently needed to use USB devices at virtual machines, but impossible to connect USB device to some of them. The Universal Serial Bus allows connecting up to 127 devices to a computer.
<urn:uuid:f5957ee2-006a-4386-87cf-156011b0ee68>
CC-MAIN-2017-04
http://www.net-usb.com/usb-limitations/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00165-ip-10-171-10-70.ec2.internal.warc.gz
en
0.956537
271
2.9375
3
Canon started out as a company with a handful of employees and a burning passion. Established in 1933 by Goro Yoshida and Saburo Uchida, Canon began as company called Precision Optical Instruments Laboratory. In the company’s beginnings, their major goal was to develop a 35mm camera. In 1934,the Kwanon camera was released yet it never actually hit the marketplace. That company soon became a world-renowned camera maker and is now a global multimedia corporation. However, the origins of their success remain unchanged: the passion of their early years and technological expertise amassed over more than 60 years. Canon will continue using its technologies to benefit people as it pursues its objective of becoming a company that is loved by people throughout the world. Canon deals in number of products for Personal, Business & Industrial use. This includes: • Digital Cameras • Video Camcorders • Image Scanners • Personal Information Products • Digital Production Systems • Office Network Multifunction Devices • Liquid Crystal Displays (LCD) Projectors Beside this there is a long list of Canon products, includes; Semiconductor Exposure Systems, LCD Exposure Systems, Ophthalmic Equipment, Digital Radiography Systems, Broadcast Equipment, Die Bonders, IAMS* Mass Spectrometer, Vacuum Thin-Film Deposition Equipment, Organic LED Panel Manufacturing Equipment for industrial usage. Moreover A report by the environmental organization Clean Air-Cool Planet puts Canon at the top of a list of 56 companies the survey conducted on climate-friendly companies. Canon has also launched three new calculators in Europe, called "Green Calculators", which are produced in part from recycled Canon copiers. The company has a Corporate Social Responsibility (CSR) strategy in Europe, named ‘Green is just a shade of blue’. The strategy places emphasis on green issues being ‘a small part of the bigger, bluer picture’, and therefore gives equal importance to other areas, including ethics, attitudes, humanitarian aid and disaster relief, education, science and social welfare. Keep yourself updated at ezcouponsearch.com for latest Canon Promo Code, Canon Coupons and Canon Discount Codes to avail fabulous discount offers.
<urn:uuid:c0f0820e-43bf-4d59-90da-10f2a28fc2c4>
CC-MAIN-2016-44
http://www.ezcouponsearch.com/canon-coupons/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721558.87/warc/CC-MAIN-20161020183841-00046-ip-10-171-6-4.ec2.internal.warc.gz
en
0.935153
461
1.828125
2
The ANSI/ISO SQL standard defines four levels of transaction isolation in terms of three phenomena that must be prevented between concurrent transactions. These undesirable phenomena are: A transaction reads data written by concurrent uncommitted transaction. A transaction re-reads data it has previously read and finds that data has been modified by another transaction (that committed since the initial read). A transaction re-executes a query returning a set of rows that satisfy a search condition and finds that the set of rows satisfying the condition has changed due to another recently-committed transaction. The four isolation levels and the corresponding behaviors are described below. Table 9-1. ANSI/ISO SQL Isolation Levels |Isolation Level||Dirty Read||Non-Repeatable Read||Phantom Read| |Read committed||Not possible||Possible||Possible| |Repeatable read||Not possible||Not possible||Possible| |Serializable||Not possible||Not possible||Not possible| Postgres offers the read committed and serializable isolation levels. If you see anything in the documentation that is not correct, does not match your experience with the particular feature or requires further clarification, please use this form to report a documentation issue.
<urn:uuid:18ee59bb-5f6f-477b-9392-fa816cbddf7d>
CC-MAIN-2017-04
https://www.postgresql.org/docs/7.1/static/transaction-iso.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00429-ip-10-171-10-70.ec2.internal.warc.gz
en
0.860179
252
2.25
2
Every PC do have their own MAC Address and MAC address used like identity for the network card. An MAC address of an ethernet device is a 6 bytes number in expression of 12. Sometimes, you need to change the MAC address to bypass the network blocking, to sniffing the network packet, etc. And it is quite easy to use a handy tool in Linux called MACchanger-GTK. To install it, simply go to your Add/Remove Software application and for the macchanger and install it. 1. Select your Network Interface from the drop down. 2. Click See current MAC (this will display your address in a new window). 3. Click the Known vendor button. If your NIC is detected with enough information you can then change the address to another address of the same manufacturer. If not, your best bet is to go with Random. 4. From the Options drop down select one of the methods for changing your address. 5. Click Change MAC.
<urn:uuid:ac3f5c24-f608-4959-8028-d60b02773de4>
CC-MAIN-2017-04
http://www.mickgenie.com/change-your-mac-address-in-linux/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00389-ip-10-171-10-70.ec2.internal.warc.gz
en
0.887133
205
2.65625
3
The Nanavati Commission has determined in its investigation of the anti-Sikh riots of 1984: (That) the violence that followed the assassination of the then Prime Minister, Indira Gandhi, was “organised and systematic” in several areas, the entire Congress apparatus could not be held responsible for the acts of individual politicians, hooligans, depraved people and local gangs. Sounds a little bit like the “a few bad apples” theory. There have been ten commissions of inquiry to date, makes depressing reading as chronicled by Dilip D’Souza, when people like Sajjan Kumar have been let off the hook: A CBI team went to Kumar’s home to file the charges; his supporters locked them up and threatened them harm if they persisted in their designs on their leader. In retrospect, 1984 feels like a dress rehearsal for Gujerat. When powerful people subvert the law, it does not go unnoticed, and those who would follow them refine the tactics they have learnt, knowing they can do so with impunity. The Nanavati Commission however does recommend that the most egregious culprits, HKL Bhagat, Sajjan Kumar and Dharam Das Shastri be re-investigated. But when you read accounts of people like Advocate Harvinder Singh Phulka, it becomes clear that while people haven’t given up, the tactic of bureaucratic delay makes the prospect of justice seem rather dim. For more information on this and other Human Rights issues look at Jas Karan’s blog at the Harvard Law School.
<urn:uuid:f0747177-b3d0-4ec3-84b9-6ef56fc5a68c>
CC-MAIN-2017-04
http://blog.shashwati.com/2005/01/28/too-little-and-a-little-too-late/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00027-ip-10-171-10-70.ec2.internal.warc.gz
en
0.959977
331
1.601563
2
If a drug increases lifespan in mice by 15%, should I take it? The idea of intervention testing in a model organism is simple: while keeping all conditions equal, test whether animals subjected to an intervention show a statistically significant difference in lifespan compared to a control group. An intervention could be a particular drug, caloric restriction, a diet of different nutrients (e.g. more protein), a change in feeding regime, etc. The aim of such experiments is not to directly search for an elixir of life but to use previously characterized molecules as exploratory tools in order to find out which biological processes control healthy lifespan. The key aspect of these tests is treating and observing the studied animals for a substantial part, if not the entirety, of their respective lifespans. A single instance of a dog living to 30 years or a mouse living for 5 would, in itself, be sensational. When lifespan changes slightly, say an extra 15%, we need data on hundreds of animals. But 15% in comparison to what? Controlling the controls During my compulsory service in the Russian army, I briefly picked up the habit of smoking. Smokers were excused for frequent breaks, while the rest had to keep doing hazardous tasks, such as fixing sewage pipes, moving heavy equipment, and applying toxic paint. My peers got injuries and chronic respiratory illnesses. In retrospect, a brief episode of chain smoking would appear to have had a substantial benefit within our “cohort”. Baselines matter! Reporting life extension in sick mutants, or animals kept in suboptimal conditions, has very different implications from a study involving a healthy control group. Take a close look at these so-called lifespan curves, each of which shows a surviving fraction of a cohort as a function of time, always going from 100% to zero. The precise shape of such a curve and slight differences between multiple curves tell us a lot about an intervention and its interaction with an organism. This plot compares effects of several drugs from an Intervention Testing Program (ITP) in UM-HET3 mice . It is meant to illustrate that the notion of “statistically significant” is not at all trivial. On one hand, rapamycin gave about 15% extra lifespan compared to controls. However, the same ITP data shows a 15% median lifespan difference between control male mice held at two different facilities in otherwise identical conditions. Cross-checking the literature, we see that there are 20 papers on rapamycin in mice [3,4]. One shows a median lifespan increase of 8%, while another shows a 37% increase in the same strain/dose (128 ppm). Getting to the bottom of such differences would be crucial e.g. for Longevica, whose business is based on the outcome of another large intervention testing project: 1000+ compounds in B6C3F1/J mice over 3 years, tested in 15 mice per compound. Longevica is looking to complement its own data with all the drugs ever tested in mice, creating an open research platform. In a separate effort, GeneAge and OpenGenes have been compiling data on all genetic interventions affecting lifespan. Remarkable conservation of processes A remarkable conservation across a wide range of species, from molecular- to organ-level processes, enables testing interventions in one species and generalizing the results to others. Such universality has indeed been observed: caloric restriction and rapamycin affect lifespans across species, from apes to flies. Alas, there are no perfect species – some are prohibitively expensive to use at scale, some live too long, and some only react to unreasonably high doses. We have to do what we can; expensive animals are used scarcely, producing small (possibly not statistically significant) cohorts, while worms are subjected to extreme dosages when drugs crash out of solution. Our hope is that a big picture will come through when we combine reports of interventions in one species and closely related interventions in related species. Thousands of results of intervention testing for lifespan extension have been published to date [1-2]. When and where is such an integration supposed to occur? Agglomerating all the knowledge in the entirety of the relevant literature would be a superhuman feat. Perhaps artificial intelligence could help, but AI starts with computer-readable data, and current publishing practices are a long way from forcing scientists to express their premises and findings in a framework of constrained ontologies and logical predicates. Someone has to marshal the sources and distill the literature into a uniform representation while working out a proper database schema. Early attempts [3-5] leave a lot to be desired. On top of the inherent discordance of the literature, the scope and quality of extracted information is very limited. The same drug (caffeine), tested in the same strain of worms and at the same dose (7.5 mM), decreased lifespan by 12% in one study and increased it by 20% in another. It turns out that a drastically different temperature influences metabolism, but this was not reflected in the baseline data. Baselines matter! A system focused on baseline data All this underscores a need for a system that contains detailed baseline data on model organisms and control conditions in order to allow us to contrast the controls used in a given paper to others reporting on the same strain and to verify that the lifespan follows the same distribution. Rich data on control groups’ lifespans will provide answers. What are the longest and shortest living strains of mice? How does temperature affect the lifespan of worms? Which husbandry conditions produce the longest lifespan in certain species? To address this need for a data repository and an open research platform, Dr. Leon Peshkin conceived ALEC – Animal Life Expectancy Comparisons – a lifespan data browser whose application depends on the data it is populated with. The most challenging and expensive part of the project will be data extraction and curation. A pilot site is already populated with a substantial seed dataset kindly provided by the ITP ; it is hosted by Lifespan.io and available for interactive exploration, and there are multiple illustrations of what can be uncovered within ALEC. This pilot effort, spearheaded by Leon Peshkin and Olga Spiridonova, is focused mainly on lifespan in controls across species and strains. Longevica and OpenGenes can now develop GitHub-style branches of the ALEC platform. ITP https://www.nia.nih.gov/research/dab/interventions-testing-program-itp ITP in worms https://citp.squarespace.com Barardo, D., et al, de Magalhaes, J.P. (2017) “The DrugAge database of ageing-related drugs.” Aging Cell 16(3):594-597
<urn:uuid:2d946977-a740-4cc1-9a9c-d43561af5e47>
CC-MAIN-2022-33
https://www.lifespan.io/news/alec/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00274.warc.gz
en
0.919928
1,438
1.9375
2
Autumn Stargazing Over Pepperwood Bing Quock and Ron Dammann from the California Academy of Sciences will guide you through a tour of the season's celestial sights, using a combination of historic and modern telescopes. Meet at the Dwight Center for an overview of the Hume Observatory and a quick preview of the night sky. Later we'll proceed to the observatory where we'll view Jupiter, the Ring Nebula in Lyra, the Great Cluster in Hercules, the Andromeda Galaxy and maybe the distant planet Uranus. In case of cloudy weather, observatory session will be replaced by activities in the Dwight Center. Dwight Center at Pepperwood Preserve (View) 3450 Franz Valley Road Santa Rosa, CA 95404
<urn:uuid:9f185817-46b3-42cd-9e81-b83562fde2a5>
CC-MAIN-2017-04
http://www.brownpapertickets.com/event/182772
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00051-ip-10-171-10-70.ec2.internal.warc.gz
en
0.817685
148
1.875
2
Grievance-Mongering Leaders Demand Slave Reparations at the United Nations In another case of anti-Western grievance-mongering at the United Nations, the leaders of two Caribbean nations are calling for slave reparations from Western nations that profited from the trans-Atlantic slave trade. Recently, the U.N. General Assembly heard from the prime ministers of two twin-island Caribbean nations: Antigua and Barbuda and St. Vincent and the Grenadines. In separate speeches, the Caribbean leaders declared that reparations were needed to remedy the barbaric injustices of slavery that Western nations loosed upon the world -- and whose legacies continue to this day, according to Caribbean news outlets. "Antigua and Barbuda has long argued that the legacy of slavery, segregation, and racial violence against peoples of African descent have severely impaired our advancement as nations, communities and individuals across the economical, social and political spectra," Prime Minister Baldwin Spencer told the General Assembly. For his part, Prime Minister Dr. Ralph Gonsalves of St. Vincent and the Grenadines said: "Racial discrimination was justified and became itself the justification for a brutal, exploitative and dehumanizing system of production that was perfected during the trans-Atlantic slave trade and ingrained over the course of colonial domination." "The structure of our modern world is still firmly rooted in a past of slavers and colonialist exploitation," he added. "While we celebrate the noble heroism of the famous and the faceless who resisted racist colonial hegemony, we must continue to confront the legacy of this barbarism and continuing injustice." The leaders' comments, during a Saturday session, were made one day after another case of grievance-mongering and grandstanding before the General Assembly: Palestinian President Mahmoud Abbas's call for Palestinian statehood. The reparations racket has been around for years. It has attracted a motley bunch -- from jive-talking hustlers to erudite professors of academic disciplines like African-American history and post-colonial studies. But only in recent years have whole countries joined the reparations racket. Besides having large black populations, they share common traits: leftist leaders, ailing economies, and a host of anti-Western grievances propagated by leftist elites. How should descendents of African slaves be compensated according to reparations advocates? Spencer called for formal apologies from former slave-trading Western nations, after which these offenders must "back up their apologies with new commitments to the economic development of the nations that have suffered from this human tragedy." The Caribbean region, to be sure, is already a major recipient of U.S. foreign aid, a fact the speakers failed to mention. Neither of men, moreover, mentioned an awkward detail: their own African ancestors may have owned slaves and participated in the slave trade (though they never did as well, of course, as Westerners, who were not doing anything illegal at the time). Ten years ago, the anti-Western reparations movement was energized by the United Nations' racism conference in Durban, South Africa; that was the infamous UNESCO-sponsored event in 2001 that equated Zionism with racism. It also offered tacit support to the idea of slave reparations. Regarding Durban, Spencer was full of pride, calling it "an innovative and action-oriented agenda to combat all forms of racism and racial discrimination." It's a view shared by the United Nations. Just five days after Spencer and Gonsalves made their reparations pitches, the U.N. held a high-level meeting to commemorate the 10th anniversary of the Durban Declaration and Program of Action. Spencer and Gonsalves are not the first Caribbean leaders to jump on the reparations bandwagon. Four years ago, Jamaica's political leaders were angling to shake down Britain for slave reparations. The left-leaning People's National Party was then in charge on the island, a hotbed of leftist politics with a population of 2.7 million. Struggling to reverse years of economic decline, leftist political leaders and elites started beating the drum for a regional campaign to convince Britain to provide compensation for its role in the trans-Atlantic slave trade. "We owe reparations to ourselves and our ancestors," Rupert Lewis, a lecturer in government at the University of the West Indies in Jamaica, told a gathering of schoolchildren in Kingston, the capital. The occasion was part of activities associated with Jamaica's commemoration of Britain's 200-year-old Abolition of the Slave Trade Act, adopted March 25, 1807. At the time, the case for reparations was being made to ordinary Jamaicans with lectures and the airing of the pro-reparations documentary film The Empire Pays Back. The message: the source of the island's problems is indeed the legacy of slavery and British colonialism -- not the misguided leftist policies that have guided Jamaica since it gained independence from Britain in 1962. "In the medium term, the goal is to mobilize all those who have been working in the [reparations] field for a long time, and to sensitize those who have dismissed the work of the movement for lack of knowledge," Jamaica's minister of tourism, entertainment, and culture, Aloun Assamba, told the Jamaica Observer. Curiously, the Caribbean's reparations hustlers single out only Western nations in their demands. They ignore the slavery that existed elsewhere in the world -- the Middle East, Africa, and South America -- and while they mourn Africans caught up in the trans-Atlantic slave trade, they shed no tears for the millions of Africans who disappeared into the Muslim slave trade. Nor do they condemn slavery that persists in Africa today, nor the human trafficking that's a problem in many parts of the world, including Jamaica. Slavery, in other words, doesn't bother these people nearly as much as all their frothing suggests. How come? Some are obviously racists. And all are leftists; for them, reparations are the means by which they can achieve the Marxist redistribution of wealth they dream about. In recent years, they've adopted a postmodern form of Marxism -- what might be called "cultural Marxism." In this view, the villains are no longer capitalists and bourgeoisie, as espoused in economic Marxism. Now the villain is "white male privilege" -- a privilege supposedly made possible by the head start that black African slaves gave to white Western nations. Indeed, as Cambridge University senior lecturer Richard Drayton wrote in an upbeat review of The Empire Pays Back, "Africa underpins a modern experience of (white) British privilege." The documentary was produced by Jamaica-born producer Robert Beckford, a lecturer in African Diaspora Religions and Cultures at England's University of Birmingham. How should Britain's monstrous historical theft and injustice be remedied? In a word: reparations -- by redistributing wealth from whites to the descendants of black African slaves. Ultimately, reparations advocates say this is all about healing. "These [reparations] proposals are not intended to be divisive or confrontational, but rather form part of a process to heal the wounds of the past," explained Jamaica's Ambassador to the United Nations, Stafford Neil, during Durban's racism conference. And no matter that few if any whites are around anymore with any connection whatsoever to the slave trade hundreds of years ago -- yet whites as a group are nevertheless cast as modern-day beneficiaries of slavery. Ultimately, reparations advocates distort the realities of the ancient slave trade, according to Ohio State University Professor Robert Davis. "We cannot think of slavery as something that only white people did to black people," says Davis, author of Christian Slaves, Muslim Masters (Palgrave Macmillan, 2003). In his book, Davis documents that Muslim slavers off North Africa's Barbary Coast enslaved one million or more white Europeans between 1530 and 1780 -- a number greater than Africans enslaved during the same period. Why is the enslavement of white Europeans ignored? Because, says Davis, it fails to echo the scholarship favored today -- that history is all about European conquest and colonization. In this version of history, Britain and America get no credit for leading international efforts to end the profitable trans-Atlantic slave trade -- even using their warships to stop it. Both countries are portrayed in the worst light possible; whatever they did, it was too little, too late. Not surprisingly, reparations advocates who claim that the West's prosperity is founded upon slave labor overlook the obvious reasons for the West's prosperity: its political and economic life are organized around democracy, free markets, and the rule of law. Dedicated leftists won't admit this. This includes the Caribbean's leftist rulers, who ambivalently embrace free markets and look for their inspiration to Cuba -- a place where you won't find any of the 2.6 million members of the Jamaican Diaspora living. Besides slavery, Jamaica's leftist elites obsess endlessly over British colonialism, but there's a glaring irony with this grievance-mongering: Jamaica's dramatic decline over the years -- crime, gangs, political corruption -- occurred when black Jamaicans, not their former masters, were running their country. Jamaica's problems, in other words, have all been related to specific decision made by Jamaica's politicians and elites. Jamaica vs. the Bahamas Jamaica's blame-it-on-slavery argument becomes especially problematic when the country's dysfunction is contrasted against the prosperity enjoyed by the Bahamas. A former British colony, the Bahamas also has a legacy of slavery. Yet it has no crippling debt, no history of serious political violence, and no out-of-control crime rate. It has one of the region's highest per capita incomes: $19,000, nearly five times more than Jamaica's. There's no huge Bahamian Diaspora. Why is the Bahamas a success? Because its political leaders and voters look forward, not backward -- and they unashamedly look to America as an example. They have for the most part embraced business-friendly policies and a low-tax philosophy. Four years ago, for instance, an interesting political phenomena occurred in the Bahamas. Its ruling left-leaning political party suffered a stunning election defeat, despite having overseen an expanding economy and an unprecedented development boom. Interestingly, the main campaign issues were good management and honesty in government -- not racial issues (such as which candidate had the darker skin color). It's an example of the Bahamas' good governance and civic culture -- traits not as apparent in Jamaica and other Caribbean island-nations with similar histories of racism and colonialism. Notably, in the Bahamas, the bicentennial of the slave trade's abolition got circumspect media coverage -- and was consigned to the inside pages of the main newspapers. In Jamaica, on the other hand, The Observer -- a popular left-leaning daily owned by Sandal's resort owner Gordon "Butch" Stewart -- ran a chest-thumping front-page article in which Prime Minister Portia Simpson-Miller paid lip service to reparations, telling schoolchildren to honor their slave ancestors by respecting one another. "My request for honoring them is that for every child that is raped and is left to soak in the rapist's semen and her own blood, you are perpetuating, Mr. Rapist, the action of the slave master." It's hard to imagine political leaders in the Bahamas making such lurid comments to schoolchildren. Nor are Bahamian political leaders grandstanding before the U.N. General Assembly, demanding slave reparations based on a leftist post-modern view of history. They're too busy looking forward, not backward.
<urn:uuid:70092095-a6e2-49ed-8970-923de9b9056a>
CC-MAIN-2017-04
http://www.americanthinker.com/articles/2011/10/grievance-mongering_leaders_demand_slave_reparations_at_the_united_nations.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00431-ip-10-171-10-70.ec2.internal.warc.gz
en
0.954458
2,394
2.25
2
The World Health Organization recommends breastfeeding as the sole source of nutrition for infants until six months of age, as this helps reduce child morbidity and mortality. In contrast, early weaning is associated with both the development of obesity and Type 2 diabetes in adulthood. Researchers at Rio de Janeiro State University, led by Patricia Lisboa, showed that weaning rat pups early increased insulin secretion in adolescent male pups and in both genders as adults. By adolescence in male pups, the scientists mean an age in pups that is considered equivalent to adolescence in humans. In rats, adolescence is defined as ranging from age 35 to 55 days. This increased insulin secretion is indicative of developing insulin resistance, which means a reduced responsiveness to insulin. To try to compensate for this reduced responsiveness of the body, it secretes more insulin. This is one sign of diabetes, a disease characterised by high blood sugar levels. Blood sugar levels are normally regulated by insulin, so high blood sugar levels mean the body creates more insulin to try to regulate this. The result of increased insulin secretion indicates that adolescent pups might be more susceptible to Type 2 diabetes, as will all the offspring in adulthood. Patricia Lisboa, one of the authors on the study said: ‘There are many causes of Type 2 diabetes, but not breastfeeding for long enough, is one we can guard against. Understanding the increased susceptibility to Type 2 diabetes as a result of early weaning will help us develop the best public health guidance.’ Image credit: Freepik
<urn:uuid:32768317-c4f2-4401-ab19-0cfa0ec2c257>
CC-MAIN-2022-33
https://www.hobbsonlinenews.net/nutrition-breastfeeding/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571234.82/warc/CC-MAIN-20220811042804-20220811072804-00066.warc.gz
en
0.935932
314
3.0625
3
DescriptionSEGA's mascot Sonic the Hedgehog made his debut in a famous Genesis title, but Sega's 8-bit systems got their own version of the platformer, featuring the same story and gameplay style, but different levels. To stop the evil Dr. Robotnik, Sonic must traverse six zones consisting of three levels each. Most of the zones are based on those in the original game, but some are entirely new, including a jungle environment and a huge airship. Other unique differences are one level that scrolls automatically and one that is aligned vertically instead of horizontally. Most of the enemies (mechanized animals, defeated by Sonic's spikes when jumping or rolling) and power-ups (speed-ups, shields, extra lives) are the same as in the Genesis version as well. Sonic can pick up golden rings for protection (when hit, he simply loses all of his rings instead of a life) and bonuses: 100 rings gain Sonic an extra life, and 50 remaining rings at the end of a level allow access to pinball-themed special stages full of bumpers and springs. The final level of a zone is always a boss fight against Robotnik. Some of the boss fights differ in the Master System and Game Gear versions of the game, with special designs for the handheld version due to the smaller visible screen area. Sonic should also collect the six Chaos Emeralds to keep them from falling into Robotnik's hands. In a departure from the original game, these are not hidden in the special stages but somewhere in the regular levels. - "ソニック・ザ・ヘッジホッグ" -- Japanese spelling Part of the Following Groups |Master System owners get to see what all the fuss is about.||Retro_Minded (13)| |Move over, Alex Kidd. Sonic is in town||*Katakis* (38291)| |A True Classic: The start of the legend!||M.Allen (76)| |Pixel-Heroes.de||Nov, 2003||10 out of 10||100| |Retrogaming History||Feb 28, 2008||10 out of 10||100| |Power Sonic||Jan 10, 2014||9.5 out of 10||95| |ASM (Aktueller Software Markt)||Jan, 1992||11 out of 12||92| |Computer and Video Games (CVG)||Dec, 1991||90 out of 100||90| |Jeuxvideo.com||Mar 11, 2011||18 out of 20||90| |SegaFan.com||Jul 14, 2003||8.6 out of 10||86| |Defunct Games||Jan 07, 2007||85 out of 100||85| |Video Games||Dec, 1991||81 out of 100||81| |IGN||Aug 04, 2008||7.5 out of 10||75| There are currently no topics for this game. Master System II versionThe Sonic The Hedgehog version that came built-in the Master System II console lacks credits. Because ROM chips were very expensive at the time, the credits were dropped to make room on the small ROM chip for the necessary BIOS routines for the console. By doing this, Sega avoided having to buy bigger and more expensive ROM chips for the console. Related Web Sites - Game Map (Sega Master System) on SMS Power! (Detailed maps of all levels of the Master System version.)
