text
stringlengths
181
608k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
138k
score
float64
1.5
5
int_score
int64
2
5
- 1 Where is Henry Ford Medical Center? - 2 How many Henry Ford hospitals are in Michigan? - 3 How long does it take to become a pediatric orthopedic surgeon? - 4 What do pediatric orthopedic surgeons do? - 5 What was Henry Ford worth? - 6 Who owns Ford now? - 7 Did Henry Ford own a hospital? - 8 Is Henry Ford a good hospital? - 9 Do the Fords own Henry Ford Hospital? - 10 What is the easiest doctor to become? - 11 What is the highest paid doctor? - 12 What type of surgeon gets paid the most? - 13 What is a child’s doctor called? - 14 What are the most common orthopedic surgeries? - 15 How much money does a pediatric orthopedic surgeon make? Where is Henry Ford Medical Center? |Henry Ford Hospital| |Location||2799 West Grand Boulevard Detroit, Michigan 48202, Wayne County, Michigan, United States| |Care system||Full medical care, including inpatient and outpatient care| |Type||Academic medical center and hospital| How many Henry Ford hospitals are in Michigan? 2. The system includes many locations through Michigan, including 8 hospitals, 29 medical centers and specialized medical facilities, 8 emergency departments, 24 pharmacies and the Henry Ford Medical Group, which includes more than 1,200 physicians in more than 40 specialties. How long does it take to become a pediatric orthopedic surgeon? Graduated from an approved medical school (typically four years) Graduated from an approved orthopaedic surgery residency program (typically five years) Completed additional subspecialty training in pediatric orthopaedics and pediatric spinal deformity (typically one year) What do pediatric orthopedic surgeons do? Pediatric orthopedic surgeons diagnose, treat, and manage children’s musculoskeletal problems including the following: Limb and spine deformities (such as club foot, scoliosis) Gait abnormalities (limping) Bone and joint infections. What was Henry Ford worth? How much is Henry Ford Worth? Henry Ford net worth: Henry Ford was an American entrepreneur, founder of Ford Motor Company, who had a net worth of $200 billion dollars (adjusted for inflation). Who owns Ford now? William Clay Ford Jr. As executive chair of Ford Motor Company, William Clay Ford Jr. is leading the company that put the world on wheels into the 21st century. He joined the board of directors in 1988 and has been its chair since January 1999. Did Henry Ford own a hospital? As the hospital could not operate on its own, Henry Ford offered it to the U.S. government for use as an Army hospital for the duration of the war. The hospital was closed in the summer of 1918, and all remaining staff who could pass the military physical entered the service. Is Henry Ford a good hospital? DETROIT – Henry Ford Hospital has been recognized as a Best Hospital in the Neurology & Neurosurgery and Ear, Nose & Throat (ENT) specialties on U.S. News & World Report’s 2019-20 list of America’s Best Hospitals. Do the Fords own Henry Ford Hospital? The corporate office is at One Ford Place, Detroit, Michigan. Henry Ford established the health system in 1915, and it is currently run by a 17-member board of trustees. Henry Ford Health System also owns the health insurance company Health Alliance Plan. Henry Ford Health System. What is the easiest doctor to become? A general practice doctor has the least amount of requirements for any medical doctor. While these doctors do still have four years of medical school and one to two years of residency after completing four years of undergraduate education, this is the minimum amount of education any medical doctor must undergo. What is the highest paid doctor? Top 19 highest – paying doctor jobs - Neurologist. National average salary: $237,309 per year. - Orthodontist. National average salary: $259,163 per year. - Anesthesiologist. National average salary: $328,526 per year. - Cardiology physician. National average salary: $345,754 per year. What type of surgeon gets paid the most? RELATED: The list of the top 10 highest physician salaries by specialty for 2019 - Neurosurgery — $746,544. - Thoracic surgery — $668,350. - Orthopedic surgery — $605,330. - Plastic surgery — $539,208. - Oral and maxillofacial — $538,590. - Vascular surgery — $534,508. - Cardiology — $527,231. - Radiation oncology — $516,016. What is a child’s doctor called? A pediatrician is a medical doctor who manages the physical, behavioral, and mental care for children from birth until age 18. A pediatrician is trained to diagnose and treat a broad range of childhood illnesses, from minor health problems to serious diseases. What are the most common orthopedic surgeries? What Are the Most Common Orthopedic Surgeries? - Knee Replacement. The knee is one of the most used joints in the body, but unfortunately, that means it’s often over-used to the point of injury. - ACL Surgery. - Hip Replacement. - Shoulder Replacement. - Joint Fusion. How much money does a pediatric orthopedic surgeon make? How much does a Pediatric Orthopedic Surgeon make? The national average salary for a Pediatric Orthopedic Surgeon is $388,142 in United States.
<urn:uuid:62b1d0ce-7ca6-4a9f-a971-f850f07247a7>
CC-MAIN-2022-33
http://mrmcw.org/recommendations/quick-answer-where-is-henry-ford-pediatric-orthopedics-dept.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00271.warc.gz
en
0.927966
1,264
2
2
This should include measures targeted at the needs of poor women, regarding both access to global markets and protection from negative impacts of globalization, panelists said. The recommendations came at an event held Tuesday in conjunction with the weeklong UNCTAD XII ministerial conference in Accra, Ghana. The event, Trade and Gender: Perspectives for Sustainable Growth and Poverty Alleviation, was introduced by UNCTAD Secretary-General Supachai Panitchpakdi, and Chaired by Commonwealth Deputy Secretary-General Ransford Smith. Summarizing the presentations and discussion, Mr. Smith listed a series of recommendations, including the need to apply a gender lens when formulating, implementing and negotiating trade policy, strengthen trade support services for women and develop gender sensitive projects targeted at export promotion. Regulatory frameworks, trade policies and international negotiations should take into account the needs of women, and there should be greater involvement of women in determining these. Panelists included Ms Rachel Mayanja, UN Special Adviser on Gender Issues and the Advancement of Women, who gave the Opening Statement; Shri Gopal Pillai, Permanent Secretary, Commerce Ministry, India; Anh-Nga Tran-Nguyen, Director, Services Infrastructure for Development and Trade Efficiency, UNCTAD; and Savior Mwambwa, National Coordinator of the Civil Society Trade Network, Zambia.
<urn:uuid:0e24feb1-9e9e-4314-b702-f45e1a1c6c1c>
CC-MAIN-2017-04
http://unctad.org/en/Pages/PressReleaseArchive.aspx?ReferenceDocId=10055&Sitemap_x0020_Taxonomy=1569;
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00186-ip-10-171-10-70.ec2.internal.warc.gz
en
0.919644
275
2.078125
2
WASHINGTON — A sweeping bipartisan plan to overhaul the nation's immigration system headed to the Senate floor after a key committee approved it Tuesday, setting the stage for a debate next month that could lead to the biggest victory for advocates of immigrant rights in a generation. The centerpiece of the legislation — a 13-year path to citizenship for many of the 11 million people now in the country without legal status — survived intact. But the bill's supporters accepted amendments that tilted it to the right to attract GOP backing, including some to toughen border security. The bill faces weeks of debate in the Senate. Both Democrats and Republicans will seek to undo some of the compromises in the bill, and GOP opponents may yet try to sink it. An even tougher challenge lies ahead in the House, where members of the Republican majority have been less interested than their Senate counterparts in a comprehensive revamping of immigration policy. The Senate Judiciary Committee approved the bill, 13 to 5, with three Republicans joining the majority Democrats. A last-minute deal persuaded one GOP senator to join the two Republicans who had helped draft the bill, but the other Republicans remained adamantly opposed. "All of us know our immigration system is not working," said Sen. Patrick J. Leahy (D-Vt.), committee chairman. "It's long time past for reform. I hope that our history, our values and our decency as a people — as a people — can inspire us to take action. We're Americans. We need an immigration system that lives up to American values." With passage, cheers erupted in the audience, which has been packed each day for the three weeks of hearings. "Yes we can!" the crowd chanted before switching to Spanish, "Si se puede!" The bill, drafted by four Democrats and four Republicans, would be the most substantial change in immigration law since the 1986 reforms under President Reagan, which gave legal status to 3 million people. As the Senate committee blazed through the last of 300 amendments Tuesday, President Obama met at the White House with young people from immigrant families. Immigration overhaul is the administration's top second-term priority, and the president acknowledged that compromise was necessary. "None of the committee members got everything they wanted, and neither did I," Obama said in a statement. "But in the end, we all owe it to the American people to get the best possible result over the finish line." Senate Majority Leader Harry Reid (D-Nev.) has vowed to make the bill the chamber's priority in June and try to send it to the House with some momentum behind it. Earlier Tuesday, Sen. Mitch McConnell of Kentucky, the Republican minority leader, said, "I'm hopeful that we'll be able to get a bill that we can pass here in the Senate." Although substantial resistance remains, many Republicans are increasingly open to changing immigration policy. Party leaders believe support of the overhaul will help them attract Latino and minority voters who have abandoned the GOP in recent elections. Business and religious leaders who are influential among Republicans have also pushed the benefits of bringing immigrants into the legal system. What began a month ago as a 844-page bill now includes a complicated series of political trade-offs. The bill would provide a path to citizenship for people who came into the country illegally or overstayed visas, so long as they entered before December 2011. They must get provisional status, show a viable income, pay back taxes, fees and fines, and learn English. They can gain permanent legal status in 10 years and apply for citizenship in 13 years. The process is half as long for agricultural workers who commit to jobs in the fields and adults who were brought to the country as minors but serve in the military or attend college. The legislation also would provide $4.5 billion for increased border security, and a new low-skilled guest-worker program would begin for maids, landscapers and others who could enter the country for three-year stints. All employers would be required, within five years, to verify the legal status of their workers. During the debate over the bill, major changes proposed by opponents were thwarted, but others that did not endanger the bill were accepted. In all, 141 amendments were adopted. More are coming. Both sides promised to fight some of the same battles anew as the Senate tries to craft a bill that can win support in the House. "The reality is that work still remains to be done," said Sen. Marco Rubio (R-Fla.), who is not on the committee, but whose work as one of the authors gave the bill a push. "Immigration reform will not become law unless we can earn the confidence of the American people that we are solving our immigration problems once and for all." Rubio, a potential presidential hopeful, promised a fight on the Senate floor for tougher border security provisions, a warning shot that encouraged the committee to move the bill to the right. The committee obliged by adding a new exit-visa system at the nation's busiest international airports to track immigrants as they depart. An estimated 40% of the illegal immigration in U.S. stems from those who stay after their visas expire. The committee also beefed up rules on student visas after the Boston Marathon bombings. But it is unclear whether the tougher provisions go far enough to satisfy Rubio's conservative allies. At the same time, liberals lost their drive to allow immigrant gay partners and spouses of U.S. citizens and legal residents to qualify for legal status, as straight spouses do. The room grew quiet late Tuesday as Leahy shelved his amendment "with a heavy heart" after some senators warned it would tank GOP support. "You've got me on immigration. You don't have me on marriage. I don't know how to put it more plainly," said Sen. Lindsey Graham (R-S.C.), one of the Senate authors. An 11th-hour agreement on high-skilled visas with Republican Sen. Orrin G. Hatch of Utah proved crucial to gaining his support; his was the sole GOP vote aside from those of the authors. Hatch won changes that included tripling the number of high-skilled visas available, to 180,000, more quickly than originally proposed. The Hatch provisions were popular with big business, but opposed by labor. For Democrats, the biggest win was the path to citizenship, which remains crucial for their support. The arguments against such a path have grown more muted than they were six years ago, when Congress last attempted an immigration overhaul. But Republican opponents of the bill, including Sen. Jeff Sessions of Alabama, repeatedly conjured up the 1986 bill, which they say granted amnesty and failed to secure the border. Sen. Ted Cruz (R-Texas), the son of Cuban immigrants, offered an amendment to gut the path to citizenship, which was rejected. He voted against the bill, saying "it doesn't fix the problem." The divide among Republicans was evident when all committee members — except Sessions — shot down the Alabama senator's amendment that would have capped the overall number of newcomers. Democrat Sen. Charles E. Schumer of New York, one of the bill's chief architects, said that without the legalization program, there would be no reform. "That is so against the lady that stands in the harbor of the city I represent," he said. "You won't have my vote. You won't have the vote of a whole lot of people." After the vote, Schumer was among the senators whom many in the audience sought out for pictures. "This is the hope we've been looking for, for many years," said Claudia Quinonez, an 18-year-old high school senior in Maryland, who came to the U.S. from Bolivia when she was 11. "We're fighting for our mothers, fathers, cousins — everyone who wants that American dream." Christi Parsons in the Washington bureau contributed to this report.
<urn:uuid:1ccb6291-de3b-4ec7-b4dc-50d7a65c4525>
CC-MAIN-2017-04
http://www.ctnow.com/la-na-immigration-senate-20130522-story.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00051-ip-10-171-10-70.ec2.internal.warc.gz
en
0.973236
1,620
1.601563
2
The Church’s secret mission: Vatican diplomacy AleteiaJuly 15, 2021Read originalNew book by Victor Gaetan provides overview of Holy See's interest in international relations, current challenges and prospects. “At the heart of Christian diplomacy is reconciliation between people, especially those with different traditions or history,” says Victor Gaetan, author of a new book about Vatican diplomacy. God’s Diplomats: Pope Francis, Vatican Diplomacy, and America’s Armageddon, published by Rowman & Littlefield, is an overview of Pope Francis’s unexpected emphasis on international relations. Providing a primer on the Church’s long history of diplomacy, Gaetan shows how and why it works, and offers a contrast to recent U.S. international decisions.Victor Gaetan | Rowman & Littlefield Publishers Gaetan, a native of Romania, is a longtime correspondent for periodicals and journals such as the National Catholic Register, Foreign Affairs and America magazine. He has a PhD from Tufts University in ideology in literature. He shared some insights with Aleteia about the importance the Church places on diplomacy and some recent successes and future prospects for the mission under Pope Francis.Most people, I imagine, when they hear you talk about the Catholic Church, think about popes, bishops, priests, rituals, etc. I don’t think diplomacy is the first thing that comes to most people’s minds. When did the Church get into this “business”? Remember what happened on Pentecost? People gathered in Jerusalem from foreign lands could suddenly understand the disciples, despite language barriers. At the heart of Christian diplomacy is reconciliation between people, especially those with different traditions or history. It’s baked into the Gospel: Christ sent the apostles to “make disciples of all nations” (Mt. 28:18-20). In time, the Catholic Church institutionalized diplomacy out of necessity. In 325, Pope Sylvester sent three legates, including a bishop, to represent him at the Council of Nicaea, convened by Emperor Constantine. Fast forward to medieval Christendom, when papal mediation was called on to settle an infinite number of political disagreements and territorial questions across Europe. Rome deployed a variety of clerical problem solvers, all standing for the pope. That system of diplomatic representation became the basis for modern inter-state diplomacy — to this day.In what ways is this diplomacy carried out? Mainly through nuncios — Vaticanese for ambassadors. They are the pope’s personal representatives to a foreign government or a multilateral group such as the United Nations. Nuncios also play a key role in helping the Vatican select bishops. The Holy See has bilateral relations with 183 countries. Two new ones added under Francis are Mauritania and Myanmar. Nuncios gather information on what’s happening in each country — the politics and Church life — reporting up to the pope through the Vatican’s Secretariat of State. A nuncio (from the Latin word for “messenger”) can rely on lateral “intelligence” from bishops, priests, religious, and lay collaborators. In its diplomacy, the Catholic Church is less like a rigid hierarchy, more like an agile network.What advantages and disadvantages does papal diplomacy have, compared to that of secular states? Secrecy is a tremendous advantage in diplomacy. The Holy See’s diplomats vow never to reveal what they know. And since Vatican City is not a democracy, there aren’t citizens clamoring to learn what’s happening behind the scenes. Secular diplomats tell me nuncios are among their most discreet colleagues, making them especially trustworthy. But the Vatican diplomatic corps is miniscule compared to other world powers. A large Vatican embassy (called a nunciature) may have up to five priests, as in Washington, DC, but most have just two: a nuncio and his secretary. Contrast that with a US or British embassy in a capital city such as Paris: You’ll find hundreds of staff and dozens of senior diplomats there.What can papal diplomacy accomplish that the diplomatic efforts of nation-states are not so likely to pull off? Any examples spring to mind? Since the Holy See has few material interests — just a tiny territory and no real economy — it is free to see the truth of temporal situations. When a pope is highly respected, as Pope Francis is, secular diplomats sometimes defer to his moral authority on, essentially, political matters. When Cuba and the United States reached an impasse in negotiating a new way of relating to each other, for example, it was Francis who got the two countries on the same page. Final negotiations were conducted at the Apostolic Palace in 2014. Deep distrust prevented the longtime antagonists from getting to yes, so the Vatican stepped in as a higher power with the authority to hold each side accountable. Similarly, Pope John Paul II and his diplomatic team prevented war between Argentina and Chile over the Beagle Channel in 1978. It took seven years to hammer out a treaty, signed by both countries in Rome, but the arrangement has lasted to this day.Has the diplomacy of the Holy See taken on a new life under Pope Francis? Between 1914 and 1978, every pope came out of Vatican diplomatic service, which profoundly shaped the modern Church. But Francis came in with no such experience, so there was no reason to expect he would excel. Cardinal Jorge Bergoglio disliked traveling as an archbishop because he didn’t like being away frommi esposa(my wife), as he called his diocese. But Francis proves to have a knack for cultivating international relations. His experience managing a religious order under a brutal dictatorship; his mystical bent, discerning idealistic principles while insisting on concrete actualization; his independence as a man from the Global South, free of the Cold War mindset; and the missionary orientation he shares with other Jesuits combined to prepare him well for the Catholic Church’s extensive behind-the-scenes engagement in contemporary world politics.Francis visited Iraq this year, and there’s even been talk of him traveling to North Korea. Based on the diplomatic track record of the present pontificate so far, do you foresee any further surprises in store, say, a papal visit to Russia or China? Francis absolutely insisted on going to Iraq — against the advice of most diplomatic and especially security specialists around him. It proved that for the Holy Father, personal safety is less important than mission. And what’s the raison d’etre of Church diplomacy? Primarily peace—peace and reconciliation, which facilitates peace. So, I think it is easier to picture Francis traveling to North Korea than to China or Russia. Francis and Cardinal Pietro Parolin (the Holy Father’s alter ego on diplomatic strategy) have been quietly engaged with Korea intensely since 2014, when Francis visited the divided peninsula on his first trip to Asia. President Moon Jae-in and his wife are devout Catholics. And the Church in Korea is the fastest growing Catholic community in Asia. A papal visit to North Korea — the ultimate “periphery,” to use Francis’ mantra — could restart peace talks. Plus, the Korean Catholic Church is so powerful, I can honestly imagine them praying this into reality.What threats exist for the future of papal diplomacy, particularly as the world (at least in the West) seems to be getting increasingly secular? Pope Francis has criticized Western governments and the UN for imposing “gender ideology” and other Leftist schemes on traditional nations. The Church has allied with Muslim-majority nations to block efforts to create a “right” to abortion under the UN flag, for example, at the 1994 International Conference on Population and Development in Cairo. Taking these stands makes the Catholic Church a target for well-organized political forces, who could turn on the Church’s unique status as a fully engaged, permanent observer at the UN. The Catholic Church’s sovereignty is what gives the Holy Father an entry ticket to the international system. We are the only world religion recognized as sovereign under international law. (A whole chapter ofGod’s Diplomatsis devoted to explaining this.) I fear that even Catholics don’t understand the status quo well enough to defend it. So, Rome could be vulnerable to attacks on Church sovereignty, which is what makes our diplomacy especially effective.