<urn:uuid:3e6e9fa4-7a07-4a9b-be72-91439bba7bca>
CC-MAIN-2017-04
http://www.mobygames.com/game/sega-master-system/sonic-the-hedgehog__
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00215-ip-10-171-10-70.ec2.internal.warc.gz
en
0.89619
716
1.617188
2
Simply insert into the ground and read the temperature, great robust and easy to read thermometer. Thermometer range is 0-80 °C We recommend using a thermometer, especially in the spring, to keep a check on when different pest will be active and also when you can start to effectively use biological controls. Minimum soil temperatures needed for nematode application is 5°C but some pests are not active until the temperature reached around 12°C The temperature of the soil is also very important for plant growth. The suns rays warm the soil, and the plants use that warmth to drive the chemical reactions that keep them alive and drive the cells to multiply. In fact in spring the average soil temperature will be even more important than the average air temperature, as a trigger for growth. A good rule of thumb is that grass will not grow unless their roots are above 6 degrees. Soil temperature also influences which soil pests are around and active - when the soil is very hot or very cold then grubs such as leatherjackets and vine weevil tend to bury themselves deep and not feed too much. Finally soil temperature also influences the activity of the predators and parasites we use to control pests. Nematodes, for example, are inactive below 5 degrees, and most effective at 10 degrees and above. For all these reasons a good soil thermometer is an essential part of soil monitoring. Our probe thermometer is the tool the professionals use. It has a strong probe which allows the heat from the soil to contact the thermometer bulb effectively.
<urn:uuid:2381fe85-0388-433e-87c5-bdab21464f4b>
CC-MAIN-2022-33
https://ladybirdplantcare.co.uk/collections/all-products/products/soil-probe-thermometer
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00477.warc.gz
en
0.937119
325
3.15625
3
The minerals sodium and potassium are both electrolytes required by the body. Electrolytes control the amount of water in your body, muscle function, pH levels and other vital processes. Although sodium is required for normal functions, high levels can lead to high blood pressure, which burdens the heart. Potassium can help remove excess sodium and thus help control blood pressure levels. Potassium gluconate is a potassium supplement that can raise potassium levels in the blood. Potassium performs a number of biological functions, such as building proteins, controlling acid-base balance, building muscle, maintaining normal body growth and breaking down and utilizing carbohydrates. Most foods contain some potassium. Vegetables, meat, fruits and dairy products are all good sources of dietary potassium. When there is too little potassium in the body, a condition known as hypokalemia, characterized by muscle weakness, abnormal heartbeat and increased blood pressure, can occur. Too much potassium can cause a condition known as hyperkalemia, characterized by abnormal and dangerous heart rhythms. Your body needs sodium to control blood volume and blood pressure and for the proper function of muscles and nerves. MedlinePlus notes that high levels of sodium in the diet can raise blood pressure and lead to a buildup of fluid in those with kidney disease, cirrhosis or congestive heart failure. Healthy adults should consume no more than 2,300 milligrams of sodium per day, according to MedlinePlus. The American Heart Association notes, however, that approximately 98 percent of Americans consume more than twice the recommended amount of sodium. Although not a substitute for maintaining a healthy amount of sodium, consuming higher levels of dietary potassium can help expel more sodium through the urine, notes the American Heart Association. Potassium gluconate is a supplemental form of potassium used to raise potassium levels in the blood. It can be used to raise low potassium levels associated with diarrhea, vomiting, hormone problems or diuretic use. Because potassium gluconate raises potassium levels in the body, it can be used to eliminate sodium from the body. You should not use potassium gluconate if you have a urinary tract infection, kidney failure, a peptic ulcer, Addison's disease, uncontrolled diabetes, severe burns or if you're dehydrated, according to Drugs.com. WebMD notes that you should take potassium gluconate with a full glass of water and a meal to prevent upset stomach, and you should not lie down for at least 10 minutes after taking it. The tablets should not be chewed, crushed or sucked, as doing so can release the entire dose at once. Side effects can include gas, diarrhea, nausea or upset stomach. - George Doyle/Stockbyte/Getty Images
<urn:uuid:f2314c4c-a021-4935-a15c-224f6fde15fe>
CC-MAIN-2017-04
http://healthyeating.sfgate.com/potassium-gluconate-eliminate-sodium-body-10763.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00341-ip-10-171-10-70.ec2.internal.warc.gz
en
0.88693
551
3.265625
3
Window 7 key finder If you’re planning to reinstall Windows, you need your Windows serial key. This key, which is also known as Windows serial, can be found on a sticker or within the manual that comes with Windows. All operating systems, be it Windows 8 or Windows 7 require this serial key in order to get completely installed. However, if you find yourself without a key or if you’ve lost the key, there are several things that can be done to restore it as the key is encrypted in the Windows registry. Question: I’m looking for my Windows 7 serial key. Where can I find it? Are you looking for your Windows 7 key? A product key, which is commonly referred to as the serial key, might not be given a lot of value and system till your system crashes. But once you start the whole reinstallation process, a serial key vital. The key that came with your Windows 7 is needed in order to reinstall Windows. Answer: Windows Registry is where you can usually find your product or serial key in. Since the Windows 7 key is encrypted in the Windows Registry, it makes it almost impossible to search for the serial key manually. However, there are few ways through which you can easily decode and find the key. One of the easiest ways of finding your key is by using a Windows 7 key finder program. This is because, key finder programs search your computer to locate and decode your Windows serial key. Follow the steps below to locate your Windows 7 serial key: - You cannot manually locate the serial key in Windows 7 as the key is encrypted in the Windows Registry and is not readable. The manual process that could locate the key in Windows 95 and Windows 98 will not work in other operating systems such as Windows 7. The manual process is only helpful in finding the product ID number, and not the product key. - However, there are several key finder programs that may come to your aid at this point. So your next step would be to choose a key finder program that suits your requirement. This is where Lazesoft Windows Key Finder comes. It supports all versions of Windows 7, from Professional to Basic and Starter. It also provides you with several additional features. - Download Lazesoft Windows Key Finder, and follow the easy instructions provided. - These instructions will help you locate the key. The numbers and letters showed by this utility represent the serial key. - Make sure that you copy the key exactly as displayed, or you may find yourself facing more problems while reinstalling Windows 7. If you plan on installing Windows 7 you will need your Windows 7 serial key. However, if you can’t find that key you have two options to locate it. The first is through a key finder program. But if that doesn’t work, then you still have another option. The other option is to either ask for a replacement serial key from Microsoft or purchase another copy of your existing Windows which will ensure another serial key. More information about Lazesoft Windows Key Finder Lazesoft Recovery Suite is easy to use, powerful boot disk design to Recover Data, Recover crashed Windows System, Recover Windows Password, Clone or Backup Disk, etc. Free Windows Key Finder
<urn:uuid:6ce6b68b-8b50-4c91-822b-6250a57e5236>
CC-MAIN-2017-04
http://www.lazesoft.com/windows-key-finder/window-7-key-finder.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00157-ip-10-171-10-70.ec2.internal.warc.gz
en
0.921095
675
1.5
2
Research shows that people who set realistic weight goals and keep track of what they eat lose more weight – and there are plenty of smartphone apps that can help you achieve your weight loss goal and lead a healthier life, as well as apps to encourage and track daily exercise tailored to your needs. We pick some of the best nutrition and activity apps to help you reach your goals and loose weight, eat more healthily and keep active. First, an important note: be aware that if you have experienced an eating disorder in the past using one of these apps might not be beneficial and could potentially cause a relapse. We recommend speaking to a medical professional to make sure that any changes to your eating habits are safe. Free, iOS, Android and Windows Phone This popular calorie and exercise tracking app has helped millions of people lose weight and get fit. Add details such as height, age and target weight and the app calculates how many calories you can eat each day. The phone’s camera can scan food packaging barcodes to log calories of the food you eat. MyFitnessPal has a vast database of more than five million foods, as well as a recipe calculator for adding your own meal recipes. Weight loss is shown is a useful graph, and it’s easy to track your exercise and share your progress with others. Top fitness and exercise apps 2. MyNetDiary Calorie Counter Free, iOS and Android MyNetDiary's Calorie Counter app makes tracking your calorie intake and exercise simple. Set a weight-loss goal, then use the app to scan food packaging barcodes to log calories and nutritional information. If an item isn’t in the database, you can create custom foods or recipes. Logging exercise is straightforward with over 500 different activities included, along with an option for manual entry of calories burned, with time and distance tracking for walking. Unlimited access to a qualified GP with Saga Health Insurance - you'll have access 24 hours a day, 365 days a year to a GP consultation service. Find out more about our GP phone service. Free, iOS, Android Track your daily calories burned and calories consumed with Cronometer. Set your targets depending on your needs (a safe calorie deficit for weight loss, or equal burned/consumed for maintenance) and set the macros you would like to use (protein, carbohydrates and fat). Micro nutrients are also available to track making it a good option for anyone on a restrictive diet, for example vegans or vegetarians wanting to monitor B12, calcium or iron, or people wanting to reduce the sodium in their diet. Link up with a fitness tracker on your phone to automatically import calories burnt through walking around, and log workout sessions as you do them for an estimate of calories burned based on your height, weight, age and gender. Check out our recipe pages for more healthy meal ideas 4. Drinkaware Track and Calculate Free, iOS and Android If you want to reduce your alcohol consumption, this free app from charity Drinkaware can help. Its large database of alcohol brands helps you accurately track the units and calories in your drinks. You can set goals to moderate your alcohol consumption with personalized feedback for support and motivation. There’s even an option to add drinks prices so you can see how much you’ve saved by cutting back on alcohol. For ideas for fun non-alcoholic drinks, visit our guide to 'mocktails' 5. 5:2 Diet Complete Meal Planner £1.99, iOS and Android Fans of the popular 5:2 diet will appreciate this meal planning app from TI Media Limited. Designed to help with the challenge of what to eat on the diet’s two 500-calories days, it has over 100 breakfast, lunch and dinner 5:2 diet recipes as well as snack lists. With calorie counts and diet tips, this app should provide all the know-how and motivation you need to lose weight on the 5:2 diet. Brain tricks to help you lose weight 6. Daily Workouts - Home Trainer Free, iOS, Android Your own personal trainer in your pocket. Small, easy workouts between five and ten minutes in length with on-screen instructions and a timer. You don’t need to be connected to the web to do the sessions either. Need more time to talk to a doctor? Saga's GP phone service offers unlimited access 24 hours a day, every day of the year. Find out more about our GP phone service.
<urn:uuid:a1e14bc5-6414-448e-bd1a-e90aec66ac89>
CC-MAIN-2022-33
https://www.saga.co.uk/magazine/health-wellbeing/diet-nutrition/weight-loss/top-diet-and-nutrition-apps
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00673.warc.gz
en
0.927736
945
1.578125
2
Corporate Tax Lawyers in Phenix City In Phenix City, Alabama, a "corporation" is defined as a legal entity that's separate from its owners. Thus, from a legal standpoint, the owner of a corporation and the corporation itself are not the same "person." This doctrine is identified as "corporate personhood." While the concept is somewhat abstract, the law of Alabama treats corporations as individual persons, for most purposes. This means that, legally, corporations have many of the same rights, privileges, and obligations as living, breathing human beings. As a prime example, corporations have to pay income taxes, just as a person would. Corporate Tax Rate in Phenix City, Alabama Every corporation in the United States is required to pay federal income tax. Most states also have a corporate income tax, which corporations doing business in Phenix City, Alabama are required to pay. Under the federal tax system, and the tax laws of some states, corporate income is taxed at a different rate from the income of individuals. For example, the top federal income tax rate for corporations is 35%, compared with 33% for individuals. The highest tax rate applies to corporations making more than .3 million per year. The lowest corporate tax rate is 15%, applying to those corporations that make less than ,000 per year. In Alabama the corporate tax rate probably differs from the individual tax rate as well. In many states, policymakers have determined that the local economy benefits most when it is business-friendly. In those states, the corporate tax rate is normally lower than the individual income tax rate, unlike the federal system, where the corporate tax rate is higher. Corporations in Phenix City, Alabama are required to pay both the state and federal corporate tax. Failing to pay either (or both) of these taxes can result in severe legal penalties, including fines that may prove ruinous, especially for smaller businesses. How Can a Phenix City, Alabama Corporate Tax Lawyer Help? The majority of big corporations have accountants, tax lawyers, and other legal/financial specialists on staff to ensure that they comply with state and national corporate tax laws. As most business owners know, however, the majority of small Phenix City corporations can't afford to have attorneys on staff full time. Thus, if you run a small corporation, and are confused about the corporate tax issues that may affect you, it's a very good idea to retain the services of a Phenix City, Alabama tax attorney immediately.
<urn:uuid:d46390f0-a5a7-4544-bfdb-78653dab73b3>
CC-MAIN-2022-33
https://taxattorneys.legalmatch.com/AL/Phenix-City/corporate-tax-lawyers.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00067.warc.gz
en
0.966116
514
1.640625
2
WASHINGTON (JTA) — The U.S. Senate unanimously approved a resolution urging Iran to fulfill its pledge to help find Robert Levinson, a Jewish American who went missing in Iran in 2007. Five Americans were released last month in a prisoner exchange with Iran timed to mark the launch of the implementation of the sanctions relief for nuclear rollback deal between Iran and six major powers. The Iranians said they would assist in tracking down Levinson; the Obama administration believes he is no longer in Iran. The non-binding resolution approved Thursday, sponsored by Sens. Bill Nelson and Marco Rubio, respectively a Democrat and a Republican from Levinson’s home state of Florida, “notes the pledges by current Iranian officials to provide their government’s assistance in the Robert Levinson case” and “urges Iran, as a humanitarian gesture, to intensify its cooperation in the Robert Levinson case and to share the results of its investigation into his disappearance with the U.S. government.” Levinson, 68, of Coral Springs, Florida, a private detective and a former FBI agent, has been missing since disappearing from Iran’s Kish Island during what has since been revealed as a rogue CIA operation. Rep. Ted Deutch, D-Fla., who represents Levinson’s southern Florida district, is advancing a similar motion in the U.S. House of Representatives. It was approved this week by the House’s Middle East subcommittee.
<urn:uuid:3dfeee5a-99cb-4e37-a9ce-0b875904c259>
CC-MAIN-2017-04
http://www.jta.org/2016/02/12/news-opinion/politics/free-robert-levinson-senate-appeals-to-iran-in-unanimous-vote
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279489.14/warc/CC-MAIN-20170116095119-00014-ip-10-171-10-70.ec2.internal.warc.gz
en
0.962207
302
1.679688
2
Voice over IP (VoIP) is no longer tomorrow's technology. High-speed networks that support quality-of-service (QoS) technology have come a long way in mitigating performance and availability issues. But what about security? If your network is robust enough, securing VoIP is manageable. But if you're contemplating Internet telephony, you're entering dangerous territory. "That's really the wild, wild West," says Doug Haluza, director of engineering and new technology at Lexent, an enterprise telecommunications solutions provider. "There's no way to control how packets are routed, how many carriers they go across. Basically, doing Inter-net telephony is a risky proposition." (see "This Line's Secure") Internally, voice running over your data lines is essentially no more or less secure than any other application in your IP infrastructure. And, in some respects, it's at least as secure as traditional telephony. VoIP is here, now, and growing. When we examine VoIP in the context of well-known issues of IP data and traditional telephone security, implementation remains a security challenge--but not necessarily a nightmare. VoIP on the Rise Most major corporations are starting to look at their next generation of telephony technology. Almost without exception, they're looking at VoIP. The process of transporting voice conversations using the IP protocol isn't a radical new idea. In fact, the basic technology for using advanced packet services like frame relay, ATM and IP for transporting voice between corporate sites is several years old. Historically, the most common application for this technology has been for toll bypass--using less-expensive data services rather than by-the-minute voice services. This has been especially cost effective for international calls. That's no longer the case. Extremely low toll rates have removed a lot of the incentive to bypass toll charges. Long distance voice in the United States is already essentially free. Cutting the price of phone calls in half saves far less when you're paying 3 cents per minute rather than the 15 cents per minute of a few years ago. Nevertheless, VoIP is taking off as the focus moves from simple toll savings to reengineering the entire voice infrastructure. As organizations move through the normal cycle of replacing their PBXes, VoIP can be viewed as a logical choice for converged messaging, call centers and interactive multimedia collaboration. So, there's a good chance VoIP is coming to your organization, probably sooner rather than later. The good news is that VoIP in a well-designed corporate IT environment is at least as secure as conventional telephony. Then again, conventional telephony isn't exactly secure. Voice Over Ethernet You may be concerned that VoIP LAN or WAN traffic will be carried over an Ethernet backbone and broadcast over the entire local network, making it easy for anybody to eavesdrop. Not so. It's true that 15 years ago almost all Ethernet traffic was broadcast over a single coaxial cable and was available to all users on the network. Today, however, virtually all Ethernet traffic is switched. Even though all network points may be reached--just as you can call anyone connected to the traditional telephony network--the individual packets exchanged between two network points are available only to those two points. So, the architecture is the same as that of traditional telephony. The VoIP packets that comprise a conversation between two network points are available to the workstations or IP phones at those endpoints, on the physical cabling to the nearest Ethernet switch and in the switching infrastructure. Can this infrastructure be compromised? Sure, if your switches aren't protected from unauthorized access. Someone with the right equipment can tap in--but the risk, as we'll see later, is significantly less than with traditional telephony. Voice Over the Internet OK, you're feeling pretty good about VoIP running over your private network; corporate intranets are a closed system, and any breaches of security must come from within. But what about letting VoIP out into the world? How does the security of Internet VoIP compare with your current phone system? Network connections to the outside world--and to business partners, suppliers, etc.--open your servers to access from unfriendly and unknown people. Unlike traditional telephone numbers, there's very little centralized control over the use of IP addresses. This anonymity creates a fertile environment for address spoofing, which enables distributed denial-of-service (DDoS) attacks and other network compromises that could bring down your call-processing capabilities. By definition, VoIP is vulnerable to all of the intrinsic security problems in IP. DDoS is a virtual "busy signal" on an IP phone system. VoIP's dependence on continuous, reliable packet flow makes availability an issue in the face of attacks. The high levels of packet loss inflicted by January's SQL Slammer worm, for example, raised concerns about VoIP reliability. When you conduct business on the Internet, you're turning control of your data and/or voice transmission to other people's networks--and some of those networks are more secure than others. Traditional data networks depend on a few well-known--and trusted--entities. There's a local service provider at each end of the connection and an inter-exchange carrier connecting them. So, for instance, a connection between Atlanta and Boston might involve BellSouth, Verizon and AT&T. You know these providers and are confident they're transmitting your information securely. Not so on the Internet. You can choose your local ISP, but your traffic between points on the Internet involves several ISPs, and these can change. For example, a simple Traceroute command usually shows at least three or four different carriers involved in a given data conversation. So, the safest route is limiting VoIP to internal use. Simply add VoIP as an additional application on a secure corporate intranet. But you might be shortchanging yourself. When it comes to outside communications with VoIP, weigh the potential cost savings and efficiencies gained by converging technologies against the risk. If you're already transmitting and receiving sensitive data over the Internet, you've gone to considerable lengths to protect that data, which is almost surely more sensitive than your voice traffic and no less vulnerable to attack. These safeguards can be leveraged to help secure VoIP over the Internet. Two protocols are gaining popularity in the VoIP arena, with both able to support encryption but under different circumstances. Session Initiation Protocol (SIP), sponsored by Cisco Systems and Microsoft, is designed to set up a session, or "call," between two endpoints. SIP supports VoIP encryption via SSL, PGP or S/MIME. Its biggest deficiency may be the lack of authentication mechanisms, which could lead to identity theft. Also, it has no means of handling delivery failure of intermediary network devices or load balancing, which could be problematic for larger enterprises with a lot of traffic. However, interoperability among SIP systems is fairly widespread. H.323, designed to support multimedia over IP for Web-based video conferencing, addresses some of SIP's call-handling issues, such as its ability to reroute calls around failed gateways so the call isn't disrupted. But such service comes at a cost. In addition to more overhead, voice data may not move as quickly, which could influence quality of service. It supports encryption via H.235 and can use SSL under certain conditions. But What About Packet Sniffing? While it's technically possible to sniff voice packets, it's a lot more difficult than tapping into a traditional phone transmission. Let's consider what it would take to tap into VoIP. The first step in sniffing a conversation is to gain physical access to the packets. This means having access to the switches and/or the corporate backbone network. But those same switches carry critical corporate data, which is far more sensitive than your conversations. If you've secured data against sniffing, you've secured voice. If you haven't protected your data, voice packet sniffing isn't your most serious security problem. Of course, the transmission medium makes a difference. Wireless Ethernet is far more susceptible to sniffing than copper wire. The most secure is fiber-optic cabling, which doesn't emit radio frequencies as does copper wiring. But let's say an intruder gains physical access, despite your best efforts. If it's a traditional phone line, he's practically listening already. But if you're using VoIP, he really has his work cut out for him. First, consider what it takes to tap a traditional phone line. If the conversation is still in analog format, the intruder simply taps onto the line using a "butt set"--which was formerly reserved for telephone repairmen, but now available at hardware stores--and starts listening. Traditional telephony uses time-division multiplexing for trunk groups--as opposed to packet multiplexing--so picking out a single conversation from a digitally multiplexed bundle of conversations and decoding the 64 Kbps pulse code modulation (PCM) is relatively easy. Compare that with pulling a conversation out of an IP transmission. Voice packets are buried deep inside a sophisticated protocol stack. The intruder has to know what the physical format of the information is; decode the Ethernet packets to find a single flow between two points; decode the IP layer; decode the transport-layer (layer 4) protocol--probably UDP--and then, finally, decode the voice packets, which could be encoded in a wide range of formats. And he has to do it in real time. Typically, tools for this type of analysis are applied to an archived stream as opposed to real time. If this isn't hard enough, the actual payload of the IP stream--possibly including a secondary level of IP addressing--could be encrypted via IPSec. (If you plan to use IPSec to protect your VoIP traffic, factor in its possible impact on performance. QoS may be a greater challenge than security in deploying VoIP.) So, Is VoIP Secure? It's a lot easier to listen to a conversation over a cubicle wall than it is to tap a VoIP call. Before you get excited about encoding all your IP telephony with IPSec, take some simple precautions like telling the sales force not to discuss key negotiations on their cellphones in a crowded airport. And lock the doors to the equipment rooms! If you're planning to deploy VoIP, you'll need to take some steps to make the data network more secure, especially if you haven't performed an overall security audit recently. But the bottom line remains that for most corporations, we're already crossing the threshold where there's a higher level of security needed for data applications than for phone conversations. The odds are that you actually could improve your level of telephony security as compared with traditional telephony simply by piggybacking your voice onto the more secure data network. There's even a question as to how secure VoIP should be. For instance, there are legitimate concerns from the law enforcement community about whether advanced voice networks are "too secure" for court-sanctioned wiretapping. VoIP is probably as secure as traditional telephony and a lot more secure in most cases than your cellphone. Balance sufficient security against risks and benefits. If the effort of required to obtain the information in a VoIP call is greater than the intrinsic value of the information, VoIP could be considered "secure enough." About the author: Steven Taylor is president of Distributed Networking Associates, and editor and publisher of Webtorials.com, a Web site for technology-based tutorials.
<urn:uuid:45ad80a4-0fd2-4d71-8700-8e1ebb5777ce>
CC-MAIN-2017-04
http://searchsecurity.techtarget.com/VoIP-network-security-protocols-Is-VoIP-secure
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279489.14/warc/CC-MAIN-20170116095119-00006-ip-10-171-10-70.ec2.internal.warc.gz
en
0.944661
2,387
2.171875
2
The freshwater Chaetophorales of New Zealand Abstract (Summary)Restricted Item. Print thesis available in the University of Auckland Library or available through Inter-Library Loan. The present study, the first of its kind in New Zealand, is based on over 1600 collections gathered from all over the country. A total of 83 taxa (72 spp and 11 varieties/forms) belonging to 26 genera are described in the present work with as complete information as possible. Of these, 14 taxa (including 3 genera: Diaphragma, Epibolium and Gloeoplax) are new to the southern hemisphere and 31 taxa (including 8 genera: Chaetotheke, Cloniophora, Diaphragma, Draparnaldiopsis, Epibolium, Gloeoplax, Gongrosira and Physolinum) are new to New Zealand. The following 13 taxa have been described as new to science: Chaetophora attenuata Hazen var. claytonii var. nov. Draparnaldiopsis taylorii sp. nov. Gongrosira chapmanii sp. nov. G. jollyi sp. nov. Stigeoclonium fasciculare Kütz. var. henriquesii var. nov. S. fasciculare Kütz. var. amrutii var. nov. S. islamii sp. nov. S. lubricum (Dillw.) Kütz. var. nathanii var. nov. S. lubricum (Dillw.) Kütz. var. nairii var. nov. S. nudiusculum (Kutz.) var. lamii var. nov. Trentepohlia jolithus (L.) Wallr. var. anthonyi var. nov. T. flintii sp. nov. T. rigidula (Muell.) Hariot var. lynchii var. nov. A new combination (Cloniophora paihiae (Islam) comb. nov.) has been proposed and descriptions of three species (Phycopeltis expansa Jennings, P. prostrata (De Wildem.) Schmidle and Trentepohlia peruana (Kütz.) Printz) have been emended. Two species of Trentepohlia: T. lagerheimii De Wildem. and T. willei (Tiff.) Printz are considered as conspecific with T. peruana (Kütz.) Printz and are reduced to synonyms of the latter. SEM studies of many taxa, more particularly of Trentepohliaceae, have been made for the first time. An antibiotic property has been recorded in one new taxon of Stigeoclonium (S. fasciculare Kütz. var. amrutii var. nov.). Each and every taxon has been illustrated. Maps showing New Zealand and world distributions of the taxa are provided. For the first time a review of New Zealand and world literature on the order Chaetophorales as a whole has been carried out. Several taxonomic problems and discrepancies in the literature have been indicated and the course of future work has been suggested. School Location:New Zealand Source Type:Master's Thesis Date of Publication:01/01/1976
<urn:uuid:a7a00b33-075e-4ef8-9523-2318ee1fb2cd>
CC-MAIN-2017-04
http://www.openthesis.org/documents/freshwater-Chaetophorales-New-Zealand-552522.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00034-ip-10-171-10-70.ec2.internal.warc.gz
en
0.830402
714
2.34375
2
An organization’s success and competitiveness depends upon its ability to embrace diversity and realize the benefits. With that in mind, there are many benefits when organizations evaluate how they handle workplace diversity issues, develop and implement diversity plans. Lawrence & Weber (2014) conveys that successful diversity management includes communicating goals, measuring progress, and establishing mechanisms for assessing Such behavior than some expected values because increases their effects on social work field, interpersonal communication and coordination in the organization (Motowidlo, J.S 2003). Another way by which field is improved, by the increased readiness of individual behaviors for do valuable organization. Some things that people improve their personal knowledge and skills Introduction In today’s, work environment it is imperative that teams work together to create organizational syner gy. Synergy occurs when two or more elements or individuals work together to produce a combined effect that is greater than the sum of their separate effects. Teams have common goals, purposes, and interactions that can be different (Krystna, 2014). Furthermore, teams that function efficiently are part of the total quality management concept. Benefits CPD activities enable CPAs to showcase their skills and knowledge and make the best of their career. It can also be of great benefit to employers establishing frameworks for recognizing achievements of the employees. In the 2000 study on expectancy-value theory of achievement motivation, Wigfield and Eccles explain how an individual’s choice, persistence, and performance are affected by motivation. The motivators for partaking in the CPD programs are diverse and complex. Individual professionals and governments’ motivations are similar and to some extent shared with employers. The effect of power on culture and leadership is real and this effect can be long lasting. The term power conjures up images of both evil and good and is a subject that is rarely discussed in management planning sessions or leadership training. But, because strength is the basis for influence attempts understanding its uses and limitations help a leader to learn to use it effectively. Becoming a efficacious leader is critical because companies do not form accidentally. Leaders help companies for culture by being goal oriented, having a specific purpose, and are created because one or more individuals perceive that the concerted and coordinated action of a number of people can accomplish something that individual action cannot. Written report on Team Effectiveness Report by Christina Thai This report addresses an understanding and comparison between team members and groups, to the development of transforming groups into teams, to the overall representation characteristics of high performance teams. Another section report will also give insight of how challenges are dealt with inside a team environment and the recommended action steps to motivate the team performance effectively. Introduction There is a slight difference when it comes to distinguishing the differences between a group and a team. 3. Communication, cohesion and trust , the clockwork behind team successfulness (Maznevski, 1994) defines effective communication as method to transmit meaning, which will be kept as intended, from one person to another or others. Obviously, effective communication within a team is a desirable feature. It promotes comprehension between the team members and productively utilizes new pieces of information brought into the team. Fiedler's contingency model focuses on the match between a leader's style and the characteristics of the situation. While I deploy supportive leadership styles and I emphasise on showing empathy for others and providing moral support and assistance to others, my main objective is to get the job done. 4.0 Traits and skills of supportive leadership Leadership style is the manner and approach of providing direction, implementing plans, and motivating people. Supportive leadership style is more transformational, emphasizing effectiveness. It is a naturally organic and emotionally sensitive style and is especially useful in circumstances such as change. Many studies have specified that transformational leadership has positive effects on followers' efforts and satisfaction (Bycio et al., 1995; Kirkpatrick & Locke, 1996; Parry, 2000). Compared with other styles, transformational leadership is deemed beneficial in developing leaders and enhancing subordinates' faithfulness, faith and self-esteem (Barling et al., 1996; Northouse, 2009). Therefore, transformational leadership is the most effective form of leadership, where the leaders are closely involved with, and motivate their subordinates to attain beyond their transactional agreements (Panagopoulous & Dimitriadis, 1- Introduction This report will state and elaborate the idea and the concept of culture, cultural diversity as well as handling with cultural diversity in an organization. It will clarify and explain the advantages as well as disadvantages for a company having employees of different cultural backgrounds. Likewise, it will also explain significance of dealing with different cultures, influence of culture over the workers and style of management. Similarly, it will also discuss significance of cultural training and cultural diversity implications in managing an organization. Data, information, and knowledge is collectively owned and by placing an emphasis on social resources and social relationships will enhance knowledge sharing, affective commitment, and help mitigate organizational barriers (Casimir, Lee, & Loon, 2012). In order to promote trust internally and externally, within and throughout the organization, encouraging open communication, transparency, honesty, integrity, and ethical considerations are imperative. Identifying answers to the most pressing and prevalent problems facing the organization are how the organization will surpass our competition. Many organizations will face difficulty while contending with complex organizational issues, as the result of continuously developed trusting relationships, in the face of adversity, our agency will demonstrate resiliency. Group cohesion and team effectiveness will fully develop by instilling and cascading trust as an essential performance variable throughout the agency. Clearly, this manager either had taken classes on management or had a natural talent for the managerial role. When conflict is managed well, it can lead to improved creativity, innovation, higher-quality decision making, therefore creating a more productive workplace. Also another aspect of good communication and conflict management is the strengthening of employee relationships. When the employees feel like they are a part of the solution, they are more willing to participate in the implementation of the decision, even when the decisions are not their preferred outcome (Runde, C. E.
<urn:uuid:ae671804-0727-4c48-ac2c-4fd293f634fe>
CC-MAIN-2022-33
https://www.ipl.org/essay/What-Is-Cultural-Diversity-In-Culture-PJACWHRAWG
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572304.13/warc/CC-MAIN-20220816120802-20220816150802-00475.warc.gz
en
0.942501
1,237
2.484375
2
Help preserve World Heritage sites UNESCO is a non-profit intergovernmental organization. Contributions to UNESCO’s World Heritage Centre—made by individuals like you—are used for projects implemented by experts to protect World Heritage sites around the world. Donate and receive the World Heritage map Highest donation to date: From: United States of America It is the duty of the international community as a whole to cooperate in the protection of World Heritage - please join us in this noble task Director of the World Heritage Center
<urn:uuid:785f3fb2-d7d3-496c-ac3a-7309a0bca9a8>
CC-MAIN-2017-04
http://whc.unesco.org/pg_friendly_print.cfm?cid=348&step=1
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00391-ip-10-171-10-70.ec2.internal.warc.gz
en
0.851272
107
2.03125
2
METRO VANCOUVER -- Surrey has teamed up with federal government to build a new organics biofuel facility in the city. The plant, which will process residential and commercial kitchen and yard waste into a renewable fuel, will be located on city-owned land in Port Kells next to the Surrey Transfer Station. It has the capacity to take 80,000 metric tonnes of organics per year. Surrey Mayor Dianne Watts said facility, the largest of its kind in the country, will "establish a new benchmark in Canada and provide environmental benefits to the entire region" while helping Metro Vancouver achieve a regional 70 per cent waste diversion target by 2015. The City collects waste from approximately 100,000 homes. Based on recent studies, Surrey has concluded that about 65 per cent of its residential garbage is comprised of organic waste that could be diverted from the landfill. Once the facility is operating, Surrey will be home to the only fully-integrated organics waste management system in North America. The system includes curbside organics collection, an entire fleet of compressed natural gas waste collection trucks, and a facility to process organics into fuel which will be used to power the waste trucks. The federal government will contribute up to $16.9 million, 25 per cent of the project costs. A private partner will be chosen to design, build, finance, operate and maintain the facility in a long-term agreement. An open Request for Qualifications process is expected to be released by the City early in 2013, followed by a subsequent invitation to short-listed proponents to participate in a Request for Proposal in the spring of 2013.
<urn:uuid:c1aa77eb-6d6c-4dfb-baaf-f1b917ab3336>
CC-MAIN-2016-44
http://www.vancouversun.com/news/metro/Transportation/7273983/story.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719843.44/warc/CC-MAIN-20161020183839-00292-ip-10-171-6-4.ec2.internal.warc.gz
en
0.946635
332
1.945313
2
'Chew' in the Bible Nevertheless these shall ye not eat of them that chew the cud, or of them that divide the hoof: as the camel, because he cheweth the cud, but divideth not the hoof; he is unclean unto you. the pig, though it has divided hooves,does not chew the cud—it is unclean for you. All animals that have hooves but do not have a divided hoof and do not chew the cud are unclean for you. Whoever touches them becomes unclean. Nevertheless these ye shall not eat of them that chew the cud, or of them that divide the cloven hoof; as the camel, and the hare, and the coney: for they chew the cud, but divide not the hoof; therefore they are unclean unto you. and the pig, though it has hooves, it does not chew the cud—it is unclean for you.You must not eat their meat or touch their carcasses. Thus says the Lord concerning the [false] prophets who lead my people astray;When they have something good to bite with their teeth,They call out, “Peace,”But against the one who gives them nothing to eat,They declare a holy war.
<urn:uuid:5bbaa649-8752-435a-9d6d-90a682f62870>
CC-MAIN-2022-33
https://bible.knowing-jesus.com/words/Chew
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571234.82/warc/CC-MAIN-20220811042804-20220811072804-00067.warc.gz
en
0.968461
274
2.328125
2
The recent recall of Vioxx generated an enormous amount of attention on the Food and Drug Administration (FDA) and the approval process of pharmaceuticals. Particular scrutiny arose over examining clinical trial data on existing drugs and how the FDA needs to improve its monitoring of drugs already on the market. The culmination of this scrutiny and public debate was the announcement February 15, 2005 of the FDA's Drug Safety Initiative. Three short days later, further analysis on Vioxx and other non-steroidal anti-inflammatory drugs (NSAIDs) of the COX-2 class, revealed that these drugs should remain on the market, which brings up the question of was all this debate and change really necessary and who does it really protect? The well-documented saga began September 30, 2004 with Merck's voluntary recall of their blockbuster drug Vioxx. The arthritis and acute pain drug had estimated worldwide sales of $2.5 billion and was prescribed to an estimated 1.9 million patients in the United States in 2003. Even though the drug was approved and marketed in the United States in 1999, Merck was continuing clinical trials with Vioxx in other diseases. It is very common for drugs to be studied in multiple diseases and also common for drugs already approved to be studied in new indications. A three-year trial evaluating Vioxx in prevention of recurring polyps produced the now infamous data that Vioxx increases cardiovascular risk such as heart attacks and strokes. Consumers, doctors and politicians all questioned how a drug this widely used could be so harmful and how could the FDA allow a drug like this to be approved. Shortly after that reaction came anecdotal evidence from prior trials that this outcome should have been foreseen and some data that implicated other Cox-2 inhibitors like Bextra and Celebrex from Pfizer, shared the same risks as Vioxx. Pfizer defended its products and never hinted at a voluntary recall until more information could be obtained. Meanwhile, over-the-counter drugs started advertising their safety over Cox-2 inhibitors and tried to win the public over with their advertising campaign. As the lawsuits began to mount for Merck, politicians and consumers demanded change at the federal level to ensure safe drugs and to ensure continued and better monitoring once a drug is on the market. On February 15, 2005 the FDA released their concept for the Drug Safety Initiative, a new program to ensure consumer safety. The initiative is composed of two major portions; create an independent Drug Safety Oversight Board (DSB) to monitor drug safety issues and open more lines of communication with the public and healthcare professionals. The DSB will be composed of FDA members, other Department of Health and Human Services officials, medical experts and representatives of consumer groups. This group will monitor the safety of drugs on the market and make informed decisions with all the data present. The new lines of communication are to be highlighted with the creation of a Drug Watch webpage that will contain the latest safety information regarding drugs on the FDA watch list. Three days after the release of the Drug Safety Initiative, an advisory panel ruled in favor of keeping Celebrex, Bextra, and Vioxx on the market. This advisory panel consisted of FDA consultants from various medical and public health institutions, patient consultants and representatives from the National Institute of Health. These panel members voted 31-1 to keep Celebrex on the market, 17-15 in favor of Vioxx and 17-13 in favor of Bextra. This independent panel is not the same format as the DSB but the idea was the same. This independent panel suggested strict "black box” warning labels for all three drugs but still said they could remain on the market. The FDA does not have to adhere to the recommendation of this committee but typically they follow their advice. Looking at the events of the past five months, one has to now wonder if the creation and placement of the DSB and other changes at the FDA will protect investors more than the public. The original public outcry was about the safety of Vioxx and how the FDA (and Merck) could allow it on the market. With the independent panel of experts believing Vioxx should remain on the market but with stricter warnings, it begs the question, was all this necessary and whom do these changes really benefit? Patient safety is probably not going to benefit much if at all from the changes at the FDA. Prior to the formation of the DSB, the burden of continued monitoring fell in large part to the pharmaceutical company due to legal worries. Patient safety and the fear of litigation is what drew Merck to pull Vioxx off the market. That drastic and major reaction by Merck caused its shares to fall over 30% from its pre-recall value. For a company to take such a drastic step, highlights the fear pharmaceutical companies have over litigation. The DSB is now placing more of the burden of drug safety on them and this protects the financial interests of pharmaceutical companies because they may not have to act so proactively. If the DSB supports continued marketing of a particular drug, then this lowers the company's legal risk. Now that the independent counsel has approved keeping Vioxx on the market, some of Merck's litigation risk has diminished. The new initiative from the FDA does not really protect consumers any more than in the past, the only thing that has changed is the shifting burden of drug monitoring. Responsible pharmaceutical companies have always monitored their drugs because of the enormous liability issues that surround a poor product. As evident with Vioxx, a company will pull a $2.5 billion product off the market to try and save itself from some litigation. Now that the burden is on a government oversight committee, we cannot expect unsafe drugs to be found any quicker or examined anymore thoroughly than the prior system. If the DSB was in existence prior to the recall of Vioxx, we might have seen a greatly different story unfold. A story in which Vioxx was never removed from the market but just new warnings added. A story in which Merck's shares do not fall 30%. This story shows the same amount of protection for patients as the real story but also protects the value of Merck. This new drug safety initiative might potentially protect companies but may do little to increase patient safety. For further information please contact: +44 (0) 207 915 7856
<urn:uuid:24a55120-7fcf-4871-9df2-08de0013488e>
CC-MAIN-2017-04
http://www.medica-tradefair.com/cgi-bin/md_medica/lib/pub/tt.cgi/FDA_Drug_Safety_Initiative_Protects_Investors_more_than_Patients.html?oid=15184&lang=2&ticket=g_u_e_s_t
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283301.73/warc/CC-MAIN-20170116095123-00502-ip-10-171-10-70.ec2.internal.warc.gz
en
0.958384
1,296
2.78125
3
Atlantic Sea Farms Season 2 Episode 1 | 26m 4s | Video has closed captioning. Atlantic Sea Farms partners with lobstermen up and down the rocky coast of Maine to farm kelp in the region’s icy waters. The cultivation of this fast-growing, highly nutritious sea vegetable is creating new economic opportunities for fisheries in Maine while also benefiting the ocean. Plus, it’s delicious and chefs are finding creative ways to incorporate kelp into their menus. Problems Playing Video? | Closed Captioning
<urn:uuid:f1b604d4-96d1-48ca-8af4-80dbc615fff1>
CC-MAIN-2022-33
https://playpbs.azpm.org/video/atlantic-sea-farms-b1pe1x/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00471.warc.gz
en
0.910459
116
1.515625
2
The internal combustion engine burns fuel within the cylinders and converts the expanding force of the combustion or “explosion” into rotary force used to propel the vehicle. There are several types of internal combustion engines: two and four cycle reciprocating piston engines, gas turbines, free piston, and rotary combustion engines. The four cycle reciprocating engine has been refined to such a degree that it has almost complete dominance in the automotive field. The engine is the heart of the automobile. It converts fuel into the energy that powers the automobile. To operate, it requires clean air for the fuel, water for cooling, electricity (which it generates) for igniting the fuel, and oil for lubrication. A battery and electric starter get it going. Each “cylinder” of the typical car engine has a “piston” which moves back and forth within the cylinder (this is called “reciprocating”). Each piston is connected to the “crankshaft” by means of a link known as a “connecting rod”. Four-stroke Piston Cycle In 1876, a German engineer named Dr. Otto produced an engine, that worked using the four-stroke, or Otto cycle. “Four-stroke” refers to the number of piston strokes required to complete a cycle (a cycle being a sequence of constantly repeated operations). It takes two complete revolutions of the crankshaft to complete the cycle. The first stroke is the intake stroke. The piston moves down the cylinder and creates a partial vacuum in the cylinder. A mixture of air and fuel is forced through the inlet valve into the cylinder by atmospheric pressure, now greater than the pressure in the cylinder. During this stroke, the exhaust valve stays closed. The second stroke is the compression stroke. The piston moves up in the cylinder with both valves closed. The air and fuel mixture is compressed and the pressure rises. The third stroke is the power stroke. Near the end of the compression stroke, the air and fuel mixture is ignited by an electric spark from the spark plug. The combustion that occurs causes a rise in temperature and enough pressure to force the piston down again. On the fourth stroke, or exhaust stroke, the piston moves up again and forces the burned gases out of the cylinder and into the exhaust system. This cycle repeats itself the entire time the engine is running. Horsepower is a unit of power for measuring the rate at which a device can perform mechanical work. Its abbreviation is hp or bhp (for brake horse power). One horsepower was defined as the amount of power needed to lift 33,000 pounds one foot in one minute. Gaskets and seals are needed in your engine to make the machined joints snug, and to prevent fluids and gasses (oil, gasoline, coolant, fuel vapor, exhaust, etc.) from leaking. The cylinder head has to keep the water in the cooling system at the same time as it contains the combustion pressure. Gaskets made of steel, copper and asbestos are used between the cylinder head and engine block. Because the engine expands and contracts with heating and cooling, it is easy for joints to leak, so the gaskets have to be soft and “springy” enough to adapt to expansion and contraction. They also have to make up for any irregularities in the connecting parts. Overhead Camshaft (OHC) Some engines have the camshaft mounted above, or over, the cylinder head instead of inside the block (OHC “overhead camshaft” engines). This arrangement has the advantage of eliminating the added weight of the rocker arms and push rods; this weight can sometimes make the valves “float” when you are moving at high speeds. The rocker arm setup is operated by the camshaft lobe rubbing directly on the rocker. Stem to rocker clearance is maintained with a hydraulic valve lash adjuster for “zero” clearance. The overhead camshaft is also something that we think of as a relatively new development, but it’s not. In 1898 the Wilkinson Motor Car Company introduced the same feature on a car. Double Overhead Camshaft (DOHC) The double overhead cam shaft (DOHC) is the same as the overhead camshaft, except that there are two camshafts instead of one. Overhead Valve (OHV) In an overhead valve (OHV) engine, the valves are mounted in the cylinder head, above the combustion chamber. Usually this type of engine has the camshaft mounted in the cylinder block, and the valves are opened and closed by push rods. All engines have more than one valve; “multivalve” refers to the fact that this type of engine has more than one exhaust or intake valve per cylinder. Timing refers to the delivery of the ignition spark, or the opening and closing of the engine valves, depending on the piston’s position, for the power stroke. The timing chain is driven by a sprocket on the crankshaft and also drives the camshaft sprocket. Vacuum System (Importance of) Engines run on a vacuum system. A vacuum exists in an area where the pressure is lower than the atmosphere outside of it. Reducing the pressure inside of something causes suction. For example, when you drink soda through a straw, the atmospheric pressure in the air pushes down on your soda and pushes it up into your mouth. The same principal applies to your engine. When the piston travels down in the cylinder it lowers the atmospheric pressure in the cylinder and forms a vacuum. This vacuum is used to draw in the air and fuel mixture for combustion. The vacuum created in your engine not only pulls the fuel into the combustion chamber, it also serves many other functions. The running engine causes the carburetor and the intake manifold to produce “vacuum power,” which is harnessed for the operation of several other devices. Vacuum is used in the ignition-distributor vacuum-advance mechanism. At part throttle, the vacuum causes the spark to give thinner mixtures more time to burn. The positive crankcase ventilating system (PCV) uses the vacuum to remove vapor and exhaust gases from the crankcase. The vapor recovery system uses the vacuum to trap fuel from the carburetor float bowl and fuel tank in a canister. Starting the engine causes the vacuum port in the canister to pull fresh air into the canister to clean out the trapped fuel vapor. Vacuum from the intake manifold creates the heated air system that helps to warm up your carburetor when it’s cold. The EGR valve (exhaust-gas recirculation system) works, because of vacuum, to reduce pollutants produced by the engine. Many air conditioning systems use the vacuum from the intake manifold to open and close air-conditioner doors to produce the heated air and cooled air required inside your vehicle. Intake manifold vacuum also is used for the braking effort in power brakes. When you push the brake pedal down, a valve lets the vacuum into one section of the power-brake unit. The atmospheric pressure moves a piston or diaphragm to provide the braking action. The combustion chamber is where the air-fuel mixture is burned. The location of the combustion chamber is the area between the top of the piston at what is known as TDC (top dead center) and the cylinder head. TDC is the piston’s position when it has reached the top of the cylinder, and the center line of the connecting rod is parallel to the cylinder walls. The two most commonly used types of combustion chamber are the hemispherical and the wedge shape combustion chambers. The hemispherical type is so named because it resembles a hemisphere. It is compact and allows high compression with a minimum of detonation. The valves are placed on two planes, enabling the use of larger valves. This improves “breathing” in the combustion chamber. This type of chamber loses a little less heat than other types. Because the hemispherical combustion chamber is so efficient, it is often used, even though it costs more to produce. The wedge type combustion chamber resembles a wedge in shape. It is part of the cylinder head. It is also very efficient, and more easily and cheaply produced than the hemispherical type. Cutaway of the V-8 Engine This diagram shows the flow of fuel and exhaust within a V8 engine. It shows the timing chain (driven by the crankshaft) drives the camshaft, which opens the valves. Fuel enters the cylinders via the intake manifold. The spark-caused explosions force the pistons down. Rotation of the crank forces the pistons back up, which expels the exhaust. A cylinder is a round hole through the block, bored to receive a piston. All automobile engines, whether water-cooled or air-cooled, four cycle or two cycle, have more than one cylinder. These multiple cylinders are arranged in-line, opposed, or in a V. Engines for other purposes, such as aviation, are arranged in other assorted forms. The diameter of the cylinder is called the “bore” while its height is called its “stroke.” The “displacement” of an engine is actually a reflection of the total amount of volume of the engine’s cylinders, and nothing to do with the actual size of the engine itself (although the two are highly correlated). The displacement is simply the bore multiplied by the stroke of a single cylinder, multiplied by the total number of cylinders in the engine. Muscle car engine displacements were usually measured in cubic inches, while modern vehicle’s are expressed in terms of liters. Roughly 61 