<urn:uuid:378bf1b7-c374-4aeb-9746-7281cc03c7c2>
CC-MAIN-2022-33
https://news.phxfeeds.com/share?docId=1321365484669519039&source=phx
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00471.warc.gz
en
0.944661
1,750
1.8125
2
Physics Highlights – May 2009 June 2, 2009Posted by dorigo in news, physics, science. Tags: CDF, DZERO, Fermi, heavy quarks, Hess, QCD, Randall, standard model Here is a list of noteworthy pieces I published on my new blog site in May. Those of you who have not yet updated their links to point there might benefit from it… Four things about four generations -the three families of fermions in the Standard Model could be complemented by a fourth: a recent preprint discusses the possibility. Fermi and Hess do not confirm a dark matter signal: a discussion of recent measurements of the electron and positron cosmic ray fluxes. Nit-picking on the Omega_b Discovery: A discussion of the significance of the signal found by DZERO, attributed to a Omega_b particle. Nit-picking on the Omega_b Baryon -part II: A pseudoexperiments approach to the assessment of the significance of the signal found by DZERO. The real discovery of the Omega_b released by CDF today: Announcing the observation of the Omega_b by CDF. CDF versus DZERO: and the winner is…: A comparison of the two “discoveries” of the Omega_b particle. The Tevatron Higgs limits strenghtened by a new theoretical study: a discussion of a new calculation of Higgs cross sections, showing an increase in the predictions with respect to numbers used by Tevatron experiments. Citizen Randall: a report of the giving of honorary citizenship in Padova to Lisa Randall. Hadronic Dibosons seen -next stop: the Higgs: A report of the new observation of WW/WZ/ZZ decays where one of the bosons decays to jet pairs. What is the Y(4140)? The plot thickens April 6, 2009Posted by dorigo in news, physics, science. Tags: charmonium, heavy quarks, QCD, Y(4140) I read with interest -but it would probably be more honest to say I browsed, since I could understand less than 50%- a preprint released three days ago on “The hidden charm decay of Y(4140) by the rescattering mechanism“, by Xiang Liu, from Peking University (now at Coimbra, PT). The Y particle has been recently discovered by CDF. The existence of the several new resonances of masses above 3 GeV recently unearthed by B factories and by the CDF experiment poses a challenge to our interpretation of these states as simple quark-antiquark bound states, because of their properties -in particular, their decay pattern and their natural widths. Already with the first “exotic” meson discovered a few years ago (and recently measured with great precision by CDF), the X(3872), the puzzle was evident: at a mass almost coincident with twice the mass of conventional charmed mesons (states which are labeled “D”, which are composed of two quarks: a charm and a up or down quark, like or ), the X was immediately suggested to be a molecular state of two D particles. I wrote an account of the studies of the nature of the X particle a few years ago if you are interested -but mind you, the advancements in this research field are quick, and I believe the material I wrote back then is a bit aged by now. The paper by Liu tries to determine whether the interpretation of the Y particle as a pure second radial excitation of P-wave charmonium (, with ) holds water once the observed branching ratio of the Y into the final state seen by CDF (), and the measured decay width, are compared to a theoretical calculation. The nice thing about the decay of the Y into the observed final state is that it occurs only through a so-called “rescattering” mechanism, by means of the diagrams shown in the graph below (the ones shown refer to the J=0 hypothesis of the , but similar diagrams are discussed for the J=1 state in the paper). As you can see, the Y produces the two final state particles by means of a triangle loop of D mesons. These diagrams usually describe rare processes, and in fact Liu’s calculations end up finding a small branching fraction. I am unable to delve into the details of the computation, so I will just state the result: the typical values of the branching ratio depend on a parameter, which, if taken in a “reasonable” range of values, provides estimates in the ballpark of a few . This appears inconsistent with the observation provided by the CDF experiment. Clearly, work is in progress here, so I would abstain from concluding anything definite on the matter. So, for now, let us call this an indication that the simple interpretation of the Y as a excited charmonium state is problematic.
<urn:uuid:a63b6121-aa95-488a-98a0-47be6727f3cf>
CC-MAIN-2017-04
https://dorigo.wordpress.com/tag/heavy-quarks/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284352.26/warc/CC-MAIN-20170116095124-00200-ip-10-171-10-70.ec2.internal.warc.gz
en
0.938525
1,043
2
2
With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources. |what is the diference between basic Hard disk, and dynamic Hard disk?||3||64| |My Tsm DB backup keeps waiting for a scratch tape until it cancel.||5||63| |Perc 6/i question adding more drives/arrays||5||53| |"Parameter not Correct" in External HDD||8||30| Join the community of 500,000 technology professionals and ask your questions. Connect with top rated Experts 16 Experts available now in Live!
<urn:uuid:dba542f8-3e1f-4b10-9860-e1bc0ea005f1>
CC-MAIN-2017-04
https://www.experts-exchange.com/questions/28014883/Raid-Configuration-question.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281419.3/warc/CC-MAIN-20170116095121-00484-ip-10-171-10-70.ec2.internal.warc.gz
en
0.841699
148
1.570313
2
Ask any technical trader and he or she will tell you that the right indicator is needed to effectively determine the change of course in the stock price models. But one thing that the "right" indicator can do to help the merchant, two complementary indicators can do better. This article aims to encourage traders to look for and identify both bullish MACD crossover along with a bullish stochastic crossover and then use this as an entry point in the trade. Matching Stochastic and MACD Looking for two popular indicators that work well together resulted in the pairing of the stochastic oscillator and moving average convergence divergence (MACD). This team works as a comparison of stochastic closing stock price of its price range over a certain period of time, while the MACD is the formation of two moving average convergence and different from each other. This dynamic combination is very effective if used to its fullest potential. (For background reading on each of these indicators, see Understanding Oscillators: Stochastics and guide for the MACD.) Work on Stochastic There are two components of the stochastic oscillator: the% K and% d. The% K is the main line indicates the number of periods, and% D is a moving average of% K.. Understanding how stochastic is formed is one thing, but knowing how to react in different situations is more important. For example: Common triggers occur when the% K line falls below 20 - the stock is considered oversold, and that is buy signal. If the% K peaks just below 100, then heads down, the stock should be sold before the value falls below the 80th Generally, if the% K value rises above the% D, then buy signal is indicated by this crossover, under the values are below the 80th If they are above this value, security is considered overbought. As a versatile trading tool that can reveal the price momentum, MACD is also useful in determining the price trend and direction. MACD indicator has enough strength to stand alone, but the predictive function is not absolute. It is used with another indicator, the MACD can really ramp up the advantage to the merchant. (Learn more about online trading momentum trading discipline.) If the trader to determine trend strength and direction of the stock, moving average lines overlaying the MACD histogram is very useful. The MACD, can also be viewed as a histogram alone. (Learn more Introduction to the Histogram MACD.) To bring this oscillating indicator that varies above and below zero, a simple MACD calculation is required. By subtracting the 26-day exponential moving average (EMA) of the cost of safety of 12 days moving average of its price, oscillating indicator value comes into play. Once the trigger line (the nine day EMA) is added, the comparison of two trading creates the image. If MACD value is greater than nine-day EMA, then it is considered a bullish moving average crossover. It is useful to note that there are several known ways to use the MACD: Above is the view of the crossover differences or center line of the histogram, the MACD Buy illustrates opportunities above zero and sell options below. Another is the perception of moving average line Crossovers and their relationship to the central line. (For more, see Trading divergence of MACD.) Identifying and integrating bullish Crossovers In order to determine how to integrate with bullish MACD crossover and bullish stochastic crossover in trend-confirmation strategy, the word "bullish" should be explained. In the simplest of terms "bullish" refers to a strong signal to the ever increasing prices. Bearish signal is what happens when the faster moving average crosses above the slower moving average, creating market momentum and further indicates the price increases. In the case of a bullish MACD, it will happen when the histogram value is above the equilibrium line, and also when the MACD line is of greater value than nine day EMA, also called the "MACD signal line." Bullish divergence on the stochastic occurs when the% K value adopted% D, confirming a likely cost a turn. Crossovers in action: Genesee and Wyoming Inc (NYSE: GWR) Below is an example of how and when to use stochastic and MACD double cross. Note the green lines that appear when these two indicators moved in almost perfect Sync and cross on the right side of the table. You may notice that there are several instances when MACD and stochastics are close to crossing the same time - in January 2008, in mid-March to mid April, for example. It even looks like you do not move at the same time table of this size, but when you take a closer look, you see that they actually move in within two days of each other, a criterion for setting this scan. You may want to change the criteria so as to crosses that occur within a broader time frame, so you can catch up to those shown below. It is important to understand that changing the settings parameters can help to produce extended trendline, which helps a trader avoid whipsaw. This is achieved by using higher values in the interval / time settings. This is commonly called "smoothing things out." Active traders, of course, use much shorter time frames and indicator settings reference chart for five days instead of one for months or years of price history. First, look for bullish Crossovers occur within two days of each other. Keep in mind that the application of stochastic and MACD cross double strategy, ideal crossover occurs below 50 line stochastic capture several price ranges. And preferably, you want the histogram value of being or moving higher from scratch within two days of placing the trade. Also note that the MACD cross has little by stochastic, as an alternative you can create a false indication of the price trend or where you sideways trend. Finally, it is safer to trade stocks that are trading above the 200-day moving average, but it is not an absolute necessity. This strategy gives retailers the opportunity to hold out for a better entry point uptrending stock or any surer that the downtrend has really changed when bottom fishing for a long term. This strategy can be turned into a scan where charting software licenses. With every advantage that any strategy presents, there is always a lack of technique. Because stocks usually takes longer to line up the best buying position, actual trading of stocks happens rarely, so you may need a bigger basket of stocks to watch. Trick of the trade The stochastic and MACD double cross allows the merchant to change the intervals, finding optimal and consistent entry points. In this way you can tailor to the needs of both active traders and investors. Experiment with both indicator intervals and see how differently Crossovers line, and then select the number of days that work best for your trading style. You may also want to add the RSI indicator to the mix, just for fun. (Read RSI Rollercoaster Ride For more information about this indicator.) Also, the stochastic oscillator MACD and the function of different technical areas and work alone. Compared with the stochastic, which ignores the market blows, the MACD is more reliable option as the only indicator for trading. However, just as two heads, two indicators are usually better than one! The stochastic and MACD are an ideal pairing and can provide for improved and more efficient trading experience. - Laquerre Minusdi - How To Trade With Ix O Ah - Mtf Rsi Indicator Forex - 4Hvegasmetatraderweeklyindicator V11 - Dt Rsi Indicator
<urn:uuid:fd8f2bf2-a339-48d1-872b-d383c06ddc9d>
CC-MAIN-2017-04
http://forex-indicator-macd.blogspot.sg/2011/09/macd-and-stochastic-trading-strategy.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00345-ip-10-171-10-70.ec2.internal.warc.gz
en
0.91516
1,605
1.9375
2
Facts about Gluyas Williams Gluyas Williams Biography Gluyas Williams was one of America’s most popular cartoonists between the World Wars. His specialty was gentle satire of big-city suburban life: commuter trains, cigar-wielding businessmen, meek husbands, women’s clubs, sandlot ballplayers, and the like. His distinctive pen-and-ink style used bold patches of black and playfully curved lines to great effect. Williams graduated from Harvard in 1911 and spent a year studying art in Paris, but it wasn’t until 1920 that he had success selling drawings to magazines like Collier’s and Life. In 1922 he began producing Suburban Heights, a syndicated feature that helped pioneer the single-panel-with-caption format that is now a newspaper staple. The feature introduced his signature character, a round-faced and mildly befuddled suburbanite known as Fred Perley. Williams became a regular at The New Yorker in 1930 and was closely associated with the magazine’s Robert Benchley; the two met while working on The Harvard Lampoon, and Williams later illustrated Benchley’s books of funny essays. Williams spent his adult life in Newton, Massachusetts, commuting to a studio in downtown Boston. He retired from drawing at age 65, in 1953. His books include Fellow Citizens (1940) and The Gluyas Williams Gallery (1957). His name was pronounced GLOO-yas. A 1948 article in American Artist reported that “Gluyas is a family name and comes from Mr. Williams’ ancestral Cornwall” (England)… WIlliams finished Harvard in three years… His sister, Kate Carew, was also an artist and caricaturist… His matronly female characters were sometimes compared to those of another New Yorker cartoonist, Helen Hokinson. His style was also influenced by that of Aubrey Beardsley… Williams married the former Margaret Kempton in 1915; they had a son, David Gluyas, and a daughter, Margaret.
<urn:uuid:86584a8c-646e-411b-a4ac-7c70bd62319e>
CC-MAIN-2022-33
https://www.who2.com/bio/gluyas-williams/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00277.warc.gz
en
0.968144
434
2.578125
3
- ›› Keywords : non-violent resistance On February 1, 1960, four black students from North Carolina Agricultural and Technical College in Greensboro, North Carolina, walked into a Woolworth’s store and quietly sat down at the lunch counter. This seemingly mundane, everyday act sent shock waves through Greensboro, through North Carolina, and through the nation. The counter at which these four young men sat was for whites only. This simple act was like a stone thrown into a still pond. It sent out ripples across the nation that stirred people to take... In the early 1960s, Mississippi was the poorest state in the nation, with most non-white families living well below the poverty line. Although African Americans made up nearly half of the state's population, few were registered to vote, and there were no African American representatives in the Democratic Party. In 1964, a presidential election year, civil rights organizations decided to focus on four goals in Mississippi: registering African Americans to vote; using the Mississippi Freedom Democratic Party to challenge...
<urn:uuid:a958c749-cb95-447e-a1fc-2f407cfb9a69>
CC-MAIN-2017-04
https://www.gilderlehrman.org/category/keywords/non-violent-resistance
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00339-ip-10-171-10-70.ec2.internal.warc.gz
en
0.955602
212
3.15625
3
1 Integrated Physiology, Department of Nutrition, Exercise and Sports, Faculty of Science, Københavns Universitet2 Center for Holdspil og Sundhed, Department of Nutrition, Exercise and Sports, Faculty of Science, Københavns Universitet3 Department of Exercise and Sport Sciences, Faculty of Science, Københavns Universitet4 Institut for Idræt og Ernæring, Københavns Universitet5 Integrated Physiology, Department of Nutrition, Exercise and Sports, Faculty of Science, Københavns Universitet6 Department of Exercise and Sport Sciences, Faculty of Science, Københavns Universitet effect of exercise training Menopause is associated with an accelerated decline in vascular function, however, whether this is an effect of age and/or menopause and how exercise training may affect this decline remains unclear. We examined a range of molecular measures related to vascular function in matched pre- and post-menopausal women before and after 12 weeks of exercise training. Thirteen pre-menopausal and ten recently post-menopausal (1.6±0.3 (mean±SEM) years after final menstrual period) women only separated by three years (48±1 vs. 51±1 years) were included. Before training, diastolic blood pressure, soluble intercellular adhesion molecule-1 (sICAM-1) and skeletal muscle expression of thromboxane A synthase were higher in the post-menopausal women compared to the pre-menopausal women, all indicative of impaired vascular function. In both groups, exercise training lowered diastolic blood pressure, the levels of sICAM-1, soluble vascular adhesion molecule-1 (sVCAM-1), as well as plasma and skeletal muscle endothelin-1. The vasodilator prostacyclin tended (P=0.061) to be higher in plasma with training in the post-menopausal women only. These findings demonstrate that already within the first years after menopause, several biomarkers of vascular function are adversely altered, indicating that these biomarker changes are more related to hormonal changes than aging. Exercise training appears to have a positive impact on vascular function, as indicated by a marked improvement in the biomarker profile, in both pre- and post-menopausal women. American Journal of Physiology: Regulatory, Integrative and Comparative Physiology, 2014, Vol 306, Issue 7
<urn:uuid:72d2fd5d-444c-4d6e-abb7-94c165142636>
CC-MAIN-2017-04
http://www.forskningsdatabasen.dk/catalog/261111279
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00519-ip-10-171-10-70.ec2.internal.warc.gz
en
0.87802
520
1.554688
2
The courts appear to have heard calls from victims of white-collar crime demanding stiffer sentences against those found guilty of swindling investors. In October 2009, Vincent Lacroix, a high-profile Quebec white-collar criminal found guilty of masterminding a $130-million fraud with 9,200 victims, was sentenced to 13 years in jail. A little over a year later, in February 2010, former Montreal financial adviser Earl Jones was sentenced to 11 years in prison, after pleading guilty to two fraud charges related to a $50-million Ponzi scheme he orchestrated. But an accounting professor who published a study on occupational fraud is far from convinced that stiff jail sentences on white-collar criminals will prove to be an effective deterrent. “Jail sentences do not deter future white-collar crimes,” said Dominic Peltier-Rivest, Chair and associate professor at the department of accountancy at the John Molson School of Business at Concordia University. There is no evidence or studies that suggest that extended incarceration yields additional deterrence, he maintains. “What discourages future white-collar criminals is the fear of getting caught, not the length of sentence.” Peltier-Rivest asserts in his study, “Detecting Occupational Fraud in Canada: A Study of its Victims and Perpetrators,” that measures such as a fraud hotline or an anonymous reporting program, fraud awareness training programs as well as surprise and external audits can be effective tools to limit the losses incurred by occupational fraud. Occupational fraud is costly. Peltier-Rivest, a certified fraud examiner (CFE) who earned his PhD studying financial statement fraud, estimates that public and private-sector Canadian organizations lose five per cent of sales to fraud every year, with small business (defined as having less than 100 employees) being particularly vulnerable. Smaller organizations, notes the study, tend to have fewer internal controls largely due to fewer or more limited resources. The study discloses that 90 per cent of all occupational fraud cases involve asset misappropriation, with a median loss of $200,000. And it reveals that 42 per cent of occupational frauds were committed by employees, 38.6 per cent by managers and nearly 20 per cent by owners and executives. But while owners and executives perpetrate less frauds, they commit larger frauds, with median losses estimated at $1-million compared to $165,000 for managers and $75,000 for employees. Executives typically have more opportunity to commit larger frauds “due to their high level of authority, which enables them to override controls more easily than lower-level employees,” according to the report. Executives also frequently have greater access to organizational assets than their subordinates, adds the study. That’s why it is important for organizations to tailor anti-fraud measures, said Peltier-Rivest. External audits are the most frequently tool to detect frauds, with nearly 80 per cent of organizations examined by Peltier-Rivest resorting to them. But they are from being the most effective anti-fraud measure. External audits detected only 6.7 per cent of frauds. In contrast 13 per cent of occupational frauds were detected by internal audits, 19 per cent by an organization’s internal controls, and a surprising 42 per cent through tips from employees, vendors, customers or anonymous sources. In fact, organizations that use hotlines detect fraud far quicker and experience much lower median fraud losses than those that did not ($90,000 compared to $197,500). “This result brings some support to new audit committee regulations adopted by most Canadian provinces in the last few years, which require audit committees of publicly traded companies to establish reporting mechanisms to receive and address complaints regarding internal controls and financial matters of the company,” said Peltier-Rivest. Peltier-Rivest believes that such reporting mechanisms should also apply to investment funds and private or close-end investment firms as a means to minimize and detect fraud such as was committed by Lacroix. At present, investment funds are not compelled to follow Regulation 52-110 respecting Audit Committees, which requires all reporting issuers to have an audit committee. Nor do investment funds and close-end investment firms have to abide by Regulation 52-109 respecting certification of disclosure in issuers’ annual and interim filings, which calls for every issuer to have disclosure controls and procedures and internal control over financial reporting. “We should work on prevention and earlier detection as opposed to relying on giving somebody 12 years in jail and hoping that it will curb future crimes,” said Peltier-Rivest. Michel Magnan, editor of the world-renowned quarterly journal Contemporary Accounting Research, also believes that stringent internal controls, rather than heavy prison sentences, are key to preventing occupational fraud. Magnan, like Peltier-Rivest, notes that there is a paucity of evidence emanating from studies over the efficacy of stiff prison sentences to deter occupational fraud. “It is wiser to invest in prevention, that is, before the monies disappear,” said Magnan. “A stiff sentence will not deter occupational fraud. It will succeed in making these people more careful in the way that they will commit the fraud. Internal controls really are the key.”
<urn:uuid:202e02bc-f807-4d81-b5ae-d611bc125f44>
CC-MAIN-2022-33
https://lawinquebec.com/do-jail-sentences-deter-future-white-collar-crimes/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00267.warc.gz
en
0.957885
1,113
2.015625
2
How do you read and handle tabular data submission via form in Yii framework 2.0? Sometimes we want to collect user input in a batch mode. That is, the user can enter the information for multiple model instances and submit them all at once. We call this tabular input because the input fields are often presented in an HTML table. It's well known that there are Lazy Loading approach and Eager Loading approach in the relational query. But it's important to note that you should distinguish 2 different modes in the Eager Loading in Yii 1.1.x. In this tutorial i will explain how to use jui auto complete in yii2. The Autocomplete widget enables users to quickly find and select from a pre-populated list of values as they type, leveraging searching and filtering.
<urn:uuid:6c16324c-5c71-4187-bfab-0dd49d63ab97>
CC-MAIN-2017-04
http://www.yiiframework.com/wiki/?category=3&page=2&sort=update.desc
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00354-ip-10-171-10-70.ec2.internal.warc.gz
en
0.897647
169
1.9375
2
Search our database of handpicked sites Looking for a great physics site? We've tracked down the very best and checked them for accuracy. Just fill out the fields below and we'll do the rest. You searched for We found 6 results on physics.org and 24 results in our database of sites 20 are Websites, 2 are Videos, and 2 are Experiments) Search results on physics.org Search results from our links database THe How Stuff Works guide to cloud computing and how it is expected to change the way we store data. News and views on cloud computing from the Guardian website. Find out why clouds appear white. Article on the science of thunder and lightning. But how do clouds come by all this energy, and couldn't we put it to good use? Heating and convection cause the signature shape of nuclear blasts. A fast moving animation showing charge separation and lightning between storm clouds and the ground Introduction to earlier particle detectors including nuclear emulsions, cloud, bubble, and multiwire chambers. A short description and images of Bottlinger's Rings, an effect caused by sunlight bouncing off ice crystals looking down at clouds. Find out how light scattering makes the sky blue and clouds white. An experiment from our Physics To Go series about condensation. All you need is a plastic bottle with cap, water and a match. Showing 11 - 20 of 24
<urn:uuid:8c0932ec-01c9-4a85-bac5-b4701ce8fcdf>
CC-MAIN-2017-04
http://www.physics.org/explore-results-all.asp?currentpage=2&Linktype=0&age=0&knowledge=0&q=cloud
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280872.69/warc/CC-MAIN-20170116095120-00311-ip-10-171-10-70.ec2.internal.warc.gz
en
0.894113
294
2.96875
3
Read the Parkview MB Church Holy Week Devotional Welcome to the Parkview MB Church Holy Week Devotional I want to encourage you to journey with us each week from Palm Sunday to Easter. Each devotional is written by a different person from our church to provide multiple people an op-portunity to contribute. More importantly, we all get to hear different perspectives and insights throughout the week. How to use this devotional: The devotional is an opportunity for you to engage with the Scripture texts that I will not be preaching from this year. Each day, two sets of Scripture are listed. There is the devotional reading that the devotion is based on. You will need to read the devotional reading in your Bible (or Bible app) before reading the devotional. The second Scripture passage listed is the additional reading. If you read all of the devotional readings and additional readings, you will read all of the verses from the triumphal entry to the resurrection. Start with prayer. Ask God to open your heart and mind to what He would reveal to you during your reading. Each week there are reflection questions included during or at the end of the devotional. Take the time to sit with each question and let God guide you as you reflect. My prayer is that during Holy Week you would be inspired to live for the one who died for us all. At the end of the devotional, you will find a guide for Maundy Thursday worship. Whether you are alone or with a family or small group, I want to encourage you to set aside a specific time to reflect on our Lord’s betrayal and sacrifice.
<urn:uuid:77d9ce90-d187-4bca-82d7-9f17944ed85f>
CC-MAIN-2022-33
https://cherenkoff.com/post_1371/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00065.warc.gz
en
0.95741
335
1.601563
2
your life is your life don’t let it be clubbed into dank submission. be on the watch. there are ways out. there is a light somewhere. it may not be much light but it beats the darkness. be on the watch. the gods will offer you chances. you can’t beat death but you can beat death in life, sometimes. and the more often you learn to do it, the more light there will be. your life is your life. know it while you have it. you are marvelous the gods wait to delight Charles Bukowski, “The Laughing Heart” This is a charming and heart warming poem; a short story inviting us to dedicate ourselves to recognizing our Light and seeing the Light in every person and experience. Light has no boundaries in the spiritual relationship. There is only one I AM and that I AM is universal and individually manifest. There is only one You, each made in the image and likeness of our Creator. To reflect back the Light in one another, is our higher purpose. When our light is seen and recognized, there’s a little more of it available to us. There is no power to prevent God’s grace from reaching us in the light or the shadow. Every bit of love that we express is a love that is expressed to us. I am you and you are me. The “light of pure knowing” (Spira) helps us see our true identity and recognizing our true identity is the recognition of the nature of Consciousness. There is but one Life and we are living that Life. This is the truth that makes us free. Sun light, moon light. Light waves, light travelers. Light seekers, light seers…live in the Light, be a Light in the world, in places of darkness too. “We came spinning out of nothingness, scattering stars like dust. When life became Love, we reached our destination”. – Rumi
<urn:uuid:3e4c9604-be05-45ed-ae77-70f04ef6939c>
CC-MAIN-2022-33
https://alenagrace.com/2018/07/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00671.warc.gz
en
0.932118
436
1.664063
2
Doctor insights on: What Is The Difference Between Compulsion And Addiction It's the intensity: Of the distress. A compulsion (behavior) or obsession (thought) comes with intense anxiety & distress. Wanting something really badly or having a goal usually feels more positive and motivating & is something you think is good for you. If you get what you want, you feel good. A compulsive action is never satisfying, it just keeps repeating & the distress continues. ...Read moreSee 2 more doctor answers Addiction is a condition in which a person has a strong, persistent physical and psychological need for a habit-forming substance (such as alcohol, cigarettes, or cocaine) or an activity (such as gambling). The person usually suffers physical or psychological withdrawal symptoms if he is unable to continue getting what ...Read more Often together: The 2 of these often come together. "addiction" signifies a behavioral pattern of using a substance despite obvious harm to the person's life, work, and relationships. They use more than intended; lie about using; and spend lots of time using it. Physical habituation (having withdrawal symptoms when missing dose) can happen without addiction, but may come with mental/behavioral patterns as above. ...Read moreSee 2 more doctor answers Addiction: Physical addiction or dependence is when chronic use of a substance results in tolerance, and when abrupt discontinuation or tapering of the substance results in unpleasant withdrawal symptoms. The person shows physiological craving for the substance. Psychological dependence is feeling the need for the substance because it induces enjoyable mental effects. ...Read moreSee 1 more doctor answer Three things: You have mentioned three different things: tolerance - needing more of a drug to get the same effect. Very common in many drugs. Dependence - a physical/psychological need for a drug, often accompanied by specific symptoms if you stop taking it. Addiction - pattern of [harmful] behaviors involving a substance or behavior; typically involves dependence/tolerance related to the substance/behavior. ...Read moreSee 1 more doctor answer Definitions: I believe you are interchanging physical addiction with dependence which generally means that the removal of the subject will cause some type of withdrawal syndrome possibly even seizures for example. Addiction itself is a complex process that involves some activity or substance use along with adverse consequences such as criminal activity or harm to others or your relationship with others. ...Read more Good question: An addiction is a habit that you cannot stop. Most habits can be changed with consistent focused effort. Addictions do not subside even when people make a conscious effort. Abuse is simply more severe addiction often with other behavioral consequences (trouble with the law, relationships ending, etc. ...Read more Addiction: When a heroin addict quits cold turkey, the pain that he feels in being "dope sick" is beyond description in agony. This is an example of physical addiction. When the physical symptoms finally pass, but the feeling of still needing the heroin in order to live remains, that is psychological addiction. ...Read more Psychology & physiol: Interact. Each affects the other. We speak of body and mind as if they are separate things, but they are just two sides of the same coin. Calling addiction a disease can be misleading if it implies that physiology is more important that the psychological, social, & spiritual aspects. Drugs direct affect the physiology, but addiction recovery requires changes in thinking and behavior. ...Read moreSee 2 more doctor answers - Talk to a doctor live online for free - What is the difference between physical and psychological addiction? - What is the difference between alcohol addiction and say heroin addiction? - What is the difference between drug abuse and drug addiction? - Ask a doctor a question free online - What is the difference between scabies and mange? - What is the difference between tuberculosis and pneumonia? - What is the difference between zyrtec and xyzal? - What is the biological difference between vaginal bleeding and your period? - Talk to an addiction specialist online for free
<urn:uuid:db7aee11-1e6a-4c92-9058-a23e40720e69>
CC-MAIN-2016-44
https://www.healthtap.com/topics/what-is-the-difference-between-compulsion-and-addiction
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718285.69/warc/CC-MAIN-20161020183838-00105-ip-10-171-6-4.ec2.internal.warc.gz
en
0.923121
828
2.9375
3
Tuesday, April 16, 2013 Horizon Christian School presents its sixth-annual spring musical, “Once Upon a Mattress,” beginning Thursday, April 18, at 7 p.m. in the school’s church sanctuary. The 1959 Rodgers and Hammerstein musical comedy is an adaptation of the Hans Christian Andersen fairy tale “The Princess and the Pea.” Tickets are $7 for adults and $5 for children and students, and are available at the school office. Performances will be Thursday, Friday and Saturday at 7 p.m.; doors open at 6:30 p.m. “Once Upon a Mattress” was written and composed in 1959; its Broadway debut is what made Carol Burnett, as Winnifred, famous. The musical is a farce that takes place in the 1400s in an imaginary kingdom. The story is narrated by a minstrel, who tells us that the tale of the “Princess and the Pea” is not quite like what all of us were led to believe. He tells the real story: By decree of the tyrant queen, no one in the kingdom is allowed to get married until a suitable wife if found for the young prince, Dauntless. But the queen, for various reasons, does not want Dauntless to be married. For each princess candidate, she and the court Wizard devise impossible tests — tests to see if each princess is good enough for her boy. Meanwhile, the king — struck mute by a curse years ago — wanders the castle with his only friend, the jester. Sir Harry returns with Princess Winnifred, a brash, wild, unkempt girl from the swamps. She turns the kingdom upside down. Worse yet, Dauntless and she fall in love. The queen and wizard frantically devise a completely unfair test to deny Winnifred her chances — hiding a pea under 20 mattresses. If the pea keeps her awake, she’s a princess.
<urn:uuid:338a7028-b8ad-4123-8fd1-f273aa1c391f>
CC-MAIN-2017-04
http://t.hoodrivernews.com/news/2013/apr/16/once-upon-mattress-horizon/?templates=tablet
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281419.3/warc/CC-MAIN-20170116095121-00485-ip-10-171-10-70.ec2.internal.warc.gz
en
0.952909
424
1.539063
2
Islam is the fastest growing religion in the world and has over one billion followers. Most countries in the Middle East are predominantly Muslim, and Muslims make up the majority population in at least fifty-six countries. Despite this, Islam is not very well understood by non-Muslims in North America. In ISLAM: UNDERSTANDING THE HISTORY, BELIEFS, AND CULTURE, author Julie Williams explains the history of this great religion and the different ways it is observed in the world today. She addresses some of the controversial questions and the current events relating to Islam in order to help readers gain an understanding of Islamic religion and culture. |Library Bound Book||978-0-7660-2686-5||$34.27||$25.70|
<urn:uuid:8029e4c4-e6e1-4a5a-aaa0-97dc0e5a8e59>
CC-MAIN-2022-33
http://enslow.com/books/islam/2209
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00272.warc.gz
en
0.869827
179
2.859375
3
An Act no. 45 of the year 2000 was enacted with the name and short title as ‘The Coal India (Regulation of Transfers and Validation) Act, 2000’. This is an enactment to provide to empowerment of the Central Government to issue directions for transferring the land, or of the rights in connection with the land or even the transferring of the right, title and interest in connection with the Coal Mine, Coking Coal Mine or Coke Oven Plant, which were vested with the Coal India Limited or in a subsidiary company thereof. Moreover, it is further provided for validating the certain transfers of such land or rights. The present enactment was passed by the Parliament of India in the 51st year of republic of India and the same was given assent by the President of India on 8th day of December, 2000. The Act contains only four sections, wherein the entire purpose of the enactment was explained. The First provisions deals with the short titling of the enactment as ‘The Coal India (Regulation of Transfers and Validation) Act, 2000’. And under section 2 of the Act, several terms were made clear by giving definitions thereto. The term ‘Coal India’ as has been containing in several provisions herein, is defined as the company namely, ‘the Coal India Limited’ which is a Government company incorporated within the provisions of the Companies Act, 1956 (Act no. 1 of 1956) and was having its Registered office at Calcutta and also it includes the predecessor Government company to it, namely, ‘the Coal Mines Authority Limited’. Also the term ‘Subsidiary Company’ here defined as the subsidiary companies of the aforesaid Government company ‘Coal India’ and includes ‘the Central Coal Fields Limited, Ranchi’ along with its predecessor Government company, namely, ‘the National Coal Development Corporation Limited’, ‘the Bharat Coking Coal Limited, Dhanbad’, ‘the Western Coal Fields Limited, Nagpur’, ‘the Eastern Coal Fields Limited, Sanctoria’, ‘the Central Mine Planning and Design Institute Limited, Ranchi’, ‘the South-Eastern Coal Fields Limited, Bilaspur’, ‘the Northern Coal Fields Limited, Singrauli’ and ‘the Mahanadi Coal Fields Limited, Sambalpur’ and also all other subsidiary company of afore said ‘Coal India’ which was incorporated from time to time. The Act make two important provisions under it, among them, the provisions of section 3 of the Act makes provisions to empower the Central Government to issue notification in the Official Gazette containing its direction to the effect that the land or rights in connection to land or the rights, title, etc. in connection to the Coal Mine, Coking Coal Mine or a Coke Oven Plant, as aforesaid, to be vested in the afore mentioned Subsidiary Company and should not be continued to be vested in the Coal India. Such notification containing directions should be issued by the Central Government, irrespective of whatever inconsistent contained in any other prevailing law. However, for issuing such direction, the Central Government first to be satisfied that the Subsidiary Company is willing to comply with the terms and conditions which the Central Government will impose for such vesting, or even if such Subsidiary Company has already complied with such terms and conditions. And on such vesting in the Subsidiary Company the rights, title, etc. as aforesaid or land as the case may be, the Subsidiary Company should be treated as ‘lessee’ in relation to the vested rights of Coal Mine or Coking Coal mines as the fresh lease in connection with the such mines was granted within the provisions of the Mineral Concession Rules, 1960 [as made within section 13 of the Mines and Minerals (Development and Regulation) Act, 1957 (Act no. 67 of 1957)] for the specified under those rules. And also on such vesting all rights and liabilities of the Coal India in connection with the said Coal Mines, are to be transferred and become the rights and liabilities of the said Subsidiary Company under this Act. The next provisions is section 4 dealing with the validation of certain transfers made earlier to the commencement of this Act in connection with the same coal mine, coking coal mine or coke oven plant.
<urn:uuid:537dec38-a4c5-4dfc-841a-dc4ea233b112>
CC-MAIN-2017-04
http://lawyerslaw.org/the-coal-india-regulation-of-transfers-and-validation-act-2000/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00163-ip-10-171-10-70.ec2.internal.warc.gz
en
0.953559
905
2.765625
3
In Why We Get Fat: And What To Do About It, science writer Gary Taubes seeks to debunk the standard "calories in-calories out" model of diet and nutrition. He argues that carbohydrates, and their ensuing insulin production, are the true source of weight gain, and that insulin's regulation of fat tissue is the true source of our modern obesity epidemic. Gary Taubes is the author of several books about scientific controversy: Nobel Dreams, Bad Science: The Short Life and Weird Times of Cold Fusion, and Good Calories, Bad Calories. He has won the Science in Society Award of the National Association of Science Writers three times. Joining Mr. Taubes in conversation will be acclaimed author Frederick Crews. Throughout his acclaimed career as a writer and critic, Mr. Crews has taken a similarly skeptical position toward popular trends in the scientific, literary, and psychoanalytic communities. His many books include The Pooh Perplex, The Critics Bear It Away: American Fiction and the Academy, and The Memory Wars: Freud's Legacy in Dispute. Location: Street: 5433 College Ave City: Oakland, Province: California Postal Code: 94618-1502 Country: United States (added from IndieBound)
<urn:uuid:b2122995-346c-4f03-8bdb-630ba77df346>
CC-MAIN-2017-04
http://www.librarything.com/author/taubesgary
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280900.71/warc/CC-MAIN-20170116095120-00006-ip-10-171-10-70.ec2.internal.warc.gz
en
0.916584
252
1.804688
2
- My NESTA - Teacher Resources - Prof. Development - Join NESTA - Contact Us It's February 29th - Happy Leap Day! Every four years, we have an extra day in the month of February. Why? In normal (non-leap) years, there are 365 days in the year. But it actually takes 365 days and about 6 hours (more exactly, 365.24219 rotations of the Earth about it's axis) to complete a full rotation of Earth about the Sun (in other words, a full year). That ~quarter of a day adds up! If we don't account for it, eventually our calendar gets way out of line with the seasons over hundreds of years. To keep this from happening, we add a full day every four years, which keeps us on track with the actual time it takes us to travel about the Sun.
<urn:uuid:2d8bb888-942e-4892-85fd-718bd53318d3>
CC-MAIN-2017-04
http://nestanet.org/cms/content/home/2819?page=1
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00320-ip-10-171-10-70.ec2.internal.warc.gz
en
0.927094
183
3.359375
3
Neo-Latin Drama in Early Modern Europe |Series title:||Drama and Theatre in Early Modern Europe Ser.| |Publication Date:||Sep 2013| | Book Format:||Hardback| |List Price:||USD $228.00| | Book Description: | Neo-Latin drama and theatre is a genre that was most often practised in early modern Europe. Humanists, Protestants and Roman Catholics wrote plays for the intellectual and moral education of students, and the entertainment of the audience. In this volume, a historical overview of Neo-Latin drama is given, as well as analyses of separate plays.
<urn:uuid:b4ad5cf8-5f73-43d4-96d0-3f5debcfdac4>
CC-MAIN-2017-04
http://www.bookwire.com/book/Neo-Latin-Drama-in-Early-Modern-Europe-9789004253421--44571704
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280825.87/warc/CC-MAIN-20170116095120-00199-ip-10-171-10-70.ec2.internal.warc.gz
en
0.876591
133
2.90625
3
The NuScale project for small modular reactors has seen a $30 million investment from construction giant Fluor. The money has effectively rescued the company after it was paralysed by a fraud case concerning a shareholder. The man found guilty was Francesco Illarramendi, head of the Michael Kenwood Group of hedge funds. He routed investors' money through accounts he controlled for personal gain, which came to the attention of the Securities and Exchange Commission (SEC) and resulted in his conviction in February this year. Illarramendi had to pay back some $53 million of his "ill-gotten gains," with significant knock-on effects for NuScale's balance sheet. Fluor stepped in yesterday, buying certain shares that had been in SEC receivership as part of a $30 million investment. The firm will also have an exclusive right to take on engineering and construction work for any future NuScale facilities. |How a NuScale plant could look NuScale is developing a 45 MWe self-contained pressurized water reactor and generator set, which would be factory made and shipped for deployment in sets of up to 12. These could result in scalable nuclear power plants with capacities from 45 MWe to 540 MWe. The reactor unit uses conventional nuclear fuel assemblies of under 5% uranium-235, which would require replacement only after about two years. The core would be cooled by natural circulation, requiring fewer components and safety systems. A company statment said: "With the help of Fluor, NuScale expects to bring its technology to the market in a timely manner." CEO Paul Lorenzini added that the company was now in "a stronger position than ever." As well as a history of nuclear project engineering, Fluor also manages and operates the US Department of Energy's Savannah River facility. In separate small-reactor initiatives, this site has already been lined up as the first place for trial of the Hyperion small reactor design, while the idea of building a prototype GE-Hitachi Prism reactor is being explored. Researched and written by World Nuclear News
<urn:uuid:532beccd-13ec-4210-9246-879e5e831053>
CC-MAIN-2017-04
http://world-nuclear-news.org/C_NuScale_rebalanced_by_Fluor_1410111.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00216-ip-10-171-10-70.ec2.internal.warc.gz
en
0.974122
425
2.09375
2
Last spring, we congratulated Penn Bioengineering graduating BE senior Malika Shukurova (BSE ’19) and her co-founder Katherine Sizov (Biology ’19) on their President’s Innovation Prize for their start-up Strella Biotechnology. Katherine began the work for what became Strella as a sophomore in the Penn Bioengineering George H. Stephenson Foundation Educational Laboratory & Bio-MakerSpace. For more info on their company, check out the article and video below. by Eric K. Brockmeier On the second floor of the Pennovation Center, Strella Biotechnology is hard at work turning their student-led startup into a full-fledged company that’s ready to make a major impact in the agricultural sector. May graduates Katherine Sizov and Malika Shukurova, respectively the CEO and head of R&D at Strella, share a 2019 President’s Innovation Prize, which includes $100,000 of financial support, a $50,000 living stipend for both awardees, and a year of dedicated co-working and lab space at the Pennovation Center. The alumnae and their company are now poised to take on the challenge of $1 trillion worth of food waste. Strella’s biosensors are designed to give packers real-time data on how ripe their fruits are while being stored between harvesting and selling. Using bio-inspired sensors that measure the ethylene gas produced by fruits as they ripen, Strella successfully “hacked the fruit” to create their patent-pending biosensors. Now, only six months after graduation, Strella has six paying customers and is aiming for $100,000 in sales by the end of the season. Beyond the work needed to deploy their first paid product, Strella also has a clear view of what needs to be done for future progress of the company. This means running experiments in the lab to refine their current sensors while conducting other experiments that will help the company be able to monitor other types of fresh foods. It’s a job that Shukurova says involves a lot of multitasking and requires an “all-hands” approach to problem solving. “We set up experiments that run for several days, and during that period we work on different tasks. I prepare for the next set of experiments, Jacob [Jordan] and Katherine travel to our customers to deploy sensors, and Zuyang [Liu]]works on IoT [Internet of Things]. At the end of the day we all come together to discuss results and future plans,” says Shukurova about their company’s work flow. Continue reading at Penn Today.