cubic inches equals a liter of displacement. Therefore, an engine with 350 cubic inches of displacement would be the equivalent of 5.7 liters. The Piston, Rings, and Wrist Pin The piston converts the potential energy of the fuel, into the kinetic energy that turns the crankshaft. The piston is a cylindrical shaped hollow part that moves up and down inside the engine’s cylinder. It has grooves around its perimeter near the top where rings are placed. The piston fits snugly in the cylinder. The piston rings are used to ensure a snug “air tight” fit. The piston requires four strokes (two up and two down) to do its job. The first is the intake stroke. This is a downward stroke to fill the cylinder with a fuel and air mixture. The second is an upward stroke to compress the mixture. Right before the piston reaches its maximum height in the cylinder, the spark plug fires and ignites the fuel. This action causes the piston to make its third stroke (downward). The third stroke is the power stroke; it is this stroke that powers the engine. On the fourth stroke, the burned gases are sent out through the exhaust system. The wrist pin connects the piston to the connecting rod. The connecting rod comes up through the bottom of the piston. The wrist pin is inserted into a hole (about half way up) that goes through the side of the piston, where it is attached to the connecting rod. Pistons are made of aluminum, because it is light and a good heat conductor. Pistons perform several functions. Pistons transmit the driving force of combustion to the crankshaft. This causes the crankshaft to rotate. The piston also acts as a moveable gas-tight plug that keeps the combustion in the cylinder. The piston acts as a bearing for the small end of the connecting-rod. Its toughest job isto get rid of some of the heat from combustion, and send it elsewhere. The piston head or “crown” is the top surface against which the explosive force is exerted. It may be flat, concave, convex or any one of a great variety of shapes to promote turbulence or help control combustion. In some, a narrow groove is cut into the piston above the top ring to serve as a “heat dam” to reduce the amount of heat reaching the top ring. For an engine to make more power, it has to take in more air. In most four stroke engines, the air must enter the combustion chamber through the valves. The camshaft controls the opening and closing of the valves by regulating the time that the valve is opened and closed, and how much the valve is opened by. An easy solution to have more power, would be to alter the characteristcs of the camshaft so that it either keeps the valves open for a longer period of time, or lift the valve higher off it’s seat so that more air can pass into the combustion chamber. It all sounds very easy, but once again, there’s more to it than meets the eye. Like most engine mods, this one is also a compromise. In the perfect engine, the inlet valve will open when the piston is at TDC (top dead center), and as it travels down the bore, it will suck in a full charge equal to it’s displacement. The exhaust valve would open at BDC (bottom dead center), and the full displacement of spent gasses would be pumped out of the engine – the perfect engine running at 100% volumetric efficiency. In practice, the stresses on the valvetrain would just be too much for the materials to handle. To lift a valve of say 50g some 10mm off it’s seat in less than a millisecond (at 6000rpm) without it bouncing or doing anything untoward in the next 100,000 miles of it’s life, simply doesn’t work with the materials in use today. So, the manufacturers used their multi-million dollar research budgets to come up with a simple solution. The piston travels rather slowly at TDC compared to the middle of the stroke – there’s not much of the pumping action being done in the 10 or 20 degrees around TDC. So, they start to open the valve gently while the piston is still on it’s way up on the exhaust stroke. Although this creates valve “overlap” (time in which both the intake and the exhaust valves are open), it does allow the engine to breathe better and create more power. When the time that the inlet valve stays open is made longer, the overlap starts to become a problem at low engine speed. The exhaust gasses get pumped into the inlet tracts, substantially diluting the incoming charge and causing the engine to run very poor. That’s why an engine with a wild camshaft runs uneven at idle – it’s choking in it’s own exhaust gasses. However, when the engine speed goes up, the exhaust gasses pick up momentum, and during the overlap period, the departing exhaust charge creates a partial vacuum behind it, sucking in more of the fresh intake charge. This leads us to two important conclusions: Firstly, the wilder the camshaft, the less power the engine will make at low rpm. Such wild engines will normally not have enough power at regular “civilized” driving speeds to pull the skin off a rotten banana. To pull away from a stop, you will have to rev it up to come “on the cam”, or stall the engine at every attempt at a civilized getaway. Secondly, the engine will only produce more power at the very top of it’s rev range. These are important points to consider when choosing a racy camshaft for your engine. Are you willing to sacrifice low speed drivability in exchange for more top end power? It’s up to you to decide. No, we are not against performance camshafts. We have owned several “hairy” cammed cars, and want to point out the facts to you so you won’t end up wit a car you hate. Driving such a car to work every day soon starts to get on one’s nerves. And if you transport passengers in your vehicle, be warned : they are usually not very sympathetic towards the neck-wrenching style of driving that such a vehicle demands to keep it “on the boil”. If you do decide to go with a hairy cam, there are a few things you can do to slightly alleviate the associated low speed problems. 1. A good free-flow extractor exhaust with long primary pipes tuned to low engine speed optimisation can make the engine come on the cam a little sooner. The long 4-into-1 systems seem to be able to “pull the engine on the cam” a little sooner than the regular banana style 4-into-2-into-1 systems. 2. Long ramstacks on the intake. A ram stack are those shiny flared tubes you often see on the carburettors of high-performance engines. These artificially create a longer intake path for the air, allowing it to build up some momentum. They also have an added benefit that they can allow up to 8% more flow into the carb when compared to the usually blunt ending of the carb mouth. 3. Proper gas-flowing of the cylinder head. A lot of cylinder heads out there flow more air in the wrong direction than they can flow in the right direction. Most people who gasflow cylinder heads don’t even realize that they are making it easier for the gasses to also flow well in the wrong direction! Remember that the main problem is that the exhaust gasses flow into the intake port during the increased overlap period. We can put you in touch with people who can do special things to a cylinder head so that it is difficult for the exhaust gasses to pop out through the intake port in the camshafts’ overlap period. There’s a whole science behind optimising the head to make it “cam-friendly”, and usually there is a substantial improvement in the low speed range if the cylinder head is flowed properly, by a person who knows what directional flowing is about. Note that it is easy – even for experienced “port grinders” – to completely ruin the reverse-flow characteristics of your cylinder head. 4. Match the engine controls to the camshaft. The different profile of the camshaft plays havoc with the fuel injection’s standard factory mapping. The ignition timing and mixture requirements of the engine is vastly different to that of a standard engine. The way we would recommend to do this, is to fit a UNICHIP. The engine can be run on a loading type dynamometer, and the engine management system can be reprofiled to match the specific engine’s state of tune. The unichip is perfect for modified engines, because of it’s ability to be reprogrammed whenever needed, i.e. if you decide to make more mod’s, you simply have the unichip reprogrammed to match your new requirements. You don’t have to throw it away like a conventional, old style “chip”. A recent development is the serpentine belt, so named because they wind around all of the pulleys driven by the crankshaft pulley. This design saves space, but if it breaks, everything it drives comes to a stop. The automobile engine uses a metal timing chain, or a flexible toothed timing belt to rotate the camshaft. The timing chain/belt is driven by the crankshaft. The timing chain, or timing belt is used to “time” the opening and closing of the valves. The camshaft rotates once for every two rotations of the crankshaft. The Cylinder Head The cylinder head is the metal part of the engine that encloses and covers the cylinders. Bolted on to the top of the block, the cylinder head contains combustion chambers, water jackets and valves (in overhead-valve engines). The head gasket seals the passages within the head-block connection, and seals the cylinders as well. Push Rods attach the valve lifter to the rocker arm. Through their centers, oil is pumped to lubricate the valves and rocker arms. The flywheel is a fairly large wheel that is connected to the crankshaft. It provides the momentum to keep the crankshaft turning without the application of power. It does this by storing some of the energy generated during the power stroke. Then it uses some of this energy to drive the crankshaft, connecting rods and pistons during the three idle strokes of the 4-stroke cycle. This makes for a smooth engine speed. The flywheel forms one surface of the clutch and is the base for the ring gear. Harmonic Balancer (Vibration Damper) The harmonic balancer, or vibration damper, is a device connected to the crankshaft to lessen the torsional vibration. When the cylinders fire, power gets transmitted through the crankshaft. The front of the crankshaft takes the brunt of this power, so it often moves before the rear of the crankshaft. This causes a twisting motion. Then, when the power is removed from the front, the halfway twisted shaft unwinds and snaps back in the opposite direction. Although this unwinding process is quite small, it causes “torsional vibration.” To prevent this vibration, a harmonic balancer is attached to the front part of the crankshaft that’s causing all the trouble. The balancer is made of two pieces connected by rubber plugs, spring loaded friction discs, or both. When the power from the cylinder hits the front of the crankshaft, it tries to twist the heavy part of the damper, but ends up twisting the rubber or discs connecting the two parts of the damper. The front of the crank can’t speed up as much with the damper attached; the force is used to twist the rubber and speed up the damper wheel. This keeps the crankshaft operation calm. The crankshaft converts the up and down (reciprocating) motion of the pistons into a turning (rotary) motion. It provides the turning motion for the wheels. The crankshaft is usually either alloy steel or cast iron. The crankshaft is connected to the pistons by the connecting-rods. Some parts of the shaft do not move up and down; they rotate in the stationary main bearings. These parts are known as journals. There are usually three journals in a four cylinder engine. The crankshaft is held in place by a series of main bearings. The largest number of main bearings a crankshaft can have is one more than the number of cylinders, but it can have one less bearing than the number of cylinders. Not only do the bearings support the crankshaft, but one bearing must control the forward-backward movement of the crankshaft. This bearing rubs against a ground surface of the main journal, and is called the “thrust bearing.” The connecting rod links the piston to the crankshaft. The upper end has a hole in it for the piston wrist pin and the lower end (big end) attaches to the crankshaft. Connecting rods are usually made of alloy steel, although some are made of aluminum. Connecting Rod Bearings Connecting rod bearings are inserts that fit into the connecting rod’s lower end and ride on the journals of the crankshaft. Factory RPM Range Note the reference to factory RPM range. This is an extremely important concept, and must be clearly understood before starting your improvement project. The factory engines were designed and built to run in a specific RPM range. Their parts were of sufficient quality to run almost indefinitely if the RPM limits were observed. The engines developed maximum power throughout the intended range with the heads, manifolds, cams, and manifolds that were installed. For example, most standard production cars used a large two barrel carb., an #066 cam (also called a #4 in the earlier versions), which is 204 degrees intake duration at .050, and ordinary heads with press-in studs, but having very good low and mid-lift air flow. This combination provides extremely strong low and mid range torque which is exactly what the larger cars with high gears need for good throttle feel and quick response. This type of engine doesn’t develop high horsepower because it will not run much past 4600-4800 RPM and can’t breath enough air at high RPM, but it does develop excellent torque from idle up, and essentially the same total amount of torque as the highest HP engines of the same displacement. The Ram Air IV engine was designed to run to a higher RPM of about 5900. This required more air flow into the engine at higher RPM—thus, the higher flowing heads were incorporated. A longer duration cam was needed to give the cylinders time to fill at the higher RPM. The longer duration cam causes the intake valve to close later in the intake cycle, and this in turn, required more compression. The longer duration cam kills the low RPM power while hopefully extending the upper RPM power. With very poor low end power, a lower rear end gear was needed to provide some semblance of low speed performance. As the engine was so weak at low RPM, power steering and air conditioning were not available, and the engine was available only in the lightest body style vehicles. The result was a higher RPM engine with excellent power from about 3000 to 6000 RPM. This is great for a lighter weight car with a 4-speed, or an automatic with a loose converter for drag racing but it would be a dog in a normal weight street vehicle that needs to be driven from stop light to stop light. So what is the answer for real performance increase? First, determine what RPM range you actually need and intend to use. If you plan to drive the car for some normal transportation, any idle speed over about 650 RPM will be a constant pain with stock converters. If you want good power and throttle response from idle to 3000 RPM (about 70-75 MPH in high gear), don’t install a cam with more than about 210-215 degrees intake duration as measured at .050 lift. Similarly, don’t install a single plane manifold or a carb larger than 750 CFM (except for an 800 Q-Jet) on this type of vehicle. Be wary of the “Performer RPM” manifold, even though it is a dual plane. It definitely degrades low end power, and only begins to help at around 5400 RPM and up. Remember that low-end power is relative to the size/torque of an engine, and that a 455 will have relatively good low-end with an “RPM” but it will still lose power from idle to about 2000 with it! By staying in the factory intended RPM range, your rods, rod bolts, pistons crank, and oil pump are totally satisfactory for any performance use (assuming they are in normal factory condition). The heads, regardless of type, should have first quality valve guides, a valve seat preparation that optimizes low lift air flow, and matching valves. The exhaust seats do not need to be hardened, because you will never load the engine hard enough for a long enough period of time to damage the seats. Even if you somehow manage to do so, this is not a catastrophic event, and the seats could be changed later if needed. After you have determined what RPM range you expect to use, plan accordingly If you will run higher RPM than your present engine was designed for, consider what changes will be needed. If you are thinking of building a race engine, you may need special rods, forged and/or lightened pistons, vastly improved air flow through your heads, a poorer idling cam, higher performance manifold and headers. If you are thinking an engine for race and street, all the stock internal parts are totally satisfactory. “Hotter” ignition systems or components will not improve performance over properly operating factory systems. The factory Q-Jet manifold and carb are adequate and actually superior to any aftermarket setups you can buy. The factory ignition points type or HEI, will easily do the job, although the points system must be properly adjusted and maintained. Stock exhaust or Ram Air type manifolds will work fine, and headers with 1-5/8″ or 1-3/4″ primary tubes can be used if you want to put up with the hassle of leakage, additional noise, poor ground clearance, difficult installation and high maintenance. There are various methods of increasing engine RPM capability. However, increased RPM does not automatically improve acceleration. Each vehicle has unique gearing, weight, and engine power range. For optimum acceleration, the engine should be operated such that it stays in its fattest power band through each gear. For example, if the engine makes good power from 3200 to 5000, it makes no sense to shift at 5500 because you not only lose acceleration from the 5000 to 5500 range, but when you shift to the next gear, the engine will only drop to about 3500, thus losing the power from 3000 to 3500. Regardless of your engine characteristics, you must try shifting at various RPM points to find the best overall point for your combination. Disconnecting the alternator will not usually make a measurable difference in acceleration. The normal electrical load without lights and fans is about 4 amps (for ignition system) and that represents less than 1/4 HP load on the engine. However, disconnecting the alternator drops the available voltage from the nominal 14 to the ambient battery voltage of 12.4. That represents a loss of 11% of available voltage for the ignition, and the high voltage to the plugs will drop by about the same percentage. The disconnect exercise may appear to pay off if the vehicle is run first with the alternator disconnected, and then with it reconnected. Running without the alternator discharges the battery, and when it is reconnected, the alternator will charge as much as 35 amps to recharge the battery, as well as affect the engine. However, testing in the correct sequence will reveal no gain and possibly a loss in acceleration due to the reduction of the high voltage to the plugs. Removing the power steering belt will usually help by several hundredths in the quarter mile. Theoretically, this should not help because there is little if any load on the steering pump while running straight ahead. Apparently, the combination of belt tension and the larger and heavier pump pulley do present a noticeable acceleration load on the engine. The only downside to removing the belt is the harder steering.
<urn:uuid:4bc816fa-8c2a-4b75-aa13-987d62b2f20b>
CC-MAIN-2017-04
http://www.musclecarclub.com/engine/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00546-ip-10-171-10-70.ec2.internal.warc.gz
en
0.941045
6,403
3.734375
4
BUFFALO, N.Y. – Economic well-being for low-income families in the U.S. is often determined by federal measures that establish basic requirements for essentials such as food, shelter and clothing, but a new study by a University at Buffalo research team suggests that such a definition is unrealistically narrow. To help families move out of poverty, the existing perspective of economic well-being and its short-term focus on basic needs should reflect possibilities for long-term stability, including a savings plan, rather than day-to-day survival, says Yunju Nam, an associate professor in the UB School of Social Work. “My co-authors and I developed new measures for savings and asset accumulation that consider lasting economic security,” says Nam, lead author of the study, published online in the Journal of Consumer Affairs. “These measures promote economic development that can help families improve their economic situation, something that current policy inhibits,” she says. Nam says the lack of a savings plan for low-income families is not merely a matter of scare resources. In fact, previous research indicates that it’s a lack of information regarding how much to put away that’s responsible for most families failing to save. Furthermore, current social welfare policies often discourage savings, since public benefits can be cut when a savings account reaches a certain level. The study specifies precautionary, retirement, homeownership and education savings goals. Using data from various sources, the study estimates the monthly savings amount required to meet each goal while considering time (e.g., different saving periods, interest rates and inflation). Those measures are all forward-thinking variables, rooted in present realities but looking toward conceivable futures, Nam says, which respect material living conditions, but also prepare for potentialities, like job loss, and inevitabilities, like retirement. “Depending on the circumstances, we calculated savings between $155 and $572 each month to address all four goals.” No previous asset-based economic measure or set of measures includes all four types of savings, the authors write in their paper. Though these new measures serve as pathways to economic stability, Nam says their practicality can only be realized through related policy development. “That’s the piece the wider public needs to recognize,” she says. Nam hopes the study creates a new awareness for what she says are “much needed changes.” For instance, many states with 529 college savings plans encourage participation through tax-deductions, but the amount of the deduction was arbitrarily set, and fails to encourage participation by low-income families. The current study, however, provides the framework for a more appropriate figure. Many social welfare programs, such as the Supplemental Nutrition Assistance Program, impose asset-eligibility tests under which benefits can also be cut if previously eligible families start building a savings account. “Without these changes, families, especially low-income families, cannot adequately save,” says Nam. “Most of our social welfare policies are based on short-term consumption needs,” she says. “New policies are needed that encourage savings and the estimates provided in our study can be useful to help develop those policies. “If we can recognize that families need to save, and then raise the asset ceiling for benefits, then we can stop trading long-term goals for short-term needs.”.
<urn:uuid:7af590d3-defd-4763-9fbd-f0fd4b6ba62f>
CC-MAIN-2022-33
https://www.lukor.net/2015/09/04/economic-security-requires-new-measures-of-well-being/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00266.warc.gz
en
0.950974
714
2.390625
2
Ultra Wideband (UWB) Technology is the cutting edge technology for wireless communications with a wide range of applications. In Introduction to Ultra Wideband for Wireless Communications UWB principles and technologies for wireless communications are explained clearly. Key issues such as UWB wireless channels, interference, signal processing as well as applications and standardization activities are addressed. Introduction to Ultra Wideband for Wireless Communications provides easy-to-understand material to (graduate) students and researchers working in the field of commercial UWB wireless communications. Problems at the end of each chapter extend the readers understanding of the subject. Introduction to Ultra Wideband for Wireless Communications will also be useful for practicing engineers from industry who deal with the wireless systems that are designed and analyzed with the UWB technique.
<urn:uuid:7fe7e76c-a260-43a5-b177-94e5e8aa79f8>
CC-MAIN-2016-44
http://readrate.com/deu/books/introduction-to-ultra-wideband-for-wireless-communications
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718957.31/warc/CC-MAIN-20161020183838-00436-ip-10-171-6-4.ec2.internal.warc.gz
en
0.927059
151
3.5625
4
.- We’ve had a spate of teen suicides in my hometown recently, and like everyone else, I am worried about it, saddened for those who are gone and saddened for those who remain to somehow find the grace to pick up the pieces. My wife and I always taught our children that no matter how bleak the circumstance, it was temporary. And all their difficulties have to this point proven to be just that. Even problems that originate from bullying. Bullying is a fixable societal problem. And yet we seem uncomfortable when talking about it. If we talk about it. I’m not sure if it has been determined how many of the six recent teen suicides in Midland, Texas, came by kids who were relentlessly picked on, poked at and made fun of by other children who inflate their self-worth and perceive themselves as some sort of higher being than the victim, often someone who can be, but is not always, smaller, meeker, milder and not as brash or outspoken as the bully. This is a story about a 9-year-old kid who was bullied. Save for his parents’ response, nothing was ever done about it. Fortunately, the boy never entertained thoughts of suicide. But that doesn’t mean the incident just magically went away. It was the summer of 1969 and the kid had been baptized in his church a month or so earlier and so he was, in today’s parlance, on fire. So, he decided to be brave and venture out from the walls and protection of his mom and dad, something he had never before done. He and his parents had been many places together, near and far, and so the kid had always felt comfortable in their company. When he finally relented and agreed to attend summer camp, he did so with sweat on his palms and a knot in his throat. But he went anyway, and that was a big step. The kid will never forget the first night of his church-sponsored camp. After spending most of the afternoon alone (he was a shy kid, see), he had dinner with the other campers and at the end of the night the born-again 9-year-old with a new found sense of boldness and adventure returned to his bunkhouse with the others. But that first night’s experience was different for him than it was for the other campers because the kid was a rookie. Some call what happened initiation. Others think of it as hazing. To me, it was bullying. The kid was tossed into the bunkhouse unawares and told to run down the middle aisle. On either side of the aisle were the bunks, upper and lower, of the 30 or so other campers who were there for a week of fun and games and praise and worship. So the kid ran down the middle aisle like he was told. And as he did, he was struck repeatedly with belts. He was hit on the torso, the chest and in the backside more times than he cared to remember. The only thing that exceeded the pain of being struck was the humiliation that came with it. In fact, that stung a lot worse and a lot longer than the belt marks. At the end of the “beltline,” as it was fondly called by his aggressors, were a couple of bigger kids waiting in the bathroom. By this time, the kid was crying. And when he got to the bathroom, the two bigger kids took the new kid, lifted him up and buried his head in a toilet filled with urine. The bigger kids had a good laugh about the fun time they’d just had. For the rookie, the few moments in the aftermath disappeared from his memory; maybe because it was just too embarrassing to have to walk back through the beltline after the fun and festivities were over, knowing that he was on his way to the camp office, humiliated and embarrassed enough to call home and say, “Please come get me.” “Why?” the kid’s mom and dad would ask during the new kid’s call for help. And so he told them, and two hours later the kid’s parents had made the trip from their Dallas-area home and picked up their urine-soaked, belt-licked, born-again son. The parents, like the good parents they were, informed the camp and the officials at the church, and everyone prayed that the incident would be forgotten and forgiven after the offenders were duly tongue-lashed and finger-scolded. But the aftereffects of the incident never really subsided. The kid was never embraced by the group of kids his own age in the church, most particularly by those who swung at him and filled the toilet bowl with their surprise at the end of his long run through the bunkhouse. The kid was scorned and never part of the “in crowd” and he often found himself sitting alone in church or with his parents while the other kids his age bonded together in their own pew. He would, in fact, spend nine more years at the church as he waited for his 18th birthday, but God never really seemed to be there with him. Not sitting next to him, at least. That kid was me.The incident happened in the summer of 1969, several weeks after I was baptized in the church in which my parents raised me. It’s been 42 years since it happened, and although the pain is most certainly gone now, the memories of what happened are not. Did it change my life? Yes it did. After being shunned by others my age for the remainder of the time I attended that church, it closed me down to that way of practicing the faith, although I hold that particular church in no way responsible. In 1983, six years after I last set foot in the church, I met my wife and would warmly embrace — and would be warmly embraced by — the comfort and serenity of the Catholic Church. I was one of the lucky ones, finding a faith that I could call my own after a bad experience in another one. It took awhile, but I can honestly say those who did what they did quite literally never spoke to me again. But pain gave way to new faith and what has been a wonderful life. Not all stories turn out this way. If you know someone who is being bullied, encourage them to step forward and talk about it. When they do, remember: that’s when your job as a supporter of that bullying victim is only beginning. A person being bullied needs someone with them just as much as they struggle through the pain and scorn that will inevitably follow. Pray for people who are the victims of bullying. And be with them. The scars can last a lifetime, and those who bear them need to be guided through their ordeal so that they will outlive the most painful of the memories. Posted with permission from the Catholic Diocese of Wichita, official newspaper for the Diocease of Wichita. Jimmy Patterson is editor and director of communications for the Diocese of San Angelo, Texas.
<urn:uuid:986b9060-90a1-4a39-a6b2-d18bfb1a8743>
CC-MAIN-2017-04
http://www.catholicnewsagency.com/newf.php?url=the-aftereffects-of-bullying-can-last-a-lifetime/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00146-ip-10-171-10-70.ec2.internal.warc.gz
en
0.992297
1,483
1.773438
2
Classic Rias Baixas combination of plush green landscape, stunning Galician architecture and rolling vineyards; seen from the watchtower at the Bodegas Marques de Vizhoja estate in the subzone of Condada do Tea D.O. near the Portuguese border. For centuries, the Galicia region in northwest corner of Spain has been known for its abundance of fresh seafood, gorgeous beaches, plush landscape, and the visual tapestry created by a classic combination of Gothic and Baroque architecture. In short, it’s a region that teases the senses on a daily basis. However, it wasn’t until more recently that that this magnificent maritime area started getting recognition for another one of its treasures: Albariño, one of the world’s most distinctive and delicious white wine grape varieties. Known for its thick skin, green hue and relatively high juice level, the Albariño grape is primarily grown in granite and sandy loam soils in the Rias Baixas area located between the famous monastic city of Santiago de Compostela to the north and the border with Portugal to the south. The region is known for its mild and often damp climate created by its close proximity to the many estuaries or rias where a number of the main rivers of northern Spain flow into the Atlantic Ocean. Thus, to compensate for these wet conditions and the natural vigor of the Albariño grape variety, most of the vineyards are trained with a traditional parra system, a seven-foot high canopy with granite posts quarried locally. This arbor-like system is similar to the pergola system in Italy, which basically allows the vineyard owners to circulate air to avoid mildew and spread the leaves to capture as much sunlight as possible. Overall, there are more than 20,000 individual plots—some as small as only a half an acres—that are planted by over 6,500 farmers located throughout the region. Prior to the rainy season, the majority of the vineyards averaging 15 years or older are picked in early September, when the grape clusters are at their finest levels of sugar and natural acidity. Often surrounded by vineyards, the classic rectangular stone structures called oreos are used to store dried grains during the damp and rainy seasons in Galicia. Rise in Production Granite schist, the typical flat stone found in the soil on the Santiago Riuz estate property in the O Rosal subzone of Rias Baixas. Once in the cellar, the goal of producers who work with these unique grapes is to showcase a balanced amount of fruit, bracing acidity, mouthfeel, and freshness on the finish. Thanks to the integration of new technology in the region over the past two decades, this has been made much easier to do and quality has increased. And as a result, the number of fine producers in the region has more than tripled from 60 in 1990 to 192 in 2005. Yet it wasn’t until just the past decade that the wines from Galicia were widely available to consumers the New World. But that has quickly changing, mainly due to the obvious fact that the region’s biggest export market is to the United States. So much like the great Spanish reds from Rioja, Priorat and Riberia del Duero have gained recognition in the international wine market, the same is true in the white wine category as delectable Albariños from Rias Baixas are now giving the fine Rieslings from Germany or Gruner Veltliners from Australia a run for the money with sommelier and consumers across the America. Sub Zones of Rias Baixas Near the town of Meis in the historic Val do Salnés region, winemaker Ana Quintela at Pazo de Senorans winery stands in front of the organically farmed estate vineyard featuring the traditional pergola-style trellis system and granite posts. Currently, there are five sub zones of within the Rias Baixas denominacion de origen region established in 1988: Val do Salnés, Condado do Tea, O Rosal, Soutomaior, and Riberia do Ulla. Of these specific zones, Val do Salnés is the oldest, largest, and most affected by the cool, wet, and damp conditions cause by the maritime climate. As a result, the wines tend to be soft, round, and often require the most malolactic treatment. The biggest producers in the region are Martin Codax and Condes de Abarei, two ultra modern co-ops that source their fruit from a multitude of different farmers throughout the Rias Baixas region. On a slightly smaller scale is Agro de Bazan, a winery near Villanova that was established in 1992. In retrospect, the winery’s president Manuel Otero-Gudino says that people though they were a bit crazy at the time. “Back then, it was rare to find Albarino listed on labels. There were very few rows of vines and no modern production systems. But since then, it’s been wonderful to watch this momentum change for the better so quickly,” he said. There are many boutique producers in the valley as well. One of them is Pazo Barrantes, a gorgeous winery built into the ancient Creixell palace in 1991 by the owners of Marques de Murrieta Ygay in Rioja. The winery’s main release is Anada, made primarily with fruit grown on the estate directly influenced by the nearby ocean. “It’s not complicated,” said Pilar Jimenez, winemaker since 2000. “We concentrate on making this wine with the best resources that we have at our disposal and a finished products that can showcases the place where it was grown and the unique character of the vintage.” Within the stone walls of a fortress in the coastal resort town of Cambodos, Palacio de Fefinanes is another boutique winery established in 1904. According to proprietor Count Juan Gil Gonzalez de Careaga, who began the commercial venture at the winery in 1985, the key to the Fefinanes brand is purity. “In the 1950s the family would call the wine ‘Galicia’s Mosel’. Today, it’s more about this specific region and making elegant, high-quality wines people can enjoy on a regular basis,” he said. To make this happen, the winery procures Albariño grapes from over 50 separate old vine growers. After being picked at the relatively low sugar level of 22 brix, each vat of grapes is cold fermented at 16 degrees in stainless steel and converted to wine with natural yeast. As a result, this process gives winemaker Christina Mantilla a flavorful matrix of separate batches to choose from to make a final product that is both homogenous and approachable upon release. In the slightly warmer regions to the south, Albariño is often blended with Treixadura Loureiro or Caino Blanco, indigenous white wine grapes from the region. To the east, the mountainous Condado do Tea sub zone is highlighted by a much warmer climate conditions and soils that feature a combination of granite, slate and pebbles that rest on lighter granite subsoils. This region is across the Miño River from Portugal, where the grape is called Alvarinho. One of the first commercial producers in this region is Marques de Vizhoja, an enchanting winery started in 1966 by Mariano Pelaez, an innovative visionary smitten by his love for white wines made with the unique Albariño grape variety. In addition to being the first to print the name of the varietal on his labels, Palaez has also marketed the wine on billboards across Spain since the mid 1970s and was the first to use stainless steel tanks in the region beginning in 1982. Today, Palaez and his family bottle a number of different wines that meet the needs of a wide range of consumers. “Not only do we want to show the uniqueness of the Condado do Tea region and the special grapes we use, but to make wines that can match up well with many different types of expressive cuisine and fun times with friends or family,” said Palaez. Wine maverick Mariano Pelaez, proprietor of Bodegas Marques de Vizhoja, the first premium winery in Galicia to print the grape variety Albariño on its labels in the 1960s; seen here with son Jorge, the winery’s head of sales and exports. Photo 73: At Santiago Ruiz in the O Rosal subzone, from left: founding family member Rosa Ruiz, head winemaker Buenaventura Lasanta, and oenologist Luisa Freire. Similar styles can be found further west along the Miño River in O Rosal, a gorgeous winegrowing region highlighted by a mixture of fluvial soils consisting of slate stone, granite schist and iron-rich deposits. It is here that the Santiago Ruiz winery was established in 1892. Today, the winery’s annual production is 125,000 bottles, 25% of which is exported to the United States. Its main brand—a blend of Albariño with smaller parts of Loureiro and Caino Blanco—features a label that looks like an endearing treasure map that leads to, you guessed it, O Rosal. “We look at this as a distinctive product with a lot of history,” says head winemaker Buenaventura Lasanta. “Each vintage is a step forward to establish the brand, its identity, and the true personality of the region in the marketplace.” Another fine producer in the region is Terras Gauda, a winery that produces fabulous Albarino-based wines with touches of Caino Blanco and Loureiro, both of which add more meaty character, depth, and a rounder mouthfeel to the finished product. However, unlike many of the other producers in Rias Baixas, the winery is also daring enough to grow most of their vines on modern trellis systems that feature verticle shoot positioning instead of the more traditional parra system. “It’s more risky, but worth it!” explains winemaker Emilio Rodriguez Canas. On the gastronomical side, Albariños from the 2005 vintage pair nicely with spices, salsas, olives, shellfish, grilled fish, white meats, classic Spanish ham and medium-bodied cheeses. They also work great served chilled as aperitifs or by themselves in the afternoon or evening during the warmer months. In a nutshell, these new, provocative white wines from Galicia have quickly become liquid delicacies that can stimulate the senses. Even better, now that new releases are becoming readily available, you can try them for yourself and share them with other wine lovers on a regular basis. Pincher prawns, one of the many seafood delicacies enjoyed in Rias Baixas, the seafood capital of Spain, as seen here served at Condes de Albarei, a co-op winery in the Val do Salnés region. Rias Baixas Mon-Tues 034 In the historic Val do Salnes region, the birthplace of Albariño, Wine Director Jesus Alvarez and President Manuel Otero-Gudino of Agro de Bazan winery. Rias Baixas Mon-Tues 075 Classic Albariño vineyard row featuring a traditional seven-foot high pergola-style trellis system with granite posts quarried locally.
<urn:uuid:00bf8276-9228-449f-8082-a7eff41e2bfa>
CC-MAIN-2016-44
http://www.tastingpanelmag.com/News/Wine-Education/2006/Albarino-The-Great-White-of-Spain.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718285.69/warc/CC-MAIN-20161020183838-00106-ip-10-171-6-4.ec2.internal.warc.gz
en
0.943667
2,456
1.703125
2
Why the Nuclear Stockpile Is Still Relevant NSS Interviews Brigadier General Sandra Finan Air Force Brigadier General Sandra Finan paid LANL a return visit in June of this year. Finan assists the Deputy Administrator for Defense Programs, National Nuclear Security Administration (NNSA), in directing the Stockpile Stewardship Program. This program is responsible for maintaining the safety, security, and reliability of the nation’s nuclear deterrent. Finan also oversees the NNSA’s Military Academy Collaboration (MAC) program. The MAC program gives top cadets and midshipmen at the U.S. military academies (West Point, Army; Annapolis, Navy; Colorado Springs, Air Force; Kings Point, Merchant Marine; and New London, Coast Guard) the opportunity to do a summer internship at LANL in the Lab’s Service Academy Research Associates (SARA) program. (Internships are also available at other NNSA sites.) This summer’s SARA program hosted 17 interns: 1 Army cadet and 16 Navy midshipmen. During her visit, Finan received updates on the Laboratory’s weapons programs, toured key facilities, and met with the interns to get a first-hand understanding of how the program was working. National Security Science (NSS) interviewed Finan. The interview has been condensed and edited. NSS: What would you like to tell our readers? Finan: My main message is that the nuclear deterrent is still relevant to national security. While additional reductions to the nuclear stockpile are possible, they must be done thoughtfully and judiciously and be based on current and anticipated threats—because if we keep cutting it, it can get so small that it’s not going to be a deterrent. Also, the nation needs to take action today—to invest in the science and technology that ensure the nuclear deterrent is safe, secure, and effective now and into the future. The work Los Alamos performs is essential to that endeavor. NSS: Why do you think some folks don’t believe the nuclear stockpile is still relevant? Reductions to the nuclear stockpile are possible, but if we keep cutting it, it’s not going to be a deterrent. Finan: Primarily it’s the absence of the threat of the Soviet Union and the rise of terrorist threats. Terrorists probably wouldn’t be deterred by the threat of U.S. nuclear weapons. There’s a thought that our biggest threats today are really not from a nuclear exchange but from the “suitcase bomb” scenario, or from terrorists getting their hands on nuclear materials to make a dirty bomb. Of course, while terrorists might not be deterred by the threat of U.S. nuclear weapons, nation states that might aid terrorist organizations can be deterred. And something that many people don’t see is that our nuclear deterrent really is about world nuclear stability. You want your deterrent force to create that stability. Right now, the United States is committed to using its “nuclear umbrella” to protect dozens of allies from attack, allies like Japan and South Korea, which are fearful about North Korea and its nuclear weapons program. The United States’ decades-old commitments reduce the incentive for other countries to develop their own nuclear deterrent. As the United States reduces the number of its nuclear weapons, some of our allies may see the nuclear umbrella shrinking to the point that they no longer feel protected. Even if we say we can still protect them, these allies might not believe it. These allies’ perceptions and beliefs are important—it’s not what we say that counts, it’s what they believe. And our allies are also concerned about the reliability of aging U.S. nuclear weapons. Without the United States openly testing its weapons so our allies see that they still work reliably and effectively, we need to show strong scientific and technological efforts to keep the weapons operational, as well as keeping adequate funding for those efforts. Again, perceptions and beliefs are critical. If there’s diminishing faith in the reliability and effectiveness of our smaller nuclear arsenal, more nations may feel compelled to create their own deterrent—their own nuclear weapons programs. NSS: Wouldn’t that be an enormous undertaking for most nations? Finan: Yes. But many U.S. allies have the capability to develop their own nuclear weapons programs, and some could do so very rapidly. Ironically, by continuing to reduce its stockpile while not investing enough in the science and technology required to demonstrate that the remaining stockpile is good to go, the United States could be increasing the nuclear risk around the world rather than reducing it. The result could be many more nations developing and fielding nuclear weapons. In addition, allies who become nuclear powers for fear of being unprotected could someday, for any number of reasons, become U.S. competitors. In that scenario, these ex-allies could then become incentivized to build increasing numbers of nuclear weapons to compete with the U.S. stockpile. So again, reducing the size of the U.S. deterrent could result in a world with far more rather than fewer nuclear weapons. As the United States contemplates reducing its nuclear deterrent, and as it debates funding the Stockpile Stewardship Program, all the risks and possibilities need to be analyzed. What stockpile numbers are the “best” is up for debate, and the debate should be about not just what we need for deterrence but also what we need to help stop the spread of nuclear weapons. This is why I say the U.S. nuclear deterrent isn’t just about preventing an attack, it’s much broader: it’s about maintaining world nuclear stability. NSS: Let’s turn to the MAC program. What are that program’s goals and objectives? Finan: The number one goal is to create future leaders—and not just for the military because many have new careers, including in politics, after they leave the service. These kinds of leaders need to understand what goes on at the U.S. nuclear science labs. They need to understand all they can about the technology of the nuclear deterrent force, as well as the concepts behind nuclear deterrence. But they also need to know that labs like Los Alamos, in addition to working on nuclear weapons, solve all kinds of problems like those in energy security, prevention of terrorism, climate change. Leaders in public service need to know they can come to the labs to get the answers they need to meet lots of different challenges. So by involving our cadets and midshipmen—our future leaders— in the MAC program, we give them a very early exposure to all that the labs can do, as well as to the importance of nuclear deterrence. We’ve got to keep the “leadership pipeline” full with talented people who know where to turn to find answers. They’re our future. NSS: The Lab spends a lot of time looking over student applications for the SARA program and making sure there’s a good fit between what they do here and what their interests and academic goals are. This year’s interns worked in fields as diverse as computational physics, high-explosives science, and civilian nuclear science. Finan: It’s certainly more than a little bit outside the normal military cadet experience! The SARA cadets get an opportunity to experience and contribute to ongoing scientific and weapons activities at the Lab. It’s real work with important consequences. One of them may come up with an idea that changes how we do military operations. And the seed of that idea will have been planted at Los Alamos. NSS: What would you use as a measure of success for the MAC program here? Finan: I think that we’ve accomplished our mission when we build leaders who understand and appreciate the breadth of science, technology, and engineering enterprises at Los Alamos. We want them to be able to speak about the incredible work that’s done here to support not only the nuclear deterrent but so many other national security needs as well. Micah Dose, a midshipman at the U.S. Naval Academy and a SARA intern in the Laboratory’s ARIES program, peers inside the glovebox where plutonium pits are disassembled at Los Alamos. ARIES is the only program in the nation that disassembles and destroys surplus plutonium pits. The pits are transformed into plutonium oxide powder suitable for being made into fuel for civilian nuclear reactors. (Photo: LANL) In this issue... - More on this article: Sometimes You Start with Tea: Inside an IAEA Inspection
<urn:uuid:9680bce2-7592-455e-bdaf-05663bcbbc15>
CC-MAIN-2017-04
http://www.lanl.gov/science/NSS/issue2_2012/story7full.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00045-ip-10-171-10-70.ec2.internal.warc.gz
en
0.944941
1,813
1.757813
2
When is it too late to get an abortion? The answer to your question depends a lot on what state you live in. Different states have different laws about how late in a pregnancy you can get an abortion. The staff at your local Planned Parenthood health center can help you figure out how the laws in your state affect you. Regardless of where you live, you can only get a medication abortion (also known as the abortion pill) if you’re less than nine weeks pregnant. If you’re farther along than nine weeks, you’ll need to get an in-clinic abortion. Abortion is a safe and common medical procedure, but as with any medical procedure, there are some risks. And these risks increase the longer you’re pregnant. So if you’re thinking about abortion, you should make an appointment as soon as possible to talk about your options.
<urn:uuid:e926e0c7-a29f-4bd3-b04f-ee76149ccd47>
CC-MAIN-2022-33
https://www.plannedparenthood.org/learn/ask-experts/when-is-it-too-late-to-get-an-abortion
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00678.warc.gz
en
0.956321
183
2
2
Ah, spring -- time to oil up the ol' mitt for some baseball, scrape the gunk off the grill for some barbecue, stock up on Claritin for some allergies, and of course, for some spring cleaning. Sure, you could round up the Tribble-sized dust bunnies from beneath your desk and get rid of that half-empty soda can that's become a breeding ground for a strange new life-form. But it's also a great occasion to tackle a bigger mess: all that old, unused IT equipment. An office can become a veritable wasteland of superfluous computers, monitors, printers, portable devices, and the like. Sure, it might be easy to ignore all that clutter, but you may be pleasantly surprised by just how rewarding it can be to gather up that old gear and either put it to good reuse or dispose of it -- in a secure and environmentally friendly way, of course. To begin, it's likely your organization is wasting precious dollars to power machines that simply aren't being used. Old computers and monitors could be sitting in uninhabited offices or cubicles, draining power and collecting dust. An idle daisy-wheel printer might be sitting ignored, yet powered up, in the copy room beside the shiny new MFP. Just how much of a difference can these electricity vampires make on your electric bill? Consider this: Health care company GlaxoSmithKline managed to collect some 5.8 tons of old IT equipment last year from two of its office buildings in Philadelphia. According to the company, simply unplugging all of that old gear reduced annual energy consumption by 190,442 kWh, which adds up to $21,000 in annual cost savings -- not to mention the associated reduction in greenhouse gas emissions. The potential savings don't end there: Not all the PCs you find will be of the pre-Windows 3.0 variety. It's possible you'll discover computers that are perfectly fine to meet the needs of end-users who are due for an upgrade. Voila! You've spared your IT budget a hit by not purchasing a new machine. Then again, you may find machines that are of no use to anyone at your organization. Even so, there's a chance to reap rewards for your IT clean-up effort. For starters, there's a market for pre-owned IT gear. Hardware vendors like HP and Sun will give you cash and/or trade-in credit for old equipment. You might also consider turning to a third-party ITAD (IT asset disposal) provider like Intechra and PlanITROI, who can help you figure out the value of your gear, then sell it for you at a negotiated price. (ITAD providers can also assist in responsibly recycling those electronics that can't be reused. I'll get to that in a moment.) [ Learn how to choose the right ITAD provider to meet your organization's needs. ] An alternative to selling unwanted IT gear is to take the philanthropic path and donate it to a local school, nonprofit, or charity. It's a great investment in the community, plus there's some financial reward. For example, according to Earth911.com, "the Taxpayer Relief Act of 1997 states that companies that donate personal computers to schools qualify for an enhanced charitable deduction benefit. It also expands tax incentives for private companies that donate computer technology, equipment or software to K-12 classrooms." Earth911.com points to several sources of additional information and assistance in donating gear to schools and community groups. Among them: the Electronics Industry Alliance, a national trade organization that includes the full spectrum of U.S. electronics product manufacturers. The group maintains a listing of organizations throughout the United States that accept donations of electronics products. There's also a chance that some of the equipment you find just isn't suited for reuse. In that case, recycling is the ideal, Earth-friendly route. For starters, e-cycling recovers valuable materials, such as metals, copper, and engineered plastics, all of which require considerable energy to process and manufacture. According to the EPA, recycling 1 million desktop computers prevents the release of greenhouse gases equivalent to the annual emissions of more than 17,000 passenger cars. Additionally, properly recycling old electronics, rather than tossing them in landfills, helps reduce toxic pollution. PCs and monitors, especially old ones, contain a multitude of hazardous substances: lead, which can cause brain and kidney damage in children; mercury, which can cause nervous system and kidney damage; and cadmium, BFRs (brominated flame retardants), and PVC (polyvinyl chloride), which are known to cause health problems like cancer, respiratory illness, and reproductive damage and are able to accumulate in the human body and travel long distances through air and water when not disposed of properly. Finally, whether you're reselling, donating, or recycling old equipment, data security needs to be a top priority. It's possible that the machines you're disposing of contain sensitive information that can land your organization in a heap of trouble, both with the public and the law, if it falls into the wrong hands. The last thing you want is for proprietary secrets or legally protected client data -- credit card numbers, medical records, Social Security numbers -- to fall into the wrong hands. Here, you have options. You can wipe the machines in-house using applications such as DBAN (Darik's Boot and Nuke), Active@KillDisk, or BCWipe. Alternatively, you can make sure that the organization you select to buy back or recycle your gear provides a thorough data-wipe service. Cleaning up your company's IT clutter can indeed by a rewarding endeavor: You can save some money, free up space, reduce your organization's environmental impact, and do some good for your local community. Just be mindful of the potential security pitfalls.
<urn:uuid:d16ac690-9f59-4af6-96a5-f44262e2d921>
CC-MAIN-2017-04
http://www.infoworld.com/article/2632090/techology-business/spring-clean-your-it-gear.html?page=2
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281419.3/warc/CC-MAIN-20170116095121-00483-ip-10-171-10-70.ec2.internal.warc.gz
en
0.945475
1,205
1.75
2
|The Eurasian collared dove (Streptopelia decaocto) is a typical and widespread member of the collared doves| Around 15, see text. Streptopelia is a genus of birds in the dove family. The name Streptopelia is from Ancient Greek streptos, "collar" and peleia, "dove". These are mainly slim, small to medium-sized species. The upperparts tend to be pale brown, and the underparts are often a shade of pink. Many have a characteristic black-and-white patch on the neck, and monotonous cooing songs. The heartland of this genus is Africa, but several species occur in tropical southern Asia. As a group, this genus is highly successful; many species are abundant in a range of habitats in the tropics, and two now have a much more extensive distribution. The Eurasian collared dove, Streptopelia decaocto, naturally expanded out of its original range of the warmer temperate regions from south east Europe to Japan to colonise the rest of Europe, reaching as far west as Great Britain by 1960, and Ireland soon after. It has also been introduced into the US and, as of 1999 it had been reported from 22 states and was still spreading rapidly. The spotted dove, S. chinensis (probably better placed in Spilopelia, see below), is an abundant and ubiquitous resident breeding bird in tropical southern Asia, but it has been introduced to the US, Hawaii, northern Indonesia, Australia and New Zealand. A DNA sequence analysis has concluded that the genus consists of three distinct lineages. One contains the laughing dove and the spotted dove, which have long been recognized as having distinct morphology and behavior. The second group contains most of the other species, except the Madagascar turtle dove and the pink pigeon, which appear to be the surviving species of an endemic Madagascar/Mascarenes radiation and have at times been placed in other genera. The two-species lineages appear to be each other's closest relatives and cannot be firmly assigned to either Columba or Streptopelia (although overall they seem to be close to the latter). Thus, it might be best to split the two minor lineages off as distinct genera, namely Spilopelia for the first (which has priority over Stigmatopelia) and Nesoenas for the last. - Eurasian collared dove or collared dove, Streptopelia decaocto - Barbary dove Streptopelia risoria (domesticated; taxonomic status doubtful) - African collared dove, Streptopelia roseogrisea - European turtle dove Streptopelia turtur - Oriental turtle dove Streptopelia orientalis - Dusky turtle dove, Streptopelia lugens - Adamawa turtle dove, Streptopelia hypopyrrha - Island collared dove, Streptopelia bitorquata - Philippine collared dove, Streptopelia dusumieri - White-winged collared dove, Streptopelia reichenowi - Mourning collared dove, Streptopelia decipiens - Red-eyed dove, Streptopelia semitorquata - Ring-necked dove, Streptopelia capicola - Vinaceous dove, Streptopelia vinacea - Red turtle dove, Streptopelia tranquebarica - Laughing dove Spilopelia senegalensis (sometimes separated as Stigmatopelia) - Spotted dove Spilopelia chinensis - Madagascar turtle dove, Nesoenas picturata - †Rodrigues pigeon, Nesoenas rodericana - extinct (before 1690?) - Pink pigeon, Nesoenas mayeri - †Réunion pink pigeon, Nesoenas duboisi - extinct (c.1700) - Jobling, James A (2010). The Helm Dictionary of Scientific Bird Names. London: Christopher Helm. p. 367. ISBN 978-1-4081-2501-4. - Johnson, Kevin P.; de Kort, Selvino; Dinwoodey, Karen, Mateman, A. C.; ten Cate, Carel; Lessells, C. M. & Clayton, Dale H. (2001): A molecular phylogeny of the dove genera Streptopelia and Columba. Auk 118(4): 874-887. |Wikimedia Commons has media related to Streptopelia.| Media related to Nesoenas at Wikimedia Commons Media related to Spilopelia at Wikimedia Commons
<urn:uuid:20f0d8a9-c25f-4047-9080-5298c6479d9a>
CC-MAIN-2017-04
https://en.wikipedia.org/wiki/Turtle_dove
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00393-ip-10-171-10-70.ec2.internal.warc.gz
en
0.839649
987
3.140625
3
Distance from Breda to Alblasserdam Distance from Breda to Alblasserdam is 32 kilometers. This air travel distance is equal to 20 miles. The air travel (bird fly) shortest distance between Breda and Alblasserdam is 32 km= 20 miles. If you travel with an airplane (which has average speed of 560 miles) from Breda to Alblasserdam, It takes 0.04 hours to arrive. Breda is located in Netherlands. |GPS Coordinates (DMS)||51° 35´ 11.6160'' N | 4° 46´ 33.4560'' E Breda Distances to Cities |Distance from Breda to Amsterdam||88 km| |Distance from Breda to Alkmaar||116 km| |Distance from Breda to Best||44 km| |Distance from Breda to Amstelveen||80 km| |Distance from Breda to Aalten||130 km| Alblasserdam is located in Netherlands. |GPS Coordinates||51° 51´ 56.9880'' N | 4° 39´ 39.9960'' E Alblasserdam Distances to Cities |Distance from Alblasserdam to Aalten||132 km| |Distance from Alblasserdam to Aalsmeer||44 km| |Distance from Alblasserdam to Ypenburg||28 km|
<urn:uuid:d5ac5430-5c22-4d7b-8368-b46c9fa0fc73>
CC-MAIN-2017-04
http://www.distancefromto.net/distance-from-breda-nl-to-alblasserdam-nl
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00327-ip-10-171-10-70.ec2.internal.warc.gz
en
0.791899
316
2.140625
2
This image (click to embiggen, click here to embiggen A LOT) was stitched together from photos taken by NASA’s Suomi NPP satellite. It shows the Arctic in all its glory — or anyway, all its remaining glory. The ice cover there has been decreasing fast enough that within 20 years, a photo of the Arctic taken at this time of year would show no floating sea ice at all. In fact, the ice is disappearing even faster than predicted. Ice-free summers were supposed to begin sometime between 2070 and 2100; now 2030 is looking more realistic. So you know, enjoy this picture while it lasts. Stunning View of Arctic Could Be Last of its Kind, Smithsonian. Get Grist in your inbox
<urn:uuid:bd670f5d-726e-4f3c-a54a-40f6c1663ea9>
CC-MAIN-2016-44
http://grist.org/climate-change/look-at-this-picture-of-the-arctic-now-because-its-probably-your-last-chance/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988722459.85/warc/CC-MAIN-20161020183842-00344-ip-10-171-6-4.ec2.internal.warc.gz
en
0.971081
155
2.546875
3
Get to know St Kitts on this train and bus extravaganza. First up is a ride on the island’s Scenic Railway. The railroad was built almost a century ago to carry sugar canes from the fields to the sugar mill in Basseterre. These days, the double-decker trains are just a nice way of seeing the island. Take a seat for some great views as you chug past the sprawling fields, volcanic peaks and leafy forests of the north coast. On the lower level deck there will be music from the Scenic Railway Choir. The second part of your tour sees you board a tour bus for a drive along the south coast. Important landmarks lie around every corner here. Look out for the Brimstone Hill Fortress, Middle Island – once home to Thomas Jefferson’s great-grandfather – and neighbouring Nevis, birthplace of the first Secretary of the US Treasury. Tick off the top sights of St Kitts on this ‘Best of’ tour. First up is a drive through the island’s capital, Basseterre. Home to the National Museum and Independence Square, it’s jam-packed with history. Your guide will point out what’s what, and fill you in on St Kitts’ chaotic past. You’ll head up the coast to the Brimstone Hill Fortress, the Caribbean’s answer to the Tower of London, it’s all old-world turrets and cannons. But the best thing about this place is the views. The fortress sits on top of 38 acres of limestone, so you can see as far as neighbouring Saba, St Eustatius and St Barts. Leaving Brimstone Hill, you’ll make your way to Romney Manor for the last stop of the day. This 18th-century estate is spread over eight acres, and is home to the famous Caribelle Batik. Watch artists create works of art from wax and fabric. Then wander through peaceful botanical gardens before heading back to the ship. You’ll get a real flavour for the history of St Kitts on this half-day tour. On the drive to your first stop, Romney Manor, you’ll pass by the Bloody River. It earned this name because it was the site of a major battle in the 16th century. When you get to Romney Manor, your guide will show you around. The 12-acre property features beautiful gardens as well as local artworks. Next, you’ll briefly stop at the tomb of Sir Thomas Warner – an English explorer who settled in St Kitts during the 16th century. You’ll then get to visit the Brimstone Hill Fortress National Park. Because it’s perched on top of a hill, and 750 feet above sea level, you’ll have great views of the coastline, countryside and five neighbouring islands. Your trip will end at Fairview Great House. Here, you’ll get to learn about life on the island during colonial times, and wander through the dining room, with its 16-seat, mahogany dinner table and antique silverware. Our top deals tailored to you, straight to your inbox Sign up for offers More from TUI About TUI MyTUI app Cookies Notice Manage Cookie Preferences Privacy Notice First Choice Credit card fees Media Centre Travel Jobs Affiliates App Store for Ios Google Play Store Travel Money Holiday Budget Calculator TUI Group Website Terms & Conditions Holiday Brochures Holiday Weather The Foreign & Commonwealth Office and National Travel Health Network and Centre have up-to-date advice on staying safe and healthy abroad. For the latest travel advice from the Foreign & Commonwealth Office including security and local laws, plus passport and visa information check www.gov.uk/travelaware and follow @FCOtravel and Facebook.com/FCOtravel More information is available by checking /destinations/info/travel-aware Keep informed of current travel health news by visiting www.travelhealthpro.org.uk The advice can change so check regularly for updates. All the flight-inclusive holidays on this website are financially protected by the ATOL scheme. When you pay you will be supplied with an ATOL Certificate. Please ask for it and check to ensure that everything you booked (flights, hotels and other services) is listed on it. If you do receive an ATOL Certificate but all the parts of your trip are not listed on it, those parts will not be ATOL protected. Some of the flights on this website are also financially protected by the ATOL scheme, but ATOL protection does not apply to all flights. This website will provide you with information on the protection that applies in the case of each flight before you make your booking. If you do not receive an ATOL Certificate then the booking will not be ATOL protected. Please see our booking conditions for information, or for more information about financial protection and the ATOL Certificate go to: www.caa.co.uk. ATOL protection does not apply to the other holiday and travel services listed on this website.