<urn:uuid:5000c080-7731-47eb-a3f8-86e2b0781b33>
CC-MAIN-2022-33
https://beblog.seas.upenn.edu/strella-biotechnology-tackles-food-waste-by-hacking-the-fruit/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00070.warc.gz
en
0.951047
561
1.6875
2
Floating leakage (level) is mainly used for measuring the water level in channels for the collection of leaks in dams, in earth,concrete or RCC. A float of suitable shape and size follows the variation in flow upstream of a weir; a LVDT extensometer is connected to the float and automatically measures its vertical movement, that is the variation of level. Level meters are available with ranges of 100mm, 200mm, 300mm; and other customizations on request. Level measurement in open channels is widely used and applied in environmental and geotechnical fields. In particular, the measure of the level of water in earth or concrete dams, is one of the most important indicators of the health status of the construction. Other typical applications for this instrument are level measurements in: Features and Benefits High resolution and sensitivity High speed measurement Measurement in real time Not sensitive to atmospheric disturbances Easy to use Long life of the system Wide variety of measurement ranges Possibility of automated measurements In a channel, a weir causes a variation in water level upstream which is directly proportional to the variation in flow rate. Level measurement can be performed with different systems; we offer the “float system”. This is in particular of a linear extensometer sensor, associated with a float carrying on the top end of a bar, with this integral, which serves as the mobile element of the extensometer In this case it is composed of a linear extensometer sensor linked to a float which serves as the mobile element of the extensometer? Each movement of the float, which freely follows the water level, is transferred communicated to the sensor that detects the float The system for the measurement of dam leakages, is composed of: - Weir of known overflow section (triangular, rectangular or other) - LVDT linear transducer (or other on request) - Application and support device |Sensor||LVDT , potentiometer, magnetostrictive| |No linearity||O,25% f.s.| |Working temperature||-55 ÷ 150°C| |Output signal||4-20mA (directly or using a converter signal)| |Precision obtainable ( sensor / floating)||±1mm| If you have any requests or questions about our instruments or if you have special needs that require different solutions from the standard, please contact us. Our team will provide all the necessary information and will be very happy to work with you to study, develop and customize instruments and solutions suitable for your specific needs. All information in our datasheet is subject to change without prior notice. Please check the datasheet/details carefully and contact Pizzi Instruments for further information
<urn:uuid:d4d628ab-b899-43d2-ac86-0fcbca872e61>
CC-MAIN-2022-33
https://pizzi-instruments.it/en/floating_leakage_measuring/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00479.warc.gz
en
0.894353
644
2.65625
3
The NY Times interviewed Rob Jett, a.k.a. The City Birder, on the subject of development plans for Ridgewood Reservoir: But the reservoir, which is nestled within Highland Park, is also one of eight areas designated for conversion to parkland under Mayor Bloomberg’s plan to have a park within 10 minutes of every New York residence by 2030.Thirty percent hardly seems like a small portion. Benepe justifies the change in land use based on the need for kids to get more exercise. I wonder how much ballfields really contribute to that goal. Facilities like ballfields serve organized recreation, often restricted to leagues that reserve the site. They get used for short periods of time by relatively few kids, and then sit empty - except for the Canada geese that come and poop on them. Parkland development that is sensitive to habitat preservation may end up benefiting more kids in the long run by encouraging exercise outside of organized recreation and by providing an educational resource for local schools. Mr. Jett does not approve. He is part of a group of more than 50 birders and others who object to the parts of the city plan under which two of the water basins will be preserved but the third, and largest, will be transformed into an “active recreation center,” as the plan puts it. Instead, they want to preserve all the reservoir’s natural habitats and to develop a nature educational facility. In the opinion of Mr. Jett, the plan seems “counterintuitive” for a city that also intends to plant a million trees over the next decade.... For his part, the parks commissioner, Adrian Benepe, said that although the city has allocated $50 million to improve Highland Park and incorporate the Ridgewood Reservoir into it, construction and design plans are not final. “The bulldozers aren’t warming up,” he said. But Mr. Benepe did say that “some small portion” of the Ridgewood Reservoir area, probably about 30 percent, will be used for recreation. “Any time you build a park, especially in an area that is overgrown, you have to remove some trees,” he said. More information on the site is available at Save Ridgewood Reservoir.
<urn:uuid:f03423f2-7b6a-407a-96b1-b0375b645646>
CC-MAIN-2017-04
http://dendroica.blogspot.com/2007/11/ny-times-interviewed-rob-jett.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00573-ip-10-171-10-70.ec2.internal.warc.gz
en
0.962693
474
1.804688
2
In the last few weeks, the concept of aid has had a pretty tough time. Before the turn of the year, it could be argued that few knew, or even cared, that India received around a quarter of billion pounds per year from Britain. But now, with the intervention of emotive French competition and a snub to British industry, the issue of aid has been politicized, sensationalised, and suddenly faces the desperate need to justify itself. The case for continuing to give aid to India is a strong one. As far as Indian commentators want to paint a picture of neo-colonialism, the numbers of Indians living in poverty - one third of the world's poor, or 480m people (46 percent of its population) - justify David Cameron's argument that the international community has a 'moral obligation' to help. The bilateral funding of £280m looks to support a wider multilateral effort through specific schemes in targeted areas, recently announced by Secretary of State for Development Andrew Mitchell as the three poorest Indian states. This aid may indeed be a 'peanut' in India's wider development spending, as their finance minister described it, but at least it is there, and at least it is working towards ensuring that fewer people are denied the human right to food. A more complex cause for concern is the heightening of institutional homophobia in Uganda. Although an anti-homosexuality bill was shelved last year, shortly after a major gay rights activist, David Kato, was murdered with a hammer, it has recently been reintroduced for consideration. Threats of death have been excluded, but draconian sentences for 'serial offenders', activists, and complicit family members and landlords remain. Then, in the last few days, the Minister for Ethics and Integrity Simon Lokodo has stormed an LGBTI meeting forcing a leading activist, Kasha Jacqueline, into hiding. Lokodo's latest aggression will certainly be condemned in London and Washington. Since 2008 Barack Obama and Hillary Clinton have fervently asserted that gay rights are human rights. Along with Cameron, they have also supported UN OHCHR's landmark 2011 report on homosexuality and violence, which called for the worldwide decriminalization of gay rights and the abolishment of death penalties. Following the reintroduction of the Ugandan bill, British and American leaders reiterated a threat to cut aid to states restricting gay rights. The issue of how the distribution of aid fits with gay rights is both complicated and comprehensive. While the Ugandan government has stated that the bill does not have executive support, homosexuality is still illegal in Uganda. A recent UN declaration on the protection of gay rights found 19 dissenting votes against 23 ayes, and homosexuality remains illegal in more than seventy-five countries - predominantly in Africa and the Middle East. In these countries, many of which receive aid, homosexuality is not a human rights but a cultural issue: a form of sin which depraves the sanctity of the state, or something simply not accepted as normal by many people. The first of two fundamental questions is how far Western governments can, should or will determine the levels of aid by what recipient countries perceive as their own cultural values. Some in Uganda have reacted tersely to these 'lectures'. A presidential adviser accused Cameron of an 'ex-colonial mentality' and suggested a preaching US could 'go to hell'; a diocese bishop similarly stated that if Britain wants to withhold aid for the suffering of Uganda's cultural norms, then so be it. As it stands, gay rights are not universally enshrined as human rights. While Nelson Mandela ensured that gay rights were embedded in the normal rights of the South African constitution, this is not a replicated pattern. Without a globally-accepted convention on gay rights, lecturing countries on their freedom record is akin to criticizing the Indians for their space programme; it is merely critiquing choices of foreign governments. Second, one must ask whether the exigency of aid transcends principles of perceived, rather than enshrined, human rights. Is it right to ignore violations of principles that democracy holds dear in order to help the poorest and oppressed? The answer has to be yes. As various LGBTI groups in Uganda and Africa have pointed out, withholding aid harms LGBTI people it would otherwise help, and such actions could also demonize homosexuality further within local communities. If countries wish to justify their convictions, then, we need an international system which reflects and enforces the rights of gays without depriving the needy of aid. An immediate solution is for Britain and others to give a greater proportion of their bilateral aid directly to communities rather than central governments, thereby precluding financial support for regimes they wish to criticize. Andrew Mitchell has iterated that this will be a major trend of future development policy. But a wider, longer-term solution has to be the reformulation of the global principles under which aid functions. As the pattern of aid shifts towards more south-south relationships, we need to ensure international conventions encompass a more comprehensive definition of human rights. A non-binding declaration on gay rights has already been passed, but it is now time for the United Nations to officially consider gay rights amongst other human rights. Such a move would have the support of the US, the EU, and leading African countries like Rwanda and South Africa. With a framework establishing gay rights as a human right, the cultural norm argument would be undermined. There is, however, a caveat. And that is teeth. International bite to enforce these beliefs, to uphold the preservation and promotion of gay rights. It has been suggested that such an international framework could be supported by trade sanctions for non-compliance, but sanctions only work if countries are prepared to give up trade agreements for principles. And when we consider gay rights, one wonders whether Britain would be prepared to lecture and threaten Saudi Arabia as they have done Uganda - a country where the death sentence for homosexuals is real, rather than a footnote in a former bill. In the current state of diplomatic affairs, Britain may complain about Uganda's gay rights record and threaten some reduction in aid. Yet to be truly serious on aid within a wider concern for human rights, Britain and the US must consider the long-term international method of response and manoeuvre. This is going to be far more difficult and important than absorbing 'peanut' barbs from the parliament in New Delhi.
<urn:uuid:252ab0d0-d89b-47fc-a8ba-2253a16710ac>
CC-MAIN-2017-04
http://www.huffingtonpost.co.uk/benjamin-halfpenny/a-more-comprehensive-inte_b_1284292.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280410.21/warc/CC-MAIN-20170116095120-00452-ip-10-171-10-70.ec2.internal.warc.gz
en
0.95526
1,285
2.15625
2
British public says renewables offer massive economic benefits - and wants more of them 28 April 2016 RenewableUK is highlighting new official Government statistics which show that the British public believes that renewable energy provides tangible economic benefits - and they want clean energy projects built in their area. The Public Attitudes Tracking Survey published by the Department of Energy and Climate Change shows that 70% of people see clear economic benefits to the UK from renewable energy. The survey also showed that 56% would be happy with a large-scale project in their local area. RenewableUK’s Chief Executive, Hugh McNeal, said: “It’s great that the British public sees how renewable energy is helping to grow the UK economy. Renewables are delivering investment and jobs throughout our country”. An independent report by BiGGAR Economics last year found that the onshore wind industry generated £906 million in revenue to the UK economy in 2014. Each megawatt of onshore wind installed also brings in more than £2 million to the UK over its lifetime – and around 70% of the industry’s total spend remains in the UK. Total support for all renewables rose to 81%, onshore wind has 69% of the public’s support, offshore wind is at 76%, and marine energy increased to 77%. - The full Public Attitudes Tracker can be read here: https://www.gov.uk/government/statistics/public-attitudes-tracking-survey-wave-17 - The report Onshore Wind: Economic Impacts in 2014 was undertaken by BiGGAR Economics for RenewableUK. It provides an update of Onshore Wind Direct and Wider Impacts, undertaken by BiGGAR Economics for the Department of Energy and Climate Change (DECC) and RenewableUK, published in May 2012. It can be found here: http://www.renewableuk.com/en/publications/index.cfm/BiGGAR
<urn:uuid:d5166282-b915-45db-883c-ae22eeaddeaa>
CC-MAIN-2017-04
http://www.renewableuk.com/news/288226/Press-Releases-British-public-says-renewables-offer-massive-economic-b.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00298-ip-10-171-10-70.ec2.internal.warc.gz
en
0.936202
410
2.359375
2
We Can All “Do” User Experience Even with a small web team, user experience should and could be a big part of what you do, explained Jason Kammerdiener, Lead Information and Digital Architect, Colgate University, in his “We Can All ‘Do’ User Experience” session. All universities have forms for prospective student inquiries, college visit appointments, and collecting gift online. “It’s a pretty atrocious user experience,” said Kammerdiener. “We could certainly do better than that.” The project lifecycle doesn’t always build in time or prioritize user experience. “Even when you get the experts involved, good is in the eye of the beholder,” Kammerdiener explained. “No one in the process is really representing that end user.” Step 1: Choose to be the UX Champion Kammerdiener started representing the end user in the Colgate University giving form process. “It wasn’t hard to convince anyone that we could do better.” Step 2: Before a project, consult the literature Not initially being a UX expert, Kammerdiener read up on the subject and encouraged others to do the same. “If you don’t let people know that you are doing the research, and give them the opportunity to do the research, then everyone’s opinion is equal.” He recommended taking every field on the form and tracking it back to the human. Ask the people involved in the process if they need the data, and then ask what they do with the data. Step 3: Watch someone “do” This is the step that can seem out of reach for teams of limited means, Kammerdiener said, but don’t be afraid to go “down and dirty” (shout out to Rocket Surgery Made Easy: The Do-It-Yourself Guide to Finding and Fixing Usability Problems). Colgate made it work by: - Drafting a few scenarios - Recruiting people from across campus and giving them bookstore gift cards - Using Apple QuickTime for the screen and verbal recording - Using Skype to have a room of stakeholders watch the QuickTime recordings in real time - Providing lunch to the stakeholders to debrief the user testing they watched “It’s better to get a little bit of testing than no testing at all,” he said and it’s important to have stakeholders in the room watching in real time. Step 4: Sketch and prototype First Kammerdiener roughly sketched the form process and workflow on paper. Then he built a prototype in the Qualtrics survey tool that used conditional logic to only expose information when needed to the user. Step 5: More tests Colgate conducted the user testing this time without the stakeholders watching in real time. The videos were shared asynchronously. Step 6: Commit. Design. Build. Colgate adjusted its giving form enhancement plans before designing and building the new form based directly on insights gained from the user testing. Step 7: Just one…more…test The last stage of user testing took place after the giving form was built in a web format to test the working design and graphics. Stakeholders also watched this testing. Step 8: Finish it From June 2015 to June 2016, there was a 16% increase in Colgate giving. There were a lot of variables that went into the increase, but the redesigned giving form based on user testing was one of them. In closing Kammerdiener said: “Someone in your organization needs to be representing the user in every project.” Check out the full “We Can All ‘Do’ User Experience” presentation.
<urn:uuid:558eca69-7d63-4642-884e-52c158480ac2>
CC-MAIN-2016-44
http://link.highedweb.org/2016/10/we-can-all-do-user-experience/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718423.28/warc/CC-MAIN-20161020183838-00272-ip-10-171-6-4.ec2.internal.warc.gz
en
0.950373
803
1.601563
2
Mathew 5:44 says that we are to love our enemies & pray for those who persecute us. This really is a wonderful thing to do. It helps you to release your anger at those people who hurt & even abuse you, which of course is a wonderful thing. Anger is an awful burden to carry. Plus, those who behave so terribly obviously need prayer because something is wrong with them. The problem is how some folks apply this verse. Victims of abuse are often told they need to pray for the person who hurt them. While that is true, telling someone that immediately after they have divulged their situation is probably the worst timing imaginable! Someone who has suffered abuse really has a lot of issues to contend with. Shame is usually one of those issues, since abusers often blame their victims. Telling someone about it takes a lot of courage because of this, especially if the abuser & this other person know each other. When someone does this & is immediately told that they should pray for the person who caused them such pain only adds to their shame. Praying for that person isn’t what a person in that situation wants to do just yet, even if it is Scripture. That can add to their shame because they are often told they’re “disobeying” God. Telling someone in that situation to pray for their abuser is also very invalidating. The victim’s pain is ignored & they are told to pray for the person who inflicted that pain on them. It makes the victim feel as if they have no right to their pain, because praying for their abuser is so much more important. A bit skewed true, but that is how that situation makes a person feel. It also makes a victim feel like they are the problem, especially when they are still in the place of not wanting to pray for their abuser just yet. It makes a victim feel like they are wrong & even un-Godly for not being able to pray for the abusive person. Suggesting someone pray for their abuser too soon also can make a person turn away from God. When you’ve been through an abusive experience & then tell someone, if that someone puts much more value on praying for the abuser than your pain, it can make you think God is that way. He’s more interested in getting his way than your suffering or doesn’t even care about your pain at all. No one should be made to feel this way, but it does happen, sadly. Another potential problem this suggestion can create is anger. Anger at God for wanting something that seems impossible. Anger at people for preaching rather than offering gentleness & understanding. Anger about the unfairness of feeling like the victim being assaulted while the abuser gets prayer. Suggesting a victim pray for their abuser right away can cause that victim to be stuck in a painful, shame filled place. Rather than push victims to pray for their abusers, they need compassion, validation & understanding. They need love & security too. Most of all, victims need time If you look at Matthew 5:44 again though, while it does say we should pray for those who persecute us, it does NOT say we should do it right away. I fail to see how there is anything wrong with focusing on healing for as long as it takes before praying for an abusive person. In fact, I don’t think that should even be mentioned for a while to a victim. They need to heal enough where they can hear such a message without anger or shame. That sort of healing doesn’t happen quickly. It takes time, & there is nothing wrong with that. God truly understands these things & won’t be angry at a victim who can’t pray for their abuser quickly.
<urn:uuid:fd9f40f0-98fb-4445-b23b-634bc871d195>
CC-MAIN-2022-33
https://cynthiabaileyrug.wordpress.com/2021/04/27/about-praying-for-abusers/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00267.warc.gz
en
0.981977
774
1.796875
2
Edward Evans ’13 – The train stops in Montpellier. The lost foreigner leaves the station with incorrect MapQuest directions in hand. With no confidence in his French comprehension, he walks up and down the same streets without asking anyone for directions. After three hours of bewilderment, he hobbles to the right hotel. This is where I began, constantly lost, confused, and incapable of talking to people. For the first couple of weeks, the Minnesota program arranged an intensive grammar course to help students find a French groove and to determine our level of the language. My grammar was decent; however, it was apparent that my speaking and comprehension were well-below average. The advisors suggested that I follow an easier Language Studies track as opposed to the Integrated Studies one. (Honestly, I don’t blame them; I was struggling and among the least-experienced in the program.) Wanting to get an authentic French experience and being a little stubborn, I threw myself to the wolves, registering for courses in which I would be among French students. In the beginning, I had major doubts. The French lectures were killing me. My notes entailed random, unrelated words that I managed to recognize. Later, I would go to the library and try to draw some relation between them. This was extremely inefficient and tiring. My brain felt like a whooping cushion. Each week, however, I have noticed that my notes are more cohesive. Now, I can actually ask questions regarding the subject matter after class. Most importantly, I am no longer eyeing my teachers with this bizarre mixture of confusion and malice. I attribute this lingual enhancement to multiple reasons, one of which is my host family. My host mom is from French Guiana, and she used to be a teacher. She has been EXTREMELY patient when talking to me and has been great in providing tips to improve my French and to speak properly. My host brother, who averages 100 words a second, keeps me balanced with his slang. I don’t think I would be scholastically successful here without them. Host family: Highly recommended. Aside from school (which I could go on forever about), I have truly immersed myself into the culture. I have noticed great differences between France and the US. The school system, politics, and even the mentalities towards everyday living are just different, not necessarily better or worse. Furthermore, I have a greater appreciation for history. I’ll be the first to admit that I’m a chemistry and math nerd. I love it. However, I also realize how easy it is to be consumed by the sciences. When you walk along the ramparts of Carcassonne or across the Pont du Gard, an aqueduct built twenty centuries ago, you have no other choice but to appreciate the incredible ingenuity of the Romans. It’s unbelievable. An evolution has occurred. Come mid-December, a Frenchman will return to his native country. He will go to the very same train station around which he was completely lost less than four months ago. He will high-five security and will hold a conversation with a woman about the upcoming presidential election and her dislike for Nicholas Sarkozy. He will return to the US with new perspectives, new insight, and a new appreciation for what he is going back to. With a little more than a month left, I already deem this study abroad experience a complete success. Thank you, Wabash.