<urn:uuid:36300f5b-665d-45ad-8f88-295a2866b55d>
CC-MAIN-2022-33
https://www.tui.co.uk/cruise/caribbean/basseterre-port/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00471.warc.gz
en
0.908009
1,083
1.578125
2
Ephesians 6:4 (ESV) Fathers, do not provoke your children to anger, but bring them up in the discipline and instruction of the Lord. In a somewhat intense discussion with one church leader I recently made a statement that was met with shock and denial. In the context of conceding to the “bigger must be better mentality,” and with little or no focus on biblical accountability I said, “It appears some Church leaders are more concerned with butts in the seat and dollars in the plate.” If we truly love God and the people we serve then shouldn't we be concerned with true biblical discipleship? Are we in fact doing things in the Church by God’s design? About three years ago I read “Pagan Christianity” by Frank Viola and George Barna which challenged my own thinking about how we “do church” today. I wasn't raised in a Christian home, and so when I entered the ministry I assumed a lot of the way we do things in the Church to be biblical. I don’t believe those I looked to in the early years meant to mislead me or anyone else. I do believe, however, these leaders simply followed the patterns others before them had followed. Through the modern era we have systematically separated the family within the Church by age and preference. In order to experience a greater sense of “worship” we place our children in “Children’s Church,” and our youth in a “Youth” program. We've developed a mentality which is destructive to the family and Church by adopting the belief; “Our youth are the future of the Church.” The reality is that children and youth who have accepted Christ are part of the Church today. The Scriptures indicate a family integrated form of worship, yet the Church seems to have taken a different direction. In order to be seeker sensitive and “family-friendly” we've incorporated many worldly customs in order to draw a crowd rather than equip the Church to carry out one of Her first missions – biblical education in the home. I think we've placed our youth in a precarious position by providing separate worship experiences, meeting places, times, and event driven activities which appeal to a more secular mindset. By segregating our young people from their parents we've created an atmosphere which is more destructive than helpful. The Church has taken a position of leading our children that does not rightly belong to her. The greatest teachers a child should have are Christian parents and in particular Christian fathers. How was I wrong? I was wrong because at one time I supported the bigger is better and multi-program ideas without giving them much thought. The video below is entitled, “Divided the Movie”, and is fifty-four minutes long. I highly encourage you to watch this video, or simply listen to it while you surf the web. I truly believe you’ll find it beneficial and eye-opening.
<urn:uuid:7b0dd816-2f4d-46d4-a2d3-1ab79301299c>
CC-MAIN-2022-33
https://www.rod-west.net/just-thinking/archives/08-2013
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00265.warc.gz
en
0.968411
624
1.515625
2
New 7 week Training program for the City-Bay Fun Run. One of the most crucial things in being successful at distance running is to run the race evenly. To get the very best result, each kilometre should be run at the same pace or close to it. Beginner runners could perhaps aim for either a 60 minute race or say a 72 minute race. To establish your race pace per km you divide the number of minutes you hope to run the race in by 12. So as an example, 60 minutes divided by 12 = 5 minutes. This is 300 seconds. Next divide this by 10 and you establish your race pace is 30 seconds per 100 metres. You need to practice your race religiously. If you live in a quiet street you may be able to measure out a 100 metre distance there. If not a trotting track, athletic track, football oval or parklands will be ok. Each kilometre is accurately signposted so you will find it easy to keep a check on your race pace. If you adopt a training program such as this and stick to the race pace plan you are likely to run the best race you are capable of.
<urn:uuid:1a7f4978-d34f-493c-8f68-e24e37e595c5>
CC-MAIN-2022-33
https://city-bay.org.au/training/runners/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00278.warc.gz
en
0.947867
237
2.25
2
Which Joe gave his name to ‘sloppy joes’? We look at five interesting sandwiches and their lexical origins. Mark or cover with a large number of small spots or patches of colour:‘the designer whose trademark is to bespeckle his dresses with diamonds’ dot, stipple, stud, bestud, fleck, speckle, bespeckle, spot, pepperView synonyms - ‘Slices of black bread like placemats irregularly bespeckle the dining room floor.’ - ‘He delighted to play at draughts with an albino chief whose light skin was profusely bespeckled with brown blotches and whose eyes were dull blue.’ - ‘Commentators failed to agree on whether her dress was the work of Dior or the Lebanese designer Elie Saab, whose trademark is to bespeckle his dresses with diamonds.’ - ‘Last year in the Czech Republic, Prague was bespeckled with ads for a new hypermarket called Cesky Sen (Czech Dream).’ - ‘Have you so quickly forgotten those boys at the mews, of not enough years even for hairs to bespeckle their chins?’ - ‘We parked a block away, ran up to the lawn, and proceeded to bespeckle their lawn with plastic cutlery.’ - ‘He's bespeckled in piercings, he's wearing a spiked dog collar, a leather jacket and, to top it off, he's been injured in a skating accident!’ We take a look at several popular, though confusing, punctuation marks. From Afghanistan to Zimbabwe, discover surprising and intriguing language facts from around the globe. The definitions of ‘buddy’ and ‘bro’ in the OED have recently been revised. We explore their history and increase in popularity.
<urn:uuid:e43286a9-791b-4df8-879a-be12a664b235>
CC-MAIN-2017-04
https://en.oxforddictionaries.com/definition/bespeckle
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00237-ip-10-171-10-70.ec2.internal.warc.gz
en
0.963931
416
1.96875
2
DNC on Anniversaries of Landmark LGBTQ Victories at the Supreme Court June 26, 2020 DNC Chair Tom Perez and LGBTQ Caucus Chair Earl Fowlkes released the following statement on the anniversaries of the Supreme Court’s decisions in Obergefell v. Hodges, United States v. Windsor, and Lawrence v. Texas: “Five years ago, the Supreme Court recognized the inherent dignity in every person and expanded marriage equality to all Americans. This decision joined a host of landmark victories for LGBTQ+ equality handed down during Pride Month, most recently recognizing the right to work free of harassment and discrimination. We live in a more just, equal, and fair society today thanks to the activism of LGBTQ+ people across the United States who spoke their truth, challenged the status quo, and refused to back down. “We still have a long way to go on the path toward full equality, especially in the fight to protect and defend the most vulnerable, including trans women of color, LGBTQ+ homeless youth, and others who face discrimination and life-threatening bigotry. You don’t have to look far to see that intolerance personified at the highest levels of our government: Trump’s administration has stripped away rights for and effectively legalized discrimination against LGBTQ+ Americans in education, health care, housing, and the military. Just two weeks ago, the Republican National Committee endorsed a platform that calls for overturning gay marriage and legalizing anti-LGBTQ+ discrimination. It is impossible to imagine the same White House Donald Trump now resides in once lit up in rainbow colors to celebrate the advancement of equality for all. “We must elect Joe Biden to restore the federal government’s moral leadership and champion LGBTQ+ rights. Vice President Biden is an unshakeable ally of the LGBTQ+ community and his call for marriage equality was historic. As president, he will expand protections from discrimination by signing the Equality Act, enforce civil rights laws, support LGBTQ+ youth, and combat violence against transgender and gender non-conforming people. He had the LGBTQ+ community’s back on marriage, and he will have their back as president.”
<urn:uuid:3dee1bce-edd1-49f7-8f09-2a931669234f>
CC-MAIN-2022-33
https://democrats.org/news/dnc-on-anniversaries-of-landmark-lgbtq-victories-at-the-supreme-court/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00465.warc.gz
en
0.946999
441
2.015625
2
This web page is a companion to: Tamara Gibson (Kolda), Dianne P. O'Leary, and Larry Nazareth, "BFGS with Update Skipping and Varying Memory", Technical Report CS-TR-3663, Department of Computer Science, University of Maryland College Park, 1996. Also listed as Technical Report UMIACS-TR-96-49. The L-BFGS with variations subroutine may be used in any program. We have also included the linesearch that we used, needed blas subroutines, and a sample Makefile. Additionally, you may want to interface L-BFGS with variations with the CUTE testing environment for optimization software. We have also included directions and extra needed files for this. The following two maple notebook files correspond to examples given in Section 2. Both examples are performed in exact arithmetic. You have the option of either downloading the original MAPLE notebooks or viewing the output text generated by the notebooks. The first notebook implements limited-memory DFP with limited-memory constant M=1 on a simple three-dimensional quadratic function. Even after 20 iterations, the algorithm does not terminate. In contrast, limited-memory BFGS with M=1 would terminate in three iterations or less. The second notebook implements limited-memory BFGS with limited-memory constant M=1 and skips every other update of the quasi-Newton matrix. We use a three-dimensional example and show that even after 20 iterations, the algorithm has not terminated. In contrast, full-memory BFGS with update skipping would terminate in at most seven iterations. The file results.mat is a mat-file which can be read into MATLAB by the command load results. It contains the following variables: exp1 = '-DVARYMG=0' size1 = 10 EXTROSNB = 1 Example: a single row of A might be ... 0 3 5 0 102 107 0.1374D+04 0.1150D-03 0.09 The following m-files are available for processing the data in the results.mat file. We also give usage statements. We assume that the matlab variable M is the M-value of 5,10,15, or 50, the variable EXP is an experiment number between 0 and 21, and the variable PROB is a problem number between 1 and 22.
<urn:uuid:1f4f1ca1-a620-4282-b3a8-611989315735>
CC-MAIN-2017-04
http://www.cs.umd.edu/~oleary/LBFGS/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00235-ip-10-171-10-70.ec2.internal.warc.gz
en
0.898218
500
1.835938
2
Thank you for showing interest in this item. You will be notified by email as soon as this item is available to purchase. The item you selected has already been subscribed to notify to this email. System error: Failed to submit email, please contact website administrator. Download our Product Instructions and Activity Guide: Far Out!™ Solar System Mapping Tool (based on 6 reviews) of respondents would recommend this to a friend. Reviewed by 6 customers Displaying reviews 1-6 Back to top About Me Club Racer Comments about Educational Insights Far Out!™ Solar System Mapping Tool: How you use the product? Bottom Line Yes, I would recommend this to a friend Was this review helpful? Yes / No - You may also flag this review Comment on this review Wonderful Whole-Class Outdoor Activity By Kristen C. About Me Educator This was an excellent resource for a whole class activity! I used it with 3rd grade students, but I could see it being appropriate for grades 1-8, depending on how much discussion you give to the topic. I have previously done this activity by having the students measure and stand in certain spots across the school's field, but this took out a lot of the hassle, and helped the students to quickly understand where the planets are in relation to one other, and the visual representation with the downloadable planet posters was terrific! The Solar System fits in your schoolyard from Los Angeles, CA About Me Educator, Thrifty This tool is great for teaching planetary science! The tape measure includes kilometers, miles, AND astronomical units. The product itself is well-built and durable (even when you have crazy students running around, pulling hard on the tape measure itself, etc.), and the color and shape of the Sun is attractive and serves as a nice center of the Solar System. Students often have difficulty understanding the scale of the Solar System and the distances between each planet just from looking at words or pictures alone. This was a great way to kinesthetically engage the whole class and deepen their understanding of the Solar System by giving them a personal physical experience. This was also a great opportunity to take the kids out of the classroom into the parking lot (or a schoolyard or nearby park, if you have one) when they all seemed sleepy in my classroom. I asked for student volunteers to "represent" each of the planets after throwing out a few scientific facts about them, as well as telling a short story regarding the Greek/Roman deities they were named after, and students were practically *fighting* over getting to represent certain planets... "NO, I want to be the goddess of love!" "NO, I DO!" (and keep in mind, these are not little kids, these were my 9~11th graders). The process of rolling the entire tape measure back in was a bit of a chore, but aside from that, amazing product! It even includes where the asteroid belt would be found in the Solar System! (Even though it didn't include Pluto, the questions that students asked about its absence presented a good teaching moment.) Simple, but highly effective model from Pittsburgh, PA About Me Education Oriented, Educator Space is big. Like, really, really, big! Most adults have trouble comprehending the truly enormous distances between the planets, let alone kids! Anything that can help visualize these numbers is a huge help. Using the downloadable planet posters, we've been playing a game with local kids. I have them take turns each laying out their guess for the size and scale of the solar system. Then we unroll the tape and have a good laugh as we keep going well past what any of them have set up. By the time we get out to Uranus and Neptune, they're just speechless about how far apart they are.The case is light weight, but well constructed of sturdy plastic. The tape is heavy duty vinyl that has held up well despite repeated use, and doesn't tend to get tangled or twisted up too badly.One thing to consider is that at 61 feet long, this really needs to be used outdoors or perhaps in a gymnasium. In a typical house, it's a lot harder to get a real sense of scale since it's not likely you could get the whole thing stretched out end to end.Otherwise, this a nifty little tool that has earned a permanent place in the star party toolkit! Excellent Hands-on Tool from Carmel, CA This is a great, practical, and easy to store tool that get students used to the idea of planet distance. In the past, we have always paced out the distances back and forth across the black top, but in a class of 30, it can get unwieldy. This mapping tool is a fun gadget that the kids want to "play with." They can manage it on their own without teacher direction. They are really proud of themselves when they come up with new places to try it out. We get a great lesson in estimation out of it too. I teach fifth grade and find that it is especially helpful as a center during small group work. Very Fun and Useful from Erie, PA I received this solar system mapping tool as a gift and found it to be a real time saver. I teach both STEM and Math, with this tape I was able to put the students right on the mark where each planet is in relation to the sun. I didn't need to set up my own model this time, and the distances on the tape allowed me to make some very good math connections. The case and tape are both very sturdy and well designed. My students didn't have any problem using it, and it was nice to have it reel in and out easily.It did require room to use it effectively, but that is to be expected when modeling the distances of the planets. If you can get outside or have a long hallway to use this tool, it is fantastic!
<urn:uuid:ba8e527c-eefd-4c16-a45e-3e5edf74665b>
CC-MAIN-2016-44
https://www.educationalinsights.com/product/far+out!--8482-+solar+system+mapping+tool.do?sortby=ourPicks&sortby=
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719468.5/warc/CC-MAIN-20161020183839-00529-ip-10-171-6-4.ec2.internal.warc.gz
en
0.966441
1,229
2.265625
2
How Microlearning is Having a $2.2 Million Annual Impact at Bloomingdale’s In this session, you will learn why Bloomingdale’s decided to break away from conventional practices and try microlearning in 2012—before microlearning was a known term. It will explore the issues the company faced when it was decided to take the organization down the microlearning path and what the dramatic results have been. You will learn from the pitfalls and successes that were encountered along the way. For some, this session will provide a wake-up call for how learning professionals need to adapt their approaches to better meet the needs of a business and its employees. For others, it will help them gain a better perspective on the true benefits of taking a microlearning approach.
<urn:uuid:45276acd-8cef-4645-8233-787806758d40>
CC-MAIN-2017-04
http://www.axonify.com/events/microlearning-2-2-million-annual-impact-bloomingdales/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280718.7/warc/CC-MAIN-20170116095120-00406-ip-10-171-10-70.ec2.internal.warc.gz
en
0.961562
154
1.539063
2
Are you looking for a grocery store where you can find turmeric root powder? If so, this blog post is for you. In this post, we will provide you with a list of grocery stores where you can find turmeric root powder in grocery store. We will also provide you with a few tips on how to use turmeric root powder in your cooking. So, if you are interested in learning more about this spice, keep reading! What Is Turmeric Root Powder? India has been using turmeric as a spice for many years. The turmeric root powder is made from the dried and ground roots of the Curcuma longa plant. This yellow-orange powder has a slightly bitter taste and is commonly used in curry dishes. The turmeric root powder is rich in nutrients, including iron, manganese, and vitamin B6. Curcumin, a compound with potent anti-inflammatory and antioxidant effects, is also present. Curcumin is responsible for turmeric’s bright color and has been linked to a variety of health benefits. What Is Turmeric Root Powder Used for? The turmeric root powder is a versatile ingredient that can be used in a variety of recipes. Here are some examples of applications for it: 1). Turmeric golden milk Turmeric golden milk is a popular drink made with turmeric, milk, and honey. It is said to have many health benefits, including aiding in digestion, reducing inflammation, and boosting the immune system. Golden milk can be made with any type of milk, but dairy-free alternatives such as almond or coconut milk are also common. See recipe 2). Creamy coconut butternut squash soup This soup is a great way to get your daily dose of vegetables, and the coconut milk gives it a rich and creamy texture. The ginger adds a touch of spice, and the sour cream on top helps to balance out the sweetness of the squash. This soup is sure to satisfy your hunger and leave you feeling full and content. See recipe 3). Turmeric salad dressing Turmeric salad dressing is a delicious and healthy way to enjoy your salads. This dressing is made with turmeric, olive oil, lemon juice, and garlic. It is perfect for those who are looking for a flavorful and healthy dressing option. Turmeric has many health benefits, including anti-inflammatory properties. 4). Creamy turmeric dip with cinnamon This turmeric-based dip is a flavorful and healthy addition to any meal. It’s perfect for dipping vegetables or using as a spread on sandwiches. The combination of turmeric, cinnamon, and cumin gives this dip its unique flavor, while the yogurt and cream cheese make it creamy and smooth. This dish is also vegan-friendly and can be made gluten-free by using gluten-free bread. 5). India shrimp tacos with mango coleslaw Grilled shrimp tacos are a staple of coastal Mexican cuisine. The combination of fresh, juicy shrimp with the smoky flavor of the grill is simply irresistible. This recipe takes things to the next level by adding a flavorful mango coleslaw. The sweetness of the mango pairs perfectly with the savory shrimp, and the result is a truly delicious taco. Where To Find Turmeric Root Powder In Grocery Store You can find turmeric root powder in grocery store at several aisles, depending on the type of store and the section where spices and herbs are sold. In some stores, turmeric may be found in the produce aisle near other spices and seasonings. In other stores, it may be located in the international foods aisle, India food section, or in the section where natural and organic foods are sold. Some stores also sell turmeric in the bulk foods section. What Grocery Store Sells Turmeric Root Powder? Here are a few good sites to find Turmeric Root Powder in grocery store: Amazon is a great option if you’re looking for a wide variety of turmeric root powder products to choose from. You can also find helpful customer reviews on many of the products sold on the site. iHerb is another great option for purchasing turmeric root powder. They offer free shipping on orders over $20 and have a loyalty program where you can earn points towards future purchases. Vitacost is a great option if you’re looking for discounts on health and wellness products, including turmeric root powder. They offer free shipping on orders over $49 and have a rewards program where you can earn points towards future purchases. Swanson Health Products Swanson Health Products is an online retailer that specializes in vitamins and supplements. They offer turmeric root powder at a great price, and it’s often available for less than $10 per ounce. Shipping is typically free. Nature’s Way is a leading manufacturer of herbal supplements. They offer turmeric root powder at a great price, and it’s often available for less than $10 per ounce. Shipping is typically free. If you live near an Asian market, you may be able to find turmeric root powder for sale there. Asian markets typically sell a variety of spices and herbs, so you should be able to find what you’re looking for. Middle Eastern markets Another option for finding turmeric root powder is to check out Middle Eastern markets. These markets typically sell a variety of spices and herbs, and they may have turmeric root powder in stock. Finally, you can also check out specialty stores that sell spices and herbs. These stores usually carry a wide variety of products, and they may have turmeric root powder in stock. Where To Buy The Turmeric Root Powder Near Me If you are looking to find turmeric root powder in grocery store near you, then there are a few places that you can look. The most obvious place to start your search is at your local grocery store. Most likely, they will have a section devoted to spices and herbs, and turmeric should be stocked there. If not, then you can always check the international aisle or ask a staff member for assistance. Another option is to head to your local health food store near you. These types of stores typically have a wide selection of natural and organic products, so you should be able to find what you need. Once again, if they do not have turmeric root powder in stock, then you can always ask a staff member for help. Common Types Of The Turmeric Root Powder There are several different types of turmeric root powder available on the market, each with its own unique flavor and benefits. Here are some of the most common types of turmeric root powder: a. Yellow turmeric powder This is the most common type of turmeric root powder available. It has a strong, earthy flavor and can be used to add color and flavor to dishes. Yellow turmeric powder is also known for its medicinal properties and has been used in traditional medicine for centuries. b. Red turmeric powder This type of turmeric root powder is less common than yellow turmeric powder. It has a milder flavor and is often used in curries and other dishes where a more subtle flavor is desired. Red turmeric powder is also known for its medicinal properties and has been used in traditional medicine for centuries. c. Black turmeric powder This type of turmeric root powder is the least common but it packs a powerful punch. It has a strong, earthy flavor and can be used to add color and flavor to dishes. Black turmeric powder is also known for its medicinal properties and has been used in traditional medicine for centuries. Substitute for The Turmeric Root Powder Here are some good substitutes for Turmeric Root Powder if you don’t find Turmeric Root Powder in grocery store: Cumin has a similar earthy flavor to turmeric, and it also imparts a beautiful yellow color to food. Add cumin to curries, rice dishes, and vegetable stir-fries for an extra boost of flavor. Paprika is another spice with a similar flavor profile to turmeric. It will also turn your food a pretty yellow color. Add paprika to stews, soups, and sauces for a flavorful punch. Although saffron is a costly spice, a little goes a long way. Its flavor is similar to turmeric, and it will also give your food a beautiful yellow hue. Add saffron to rice dishes, curries, and vegetable stews for an exotic twist. 4). Curry powder Curry powder is a mixture of spices that often includes turmeric as one of its ingredients. This makes curry powder a good substitute for turmeric root powder, as it will still provide the same flavor profile. How To Make Turmeric Root Powder At Home? If you do not find turmeric root powder in grocery store, you can make it at home easily! All you need is a blender or food processor and some fresh turmeric roots. Here’s a step-by-step guide on how to make your own turmeric powder: 1. Start by washing the fresh turmeric roots thoroughly. Peel them if you wish, although this step is not necessary. 2. Cut the roots into small pieces, making sure that they are all roughly the same size. 3. Add the pieces of turmeric root into your blender or food processor, and blend until you have a fine powder. 4. Spread the powder onto a baking sheet and allow it to dry completely. This may take a few hours or even a day or two, depending on the humidity level in your home. 5. Once the powder is completely dry, store it in an airtight container and keep it in a cool, dark place. It should last for several months. FAQS To Find Turmeric Root Powder In Grocery Store Refer to the commonly asked questions below to find Turmeric Root Powder in grocery store. 1). What are the benefits of turmeric root powder? The turmeric root powder is a natural anti-inflammatory agent that can help to relieve pain and swelling associated with conditions like arthritis and joint pain. Additionally, it is a powerful antioxidant that can help protect your cells from damage caused by free radicals. It has also been shown to boost brain function and memory. 2). How do I use turmeric root powder? Turmeric root powder can be added to food or drinks, or taken as a supplement. When adding it to food, it is best to start with small amounts and gradually increase the amount you use over time. When taking it as a supplement, follow the directions on the package. 3). What are the side effects of turmeric root powder? The turmeric root powder is generally safe for most people. However, some people may experience gastrointestinal side effects such as gas or bloating. If you experience any adverse effects, stop taking the supplement and speak with your doctor. 4). What is the daily recommended dosage of turmeric root powder? There is no one-size-fits-all answer to this question as the ideal dosage will vary depending on the individual. Speak with your healthcare provider to determine the best dosage for you. 5). How do I take turmeric root powder? Turmeric root powder can be taken in capsules, tablets, or tinctures. It can also be included in meals or beverages. When taking turmeric root powder in capsule form, it is best to take it with a meal. If you are taking it in tablet form, you can take it with or without food. If you are taking it in tincture form, it is best to take it before meals. Turmeric root powder can be found in the spice aisle of most grocery stores. If you have any questions about where to find turmeric root powder in grocery store or how to use it, be sure to ask a store employee for help. The best way to identify the product is by looking for the word “powder” on the packaging. Be sure to share this blog post with your friends and family who might also be interested in adding this healthy spice to their cooking repertoire! - Where To Buy Bags Of Ice Near Me? - How Old To Work At Dunkin Donuts? 16 or 18 - Does Popeyes Have Apple Pay? - Does H Mart Accept EBT? - Does LIDL Take EBT? - Does Wawa Take EBT? - Can You Grill In The Rain? Traeger, Pit Boss, Kamado Joe, Weber Grill - Is Trader Joe’s Baking Powder Gluten-Free? - Does Walmart Cash Lottery Tickets? - Which Grocery Store Has The Best Meat or Steak? - What Stores Sell Stamps? or Postage Stamps - Can You Buy Slimfast On Food Stamps? Walmart or Store - Do Grocery Stores Accept PayPal? Publix, Supermarkets… - Where To Find Arrowroot Flour In Grocery Store? - Where To Find Tapioca Flour Starch In Grocery Store?