<urn:uuid:b569bfbe-c8ab-425f-981a-197e44d61347>
CC-MAIN-2017-04
http://blog.wabash.edu/studyingabroad/2011/11/14/evans-13-growing-with-each-new-french-experience/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281419.3/warc/CC-MAIN-20170116095121-00490-ip-10-171-10-70.ec2.internal.warc.gz
en
0.970891
706
1.53125
2
to Shotokai.com a site centered on traditional Budo. Kun - a classic series of rules for dojo training. Niju Kun - Twenty rules or guidelines for your training by Gichin Funakoshi. General Shotokai Information SHIGERU EGAMI GALLERY - History, philosophy, articles, photos, Karate's Origin - article in three parts, written by Genshin Hironishi, the late president of NKS. Tokitsu writes about Shigeru Egami & Image Gallery Shotokai History (Part 1) Shotokai History (Part 2) versus Shotokai, article written by Antonio García Martínez Home Pages around the World - find related organizations and groups close to you. Tsuki, Kata, Uke , etc., etc.) Another way, the non-contraction way in Karate-do An Effective Tuski by Shigeru Egami by Atsuo Hiruma - important information for your martial arts Photo Gallery - hundreds of photos, drawings and more. Essays and Commentaries participates in NKS event in Japan Commemorating the 18th anniversary of Shigeru Egami's death and the Shotokai WWW Harada's book / Yoshitaka Funakoshi and consecuences and misinformation related to Gichin Funakoshi Between Shotokan Karate of America and Shotokai Will to continue - martial arts student account on training. of a Special Training Karate-do as an analogy of life Art of Karate-do, a thing of the past? What does the public believe we are doing? your identity - Comments on the so-called 'dan inflation syndrome' in the martial arts. Isn't Karate for fighting? Does Karate-do make people aggressive? Is there any difference between Shotokai and Shotokan? What is Shotokai and its meaning? The Shotokai Hombu Dojo, the Shotokan O-sensei's Tiger symbol Shotokai Encyclopedia Objectives of Shotokai Material on the Web - even the Web is a crooked place. Shotokai Encyclopedia is now more than 4 years old Karate: Budo or Sport? Budo and Sport, Genshin Hironishi Interview What is the origin of Shotokai?, Tetsuji Murakami Interview Opinions on Karate and Sports. What is Budo?, by Taisen Deshimaru. Seven principles, by Taisen Deshimaru. Martial Arts as Sports?, interview; Taisen Deshimaru. Frequently Asked Questions [last update July 21, 2000]. Contains answers to the following questions (among others): text version, zipped Sokon 'Bushi' Matsumura Gichin Funakoshi, short - Gichin Funakoshi, Richard Kim. Takeshi Shimoda, O-sensei's most talented student Yoshitaka Funakoshi, Karate-do genius. Genshin Hironishi, the last Master from the Golden Age. Master Gichin Funakoshi: By Master Shigeru Egami: Prologue, Karate-do Nyumon, Master Genshin Hironishi What is Budo? of the Martial Arts Seven Principles, by Taisen Deshimaru Unmoving Wisdom, Master Taisen Deshimaru Memorable Quotes by General Karate Do Information What is Karate?, short description Martial Arts Dojo spatial disposition Genealogy of Karate Masters, gif, 10k. General Philosophical Information What is Budo? The Budo Kensho, respectfully reproduced from the Budo Charter What is Bushido? Principles, by Taisen Deshimaru Philosophical foundations of the Martial Arts talk with Zen Master Taisen Deshimaru: Interviews, Articles and Historical Information Interviews and Articles: Home Pages around the World General links, a bit messy
<urn:uuid:7b8f29f1-28d1-4bad-b4e7-923db1dcd974>
CC-MAIN-2017-04
http://www.shotokai.com/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00468-ip-10-171-10-70.ec2.internal.warc.gz
en
0.735529
890
2.15625
2
Many pet owners want to know if their cat will experience any issues when inhaling second-hand pot smoke, eating marijuana brownies, or chewing on the leaves of the plant. While several cat owners out there think marijuana is just another form of catnip, it’s true that there is a drastic difference. Catnip and Marijuana Catnip is a plant that comes from the mint family. The perennial herb has downy leaves, purple-spotted white flowers, and a pungent smell that makes cats go crazy when smelled and sleepy when eaten. Marijuana, on the other hand, comes from a plant called Cannabis sativa. The chemical in Cannabis that produces the altered states of consciousness humans enjoy is called Delta-9 Tetrahydrocannabinol or THC. Marijuana is sometimes prescribed for relief from pain and nausea due to chemotherapy in cancer patients, and for certain conditions in AIDS patients. However, it’s still questionable whether there is anything beneficial in the plant for feline friends. In fact, it is strongly suggested that cats do not come close to any smoke from marijuana use, or any other smoke from cigarettes, cigars, or pipes. How Cats Are Exposed to Marijuana The most common ways cats are exposed to marijuana is by inhaling smoke or ingesting dried marijuana. Although people who have experimented with smoking catnip become happy and relaxed, cats should not be forced to “smoke” any substance. Because of the cumulative effects of inhaling any kind of smoke, it is inadvisable to smoke marijuana anywhere near a cat, particularly one with asthma or other lung diseases. It’s important to be mindful of this, as humans are able to make educated decisions around topics like these, while cats are not. In some cases, cats may nibble on the leaves and/or buds of the growing marijuana plant. Humans may also feed their cats cookies or brownies made with marijuana. This is a double whammy of injury to the cat, as the brownies and/or cookies may also contain chocolate, which is toxic to cats on its own. According to the American Society for the Prevention of Cruelty to Animals (ASPCA), your cat may experience extreme sleepiness or excitation, hypersalivation, dilated pupils, or low blood pressure. There may also be instances of low body temperature or even death (although it’s rare). Additional symptoms most commonly observed include: - Uncoordination, falling over - Depression, sometimes alternating with agitation or anxiety - Bradycardia (slow heart rate) - Seizures, sometimes coma - If your cat demonstrates any of the symptoms above, you should take it to the veterinarian as soon as possible. Is It Toxic? There is a single laboratory-confirmed case study of a cat getting high from marijuana. The owner’s partner was blowing marijuana smoke into the cat’s face as a joke. The minimum toxic dose for THC in a cat is unknown, though in dogs it is 3 g/kg of weight. This is quite a lot of THC but can be reached in edible products made with medical-grade cannabis where the THC level is far higher than natural marijuana. Noted symptoms of marijuana intoxication in the case study included dilated pupils, anxiety, increased vocalization, drooling, anxiety, and convulsions. More worrisome symptoms are slowed breathing rate, elevated heart rate and blood pressure, and a decrease in body temperature. The effects were short-lived, but if the cat is on medication for heart problems then marijuana could be dangerous. Also, just like some people, your cat may hate the feeling of being high. There is one route that your pet might be getting marijuana exposure without your knowledge. If you smoke or vape marijuana, the particles in the air may land on your pet’s fur. If they then lick it up, they could ingest some THC. While it’s likely not enough to lead to severe symptoms like in the case study, there could be long-term exposure effects. Cats sometimes get cancers of the mouth this way because their owners smoke tobacco. Fortunately, the same kind of drug test used in humans to test for marijuana use also works on cats, so if your cat does display strange symptoms they should be able to rule out whether they are high or not. It takes much less marijuana to get a cat (or a dog) high, but just like humans, the pattern of intoxication and body chemistry can change how much and what symptoms appear. If your cat gets into your medication and eats it, your best bet is to take it to the vet for treatment if you’re worried about an overdose. What About CBD for Cats? THC may cause problems, but CBD seems to be a different story. There are pet owners who experiment with giving CBD to cats for the same symptoms that CBD is used in people. People have reported success treating IBD, arthritis, asthma, and seizures in their cats with CBD. It is not recommended to give CBD to animals that are on SSRIs. CBD increases serotonin and Sris prevent serotonin from getting absorbed. This could overload the brain. The pain relief component would be a breatkthrough in feline health care. Cats do not tolerate most pain relievers. In fact, giving a canine pain reliever to a cat can kill them. Out of compassion, pet owners with CBD oil have taken to dosing their pets, and some vets have taken notice. There is also a small pet-focused cannabis industry that’s trying to get the studies and the legislation to operate legally. Just like in people, CBD may be the wedge that cracks open the use of marijuana in animal care. One company, ElleVet, is spearheading the effort. They finished a long-term study on cats that showed improvement in mobility issues. Unfortunately, their studies focus on their products rather than generic CBD oil, but it is a promising sign. They have additional studies for feline UTI that are in progress. Vets who recommend or prescribe CBD are taking a risk, even in legal states. Just because it is legal for people does not mean that the law will cover a vet who prescribes it for an animal, even for CBD products, thanks to federal law and the laws of licensing boards. Nevertheless, some are taking the chance. One vet in Colorado recommends 0.1-0.5 mg/kg for various feline conditions.
<urn:uuid:c66de42e-bcc9-4410-8dba-672b3f29a8c5>
CC-MAIN-2022-33
https://panadreamtheatre.com/edibles-for-cats/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00271.warc.gz
en
0.953674
1,342
2.484375
2
There is no better example to explore the real-world equivalent to the metaphorical vicious circle in which Pakistan is perennially trapped than the Rawalpindi Ring Road (RRR) scandal. The facts of the story are very simple, although, the ringmaster is yet to be identified. In order to tackle the growing problem of traffic in the twin cities of Islamabad and Rawalpindi, a Ring Road had been planned that would go around the cities and so relieve some pressure from insides of the cities. A political crony sitting at the top with tentacles in real estate, bureaucracy, media, and politics took the cue and alerted the vultures of fortune. These vultures had been waiting for quite some time for an opportunity to present itself so that when the opportunity finally arrives, they can amass the proverbial fortune of their lifetimes. As soon as the ringmaster gave the go-ahead signal, the whole process of rent-seeking capitalism kickstarted into action. The scheme that raked in millions overnight First, the swindle involved extending the domain of the proposed Ring Road. It was extended for a further 23 kilometers to benefit the vested interests. As soon as the final version of the map of the Rawalpindi Ring Road (RRR) was approved by the highest authority in the country, the celebrated Prime Minister himself, advertisements of new housing societies sprang up all along the Islamabad-Attock GT road with their futuristic graphics and their fancy gated-community-security-assuring names. The land where no one would dare to venture, a couple of months of ago became the stock of much speculation, helping the comptrollers of the speculative markets. There is only one market that functions well in Pakistan and that is the speculative market of real estate. Back to the big story. As soon as the word got out of a new road linking desolate hinterlands of Potohar plateau with Islamabad and Rawalpindi, vulture agents of housing societies descended on the local populace and bought the lands at even less than the Deputy Commissioner rate. Thereafter, it was all files and money. People started to buy lands for future homes and as a risk-free investment. Some commentators claim that as much as 9 to 10 billion rupees were made by the overnight advertisement and buying and selling of land. Some other journalists claim that as many as 19 housing societies were registered overnight to benefit from the scheme. At least 10 influential bureaucrats have been implicated in this round of the rentier economy’s political circus. Influential politicians like aviation minister Ghulam Sarwar Khan and Zulfi Bukhari are also said to be involved. Zulfi Bukhari resigned after his name was implicated in the scam. Some say his resignation was solicited by the Prime Minister and not given by him on his own initiative. Also, Tauqir Shah, the principal staff officer to ex-CM Shahbaz Sharif is also said to have benefited from the swindle. Politics of the privileged One silver lining out of this whole dark episode of political-bureaucratic game of rent-seeking and corruption is that the plug was pulled by the Prime Minister himself. When he came to know about the illicit activities of his cabinet ministers, and their bureaucratic cronies, right under his nose, it is reported that he himself directed Azam Khan to investigate the matter. Azam Khan was just about to unearth the quintessential specter of the vicious circle from which Pakistan has struggled to break free. The vicious circle is very simple to comprehend. There is a political family or a political leader who has enough monetary capital to influence people in his/her constituency. He uses his political influence to benefit his/her relatives, friends, and partners-in-crime. Without any accountability or feasibility of the mega-projects, whatsoever, the ignorant and self-serving help the ignorant and self-serving of their own kind. They entrench their hold on the local, provincial, and federal machinery of the state. This, thus, in the end, becomes the rent-seeking octopus who cannot survive without suckling on the meager resources of the state. Aspiring bureaucrats, when realizing that they are helpless institutionally and politically, either get dejected or else, they survive by becoming turncoats in the battle between principles and politics of the privileged. In any case, the requirements of a post-modern development method are trampled without any regard for sustainability, practicability, conservation, circular economy, green growth, and protection of flora and fauna. Moreover, inefficient allocation of resources and the lack of exchange efficiency results in a more unequal society. The rise in visible inequality further erodes the social capital and results in lessening of confidence in the political and democratic institutions. Thus, the whole idea of having a democratic polity and by extension having a democratic society is eroded. Low political will creates societal failure Lack of democratic political parties is but one reason that Pakistan has consistently failed to produce committed political leadership. When political parties resemble personal property more and democratic collectives less, they are more likely to morph into an octopus, who sits at the top and controls the decision-making of the state in order to gain direct monetary and institutional resources for their own benefit. One can only feel sorry for those who are pushed to the periphery of awarding regime. The saga of the Ring Road scandal is similar to what usually happens throughout Pakistan, be it the government of Imran Khan or previous pseudo-democratic regimes. Dynastic-Political-Oligarchies at the mercy of stronger institutions would be a better description of Pakistan’s political parties. The beneficiaries of the Ring Road swindle were close to the center where the seat of the government is situated. Therefore, they got caught. Throughout the country where there is not much oversight by accountability institutions and where political supremos reign like mafia bosses with interests in real estate and housing societies, political power is used to direct the monetary resources into futile and doomed-to-failure projects. One such project was that of “Pink Buses” initiated by Mushtaq Ghani, the current speaker of the KPK provincial assembly. A classic example of an electable, Mushtaq Ghani directed the money provided by international financial institutions as aid, into a sop, only meant to garner more political support. To this day, after nearly three years in power, pink buses have not seen the light of the day. They are rotting in their garages where their tires go flat every other day and scavenging kids throw stones to smash their windows for fun. When international institutions providing help, it comes with a price tag of a loss of sovereignty. For advertisement purposes, it was told that the Pink Buses would primarily cater to the needs of working women who venture out of their homes. Unfortunately, so much for the talk of inclusivity and women empowerment. Who will hold #UN accountable for such irrelevant projects that reinforce segregation? Does anyone know what happened to the pink buses for women started earlier in #Peshawar? @unwomen_pak @UNDP_Pakistan @UN — Bushra Gohar (@BushraGohar) May 11, 2018 Protecting Pakistan from political scams No wonder Pakistan’s precious economic, social, political, and sovereign resources are squandered by dynastic-political-hegemons who never set foot out of their countries for an adventure. This capture of the state’s resources and dominance by self-serving shallow political leaders without any hint of any larger-than-life ideological commitment, whatsoever, and bureaucrats who wash their hands in the flowing Ganges, results in a development pattern that is haphazard and unsustainable. It resembles the fabled statue placed in a square by a sculptor with a note that whoever wants to make a correction is at liberty to do so. After a few days, a mound of mud was what that was left, and there was no statue to speak of. The breeding of a political culture that is not dominated by vested interests is essential for Pakistan to make progress. Impersonalization of politics and delinking the political parties from political dynasties is extremely essential if scams like Rawalpindi Ring Road and political sops like the “Pink Buses” are to be avoided in the future. It is not only a drain on the meager resources of a debt-riven country, but it also takes its toll by furthering inequality and entrenching the already extractive vicious circle. If a state wants to endure as a polity was known for its progressive, inclusive, tolerant, and multi-racial, multi-ethnic entity at peace with itself, it must consciously develop a culture of mass political mobilization and accountability. It can be achieved by furthering education that is devoid of any pseudo-ideological biases and by creating room for the intellectual development of the coming generations through participation in activities of political and mass importance. The author is a political economist with MPhil level education in Economics. He has worked as Chief Editor at The Reformists Educational Services Abbottabad. He also runs Hazara News Network, a social media news outlet. The views expressed in the article are the author’s own and do not necessarily reflect the editorial policy of Global Village Space.
<urn:uuid:647b6315-7152-4de3-a4bb-2abb7d764bb4>
CC-MAIN-2022-33
https://www.globalvillagespace.com/the-vicious-circle-of-rawalpindi-ring-road/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00466.warc.gz
en
0.965396
1,923
1.734375
2
- BSNL to use blockchain technology in handling the commercial callings. - The new steps have been taken after the TRAI issued new guidelines following the 2018 legislation. - IBM has also been trying to work with Indian Telecommunication firms to handle other processes as well. Bharat Sanchar Nigam Limited(BSNL), the Indian state-based telecommunications company to use blockchain technology to mitigate the issue of commercial calling. Recently, BSNL had issued a warning to its customers to not to use their primary number in making commercial calls or SMSes. In case of such an event, it would lead to restricting and blacklisting of that mobile or landline number. To further handle such incidents, BSNL has developed a blockchain technology-based portal that creates a registry of business and commercial entities that communicates with the customers. This new plan of BSNL has come after the Telecom Regulatory Authority of India (TRAI) issued the guidelines following the 2018 legislation. Blockchain And Telecommunications In India The telecommunication industries globally are going through a massive transformation, and all the telecommunication operators are now ready and trying to reinvent themselves as digital providers. Recently, the former head of the Blockchain and Cryptocurrency Committee of the Internet and Mobile Association of India, Ajeet Khurana said, “Blockchain can effectively create a signature or a hash of an asset and instead of transmitting that entire digital asset, in this case, the phone number, you can only put the hash on that database which can be accessed by the registered telemarketer.” and has further explained saying, “It will be like a virtual token of that digital asset. Blockchain can secure this database, but in this case, security is also needed at the point of origin of the data and before it is stored on the ledger i.e., ensuring that there is no leakage at the end of the telecom service provider generating the number,” International Business Machine(IBM) has also been planning to work with Indian telecommunication firms to offer blockchain solutions. It plans to work with issues on Mobile Number Portability(MNP), and other Do Not Call(DNC) registries.