<urn:uuid:54e3b949-55c0-4169-a4be-e5e9e57b4d95>
CC-MAIN-2022-33
https://www.fastfoodjustice.org/turmeric-root-powder-in-grocery-store/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572304.13/warc/CC-MAIN-20220816120802-20220816150802-00478.warc.gz
en
0.939155
2,741
1.640625
2
The secretive American Legislative Exchange Council (ALEC) has just ended a week-long meeting in Washington where corporate lobbyists worked with state lawmakers on model bills that will later be introduced in states nationwide. ALEC has reportedly drafted a number of new bills designed to prevent President Obama from cutting emissions, and to weaken state policies promoting clean energy. Now conservative groups across the United States are apparently planning a coordinated effort in six states to raise money for attacks on public sector rights and services in the key areas of education, healthcare, income tax and workers’ compensation. The proposals were coordinated by the ALEC-backed State Policy Network, an alliance of groups that act as incubators of conservative strategy at the state level. ALEC is struggling to re-enlist donors after an exodus prompted by its backing of Florida’s "Stand Your Ground" law. According to The Guardian, ALEC has lost nearly 400 state legislators from its network over the past two years and more than 60 major corporate donors. We discuss ALEC’s latest efforts, along with its historic opposition to divestment campaigns from apartheid South Africa, with Lisa Graves of the Center for Media and Democracy. NERMEEN SHAIKH: The secretive American Legislative Exchange Council, known as ALEC, has just ended a week-long meeting in Washington where corporate lobbyists worked with state lawmakers on model bills that will later be introduced in states nationwide. ALEC has reportedly drafted a number of new bills designed to prevent President Obama from cutting emissions, and to weaken state policies promoting clean energy. Another measure would charge homeowners fees for installing their own solar panels. This follows ALEC’s sponsoring of at least 77 energy measures in 34 states last year. Meanwhile, The Guardian reports new documents reveal ALEC is struggling to re-enlist donors after an exodus prompted by its backing of Florida’s "Stand Your Ground" law. Stand Your Ground initially helped shield George Zimmerman from prosecution for killing Trayvon Martin and was later used in instructions to the jury that acquitted him. According to The Guardian, ALEC has lost nearly 400 state legislators from its network over the past two years and more than 60 major corporate donors. The group is facing a funding shortfall for the first time after losing more than a third of its projected income. AMY GOODMAN: Now conservative groups across the United States are apparently planning a coordinated effort in six states to raise money for attacks on public sector rights and services in the key areas of education, healthcare, income tax and workers’ compensation. The proposals were coordinated by the State Policy Network, an alliance of groups that act as incubators of conservative strategy at the state level. In just one example, a proposal from the Illinois Policy Institute outlines a campaign to switch Chicago’s government worker pensions to 401(k)-style retirement plans. A copy of the plan published by The Guardian shows the institute wants to, quote, "leverage the leadership potential of Mayor [Rahm] Emanuel ... as the spark for wider pension changes." For more, we go to Washington, where we’re joined by Lisa Graves, executive director of the Center for Media and Democracy and publisher of PRWatch.org and ALECExposed.org. Last week, their work featured in a several reports by The Guardian. On Monday, they jointly published another story, "Shilling for Profit: A Case Study of ALEC’s Campaign Against Divestment from Apartheid South Africa." We’ll talk about that in a minute. Lisa Graves, welcome back to Democracy Now! Talk about your most significant findings in your most recent report. LISA GRAVES: Well, I think that the report we did jointly with the People for the American Way organization was the product of a long-standing piece of research we were doing, because this is ALEC’s 40th year, and we thought they ought to be held accountable for all 40 years. What we had discovered in our lengthy research was that ALEC was one of the major movers in the effort to stop the United States from divesting from South Africa and to thwart those policies. And so, we recently published a piece that really goes into detail about how influential ALEC was in pushing the Reagan administration and officials in the Reagan administration to try to thwart efforts to divest from South Africa. It’s quite astounding. NERMEEN SHAIKH: And, Lisa Graves, what were some of the corporate interests that ALEC was representing at the time, corporations that stood to lose from divestment from apartheid South Africa? LISA GRAVES: Well, it’s interesting. It’s some of the same long-standing funders of ALEC, including the oil industry. Exxon is one of those corporations. Also some companies that have not been so widely associated with ALEC, like IBM and others, were funders of ALEC back then. ALEC also had events backed by the diamond industry, with prizes for its legislators backed by the diamond industry. And it was really pushing this corporate—this corporate agenda to stop divestment, because it was going hurt the bottom line because, quite frankly, as people know, apartheid was extremely profitable for companies because the workers had little to no rights. And ALEC was relying on really flawed polling that was put forward by a white professor at an all-white university, claiming that most South Africans didn’t want divestment. It was really an extraordinary campaign, and they were quite successful in getting leaders of the Reagan administration to adopt their policies, to credit them for pushing for the anti-anti-apartheid efforts to oppose—to oppose divestment. And they even reached out to the Reagan administration to try to get rewards for their legislators for pushing this agenda in the states. NERMEEN SHAIKH: And, Lisa Graves, your report also points out that ALEC had other concerns—in other words, if divestment from South Africa took place, it could also have had implications for corporations and corporate work in the U.S. Could you talk about that, their domestic concerns in the event that divestment had gone through? LISA GRAVES: Well, that’s right. This is one of ALEC’s—one of the ways that ALEC has long shilled for the private sector for some of the most powerful corporations in the U.S. and the world. And as Calvin Sloan points out in the piece we published on PRWatch.org yesterday, this is—this was perceived as a threat by these corporations, by these corporate backers of ALEC, because they feared that socially responsible investing and movements to encourage socially responsible investing would take hold in the U.S. So then, even after apartheid fell, even after they failed in their efforts to stop the divestment campaigns, and even after Nelson Mandela was released from prison, from decades in prison, ALEC doubled down and adopted a resolution opposing any kind of socially responsible investing, because, in their view, it would hurt the profits of shareholders and corporations. AMY GOODMAN: Your report cites many examples, including a 1983 legislative update that ALEC distributed to its members and partners titled "The States and South Africa: A Study of the Disinvestment Issue," published on ALEC letterhead, distributed to members of the Reagan administration, was very effective. In ALEC’s monthly newsletter in ’84, the organization boasted that in response, quote, "several prominent leaders and groups, including the U.S. Department of State, the Department of Agriculture, the [United States] Trade Representative, and the Secretary of Commerce have gone on record against divestiture." Talk about who those people were. And can you also talk about Dick Cheney in all of this, known as one of the people who opposed taking Nelson Mandela off the terrorist list and calling for his release from jail? LISA GRAVES: Well, a number of the people who were active in the Reagan administration were also former legislators who were—who had previously been active in ALEC. So, the web of ALEC that we have helped uncloak with our ALECExposed.org effort that we launched two years ago, we broke that story with The Nation magazine, and we—CMD, my organization, has since worked tirelessly to help make sure people understand what ALEC is up to and how incredibly influential it is to allow these corporations to vote behind closed doors with these lawmakers on legislation, on bills. ALEC was not—is not just powerful now, although it’s been weakened. ALEC was extremely influential within the Reagan administration. And that’s in part because ALEC operates sort of like a rookie team, in some ways, for Congress, for the administration. A number of people who get trained, who cut their teeth on the legitimacy of having these close ties with corporations, so close that they would allow themselves to vote as equals with corporate lobbyists behind closed doors on bills and measures, get promoted to higher office. They go to Congress. They go into presidential administrations. And so, that was certainly the case with ALEC’s influence within the Reagan administration. But in terms of Dick Cheney, I think, as John Nichols of The Nation has also written extensively about in one of his books, Dick Cheney was, you know, unrepentantly opposed to efforts to do divestment—to the divestment campaign. He was opposed to delisting the ANC. He was opposed to basically all of the efforts to get Mandela freed. I think that, you know, that’s one of just many instances of Dick Cheney being on the wrong side of history, being dead wrong, being flat wrong. AMY GOODMAN: Let’s talk about ALEC today. Lisa Graves, talk about the loss of sponsors and also members and what’s happening around the country. LISA GRAVES: Well, after the tremendous public outcry last year in response to learning about ALEC’s role in pushing the so-called "Stand Your Ground" or "shoot first" legislation into law across the country and how ALEC used to boast about taking credit for getting that law introduced and passed, as we’ve documented, ALEC suffered tremendous losses of its corporate members. It lost General Motors, General Electric. It even lost Wal-Mart. And overall, we had been counting that we—we thought they lost about 50 members, as of earlier this year. ALEC’s own documents, that The Guardian published, indicate that it lost at least 60 corporate members. But that wasn’t the end of it. Just this past Wednesday, after news broke about ALEC’s board documents that were leaked to The Guardian, that The Guardian published, and after the incredible—incredibly revealing story in The Guardian on Wednesday about ALEC’s assault on solar energy, Visa dropped out. That was due to the tremendous work of Boston Commons and Quakers and others across the country who have been reaching out to Visa to say, "You should really get out of ALEC." So, ALEC is suffering. It’s on the—on the move to try to raise more money. It had a plan in its board documents apparently to not only reach out to the corporations that had left, but to create new revenue streams, to create new so-called task forces, where corporations would vote as equals with lawmakers to try to raise more money. I think the documents illustrate quite conclusively what we’ve been saying all along, that ALEC is one of the biggest pay-to-play operations in the country. I think it’s an institutionalization of corruption. NERMEEN SHAIKH: And, Lisa Graves, you’ve been monitoring the work of ALEC for a long time. Is such a pullout of funding and supporters in Congress unprecedented for ALEC? And if so, what do you think this might say about changes in the wider political culture? I mean, you pointed out that once, even—even given their opposition to divestment from apartheid South Africa, it didn’t actually change the strength of ALEC. So what accounts for it now, their support for Stand Your Ground as well as opposition to clean energy, etc.? Could you talk a little bit about that? LISA GRAVES: Well, ALEC has tried to disavow its role in Stand Your Ground. It no longer has that task force, but it has done nothing to undo the damage done by pushing these bills into law across the country. I think what our work demonstrates, what the work of so many organizations—Color of Change, Common Cause, ProgressNow, Greenpeace, labor unions, citizen groups like VLTP and others who have spoken out about ALEC—I think what that demonstrates is the power of people speaking out. These corporations—many of these corporations do not want to be associated with these controversial policies that they’ve been funding behind closed doors through ALEC for many, many years in numerous instances. And so, I think it shows the power of people speaking up. But I think that ALEC—I suppose that in one sense ALEC was right. ALEC was right to say that if divestment campaigns take hold, if people have a sense of power that they can speak out, that they can urge corporations to stop investing in controversial policies or in countries that are pushing such policies, like the extraordinary inhumanity of apartheid, that citizens will be empowered to encourage corporations to do more, to do better. And that’s what’s happened. That’s one of the things that ALEC was afraid of. They were afraid of having citizens be mobilized and shareholders be mobilized to get these companies to stop investing in terrible organizations. It turns out that one of those organizations is ALEC, because ALEC has pushed forward this extreme agenda to privatize our schools, privatize Social Security, privatize Medicare and Medicaid, prisons—anything that isn’t nailed down and some things that are. It’s worked to devastate workers’ rights. It has worked to harm the ability of Americans whose family members are killed or injured by corporations to sue and hold those companies accountable. And it even, as you noted and as The Guardian reported, is trying to punish citizens who invest in putting solar energy on their roofs of their homes and that are giving energy back to the grid; they want to penalize them. And so, ALEC is really an extreme organization. It’s a pay-to-play organization pushing corporate interests above all else, above our interests. And these lawmakers who are part of it are, in essence, debasing themselves by allowing corporations to have an equal say to themselves at these closed-door ALEC task force meetings, that Dana Milbank pilloried so effectively in The Washington Post this last week. AMY GOODMAN: Can you talk about the State Policy Network, and what is that all about? LISA GRAVES: Well, the State Policy Network is, in some ways, one of the children of ALEC. It is an entity that came about in the mid—in the early 1980s, actually, and really gained steam in the 1990s. It has been operating below the radar screen. What it is is a network of state think tanks—they call themselves think tanks. We have dubbed them "stink tanks" and have launched a site with ProgressNow called StinkTanks.org, so people can find out if there is a think tank in your state that is really pushing the ALEC agenda, that’s basically a handmaiden to the ALEC agenda. And what we’ve documented is that there are 64 of these entities in the states and that they have a total budget of more than $80 million. And they are spending that money to really push these—the ALEC agenda, the corporate agenda and the extreme ideological agenda of some of the wealthiest billionaires in the country, like the Koch brothers and the DeVos family and others. The Guardian published on Thursday a number of documents that show how these groups coordinate; how they’re working to disrupt the rights of workers; how they’re working in a coordinated way, in many instances, to attack energy, solar energy, and renewable energy policies. It’s quite an extraordinary exposé. I would encourage people to read it, because these groups are super powerful. They’re often quoted in your local news, new stations and in newspapers without any discussion of who they really are and who they back. And what we have documented is how these groups sit alongside those corporate lobbyists in these ALEC task force meetings, vote as equals with state elected officials on these bills before they’re put forward in the state houses to become law. And what The Guardian documented was, in some ways, how these groups are promising to their funders, like the Searle Foundation, that has close ties to a number of big groups in Washington, D.C.—the Searle Foundation—these proposals were telling the Searle Foundation that they would produce policy results, get the law changed. And what we’ve documented on our end is how some of these groups are rewarded for doing that. So, the Mackinac Center in Michigan was recently lauded at an SPN event for getting "right to work" passed in Michigan, that extremely controversial law. We looked at the 990s of the Mackinac Institute; it turns out they said they engaged in zero lobbying, not a penny on lobbying, just like ALEC has claimed to the IRS for years that it engages in no lobbying. And we and Common Cause have documented extensively how ALEC has in fact engaged in lobbying. We presented that evidence to the IRS. AMY GOODMAN: Let’s talk New Jersey for just one minute. You talked about the Searle Freedom Trust. The Guardian reports one of the grant proposals to this trust came from New Jersey’s Common Sense Institute, a tax-exempt, quote, "research and education organization." It outlines a campaign to support efforts by Republican Governor Chris Christie to end the ability of public employees to claim untaken sick days and vacation leave in their retirement packages. The proposal reads, quote, "Governor Chris Christie has been waging a war to eliminate this practice; and CSINJ would like to provide ammunition" with a "research study" and a "media campaign." When asked if the proposal involved lobbying, the institute said it was, quote, "an education organization focused on providing the public with facts and the truth." Lisa Graves? LISA GRAVES: Well, I think what we—what we are looking into is how a number of these groups appear to be engaged in changing the law really directly. It’s not just a think tank. When you think of the words "think tank," often you think of really independent researchers who are thinking about how to solve problems, and they’re doing so from a more academic or rigorous standpoint. What you see in these documents is how so many of these groups are working so closely with elected officials; how they are aiming quite directly to change the law; how, in some instances, they’re bragging about changing the law, and which is— AMY GOODMAN: Let’s talk media. LISA GRAVES: Sure. AMY GOODMAN: Can you talk about who Stephen Moore is, The Guardian report identifying him, The Wall Street Journal editorial writer, as the State Policy Network’s connection to the Searle Freedom Trust? LISA GRAVES: Well, this is really, I think, one of the most extraordinary parts of the documents that The Guardian published, because what you have is one of the editorial board members of The Wall Street Journal who is sitting on a board, in essence, of—you know, basically making decisions as a board member of—a grant adviser, pardon me, of the Searle Freedom Trust, telling them which of these State Policy Network groups they should fund for this agenda. And Stephen Moore, time and time and time again, has written—has written op-eds and probably contributed to unsigned editorials by The Wall Street Journal promoting these very policies that he—you know, he has perhaps had a hand in influencing. Now, we don’t know how long Moore has been involved with the Searle Freedom Trust. We know that he’s previously been working with one of the Donors—the Donors Trust or Donors Capital groups on some advising. What we do know is that he has extensive ties to ALEC, most of which have not been disclosed by The Wall Street Journal when they editorialize in favor of ALEC or in favor of these SPN group policies. And we think that’s a really serious issue for the Journal to have such close ties, not just from Stephen Moore, but also from others like John Fund and Paul Gigot in the past, to ALEC, and not disclose to their readers how closely Stephen Moore has been aligned with ALEC and is aligned with some of these groups. In fact, it looks like some of these groups turn around and ask Stephen Moore to write reports that advance their agenda. AMY GOODMAN: Lisa Graves, we want to thank you for being with us, executive director of the Center for Media and Democracy, publisher of PRWatch.org and ALECExposed.org. We’ll link to your reports at democracynow.org. When we come back, the connection between Cuba and the fight for freedom in South Africa. Stay with us.
<urn:uuid:8d67d584-12c8-4a76-b8bf-212d0276241b>
CC-MAIN-2017-04
http://www.truth-out.org/news/item/20588-alecs-institutional-corruption-from-backing-apartheid-to-assault-on-clean-energy-public-sector
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279224.13/warc/CC-MAIN-20170116095119-00477-ip-10-171-10-70.ec2.internal.warc.gz
en
0.974038
4,390
1.5625
2
Slipped Disc in the Lower Back A slipped disc in the lower back can be caused by poor body mechanics or an injury to the spine, but most often it occurs as a result of years of normal wear and tear to the spinal column. When researching this condition, it is first important to understand that the disc does not actually fall or slide out of place in the spinal column. Rather, the intervertebral disc becomes herniated or ruptured, causing disc material to leak and potentially place pressure on neighboring nerve roots and the spinal cord. The amount of displaced material usually determines the severity of the symptoms a person will experience. A slipped disc in the lower back typically can cause dull or sharp pain, weakness, tingling, and numbness below the waist. Slipped disc symptoms can be isolated in the lower back, or can radiate through the buttocks and down the legs. Since the symptoms of a slipped disc are similar to those of other back conditions, it is important to obtain a proper diagnosis from a physician before attempting any treatment. Your physician likely will first conduct a physical examination and record your medical history, then issue tests such as an X-ray, CT scan or slipped disc MRI. When a proper diagnosis is made, your physician will likely prescribe a conservative treatment plan that may include bed rest, over-the-counter anti-inflammatory medication, exercise and activity modification. Most patients respond well to conservative slipped disc treatments, but those who still experience chronic pain and other limiting symptoms may benefit from prescription medications or steroid injections. When symptoms fail to improve after all conventional therapies have been exhausted, slipped disc surgery may be an option. Patients considering back surgery for treatment of a slipped, herniated or ruptured disc should know that there are less-invasive options to traditional open back surgery available at Laser Spine Institute. Our minimally invasive procedures have relieved slipped disc symptoms for tens of thousands of patients. To schedule your initial consultation, or to learn more about our procedures, contact Laser Spine Institute today.
<urn:uuid:b1683981-9584-4282-9e3c-095e6ab416fb>
CC-MAIN-2016-44
https://www.laserspineinstitute.com/back_problems/slipped_disc/lower_back/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720845.92/warc/CC-MAIN-20161020183840-00085-ip-10-171-6-4.ec2.internal.warc.gz
en
0.924862
414
2.390625
2
Hello. I have just made swiss meringue for the second time. I made it once before and have just made it again. However I am now concerned with the raw egg whites. I did warm the egg whites to almost hot. Do you think that is enough heat to get rid of bacteria? I am more concerned this time I guess because of feeding a large crowd. I have not had an issue before. I always heat the egg mixture until it's close to hot. Please respond. Thanks If the eggs were pasteurized then you should theoretically be ok. I always use the pastuerized egg whites that come in a carton in the dairy case and then heat the egg mixture until it reqches 140-150 F. HTH. No the egg whites did not come out of a box. I did heat them to a little over 145. I have a giant double batch too. Hmmmmmm. All the recipes say that if you heat the egg whites to 140 or over, that they are fine, so I don't think you have anything to worry about. FDA recommends that some meats are OK at 140 degrees, but egg should be 160. I also use the pasteurized whites in the carton. So much easier and makes great smbc. I use to crack the eggs, took a lot of time, then i would make fmbc with the yolks. lotta work, but so good!!!
<urn:uuid:535ec05c-22c9-483f-b913-b698fb808819>
CC-MAIN-2017-04
http://www.cakecentral.com/forum/t/735646/swiss-meringue-buttercream
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280929.91/warc/CC-MAIN-20170116095120-00421-ip-10-171-10-70.ec2.internal.warc.gz
en
0.977498
297
1.523438
2
Constitutional Law Real Estate Eminent Thesis - Length: 9 pages - Sources: 10 - Subject: Business - Law - Type: Thesis - Paper: #2474434 Excerpt from Thesis : " (GAO, 2006) Issues involved are stated to include "the dispersal of residents in low-income communities to other neighborhoods or cities." (GAO, 2006) it is stated that an inherent right of "sovereignty, eminent domain in a government's power to take private property for a public use while fairly compensating the property owners." (GAO, 2006) There have been actions in state legislatures toward prohibition of "certain eminent domain practices, such as preventing property from being transferred to one private party to another for specific purposes..." (GAO, 2006) Eminent domain laws in many states have been changed so as to permit "private-to-private transfers only if it meets certain conditions, such as the property having been determined to be blighted." (GAO, 2006) However, these modified eminent domain laws have not undergone testing and moreover there is no available historical data on eminent domain use by which to make comparison of the effects that these laws have upon property rights, states and local government use of eminent domain which remains unclear. (GAO, 2006; paraphrased) it is stated: "Regardless of their stance in the debate on eminent domain, government officials and property rights groups we interviewed identified a few concerns related to the procedures on invoking eminent domain, including the adequacy of compensation amounts and the timeliness of notification about public hearings." (GAO, 2006) The work of Salkin and Lavine (2008) entitled: "Negotiating for Social Justice and the Promise of Community Benefits Agreements: Case Studies of Current and Developing Agreements" states that a 'Community benefits agreement (CBA) is a private contract negotiated between a prospective developer and community representatives." Specified in the agreement are the "benefits that the developer will provide to the community in exchange for the community's support or quiet acquiescence, of its proposed development." (Salkin and Lavine, 2008) CBA negotiation generally occurs between "coalitions of community groups that often include labor, environmental and religious organizations." (Salkin and Lavine, 2008) Stated as the first "full-fledged CBA" is that of the Staples Center in Los Angeles (2001). It is related however, that "Community residents suffered a blow when the developer failed to provide orally promised benefits after the completion of the project's first phase." (Salkin and Lavine, 2008) In the case of HFH, Ltd., Petitioner, V. The Superior Court of Los Angeles County, Respondent; City of Cerritos Et Al., Real Parties in Interest. Von's Grocery Company, Petitioner, V. The Superior Court of Los Angeles County, Respondent; City of Cerritos Et Al., Real Parties in Interest L.A. Nos. 30382, 30383 Supreme Court of California 15 Cal. 3d 508; 542 P.2d 237; 125 Cal. Rptr. 365; 1975 Cal. Lexis 248; 6 Elr 20062 (1975) stated is that it is not suggested by the court that "...inverse condemnation lay to challenge a zoning action whose only alleged effect was a diminution in the market value of the property in question. In this particular case, the Plaintiffs wanted the "long-standing principles of the law of just compensation" changed asking that municipal zoning bodies be held liable "for full compensation for any fall in market price due to zoning actions." (1975) in the dissent of Clark J. stated is "California has long recognized that while 'the police power is very broad in concept, it is not without restriction in relation to the taking or damaging of property. [on] the one hand, the policy underlying the eminent domain provision in the Constitution is to distribute throughout the community the loss inflicted upon the individual by the making of public improvements.... On the other hand, fears have been expressed that compensation allowed too liberally will seriously impede, if not stop, beneficial public improvements because of the greatly increased cost." (1975) Clark J. continues by stating that one fact that should be considered in making a determination of such limits "...is the extent of the diminution. When it reaches a certain magnitude, in most if not in all cases there must be an exercise of eminent domain and as this court has recently recognized in viewing these conflicting policies, the ultimate test whether compensation is constitutionally required, resolves itself into one of fairness. The constitutional requirement of just compensation derives as much content from the basic equitable principles of fairness... As it does from technical concepts of property law." (1975) it is the opinion of Clark J. that there is not a requirement of compensation for all "governmental downzoning, However, the compensatory 'or damaged' provision of the California Constitution should apply when by public action land has: 1) suffered substantial decrease in value, 2) the decrease is of long or potentially infinite duration and 3) the owner would incur more than his fair share of the financial burden.(1975) III. SUMMARY of REVIEW Eminent domain in Los Angeles, California has been traditionally viewed as acceptable however, it has been most recently noted by higher courts and agencies that there are many unanswered questions in eminent domain procedures throughout the various fifty U.S. states and that the principles guiding the laws of eminent domain are at present very 'unclear'. Sanderfur (nd) notes that there is little in the way of protection provided by California law "today...for property owners under the public use clause, the intent of the non-dependency clause is clear: to protect Californians when an overly pro-government federal bench fails to act. The abandonment of serious public use jurisprudence at the federal level does not require a similar abandonment at the state level, particularly given the unique history of California's Constitution." IV. ETHICAL DILEMMAS There are inherent ethical dilemmas, which arise in eminent domain cases. For instance, in cases of blighted communities there is the question of 'what happens to those who are disadvantaged and live in and around the area?' Also present is the question of 'where should cities house the disadvantaged who are perhaps "pushed" out of the area because of the new development?' Finally, the question of governmental policy protection in eminent domain cases for those who do not receive the provision of alternative dwellings. After having conducted the foregoing review it is the conclusion of this writer that eminent domain, while necessary is also fraught with ethical dilemmas. As noted by the GAO in its Congressional Report, the laws of the states relating to eminent domain have not been challenged and are still as of yet very unclear. Arising from this review of California case law is a recommendation that all U.S. states, to include the state of California, conduct further research in this area of study toward the goal of identifying the principles that should guide the use of eminent domain by government and governmental agencies in the future. Boulard, Garry (2006) Eminent Domain - for the Greater Good. June 2006. State Legislatures. Eminent Domain: Information about Its Uses and Effect on Property Owners and Communities Is Limited (2006) United States Government Accountability Office - Report to Congressional Committees. 2006. Nov. HFH, LTD. Petitioner, v. The Superior Court of Los Angeles County. Respondent; CITY of CERRITOS et al., Real Parties in Interest. Von's Grocery City of Cerritos, Petitioner, v. The Superior Court of Los Angeles County, Respondent; City of Cerritos, et al., Real Parties in Interest L.A. Nos. 30382, 30383 Supreme Court of California 15 Cal. 3d 508; 542 P.2d 237; 125 Cal. Rptr. 365; 1975 Cal. LEXIS 248; 6 ELR 20062 (1975) Online available at http://184.108.40.206/search?q=cache:jwI03q6Ns-YJ:www.eminentdomain-law.com/pracAreas/appLaw/decisions/AmiciCuriae/HFHLtdvSuperiorCourt.pdf+Los+Angeles+eminent+domain+ethical+issues&hl=en&ct=clnk&cd=33&gl=us Mark, Jason (2006) the Central Question. 9 Jun 2006. Grist Environmental News & Commentary. Peninemann, Milo (2000) Staples Land to Cost Developer Millions More. Los Angeles Business Journal 9 Oct 2000. Saito, Leland T. (2007) Economic Redevelopment and the Community Benefits Program: A Case Study of the L.A. Live Project, a Los Angeles Sports and Entertainment District. University of Southern California Sociology Department and American Studies & Ethnicity Department. Sanderfur, Timothy (nd) a Natural Rights Perspective on Eminent Domain in California: A Rationale for Meaningful Judicial Scrutiny of "Public Use." Social Science Research Network. Southwestern University Law Review, Vol. 32-569, 2003. Salkin, Patricia E. And Lavine, Amy (2008) Negotiating for Social Justice and the Promise of Community Benefits Agreements: Case Studies of Current and Developing Agreements Government Law Center of Albany Law School. 2008 April Sanderfur, Timothy (nd) a Natural Rights Perspective on Eminent Domain in California: Rationale for Meaningful Judicial Scrutiny of "Public Use." Social Science Research Network. Southwestern University Law Review, Vol. 32-569, 2003. Boulard, Garry (2006) Eminent Domain - for the Greater Good. June 2006. State Legislatures Saito, Leland T. (2007) Economic Redevelopment…
<urn:uuid:68057194-f61d-4fcf-b309-410c85949bdc>
CC-MAIN-2017-04
http://www.paperdue.com/essay/constitutional-law-real-estate-eminent-28930
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00537-ip-10-171-10-70.ec2.internal.warc.gz
en
0.918291
2,066
1.703125
2
Quetext's plagiarism checker is a must-have free tool for every student. Identify plagiarism before it's too late, get resources to improve your writing, and add citations quickly, all for free. You do the writing, and we'll help with the rest.Check My Paper for Plagiarism Our ColorGrade™ feedback feature highlights exact matches vs. near-exact or “fuzzy” matches with corresponding colors. From there, you can resolve plagiarism issues by deleting or altering the at-risk copy. For the copy you want to keep, you can use our handy “Cite Source” feature to generate citations in MLA, APA, and Chicago formats and insert the citations directly into your document. Our plagiarism detection tool uses DeepSearch™ Technology to identify any content throughout your document that might be plagiarized. We identify plagiarized content by running the text through three steps: Students often think of citations as a simple means of acknowledging another author's work. While this is their main purpose, there are other benefits as well. Source citations also show readers where to go to learn more. By providing context around the citation in student papers, such as the source medium and when it was published, readers can locate the information more easily. Giving too little source information or improperly formatting it can result in unintentional plagiarism. These mistakes also make it difficult for readers to locate the original source and verify information. Quetext's citation generator makes it easy for students to accurately cite their sources without slowing down their writing process. Once a user inputs the text, the software identifies the passages that require a citation and subsequently generates it in the style required — APA, MLA, or Chicago. The best way to avoid severe plagiarism consequences is to use a plagiarism checker. Often, plagiarism is unintentional and results from poor paraphrasing of material found online. Using a plagiarism checker, the student can avoid accusations of any kind of plagiarism and benefit from a close review of the original material. Quetext's plagiarism checker provides a speedy, easy process for students to receive accurate results, identifying areas of concern and providing on-page solutions. The consequences of plagiarism vary according to the student’s academic institution and grade level. For example, a middle school student who plagiarizes within an essay may receive a stern warning and additional instruction related to the process of citing sources or summarizing one’s thoughts. However, students in higher education institutions guilty of plagiarism in academic papers face much steeper repercussions, including, but not limited, to failing grades and disciplinary or legal action. Factors such as the assignment itself, the instructor, and whether or not it is your first offense impact the outcome. Depending on the severity of the situation, plagiarism can also impact a student’s reputation or future career opportunities. A plagiarism checker helps students be proactive in finding instances of plagiarism before an assignment is completed and turned in with no way to correct the errors. In addition, by identifying the potential conflicts early, students can conduct further research to find alternative sources to understand the material better and revise or rewrite the offending passages. Plagiarism checkers also help students learn innovative writing techniques, improve their writing skills through better research and experience in summarizing ideas, and preserve academic integrity. Many teachers use plagiarism checkers to ensure a student’s submission is 100% original work. With the rise of easy-to-use tools like Quetext, checking for authenticity and text matches is a quick and affordable process to scan millions of online data sources. Using plagiarism checkers also allows teachers to educate their students on the importance of citing sources and the ethical responsibilities of research and opinion writing. Plagiarism has always been a source of concern for teachers, but until now, options for manual detection have limited their opportunities to identify the problem efficiently. However, the evolution of technology in this area has made the tools more accessible than ever. Teachers are skilled at detecting plagiarism, especially those who have been teaching for a significant period or who teach in the areas of English or Literature. Some teachers use a simple technique of entering a sentence into a search engine to find instances of duplicate text on web pages. However, this manner of plagiarism detection is manually intensive and dependent upon unreliable algorithms. Some may use their writer’s intuition by identifying anomalies in sentence structure, inconsistencies in vocabulary or grammar, or a combination of all of these. Others use more sophisticated and robust plagiarism detection software, like Quetext. Quetext can scour millions of sites using DeepSearch™ technology to identify plagiarism in seconds. These tools also enable instructors to work with students to improve their writing and avoid repeating the same mistakes in the future. Yes, students can be penalized for plagiarism, even if it was an accident. Unfortunately, instructors have no way of knowing the intent behind plagiarism. Depending on the type of plagiarism, instructors may allow leeway for students to learn from their mistakes and correct the work without the threat of severe consequences. However, repeat offenders are less likely to receive this flexibility and may face steeper penalties. Additionally, instructors of college-level courses with clear plagiarism guidelines and policies may be less inclined to let students off the hook and instead enforce severe consequences. Yes! Quetext offers both a free and a paid subscription for students to seamlessly verify their writing. Quetext goes beyond traditional plagiarism checkers to provide students with advanced technology that puts content through three layers of evaluation in just a matter of seconds. This level of insight enables students to understand the degree to which the text has been plagiarized and decide whether to rewrite the text or use the citation assistant to cite sources. Quetext also offers a detailed report students can use to document their editing efforts and present as proof of a plagiarism-free, 100% original content document. Quetext's plagiarism tool also offers flexible pricing for its Pro features which facilitates the citation of online sources, attributions, and real-time feedback for writing improvement. Anyone can enter the text from a research paper into a search engine and find potential matches that identify instances of plagiarized content or duplicate content. However, this method is largely ineffective and does not identify every area of concern. Students can use Quetext's free online plagiarism checker by creating an account, copying and pasting the text in question into the plagiarism checker, and receiving a comprehensive analysis with color-coded feedback, a plagiarism percentage score, and options for editing the text. Quetext is one of the best plagiarism checkers available with high-quality insights and accurate results.
<urn:uuid:dfee6600-076f-4aad-a46f-886d940c8f17>
CC-MAIN-2022-33
https://www.quetext.com/plagiarism-checker/students
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00671.warc.gz
en
0.922672
1,394
2.125
2
Scientists meet to review Envisat results after two and a half years of operations ESA PR 48-2004. From 6 to 10 September in Salzburg, Austria, over 700 scientists from 50 countries worldwide will meet to review and discuss the early results of the European Space Agency’s Envisat satellite mission. The main objective of the Symposium is to provide a forum for investigators to present results of ongoing research project activities and to review and assess the development of applications and services. Scientists and operational users of Envisat data working in the framework of international, ESA and national projects will present preliminary results from the Envisat mission and also the scientific benefits of the 13-year ERS missions. The Symposium will address almost all fields of Earth science, including atmosphere, coastal studies, radar and interferometry, winds and waves, vegetation and agriculture, landslides, natural risks, gas mapping, ocean colour, oil spills and ice. There are to be over 650 papers, selected by peer review. Presentations will include results from Envisat on the Prestige oil spill, fires in Portugal in 2003, the Elbe flooding in 2002, the evolution of the Antarctic ozone hole since the launch of Envisat, the Bam earthquake and pollution in Europe. Numerous demonstrations are planned during the week in the ESA Exhibit area. An industrial consortium exhibit on GMES (Global Monitoring for Environment and Security) is also planned. The official opening of the Symposium is scheduled for 6 September at 2.30 p.m. Mr Eduard Mainoni, Secretary of State at the Austrian Federal Ministry of Transport, Innovation and Technology, will give the welcoming address, followed by ESA Director General Jean-Jacques Dordain and ESA Director of Earth Observation Programmes José Achache. Launched in March 2002, Envisat is the most powerful means ever created of monitoring the state of the planet and the impact of our activities on our world. It carries ten sophisticated optical and radar instruments to observe and monitor the Earth’s land, atmosphere, oceans and ice caps, maintaining continuity with the Agency’s ERS missions started in 1991. Envisat data collectively provide a wealth of information on the workings of the Earth system, including insights into factors contributing to climate change. The satellite supports research activities and government programmes in the fields of global change, pollution and disaster monitoring, and commercial applications. For further information, please contact: Envisat Mission Manager Tel.: + 39.06.9418.0361 ESA/ESRIN Communications Office Tel. + 39.06.9418.0350
<urn:uuid:2a3ecc7d-a049-482e-885e-69252b036b33>
CC-MAIN-2017-04
http://www.esa.int/Our_Activities/Observing_the_Earth/Scientists_meet_to_review_Envisat_results_after_two_and_a_half_years_of_operations
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284405.58/warc/CC-MAIN-20170116095124-00033-ip-10-171-10-70.ec2.internal.warc.gz
en
0.879847
542
2.234375
2
Some people call it a cold sore, others a fever blister. Herpes simplex virus is the cause of this annoying and often painful chronic condition. The herpes sores (lesions) typically last a week to 10 days. They most often occur on the lips, tongue, roof of the mouth, or the gums. The sores occur first as fluid-filled blisters that burst (rupture) after a day or 2. The sores will ooze fluid that has the virus. After a few days, the sores will form crusts or scabs. The virus is highly contagious and can be spread by skin-to-skin contact such as kissing. The virus is spread by skin-to-skin contact with someone who carries the virus. Most people with oral herpes were infected during childhood or as young adults from nonsexual contact with infected saliva. It can be passed by kissing, touching the infected person's skin, or sharing infected objects such as lip balm, silverware, or razors. The 2 most common forms of the virus are: Herpes simplex virus type 1 (HSV-1). HSV-1 is most often linked to infections of the mouth. Herpes simplex virus type 2 (HSV-2). This type is most often linked to genital herpes infections. Both types of HSV can infect both the mouth and the genitals. Once infected, a person will have the herpes simplex virus for the rest of their life. When the virus is not active, it is dormant in a group of nerve cells. Some people never have any symptoms from the virus while others have periodic outbreaks of infections. It is not clear what triggers the virus to return. But the risk factors below may play a role: Long or intense exposure to sunlight A recent fever Recurrent outbreaks are more common in the first year after the initial episode. After that, the outbreaks diminish in frequency and severity as the body builds antibodies to the virus. The initial (primary) infection of the oral herpes simplex virus is often the worst. It may cause severe, flu-like symptoms, swollen lymph nodes, and headache. But some people have no symptoms at all. In the initial infection, sores can occur on and around the lips and all over the mouth. Recurring infections tend to be much milder, and the sores often erupt in the edges of the lips. Some people never have any more outbreaks beyond the initial infection. These are the most common symptoms of a recurring oral HSV infection: Initial redness, swelling, heat, and pain, or itching in the area where the infection will erupt. Painful, fluid-filled blisters may appear on the lips or under the nose. These blisters, and the fluid they contain, are highly contagious. The blisters leak fluids and become sores. After about 4 to 6 days, the sores start to crust over and heal. The symptoms of an oral HSV outbreak may look like other conditions or health problems. Always see your healthcare provider for a diagnosis. Herpes simplex virus may be difficult to diagnose because it may be confused with many other infections, such as allergic reactions. HSV can be confirmed only with a virus culture, blood test, or biopsy. A healthcare provider can often diagnose it based on where the blisters are and how they look. Treatment will depend on your symptoms, age, and general health. It will also depend on how severe the condition is. Treatment may include: Keeping the infected area clean and dry Antibiotic treatment for any secondary bacterial infections Topical antiviral creams Oral antiviral medicines These tips can help you prevent an oral HSV infection: Don’t have direct contact with someone with herpes sores. According to the CDC, genital herpes (HSV-2) can be contagious without any symptoms. Don’t share silverware, glasses, straws, or other items with someone who has oral herpes. Wash bedding and towels in boiling hot water after each use. Don’t have oral sex if you or your partner have oral herpes (HSV-1). HSV-1 can be spread to the genitals, especially if you have oral blisters. To prevent a possible recurrence, use a sunblock that contains zinc oxide on your lips. A cold sore or fever blister is caused by the herpes simplex virus. The virus is highly contagious and can be spread by skin-to-skin contact such as kissing. Once infected, a person will have the herpes simplex virus for the rest of their life. Herpes sores typically last a week to 10 days. They most often occur on the lips, tongue, roof of the mouth, or the gums. Tips to help you get the most from a visit to your healthcare provider: Know the reason for your visit and what you want to happen. Before your visit, write down questions you want answered. Bring someone with you to help you ask questions and remember what your provider tells you. At the visit, write down the name of a new diagnosis and any new medicines, treatments, or tests. Also write down any new instructions your provider gives you. Know why a new medicine or treatment is prescribed and how it will help you. Also know what the side effects are. Ask if your condition can be treated in other ways. Know why a test or procedure is recommended and what the results could mean. Know what to expect if you do not take the medicine or have the test or procedure. If you have a follow-up appointment, write down the date, time, and purpose for that visit. Know how you can contact your provider if you have questions.
<urn:uuid:0928ccc7-53ca-409f-8471-8b7562f7d2a2>
CC-MAIN-2022-33
http://healthinfo.coxhealth.com/RelatedItems/85,P00888
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00676.warc.gz
en
0.931919
1,219
3.828125
4
What's The Difference Between Ale and Lager? A Brief History of The Ale The ancient Sumerians of Mesopotamia (modern day southern Iraq) had migrated from India into this southern oasis. The biggest of their achievements was Babylon. Beer was a center piece of the Sumerian religious culture and rituals. The rich fertile lands of Mesopotamia, with the Tigris and Euphrates rivers made farming the land easy, and therefore made it optimal for brewing their ales. The Sumerians finally succumbed to other cultures and the society changed, but beer would remain a staple in culinary arts from that point on. Cranberry Wine Recipe - Homemade Cranberry Wine Wine making essentially involves the mixing of fruit juice and sugar and then adding yeast to convert the sugar to alcohol. While wine is generally made from grapes, other juices can be used as the... A Brief History of The Lager Lagers found their historic origins in the early nineteenth century. To lager means 'to store' coming from the German word 'lagern'. Lagers came about when Bavarian brewers began storing their beer in cold temperatures in cellars or caves. The Alps made for a perfect spot for this process to take place. History tells us that the Bavarians would store their brews in the Alps for the summer months. This long period of time would allow the yeast and other particles to fall to the bottom and making for a clean taste & light pale color. Other lagers of the region were dark brown in color because of the heavy particles in the water these are Dunkle or Dunkel lagers and are still widely brewed today. Chemistry Between Us ( Not 'Chemicals Between' us. It's more complicated than that.) Now that we know that these types of beer have a substantial age difference let’s move on to the chemistry. This is where most people really differentiate the two. Ales are top fermenting beers that are brewed using Saccharomyces Cervisiae yeast. These yeast work best at temperatures between 60º & 77º F. This should only take about a week or so, and will produce full-bodied and hearty taste. Ales come in many different styles which include Pale Ale, Stout, Porter as well as others not named here. Lagers are bottom fermenting beers that are brewed using Saccharomyces Uvarum yeast. These yeast work best at temperatures between 44º & 50ºF. This process will take several months, but you can produce just about the same outcome if you raise the temperature to around 55 to 65ºF. This will produce a clean and subtle taste. Lagers can be altered by using different types of grain, altering the temperature of roasting. Examples of lagers are Pilsner, Bock, and Dunkles to name a few. Now that you have an idea of the differences this should make for a good dinner conversation piece. Also it may give you a better idea of what to order next time you're at the bar. More by this Author There are many great fun and interesting facts about Tennessee. Here we will examine some of those facts. Facts about Tennessee that many might not know like, before statehood the region was unoffically a...
<urn:uuid:8b529db2-a335-4e79-85e4-0ef24be9483e>
CC-MAIN-2017-04
http://hubpages.com/food/Whats-The-Difference-Between-Ale-Lager
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280825.87/warc/CC-MAIN-20170116095120-00208-ip-10-171-10-70.ec2.internal.warc.gz
en
0.952234
676
3.171875
3
One of the aspects of a child custody case that is often contentious is the child support. This financial support is paid by one parent to the other parent for the benefit of the children. It is used to pay for the expenses of the child; however, it is normally comingled with other household funds. The parent who receives the payments won’t have to account for the use of the money. Instead, they simply have to ensure that the kids have life’s basic necessities. There are cases in which a paying parent might question whether the money is actually going to the children. In this instance, they need to look at whether the child has adequate shelter, food, clothing and other needs. As long as they do, there is very little chance that the court will do anything about how the parent is spending the funds that are handed over to them. The parent who receives these support payments will have to add more money into the child’s life needs. In almost every case, child support payments aren’t enough to pay for the child’s necessities and other things like medical care costs, education expenses, and extracurricular fees. The paying parent also needs to realize that child support money is sometimes used to cover things like transportation, child care, and entertainment. It is imperative that both parents fully understand the child support order, so they can ensure it is being followed appropriately. When there are deviations from it, such as if a parent isn’t paying or the recipient isn’t providing the child with their basic needs, the court might need to get involved.
<urn:uuid:dd4e8b84-a9e3-4284-905c-7633caf05746>
CC-MAIN-2022-33
https://www.mckeonlawfirm.com/2019/05/child-support-payments-must-cover-certain-necessities/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00675.warc.gz
en
0.974557
328
1.8125
2
I work as a cabin crew so naturally, my work brings me to various countries. I am thinking bringing my drone with me overseas to capture all the different sights from these different countries. However i was wondering if having no 3g/4g data is gonna affect the way my drone flies. Usually, we would fly with a map on the app, without data, the map would not be there. So would it be able to still show the direction of the drone relative to the home point(even though there is no map overlaying the flight route)?
<urn:uuid:b1fa038a-be0c-4a74-9eaa-2a77968614dd>
CC-MAIN-2016-44
http://www.phantompilots.com/threads/can-i-fly-without-data-for-my-map.50721/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720845.92/warc/CC-MAIN-20161020183840-00087-ip-10-171-6-4.ec2.internal.warc.gz
en
0.96208
112
1.625
2
Tucson Water Turnaround (Paperback) In the 1990s, Tucson Water changed water sources without considering the limitations of their existing distribution system or the taste and odor effects for customers. The new water caused pipe corrosion for customers, damaged the distribution system, and created a public relations nightmare. The authors' first-hand experiences, first-person recollections, and newly unearthed records tell the story of how this crisis developed and how it was solved. Exhaustive research undertaken by the authors paints a detailed picture of how this crisis occurred, ineffectual attempts to address the problem, and how a new team finally solved Tucson's water woes. The book is a case study on how to avoid disasters such as the Flint lead crisis and other utility crises resulting from changing water supplies or water treatment. Critical takeaways provide readers with a quick summary of the most valuable information in the last chapter. Each key takeaway can be adapted and applied to any utility attempting to resolve or communicate a crisis.
<urn:uuid:e89345b9-6ccc-4f57-bd03-580c8fa8e74d>
CC-MAIN-2022-33
https://www.mysterylovers.com/book/9781625763433
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00077.warc.gz
en
0.931162
199
1.960938
2