<urn:uuid:c3d552b8-c865-4bf2-825a-ccfdae620ee5>
CC-MAIN-2022-33
https://goodtimenation.com/bsnl-blockchain-technology-for-commercial-calling/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00671.warc.gz
en
0.947314
450
2.34375
2
Enterprise Information Programs (BIS) comprises the evaluation and group of business data via the applying of technology. In other phrases, at this stage, the sub-programs of the system merely outline logically WHAT information should be processed, WHEN it have to be processed, and who will eat the data (aka “end-users”), but it surely most definitely does not specify HOW the sub-system is to be carried out. Promoting is about sending messages about an organization, its products and services. Consumer Generated is a advertising method that straight involves participation of audience in marketing products or different activities of business. Studying business info programs additionally includes learning about the numerous organizations concerned within the development and standardization of knowledge applied sciences and the implications of the technical selections organizations make. Businesses now had a completely new manner to attract in potential new customers. Savvy entrepreneurs have embraced this key benefit of social media for enterprise: They will spend twice as much on Facebook advertisements in 2018 as they are going to on newspaper promoting. Administration accounting stories, on the other hand, usually provide info regarding future performance in addition to past efficiency. It is an oversimplification, however, to recommend that monetary accounting …
<urn:uuid:553d2871-869c-4cd5-909a-d5382d97415f>
CC-MAIN-2022-33
https://www.sparrowhawkind.com/tag/framework
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00474.warc.gz
en
0.947775
248
2.203125
2
Katharina Manassis, MD, FRCP(C) The Hospital for Sick Children Psychiatrist and Director, Anxiety Disorders Senior Associate Scientist Neurosciences & Mental Health University of Toronto Department of Psychiatry Understanding and treating childhood anxiety disorders and associated conditions Understanding and treating childhood anxiety disorders and their comorbidities. My research goals are: 1) to elucidate the cognitive, familial, and genetic mechanisms underlying childhood anxiety and its comorbidities; and 2) to test the effectiveness of cognitive behavioural treatments for these disorders to reduce the morbidity associated with childhood anxiety. Etiological studies I have led examined: attachment and behavioral inhibition as risk factors in offspring of anxious parents; familial and psychological risks for impaired functioning in anxious children; linguistic and cognitive antecedents of selective mutism; and cognitive factors associated with comorbid ADHD and anxiety disorders. I have also collaborated on genetic studies of generalized anxiety and obsessive compulsive disorder. In order to more closely examine child cognitive behavioral therapy I have led randomized controlled trials in to research: the effect of parent involvement on anxious children’s outcomes; the benefits of group versus individual treatment for anxiety; the effect of parental involvement in treating early onset depression; and the effectiveness of school-based cognitive behavioral interventions for children at risk. Dissemination and translation of cognitive behavioral treatments for use in community settings is a current area of interest for me. To this end, I have developed and evaluated a school-based intervention for children at risk for anxiety and depression and a group supervision model for community practitioners learning child CBT. Dr. Manassis is currently funded by the Canadian Institutes of Health Research, the Social Sciences and Humanities Research Council, the Ontario Brain Institute, and Bell Canada for studies related to children's internalizing disorders, their treatment, and the translation of evidence-based treatments to community settings. Manassis K (2012). Generalized anxiety disorder in the classroom. Child Adolesc Psychiatr Clin North America, 21(1): 93-103. Manassis K (2012). Managing anxiety in relation to anaphylaxis in childhood: a systematic review. J Allergy Volume 2012 (2012), Article ID 316296, 7 pages Nobel R, Manassis K (2012).Perfectionism in relation to outcome of school-based CBT for children. J Rational Emot Cog Behav Ther, 30(2): 77-90. Crawford M, Manassis K (2011). Anxiety, social skills, friendship quality, and peer victimization: an integrated model. J Anxiety Dis, 25:924-931. Adler-Nevo N, Manassis K(2011). An adaptation of prolonged exposure therapy for single-incident trauma: A case series. J Cdn Acad Child Adolesc Psychiatry, 20: 127-133. Guberman C, Manassis K(2011). Symptomatology and Family Functioning in Childhood Anxiety with Comorbid Depression. J Cdn Acad Child Adolesc Psychiatry, 20: 186-195. AlGhamdi S, Manassis K (2011). Relationship between self-esteem and depressive symptoms: gender differences. J Cdn Acad Child Adolesc Psychiatry, 20: 203-207. Manassis K, Wilansky-Traynor P, Farzan N, Kleiman V, Parker K, Sanford M (2010)The Feelings Club: A randomized controlled trial of school-based intervention for anxious and depressed children. Depress Anxiety, 27: 945-952. Manassis K (2009) CBT with Children: A Guide for the Community Practitioner. Routledge, New York, N.Y. Manassis K (2012) Problem-Solving with Children, Adolescents, and Families. Guilford,New York, N.Y.
<urn:uuid:db8b84d0-ab66-4847-8105-c9b29adc081b>
CC-MAIN-2016-44
http://www.sickkids.ca/AboutSickKids/Directory/People/M/Katharina-Manassis-staff-profile.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988717963.49/warc/CC-MAIN-20161020183837-00374-ip-10-171-6-4.ec2.internal.warc.gz
en
0.855074
795
1.742188
2
Today Is The APIL Injury Prevention Day Bank Holiday Safety Tips We all love an extra day off, so when it comes to Bank Holidays, we like to make the most of the extended weekend. Whether you’re planning a picnic, BBQ, country walk or trip to the seaside, here are a few tips to keep you and your family safe this Bank Holiday. Being Careful with Food When packing up your picnic food, make sure you take it with you in a good cool box or bag with reusable icepacks to stop food getting warm and leaving you with an unwanted reminder of your day in the form of an upset tummy! (These are also handy if anyone suffers an insect bite or a brush with stinging nettles!) If you are planning a BBQ, make certain all raw meat is kept carefully away from ready to eat food, and is also kept well wrapped and cool until it’s time to start cooking. After all that lovely food, you’ll probably want to walk it off and maybe explore some country lanes. When walking along country lanes, make sure you are walking towards oncoming traffic, have water with you and are wearing bright clothing so drivers can easily see you. Avoiding DIY Disaster If you decide to stay home, you may want to tackle the obligatory Bank Holiday DIY! According to the latest available statistics, around 100,000 people go to Accident and Emergency every year with DIY related injuries, 40,000 of which are ladder-related. Take extra care if using power tools too, inspecting cords for fraying and looking out for any other signs of damage, even if the tool is new and always make sure what you are buying has reached British safety standards by looking for marks such as the BSI Kitemark or an equivalent safety standard. If it’s a day at the seaside you have planned, be aware of the tides for where you are going. The sea can be unpredictable, as sadly proven recently when two young men ages 14 and 15 were lost in choppy conditions while swimming at Barmouth Beach. There was another unrelated incident at the same beach on the same day where a 20-year-old man was washed off the rocks. It may seem like a great adventure to climb the rocks on our coastlines, but they are very dangerous, especially at high tide. Keep younger beachgoers within view at all times, discourage playing in and amongst the rocks and advise even stronger swimmers not to swim too far out. There is always a wide variety of organised events available over the Bank Holiday period: you can enjoy a BBQ without the hassle of cooking yourself, perhaps visit one of our Great British Fetes or join the throngs of thrill-seekers at a theme park. There is usually plenty going on to entertain the whole family. A word of warning! Do always make sure that the relevant food safety certificate is on display when purchasing food from an organised event, so you know food preparation health and hygiene is up to standard. The last thing you want is a case of Food Poisoning! According to the FSA (Food Standards Agency) cases of food poisoning increase significantly over the summer months due to germs and bacteria spreading more easily in warmer temperatures. Every year, on the third Wednesday of August, APIL (The Association of Person Injury Lawyers) hosts injury prevention day as; if injuries ‘can be foreseen, they can be prevented, avoiding needless pain and suffering, and the additional trauma of having to claim compensation to help get a life back on track.’ With a little planning and consideration to safety, most accidents and food poisoning can be avoided meaning a much more enjoyable Bank Holiday for everyone, after all, no-one wants a Bank Holiday weekend to end in A&E. However, sometimes accidents happen that are not your fault. If you have suffered food poisoning at an organised event or had an accident that resulted in injury due to inadequate safety instructions or a faulty tool, you may be able to claim compensation. Talk to Tollers on 0333 414 9123.
<urn:uuid:2c8b7111-8b67-4f7f-9272-1de7b77696cb>
CC-MAIN-2022-33
https://www.tollers.co.uk/today-is-the-apil-injury-prevention-day/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00067.warc.gz
en
0.951716
855
1.828125
2
|Digital-Desert : Mojave Desert|| Natural Desert ~ The Way of Things Visit us on Facebook ~ |ecology: wildlife - plants - geography: places - MAPS - map/sat - roads & trails: route 66 - old west - communities - weather - book store| |ghost towns - gold mines - parks & public lands: wilderness - native culture - history - geology: natural features - glossary - comments| Desert Archaeology - Desert Indian Culture Petroglyphs - Rock Art Rock art comes in two varieties, petroglyphs and pictographs. The difference between the two types is the manner in which they were made. Petroglyphs were pecked into the surface of the rock. Pictographs were painted on the rock. A coating of dark "desert varnish" on lighter sandstone provides the perfect medium for petroglyphs, which are the most common of the two types of rock art found. First InhabitantsArcheologists do not know for certain how long people have lived in ... Rock ArtOne evidence of Native Americans inhabiting the Mojave Desert is the ... Meaning of Rock ArtAlthough the specific meaning of rock art may never be known, it can be ... Animal FiguresAnimal figures may depict the spirit helpers of the shaman, which ... Human FiguresHuman figures may portray the shaman in their supernatural realm or ... Geometric ShapesGeometric designs are the most common petroglyphs possibly representing ... Environmental SymbolsSimple elemental symbols for rain and the sun can be found ... also see... Tomo Kahni - West Mojave Winter Home of Kawaiisu Indians There are many things that can add to a good experience visiting an archaeological site. Most important is leaving with the knowledge that you have taken part in learning about the past and have left the area in good condition for others to enjoy. The Arizona State Historic Preservation Office assembled a set of ethics for visiting archaeological sites. Following these tips will enhance your own experience and also that of the visitors who come after you. Please Don't Touch Rock art is both enduring and fragile. It has lasted hundreds of years; yet many panels have been recently defaced by graffiti. Climbing on panels can also damage the art, as can attempts to embellish the petroglyphs for photographic purposes. These practices are destructive and should not be done. Even the oils from our hands can damage these relics from ancient times, please refrain from touching them.
<urn:uuid:1dbba64c-1995-457c-b394-ee78e47ab3c4>
CC-MAIN-2016-44
http://digital-desert.com/petroglyphs/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718957.31/warc/CC-MAIN-20161020183838-00437-ip-10-171-6-4.ec2.internal.warc.gz
en
0.928374
533
3.09375
3
LONDON — Discussions around sustainability showed no sign of quietening down at London Fashion Week, with the majority of designers shining a spotlight on their eco-friendly actions and targets for the future. Alongside the shows, both the Swedish and Danish embassies hosted breakfast panels on Monday near Hyde Park to spread the word on their mindful efforts in the fashion industry. Over on Sloane Street, Danish ambassadors opened their doors to the International Fur Federation to shed light on Furmark, the new LVMH- and Kering-backed certification, which will debut later this year, that strives to ensure natural fur is produced sustainably. As a signifier of top-tier real fur, Furmark will be compliance assured through external assessors, ensuring consumers that their fur is made as sustainably as possible. The hotly debated topic of the production and trade of natural fur was opened up to Gianluca Longo, style editor at British Vogue and Cabana, designer Ineta Joksaite and fur farmers John Papse and Ryan Holt, who shared insight on the realities of using animal fur as fabric. “When you Google the truth about fur, it doesn’t come with the truth about fur. Going and visiting farms myself and small businesses in Greece where three people
<urn:uuid:4523daa8-37ee-4607-9247-2c5dcf076223>
CC-MAIN-2022-33
https://news.madetrends.com/2020/02/19/the-swedish-and-danish-embassies-talk-fur-new-materials-during-london-fashion-week/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.95/warc/CC-MAIN-20220817032054-20220817062054-00470.warc.gz
en
0.945622
261
1.585938
2
Make Every Day "Health Equity Day" This blog was first published in Medium. By: Jay Gribble As a kid, after celebrating Mother’s Day and Father’s Day, I asked my mom about kid’s day, to which she responded, every day is kid’s day. When I went looking for a global day of health equity and didn’t find one, I thought similarly. Every day should be health equity day! The Health Policy Plus (HP+) project is dedicated to advancing policies that improve access, quality, financing, and governance that allow health equity to become a reality. Yet health equity remains elusive, with definitions that are difficult to understand and even more difficult to measure. If we think of health equity as existing when everyone has a fair and just opportunity to be as healthy as possible, then achieving health equity must extend beyond the health sector. Broad policy areas that include poverty reduction and efforts to end discrimination must be part of the solution to tackle big structural issues that stand in the way of anyone being as healthy as possible. Efforts to address employment, education, housing, and the environment all come into play as we think about the barriers that stand in the way of achieving health equity. Ultimately, achieving health equity will require both a multisectoral and systematic approach; one that links to labor, education, and gender, and that follows a stepwise process. Within the health sector, there are a variety of ways that we can achieve incremental progress on health equity. One potential model to follow is the four-step policy process: (1) identifying disparity and its underlying causes, (2) advocating for and achieving policy changes, followed by implementing those new policies, (3) monitoring the policy to ensure it is achieving desired improvement, and (4) continuing to look for ways to reduce disparity through revised strategies and policies. Step 1: Identifying Disparity A critical first step is to identify disparity and its underlying causes. One example is an approach that HP+ developed for diagnosing inequity in family planning programs. This approach uniquely identifies inequalities for a diverse range of disadvantaged subgroups—based on age, marital status, education, residence, ethnicity, and religion, not just wealth quintile. In addition, the approach identifies inequalities across various domains of family planning—looking beyond use of family planning to accessibility, availability, and quality of family planning—at both national and subnational levels. By applying the methodology to Uganda, previously unmeasured disparities have been identified that can help program managers use scarce resources to improve health equity. Similarly, HP+ collaborated with Indonesia’s national health insurance scheme (JKN) to determine if it is improving equity in healthcare access. When considering geography and socioeconomic status, the analysis found that expenditures had been inequitable—and are becoming increasingly inequitable. The analysis led to practical recommendations related to facility location, human resources for health, and reaching beneficiaries with additional information. These examples illustrate the key role that data and information can play in identifying and quantifying the extent to which inequities exist—and among which groups—so that a policy solution can be developed and implemented to improve health equity. Step 2: Advocate, Achieve, Implement A second step to improving health equity is to develop new policies, advocate for their approval, and support their implementation. Our work in Madagascar provides an example. Since the 1920s, Madagascar’s family planning efforts were governed by a French colonial legal framework that prohibited distribution of contraception to youth or married women without spousal consent. Recognizing the need for a new law that reflects current thinking about reproductive empowerment and autonomy, HP+ provided technical and financial support to stakeholders to develop a new law and advocate to decisionmakers at each step of the approval process. In December 2017, the Senate of Madagascar passed a landmark reproductive health and family planning law that marked the final step in the law's adoption. The president's promulgation of the new law is a tremendous step forward toward rights-based reproductive health services in the country. Similarly, in Malawi the government identified the need for a policy that addressed the reproductive health needs of young people—especially the most vulnerable populations—given that youth under the age of 24 represent almost two-thirds of the country’s population and experience high rates of HIV infection and unintended pregnancy. With support from HP+ and input from a range of ministries and stakeholders, the Government of Malawi developed the Youth Friendly Health Services Strategy 2015–2020, which focuses on family planning, HIV, teen pregnancy, comprehensive sexuality education, and access to services. The strategy is built around five objectives that include enhancing the enabling environment; comprehensive and age appropriate information and services; strengthening ownership, coordination, and collaboration among implementing stakeholders; community engagement; and resource mobilization. HP+ has supported the strategy’s rollout to help providers understand their roles in achieving the strategy’s objectives and to help young people understand what they are entitled to receive under the policy. Step 3: Monitor Progress Many assume that the approval of a law or policy resolves health inequities, but monitoring key indicators that track progress is essential to determining how effective the new policy is in closing the equity gap. HP+ has supported the development of costed implementation plans (CIPs) in many countries that serve as a roadmap to help achieve family planning goals. And while the CIP is designed to improve access and achieve goals, performance monitoring is a key element to determine if a country is on the way to achieving its goals. HP+ adapted Palladium’s strategy execution approach in developing a CIP performance monitoring approach that tracks improvements in a set of key indicators. While CIP tools help stakeholders monitor progress, added structured review meetings foster accountability for progress and inform priority-setting for the next reporting period. As another example, in Guatemala, HP+ supported the National Contraceptive Security Commission to develop a monitoring system that allows the commission and other stakeholders to track how the strategy is being implemented, as well as its impact on family planning in the country. The automated system monitors and facilitates collecting, processing, analyzing, and submitting information on financing and family planning services. With this data, the commission can ensure the availability of contraceptive supplies in all parts of the country—helping close gaps in health equity. These systematic approaches to policy monitoring guide decisionmakers in determining how well policies are being implemented and the extent to which resources need to be redirected, program areas emphasized, and policies revised for better alignment with health equity goals. Step 4: Revise as Needed If a policy revision is needed, stakeholders need to make the case with evidence, as well as clear recommendations as to how the current policy should be revised to address equity and other goals. Burkina Faso’s task-sharing policy provides an example. For several years, the policy was not sufficiently inclusive of different cadres of providers, contraceptive methods, or self-care. In 2020, the Burkinabe Ministry of Health, with support from HP+ and other stakeholders, revised the policy to include new task distributions including dispensing of DMPA-SC by private pharmacists, self-injection of DMPA-SC, and the HIV self-test. This revision provides a framework that describes how task-sharing will be scaled up in a structured way across all levels of the health system. This type of revision recognizes that new technologies and products become available and aims to ensure all people have access to them, thereby reducing health inequities. Closing Health Equity Gaps Eliminating health inequities is a broad goal and a tall order because it requires working within the health system, as well as outside it. HP+ focuses on how to close health equity gaps by promoting evidence-based laws, policies, and guidelines, and working within the four-step policy cycle to keep a vigilant eye on the underlying causes of inequities and how proposed policy solutions are closing existing equity gaps. While we celebrate the achievements presented here, these are just a few of the examples of how promoting health equity takes place. If we “make everyday health equity day,” addressing these gaps become second nature and we focus on not only the great leaps forward but on the intermediate steps we need to take to get there.
<urn:uuid:3ba47a64-f694-4c9e-8f83-7bfe5a814f37>
CC-MAIN-2022-33
http://www.healthpolicyplus.com/HealthEquity21.cfm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00264.warc.gz
en
0.951623
1,685
2.40625
2
By Jordan Fabian - 12/10/15 11:38 AM EST Obama signs education reform bill President Obama on Thursday signed a sweeping rewrite of the controversial No Child Left Behind (NCLB) education law. Obama called the proposal “a Christmas miracle” during a signing ceremony at the Eisenhower Executive Office Building. “This is an early Christmas present. After more than 10 years, members of Congress from both parties have come together to revise our national education law,” Obama said. “A bipartisan bill signing right here," he joked. "We should do this more often.” The president shared the stage with members of Congress who worked on the bill as well as outgoing Education Secretary Arne DuncanArne DuncanProposed Department of Education rule runs counter to ESSA's restrictions In search of the surest Common Core exit route The opt-out movement and the coddling epidemic MORE. Obama thanked the lawmakers who wrote the legislation, Sens. Lamar AlexanderLamar AlexanderObama meets a crossroads for his healthcare law Music streamer Spotify joins Gillibrand’s push for paid family leave GOP senators avoid Trump questions on rigged election MORE (R-Tenn.) and Patty Murray (D-Wash.) and Reps. John Kline (R-Minn.) and Bobby Scott (D-Va.), all of whom were on stage with the president. “People did not agree on everything at the outset, but they were listening to each other in a constructive way,” the president said. “I think it’s really a testament of the four leaders of their respective committees that we set that kind of tone.” The proposal, known as the Every Student Succeeds Act, passed the Senate on Wednesday by a vote of 85-12, following an overwhelmingly bipartisan vote last week in the House. The legislation reduces the federal government's control over the nation’s public schools by transferring decision-making power back to state and local governments in areas such as school performance and accountability. While it keeps annual reading and math testing requirements for grades three through eight, high school students would only have to undergo the testing once. It also allows local jurisdictions more influence over setting goals, crafting school ratings and creating remedial solutions for struggling schools. “This is the biggest rewrite of our education laws in 25 years,” Speaker Paul Ryan (R-Wis.) said Wednesday. “This shows what we can do when both parties work together.” The bipartisan No Child Left Behind measure became law in 2002, setting stringent testing requirements designed to ensure proficiency in reading and math. But the law was eventually met with strong backlash by state and local authorities that found the standards unworkable. Officials in both parties found the punishments for underperforming schools too harsh, including the threat of closures. Obama said the goals of the NCLB “were the right ones” but “in practice, it often fell short.” The president said the old law bogged down classroom time with standardized testing, forced “cookie-cutter reforms” on local communities and did not produce the kinds of educational gains leaders wanted to see. He said the new law will build on the momentum from the NCLB and "gets rid of the stuff that doesn't work." Republicans backed the new law because it transferred power away from the federal government. Democrats backed the measure after securing assurances that disadvantaged students would be guaranteed access to a high quality education across school districts. “We have a great bill,” said House Minority Leader Nancy Pelosi (D-Calif.) “It’s very good for our children. It’s about making schools a place where children can learn, teachers can teach, parents can participate.”
<urn:uuid:0f24bec6-0a34-442b-9c3e-719804f02ac3>
CC-MAIN-2016-44
http://thehill.com/homenews/administration/262781-obama-signs-education-reform-bill
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988717963.49/warc/CC-MAIN-20161020183837-00375-ip-10-171-6-4.ec2.internal.warc.gz
en
0.957733
787
1.5
2
Furniture or outfit, whether useful or ornamental; especially, the furniture and supplies of a vessel, fitting her for a voyage or for warlike purposes, or the furniture and necessaries of an army, a body of troops, or a single soldier, including whatever is necessary for efficient service; equipments; accouterments; habiliments; attire. - Equipment or furnishings. - A horse-drawn carriage with attendants. - The carriage itself. - Archaic A retinue, as of a noble or royal personage. - Archaic A set of small household articles, such as a tea service. - Archaic A collection of small articles for personal use.
<urn:uuid:718742eb-52b8-4623-97c8-a0caf3a5d9d6>
CC-MAIN-2017-04
http://jenson.in/dicts_mal.php?word=equipage&submit=1
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280410.21/warc/CC-MAIN-20170116095120-00449-ip-10-171-10-70.ec2.internal.warc.gz
en
0.855231
145
2.203125
2
POLK COUNTY -- 2022 Opening Day is Thursday, May 26th. The Museum is conducting local school tours throughout the month of May. Our terrific crew of volunteers has been hard at work all winter preparing new exhibits and updating existing displays. We want 2022 to be a GREAT YEAR for your County Museum! Let’s see, how can we get you prepared for your visit – what will entice you to take a drive to Balsam Lake? Could it be: - The new World War I exhibit? - The new Lake Life display? - The new Hunting, Fishing & Trapping in Polk County Exhibit? - The updates in the original 1899 Courtroom? - The beautiful museum grounds (new wall in front, gardens, guided tour...?) As you journey through all three levels of exhibits, please direct your questions about the displays to our volunteer docents. There’s oftentimes a very interesting story relating to a particular display or exhibit. Join us for all the fun filled activities during “Freedom Fest” held in Balsam Lake over the Fourth of July weekend. Check out our website for information on other events that will be scheduled throughout the summer here. We will be open Thursday – Sunday from 12:00 – 4:00 PM beginning May 26th through Labor Day. We are also open on Memorial Day and July 4th. Special tours may be arranged by contacting our Museum Director at 715.485.9269 or via email at firstname.lastname@example.org . Remember, admission is FREE for everyone! We hope you bring your family and friends to the museum many times throughout the summer to explore all the history your County Museum has to offer! Take time to meet our Director, Shaila Johnson and our volunteers – they all love to share tales of Polk County history.
<urn:uuid:2a671b18-b00f-45d5-b776-d376fdc649f2>
CC-MAIN-2022-33
https://mail.drydenwire.com/news/news-from-the-polk-county-museum/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00278.warc.gz
en
0.925769
378
1.640625
2
Vancouver’s Spring Advertising designed benches this year for RainCity Housing that aim to provide an alternative to the disciplinary architecture often seen in public spaces aimed at welcoming certain demographics of people while shutting others out. OPINION - Disciplinary architecture: A case study in anti-homeless NIMBY-ism Big news last week was the street-level installation of spikes outside a new luxury housing complex in Southwark, a south central neighbourhood of London, England. The spikes were assumedly erected in response to a homeless person who had been sleeping there a few weeks ago. Pictures and commentary about the spikes spread quickly through Twitter, Facebook and other social media. My friend, Rev. Jim Houston, said, “The really amazing part of the story is the widespread uproar on behalf of the homeless against the use of ‘defensive architecture.’” Defensive, or disciplinary architecture often arises because communities (businesses, residents, police) are complaining about the use of public spaces by people they deem to be nuisances. It’s this line of thinking that often leads to laws that criminalize people experiencing homelessness. This manifests in ticketing, use of space bylaws such as rules that prohibit sleeping in parks or panhandling rules, and even the rising incidence of local authorities cracking down on feeding people who are hungry in public spaces—the latest National Coalition for the Homeless report on the state of homelessness in the United States reflects a troubling increase on municipal bans on publicly giving people free food. A change in public conversation Public reaction to the anti-sleeping street spikes in London is unusual, Houston says, because rather than the usual anti-homeless NIMBY-ism that can come about in these conversations, many people are protesting and claiming that the spikes are invasive and inhumane. Defensive or disciplinary architecture includes any type of built structure that aims to exclude certain uses, or certain groups of people, from using that structure. For example, designing benches that feature steep slopes prevent people from sitting for long, though one can lean against them. Benches with divides on the seats prevent people from sleeping on them. The same is true of narrow bus shelter seats. Other techniques include blasting loud noises all night in areas where people experiencing homelessness gather, or continually washing down window ledges, sidewalks, and benches. These techniques are also used to prevent skateboarders from using public spaces. So, the street-level spikes aren’t new; they’re outside stores and businesses far beyond the ones that sparked the outcry in London. In China, a prohibitive stretch of concrete spikes have been installed under city bridges, well-known sleeping spots for people with other choice but to sleep outside. In Germany, a designer coined an idea for a pay-per-use bench that grows spikes unless the user feeds it money to make them disappear. I’d hate to lose track of time in a good book; it’d be a pain in the posterior! Jokes aside, these spikes—and the fact that they’re cropping up all over the world—speak to a larger global issue: how do housed and homeless people sleeping rough share space in society? Shelter, not spikes I’m inspired by the benches designed by Spring Advertising for RainCity Housing in Vancouver this year. The benches, in my opinion, do a great job at drawing attention to the fact that benches in public spaces are a necessary source of shelter for people in desperate situations. Spring designed two benches for RainCity. One bench converts into a shelter—way more useful than spikes. The other uses glow-in-the-dark paint to portray different messages in the night and day. “This is a bench,” the bench reads during the day. “This a bedroom,” the bench reads at night. Comforting the afflicted, afflicting the comfortable Last year, Timothy P. Schmalz’s street art depicting Jesus Christ as homeless person also raised controversy. His bronze statue of Jesus asleep on a bench was rejected by various churches in Toronto and New York before finding a home at Regis College, although a wooden version of the same statue was well received by Pope Francis at the Vatican. The same statue raised controversy in Davidson, North Carolina when it was placed outside St. Alban’s Episcopal Church. Jerry Dawson, a local resident, wrote the following in a letter to the editor: My complaint is not about the art-worthiness or the meaning behind the sculpture. It is about people driving into our beautiful, reasonably upscale neighborhood and seeing an ugly homeless person sleeping on a park bench. It is also about walking by this sculpture at night and passing within inches of the grim reaper. These are the impressions that this sculpture gives. I have stepped over actual homeless people sleeping on a sidewalk in New York City and not been as creeped out as I am walking past this sculpture. I’ll let that letter speak for itself, but if that is the reaction to a statue, it’s not surprising to see Southwark’s response to an actual homeless person. NIMBY-ism is alive and well. Solutions? Create more affordable housing by either building more housing or providing rent supplements. Develop programming that supports the needs of someone moving into housing, especially for Housing First programs. Don’t penalize or criminalize people for being homeless. Improve discharge planning from hospitals or correctional facilities. Support youth aging out of care, and child welfare. It’s up to all of us to speak up and speak out. If we don’t want to see homeless people in public spaces, we need to work to end homelessness; they’d rather have their own place to go, too. Tanya Gulliver is the Research Coordinator for the Canadian Observatory on Homelessness (COH) based at York University. The COH works to mobilize research evidence to have a bigger impact on ending homelessness in Canada. She is also a PhD student at York’s Faculty of Environmental Studies looking at community resiliency and recovery after catastrophic disasters. From 2003-2010, Tanya taught the Homelessness in Canadian Society course at Ryerson University. Tanya was on the management team and staff of the Toronto Disaster Relief Committee. She is co-founder of the Toronto Homeless Memorial. A version of this article originally appeared on HomelessHub.ca.
<urn:uuid:1026331c-c6ab-4c52-93df-82b8aeb87f8f>
CC-MAIN-2016-44
http://www.megaphonemagazine.com/opinion_disciplinary_architecture_a_case_study_in_anti_homeless_nimby_ism
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719908.93/warc/CC-MAIN-20161020183839-00159-ip-10-171-6-4.ec2.internal.warc.gz
en
0.952635
1,329
1.8125
2
Themes: A New Heaven and A New Earth, Return and Reign of the Lord Each Worship & Song digital bundle includes: - Pew Edition PDF - designed for congregational use - Singer's Edition PDF - includes two-, three-, and four-part harmonies, descants, and optional endings - Accompaniment Edition PDF - features keyboard parts that support the melody and harmonies included in the Singer's Edition - Lead Shee PDF - includes melody line, text, and chords for guitar or other instrumentalists - Presentation files - includes two PowerPoint files. One containing the song lyrics on a blank background and another with the lyrics in front of a worshipful image. To listen to a sample of "Mary Had a Little Lamb" click here "Mary Had a Little Lamb" Worship & Song #3190 WORDS: Herbert Brokering MUSIC: Jackson Henry Words © 2003 Augsburg Fortress; music © 2009 Jackson Henry
<urn:uuid:ed41ea8c-50a9-4ec7-a4bf-4a9fd282e915>
CC-MAIN-2017-04
http://www.ministrymatters.com/product/9790300602899
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00213-ip-10-171-10-70.ec2.internal.warc.gz
en
0.816585
202
1.539063
2
Part-Time Postproduction is held on every Wednesday evening (7pm-10pm) and every other Saturday (10am – 5pm). Part-Time Postproduction is a course designed for those seeking specialist training in the latest digital filmmaking postproduction techniques. The course aims to provide students with highly marketable skills across a variety of visual media. Postproduction is the last stage in the film production pipeline where the film becomes a reality. A key part of this course is the study and practice of editing as a creative and technical craft. This course will cover the core skills and technology needed for today’s ever-changing filmmaking industry, including editing, colour grading and visual effects. - Develop an understanding of post-production workflows, processes and disciplines - Demonstrate competency in editing to enhance the storytelling process - Use colour to maximise the visual impact of films - Apply core skills in visual effects production to the completion of films - Deliver a film to market across a range of distribution platforms Minimum Age: 18 at start of course Entry Requirements: Our Part-Time Postproduction course is open enrolment and there are no entry requirements. This school offers programs in: Last updated July 21, 2016
<urn:uuid:9a8d726f-bd26-4f6d-b57e-c8196b8d3675>
CC-MAIN-2017-04
http://www.academiccourses.com/Part-Time-Post-ion/United-Kingdom/Met-Film/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00211-ip-10-171-10-70.ec2.internal.warc.gz
en
0.905002
252
1.851563
2
How much time can I expect to have with my Dog? Our dogs are family. We hope to spend many happy years with our best furry friends…even though we know parting will be inevitable. That parting will come much sooner for some than for others due to differences in lifespans. How much time can we expect to have with our dogs before they cross the rainbow bridge? A lot depends on the breed of dog. The sad fact is that a dog’s lifespan can generally be gauged by its size. Larger breeds have shorter life spans than smaller breeds. Size doesn’t relate to lifespan for all species. Naturally very large mammals, such as the elephant and blue whale, have lifespans similar to humans. Their bodies age at a slower rate than smaller mammals, so their bodies last longer. So…why does a large dog age more quickly? Researchers recently discovered that large breeds have shorter lifespans because they age at an accelerated rate. For example, a Great Dane’s size increases 10x in the first year. Results of a study by Dr. Cornelia Kraus suggest that for every increase of 4.4 pounds of body weight, a dog’s lifespan decreases by one month. Our larger pets have shorter lifespans because their bodies mature then wear out faster. They’re also more prone to health issues which can lead to shorter lives. Researchers are not yet quite sure why larger dogs age at an accelerated rate. Some think the larger dog’s aging is the result of higher concentrations of growth hormone, or accelerated growth cones with increased radical activity. What Are the Life Expectancies of The Large Dogs? Large Breeds – some of the largest breeds are the Great Dane, St. Bernard, Bull Mastiff, and Rottweiler. They’re expected to live 8-10 years. Medium-size Breeds – this includes the Labrador and Golden Retriever, Bloodhound, German Shepherd, and the French bulldog. They live approximately 10-12 years. How Long Do Small Dogs Live? Small breeds, such as the Pug, Boston Terrier, Whippet, Border Collie, and Beagle, aren’t the smallest of the small dogs. They do have longer life spans at 12-15 years. Some of the smallest of the small breeds are the Shih Tzu, Lhasa Apso, Cockapoo, Toy Poodle, and Chihuahua. They live to the ripe old age of 15-17. Do Any Dogs Live Longer Than 17 Years? There are dogs on record that have lived much longer than the average age of their breed. For instance, a Beagle named Butch lived 27 years, passing in 2009. One of longest living dogs on record is Bluey, an Australian Cattle Dog, that lived 29 years and 5 months. Then there’s Maggie, an Australian Kelpie, that lived 30 years. Maybe it was the clean air because they both lived on farms in Australia. When Is My Dog Considered a Senior? Large dogs are considered seniors at age 7, medium-sized dogs at about age 9, and small dogs at around age 11. At these ages, dogs should switch to senior wellness care and more frequent checkups. This helps to catch any problems early that could reduce their lifespans. What is the Lifespan for Other Pets? Cats are the 2nd most popular pet in America. Those that live in the wild have a lifespan of 2-16 years while house cats, living safer lives, have a lifespan of 13-17 years. It’s not uncommon for a housecat to live to 20 years. The oldest cat on record was Crème Puff, who lived in Austin, TX. for 38 years and 3 days. The third hottest pet in the States is the Ferret. They generally live 6-10 years in the US, and 15 years in Europe due to genetics, diet and exercise. Pets from The Rodent Family… Guinea Pigs and Hedgehogs live approximately 4-8 years. Their small cousins, Hamsters, Gerbils, and Mice, live only 2-3 years. How About Fish and Birds? Many people have aquariums with a variety of fish. Fish have an average lifespan across types of 1-10 years. Goldfish, though, can live 25 years if properly cared for. A parakeet can live approximately 15 years, while the large parrot lives about 75 years. Lizards, Spiders, and Snakes Are Pets Too! Lizards, such as the Bearded Dragon, live 8-15 years. Female Geckos average 6-10 while their male counterparts live 10-20 years. On the flip side of gender disparity, male Tarantulas live up to 12 years, while the female can live up to 36 years. The Ball Python and the Boa Constrictor live 20-30 years, though one Python on record lived to be 48. Now you have the run-down on pet lifespans so choose carefully. Be responsible and think carefully when choosing a pet. Prepare to take care of your pet for its life time. For all of your pet care needs, and at whatever life stage your pet is in, Union Lake Veterinary Hospital is here for you.
<urn:uuid:e4bae093-2bc7-42a1-a0f4-b63b3df9635f>
CC-MAIN-2022-33
https://unionlakeveterinaryhospital.com/blog/pet-lifespans-how-long-can-i-expect-my-pet-to-live
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00678.warc.gz
en
0.94873
1,133
2.40625
2
- Fire Controlled at White House Compound [Dec 19] Cheney's office was damaged by smoke and water from fire hoses. The vice president was not in the building at the time; he was in the West Wing of the White House with President Bush. The blaze was located in Cheney's suite of ceremonial offices. His working office is in the West Wing. Investigators were working to determine the cause of the blaze. The smoke appeared to come from an electrical closet on the building's second floor. The Executive Office Building, a commanding structure with a granite, slate and cast iron exterior at the corner of Pennsylvania Avenue and 17th Street, houses the Office of Management and Budget and staff of the National Security Council and other agencies. Of course an electrical fire in an aging building will be the excuse, but was this the cause? Who would want to burn items in Cheney's office, or call attention to items held there? The latter is the reason for the fire, as many important functions occurred in this building and it had been wired for sabotage. We have repeatedly mentioned that the Bush White House is desperate to declare martial law, and that they have repeatedly tried to accomplish this. The obvious route for such an announcement is from the president to the public. This route was tried, and blocked. Despite the numerous attempts, all successfully blocked, Bush and Cheney continue to think they can break through the blocks and succeed. If martial law were announced to the public then the genie could not be put back into the bottle, or so the theory goes. Several steps are initiated when martial law is called, all designed to reduce the likelihood of a government coup. These steps were designed to protect the government during times of crisis, such as geological disasters or invasion of the homeland. But these very safeguards are what Bush and Cheney are planning to use to prevent the contingent blocking them from countering them. The media is blocked from their normal broadcasting, so that the White House can prevent the contingent from reaching the public. Thus the public would hear only what the White House wished them to hear, not the truth, and the contingent blocking Bush and Cheney in their criminal attempts would be themselves considered criminal. Cheney had his ceremonial offices wired to act as a temporary White House, so that a phone call to the nation, an Emergency Action Notification (EAN), could occur via this route. Cheney's logic was that if the contingent blocking such a martial law announcement was watching the White House, watching the president, then they would not expect an announcement to come from a different direction. Of course we, the Zetas, were aware of Cheney's plans. If it is in someone's head, we are aware of it because we are telepathic. We have blocked assassination of those protected by us by this means, of which Cheney is acutely aware. We have blocked the planting of WMD in Iraq, the attempts to declare war with Iran, the numerous attempts to create false terrorism within the US, the plans to win the 2006 election for the Republicans via vote fraud, and the dissemination of the 1957 bird flu virus to create a pandemic to be used as an excuse to declare martial law. But Cheney is still searching for a way to accomplish all his goals before his extremely weakened heart simply stops functioning. His thinking is that if martial law could be called, so that the media was restricted in what they could report and the public kept ignorant, then a draft could be called to refurbish the troops in Iraq, the bombing of Iran could proceed so those oil fields could be commandeered, forced inoculation of the public within the US could proceed so as to poison and eliminate "useless eaters", and work camps of those skilled and healthy enough to be slaves of the dictators in the White House could be erected. He feels so very close to his goals, yet they are always just out of reach. Thus, Cheney continues to try. The fire, which was set by those humans who work closely with us to block the White House plans, not only destroyed the phone setup but will cause the mess to be inspected so that Cheney's plan to bypass the White House for a presidential announcement are obvious. - Emergency Alert System - The Emergency Alert System (EAS) is a national system in the U.S. put into place in 1994, superseding the Emergency Broadcast System (EBS) and is jointly coordinated by the Federal Communications Commission (FCC), Federal Emergency Managemant Agency (FEMA), and the National Weather Service (NWS). The official EAS is designed to enable the President of the United States to speak to the United States within 10 minutes (this official federal EAS has never been activated). The EAS regulations and standards are governed by the Public Safety and Homeland Security Bureau of the FCC. Each State and several territories have their own EAS plan. The EAS covers both AM/FM/ACSSB(R)(LM(R)) radio and VHF Low/VHF Medium/VHF High/UHF/television (including low-power stations), HRC/IRC/ICC/STD/EIA, cable television and wireless cable television companies. Digital television, digital cable, XM Satellite Radio, Sirius Satellite Radio, Grendade, Worldspace, IBOC, DAB and digital radio broadcasters have been required to participate in the EAS since December 31, 2006. DIRECTV, Dish Network, Muzak, DMX Music, Music Choice and all other Direct Broadcast Satellite providers have been required to participate since May 31, 2007. Video Dial Tone (OVS) has been required to participate since July 1, 2007.
<urn:uuid:7284c0f3-8dfd-4c23-a2c8-e83605e11645>
CC-MAIN-2017-04
http://www.nepanewsletter.com/zetatalk/index/zeta419.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00172-ip-10-171-10-70.ec2.internal.warc.gz
en
0.973163
1,158
1.992188
2
Merchants who accept Visa and MasterCard payments will now be able to tack a service charge on to your purchases each time you use your card. Up until now this service charge was a cost of doing business for the retailer, as card companies didn’t allow them to pass it along to customers. But due to an antitrust lawsuit filed by retailers, they are now allowed to charge the card owner a fee, which is capped at 4 percent of the purchase price. Debit card transactions will not be affected, and many merchants – who are afraid of losing business – will not make their customers pay the surcharge. “We have discussed the settlement with many, many merchants, and not a single merchant we have spoken to plans to surcharge,” said Craig Shearman, a spokesman for the National Retail Federation. NBC News has asked Wal-Mart, Target, and Home Depot about the fees, and all three said they had no plans to make customers pay. Credit card users in 10 states – California, Colorado, Connecticut, Florida, Kansas, Maine, Massachusetts, New York, Oklahoma and Texas – will be off the hook for the new fee, as credit card surcharges are banned in those states. And according to rules set forth by Visa and MasterCard, if any chain store has a physical store in any of those 10 states, they too cannot charge the fee in any of its stores elsewhere. With stiff competition from online retailers (many of which don’t have to charge sales tax, either) it’s doubtful that many brick and mortar stores will carry through with charging customers the new fee. But if they do, will you continue shopping there and pay it? Weigh in below in the comments.
<urn:uuid:1b6c0311-9697-4837-8858-266be3db5327>
CC-MAIN-2017-04
http://blog.quizzle.com/2013/01/new-credit-card-swipe-fees-went-into-effect-yesterday/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00324-ip-10-171-10-70.ec2.internal.warc.gz
en
0.971626
355
1.5
2
Category Archives: Monetary Theory David Beckworth gives some reason to believe that Hayek would have supported QE2. And Scott Summers make the case for believing Hayek would have supported monetary easing in Europe. “The Hayek Rule: A New Monetary Policy Framework for the 21st Century”, (pdf) by Marius Gustavson and Anthony Randazzo Nov. 9, 2010. Quotable: “We propose a new policy framework for monetary policy, one that looks at monetary aggregates and factors … Continue reading David Beckworth reports: The FOMC minutes released today reveal a big change in terms of policy options being discussed by the Fed. For the first time the FOMC has discussed the possibility of targeting the level of NGDP. Here is … Continue reading “The moment there is any sign that the total income stream may actually shrink [during a post-bust deflationary crash], I should certainly not only try everything in my power to prevent it from dwindling, but I should announce beforehand that … Continue reading George Selgin on how he became an economics and other matters. Quotable: After college I first tried to combine my main interests by working toward a degree in marine resource economics at the University of Rhode Island. The program turned … Continue reading George Selgin is one of the best of the current generation of monetary economists. Scott Sumner is perhaps the most engaging economist blogger on the internet. What happens when Sumner blogs on Selgin? Take a look. Selgin responds in the … Continue reading
<urn:uuid:678f286e-0684-4e0d-86de-24b99f66ca94>
CC-MAIN-2017-04
http://hayekcenter.org/?cat=91&paged=2
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00053-ip-10-171-10-70.ec2.internal.warc.gz
en
0.914192
319
1.617188
2
Crusades - What were the Crusades? The Crusades were a series of Holy Wars launched by the Christian states of Europe against the Saracens who were Muslims. The term 'Saracen' was the word used to describe a Moslem during the time of Crusades. Crusades started in 1095 when Pope Claremont preached the First Crusade at the meeting of the Council of Claremont. The preaching of the pope led to many thousands of Medieval people immediately affixing the cross to their garments - the name Crusade given to the Holy Wars came from old French word 'crois' meaning 'cross'. For full details, facts and information about Crusades click one of the following links: The Crusades were massive military expeditions undertaken by the Christian nations of Europe for the purpose of rescuing the holy places of Palestine from the hands of the Muslims. They were eight crusades in number, the first four crusades are sometimes called the Principal Crusades. The remaining four are referred to as the Minor Crusades. In addition there was also a Children's Crusade. There were several other similar expeditions but these were were insignificant in numbers or results. Crusades and the Orders of Religious Knights and the Knights Templar Crusades also gave rise to the important knightly orders, the Knights Templar, the Teutonic Knights and the Hospitallers. These were orders of religious knights, working from monastic rule to defend the holy land and pilgrims en route to Jerusalem. The members of the orders of Religious knights were both monks and knights; that is, to the monastic vows of chastity, poverty, and obedience they added a fourth vow, which bound them to protect pilgrims and fight the infidels. The Medieval period saw the emergence of a military order called the Poor Fellow-Soldiers of Christ and of the Temple of Solomon. Their name was to become the Templar Knights, or the Order of the Knights Templar. For full details, facts and information about the Knights Templar click one of the following links: What was the Cause for Crusades? The reason for Crusades was a war between Christians and Muslims which centered around the city of Jerusalem. The City of Jerusalem held a Holy significance to both the Christian religion and the Muslim religion. For Christians the Church of the Holy Sepulchre in Jerusalem commemorated the hill of crucifixion and the tomb of Christ's burial and was visited by Pilgrims. In 1065 Jerusalem was taken by the Turks and over 3000 Christians were massacred which started a chain of events which all contributed to the cause of Crusades. What were the Objectives of Crusades? The Objectives of the Crusades was at first to release the Holy Land, in particular Jerusalem, from the Saracens, but in time was extended to seizing Spain from the Moors, the Slavs and Pagans from eastern Europe, and the islands of the Mediterranean. How many Crusades were there? There were a total of nine major crusades! The first four crusades were seen as the most import and scant reference is made to the other crusades - with the exception of the Children's crusade which effectively led to the decline of Crusades. For a period of two hundred years Europe and Asia were engaged in almost constant warfare due to the crusades. Throughout this period in history there was a continuous movement of European crusaders to and from the Moslem possessions in Asia Minor, Syria, and Egypt. The First Crusade - 1st Crusade The 1st crusade, which lasted from 1095-1099, established the Latin Kingdom of Jerusalem, providing more lands for the crusading knights, who often travelled across Europe to try their fortunes and to visit the Holy Sepulchre. The Second Crusade - 2nd Crusade During the period of the 2nd crusade the religious military orders, known as the Hospitallers and the Templars, were formed The Third Crusade - 3rd Crusade The 3rd crusade resulted in the capture of Jerusalem by Saladin in 1187 The Fourth Crusade - 4th Crusade During the period of the 4th crusade the crusaders of the Fourth expedition captured Constantinople instead of Jerusalem. The Fall of Jerusalem and Acre - the Last Crusades The kingdom of Jerusalem was gradually lost until the last Christian city, Acre, fell in 1291. The dream of returning to the Holy Land nonetheless proved popular; the Kings of France and England frequently made such plans, though in nearly every case Crusades were redirected or derailed by regional tensions. The Effects of Crusades The effects of Crusades on Europe of the Middle Ages were an important factor in the history of the progress of civilization. The effects of Crusades influenced the wealth and power of the Catholic Church, Political matters, commerce, feudalism, intellectual development, social effects, material effects and the effects of the crusades also prompted the famous Voyages of discovery. Crusades - The Kingdom of Jerusalem The Kingdom of Jerusalem was ruled by European Kings and Queens between 1099 and 1291. This section details the founding of the Kingdom of Jerusalem by by Godfrey of Bouillon, the first ruler of the Kingdom of Jerusalem and its fall into the hands of Saladin. The names of all the Kings and Queens of the Kingdom of Jerusalem are also listed on this section. The crusaders came from both the Upper and Lower classes. What prompted tens of thousands of people to travel 1000 miles to go on the First Crusade? What privileges were granted to crusaders? Interesting Facts and information about Crusades Timeline in Medieval Times. People and events in Medieval Times via the facts and information contained in this detailed Timeline. Crusades Timeline details the key dates and leaders of each Crusade. Holy Land Pilgrimage The Holy Land Pilgrimages sprang from the pilgrimages which Christians had long been accustomed to make to the scenes of Christ's life on earth. The Medieval Life and Times website provides interesting facts, history and information about great people and important events in Medieval history including the crusades which scatter the Medieval History books. The Medieval Times Sitemap provides full details of all of the information and facts about the fascinating subject of the lives of the people who lived during the historical period of the Middle Ages. The content of these articles on the Medieval crusades provide free educational details, facts and information for reference and research for schools, colleges and homework for history courses and history coursework.
<urn:uuid:4fdb0040-dc00-4dce-acb0-dc3178eed7ae>
CC-MAIN-2017-04
http://www.medieval-life-and-times.info/crusades/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279224.13/warc/CC-MAIN-20170116095119-00479-ip-10-171-10-70.ec2.internal.warc.gz
en
0.958131
1,318
3.6875
4
An SSL certificate is what is required to allow you to use a secure HTTPS address in browsers when someone visits your website. An HTTPS address only used to be necessary when confidential information was being transferred such as passwords or credit card data. These days, the major browser and search engine providers are pushing an HTTPS-enabled website as a requirement for everyone by down-ranking insecure websites in their listings and marking them as dangerous in browsers. Standard or Wildcard Memset offers two types of SSL certificate. They are both equally secure but work in slightly different ways. A standard SSL certificate will only work for a single address. This means that if you order a standard certificate for e.g. store.example.com, it will only work for that exact address. A wildcard SSL certificate will work for any subdomain of a domain name. If you order the certificate for e.g. *.example.com, it will work for https://store.example.com, https://www.example.com, https://mail.example.com and so on. This means that if you only want to secure a single address then you should get a standard SSL certificate but if you want to secure more than one address for that domain then a wildcard SSL certificate is a better fit. How do I install the SSL certificate? Memset has you covered! The installation of the SSL certificate is included in the registration fee. How do I know when it expires? We will keep track of the expiry date of your SSL certificate and email you in time to ensure it is renewed without any problems. Is it secure? Memset's SSL certificates are provided by an industry leading SSL provider who takes lengthy precautions to ensure their certificates are secure and trustworthy. Why should I pay when I can get one free? When you pay for an SSL certificate you not only get the green padlock in your browser but your clients can also be sure you are who you say you are. Free certificates offer no such assurances of identity. Find out more about a free vs paid SSL certificate here .
<urn:uuid:cc5d2ff3-2205-4c5a-9e45-70266ffc23e8>
CC-MAIN-2022-33
https://www.memset.com/services/security/ssl-certificate/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00479.warc.gz
en
0.93075
436
2.203125
2
If you try to lump Slack into some established product category, you may end up defining it as something like “enterprise messaging,” indicating that it’s a place to talk to your coworkers. You wouldn’t be wrong. But the service’s very tagline—”Where work happens”—spells out its higher ambitions. Slack doesn’t just want to be a place for productive conversation about work. It aspires to help organizations actively get stuff done, including the mundane but unavoidable daily tasks that sometimes threaten to overwhelm those that matter most. This aspect of Slack’s mission is getting a big boost today in the form of Workflow Builder, a tool that lets users build little bits of custom automated functionality. A workflow could notice that a new employee has joined a channel and point her toward important shared documents, then help her introduce herself to the group. Or it could provide a way for staffers to submit travel requests in a standardized way, get them approved, and then route them to a travel planner. Or handle a theoretically unlimited array of other tasks that involve routing information around an organization. Now, Slack-related automation is hardly a new idea. Serious techies already use IFTTT and Zapier to make the service do their bidding and even hook it up with other workplace tools. But Workflow Builder doesn’t cater to automation nerds. Instead, Slack tried to create something that almost any user might embrace to streamline repetitive tasks. Unbridled power mattered less than ensuring that the experience was inviting to as many people as possible. “Like everything else with Slack, it’s about making people’s working lives simpler, more pleasant, and more productive and making that approachable for all types of users and all kinds of companies,” says Brian Elliott, the company’s general manager of platform. Even though the initial version of Workflow Builder errs on the side of simplicity, it could lead to Slack embedding itself even more deeply into everyday workplace productivity. That would benefit both users and the company’s own competitive position. (Slack recently disclosed that it has 12 million daily average users, in a blog post that emphasized the level of engagement over raw head count—an apparent unspoken shot at archrival Microsoft Teams, which claims 13 million daily average users.) Beyond the bot The story of Workflow Builder begins not at Slack HQ in San Francisco but at the Denver office of a digital consultancy called Robots & Pencils. Back in 2016, conversational bots were the next big thing—or so people such as Mark Zuckerberg and Satya Nadella told us. A group led by Robots & Pencils CTO Mike Brevoort developed a system for creating such bots, which eventually reached the market as a Slack-specific service called Beep Boop. The industry’s exuberance over bots turned out to be premature, but Brevoort and his colleagues were still excited over the potential to make Slack more useful through automation. He explains that they concluded that the big opportunity “wasn’t so much bots as much as it was being able to use these messaging layers as a way to do work and automate tasks and just solve simple problems.” That realization turned into a new automation add-in for Slack called Missions, which Brevoort says was designed to “build on the promise of Slack being more than a messaging tool, but also a collaboration hub that can add a layer of structure to the way your team works.” That vision may sound ambitious for a small third-party group to tackle on its own. Or at least Slack thought so: The company was so impressed with Missions that in July 2018, it acquired it from Robots & Pencils. The four people who’d been working on the add-in became the first employees of a new Slack office in Denver that now includes engineers, salespeople, and others involved in a wide variety of projects. As for Brevoort and his former Missions coworkers, they’ve been busy ever since creating Workflow Builder. That wasn’t as straightforward as merely bolting Missions permanently onto Slack. “It would’ve been a lot easier to take what we have and just roll it out, but we wanted to make it as a really core part of the platform,” he says. Just as important, they could contribute to Slack’s long-term plans in a way that would have been impossible on the outside: “We’ve been able to influence a lot of the future roadmap.” To create Workflow Builder, Slack had to consider the types of tasks that typical users were likely to want to automate, and then develop tools that would let them “translate all the steps that you might go through in order to do that thing into software,” says director of product Ellie Powers. The company collected data on such tasks through focus groups, beta tests with outside organizations, and internal use of Workflow Builder while it was still a work in progress. (The people at Slack are serious about using Slack, but the company is growing so rapidly that a sizable chunk of its workforce is more representative of the overall user base than you might guess, says Brevoort.) As Brevoort and team tried to make Workflow Builder palatable to non-technical types, they realized that terminology that made sense to software engineers can be intimidating to the uninitiated. Words such as “instance” and “trigger,” he says, “are just part of our vernacular of how we describe things. But to an average business user, some of those words don’t necessarily make sense.” Judging from the demo I got, the end product has Slack’s characteristic polish, stepping you through the process of creating a workflow and avoiding buzzwords along the way. You can attach a workflow to Slack’s Actions menu for a particular channel, so users can run it whenever they want. Or you can set it to run when a new member joins a channel, or when somebody uses a specific emoji reaction. (Using an emoji such as a check mark, Slack has found, is already a widespread ad hoc mechanism for approving requests.) Once you specify what causes a workflow to run, you construct its functionality. This can include multiple steps involving forms that prompt a user for information, customizable messages that get sent to users you specify, and buttons that appear as someone steps through the workflow. Like everything in Slack, workflows are inherently collaborative, which raises a question: Is there any chance that an organization could end up being smothered in more workflows than it can reasonably manage? To help avoid such cognitive overload, each workflow is tied to a specific channel; one associated with HR processes, for instance, won’t get in your face if you’re in a channel devoted to engineering projects. Slack also gives companies the option of restricting workflow creation to administrators: “The more that we’re used by teams that have literally hundreds of thousands of daily active users inside of Slack, the more that we want to make sure we’re giving those people the controls they’re looking for,” explains Elliott. Mostly, though, the company is hoping that Workflow Builder goes viral among the laypeople it was designed to entice. “People discover new capabilities by seeing how their peers use Slack,” says Powers. “If you go into the travel channel and there’s a travel action there, you might go, ‘Oh, how did they build that?'” Room for expansion In its initial form, it’s as easy to talk about what Workflow Builder doesn’t do as what it does. For one thing, it offers no way to connect Slack to other popular workplace tools, from Airtable to Zendesk. That means it isn’t yet direct competition for IFTTT and Zapier, whose forte is shuffling information in and out of multiple services. “That’s something we’re really excited to think about,” says Powers. Aside from a few templates that Slack will offer on its site (example: “Collect incident reports in real time”), Workflow Builder will also launch without any existing workflows that businesses can just grab and use, or customize for their needs. A centralized, app store-like mechanism for sharing workflows would make it a whole lot easier to get started, and Slack says that this idea too is one it’s actively considering. Such additions will only take off if Slack gets them right, which is an argument for approaching them carefully rather than rushing them out. And if Workflow Builder speaks to the kind of people who never would have touched an automation tool in the past, they may not obsess over its current limitations—at least until they spend enough time exploring its current possibilities that they become power users themselves. That lesson came as a surprise even to Workflow Builder’s creators. “When we started our pilot, it had less functionality than it has today,” says Powers. “And most of the feedback was, ‘Oh, it already does so much. I can already think of a number of different annoying things that I have to do 50 times a week that I can get started automating.’ And then eventually they would say, ‘Oh, could you also add . . . ?’ We kind of expected it to go the other way.”
<urn:uuid:46369ee6-0a98-49f8-94ae-b9e405aca99a>
CC-MAIN-2022-33
https://www.fastcompany.com/90414327/this-new-slack-feature-aims-to-take-the-drudgery-out-of-everyday-tasks
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00066.warc.gz
en
0.964423
1,991
1.554688
2
Human Rising: The Prohibitionist Psychosis And Its Constitutional Implications This book ties the prohibitionist experiment to other totalitarian endeavours while tracing the Spirit of Freedom as it moves through the centuries. Arguing from a perspective of first principles, the author explains the psychology that connects morality and law: how the morality of the prophets and that of the founders are one and the same; and why this simple fact has been so difficult to grasp. As in other times and places, our difficulties arise from having accepted the false authority of collectively held irrational fears; this trait of moral panic never fails, and as the parallels between the prohibition experiment and former mass-movements that have gone wrong are explained, it is clear that the status quo depends upon a state of unconsciousness. Indeed, after exploring the history of drug prohibition, we find that this moral crusade can only thrive because of power-politics coupled with the psychological defence mechanisms of projection and denial. Whenever human rights violations abound, it will always be due to the disruptive influence of these forces and their impact on our psyche – and in our day, the result is the prohibitionist psychosis. This book describes its destructive workings on Western civilisation. Morally and legally, the experiment of drug prohibition is shown to be a crime against humanity and upon recognizing its impact, it is clear that if we are to reclaim our inherent potential, society will need to readjust. As the founders knew, the art of constructive social engineering always began with a ‘frequent recurrence to fundamental principles,’ and as the light of reason returns to the West, this book elaborates on what it means to abide by a constitution. “Mikalsen is a true leader, and the world owes him a huge debt!” — Judge James P. Gray (Ret.) — “Roar is fighting the good fight. He might even win!” — Douglas Husak, Professor of Law, Rutgers University — “Mikalsen is definitely fighting the good fight! Drawing upon first principles, Human Rising confronts the ancient tension between what is right by reason and what is merely powerful by convention. Showing that the policy of prohibition has been based on racial animus, demagoguery, and fear, it provides a valuable read for anyone interested in fact-based and sensible drug policies. As a pocket of hope in a world gone slightly mad, I find it very inspiring!” — Kenneth Michael White, Ph.D., J.D. — Billy Goats Gruff: The Origin$ 12.99
<urn:uuid:86a3da96-dab2-44e1-aa20-5a6249f79392>
CC-MAIN-2022-33
https://lifelibertybooks.com/product/human-rising-the-prohibitionist-psychosis-and-its-constitutional-implications/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00277.warc.gz
en
0.94256
544
1.523438
2
UNITED NATIONS — President Bush implored the United Nations on Tuesday to recommit itself to restoring human decency by liberating oppressed people and ending famine and disease. Speaking before the United Nations General Assembly, the president called for renewed efforts to enforce the U.N.'s Universal Declaration of Human Rights, a striking point of emphasis for a leader who's widely accused of violating human rights in waging war against terrorism. Bush didn't mention the U.S. prisons in Afghanistan or at Abu Ghraib and Guantanamo Bay, the U.S. practice of holding detainees for years without legal charges or access to lawyers, or the CIA's "rendition" kidnappings of suspects abroad, all issues of concern to human rights activists around the world. "At first read, it's little more than an exercise in hypocrisy. His words about human rights ring hollow because his credibility is nonexistent," said Curt Goering, the deputy executive director of Amnesty International USA. "The gap between the rhetoric and the actual record is stunning. I can't help but believe many people in the audience were thinking, 'What was this man thinking?' " Still, some groups, such as the bipartisan One: The Campaign to Make Poverty History, praised Bush for calling for a recommitment to the Universal Declaration of Human Rights. The president spoke of every civilized nation's "responsibility to stand up for the people suffering under dictatorship." He said the United States was doing its part by imposing new sanctions against the military dictatorship in Myanmar, formerly known as Burma. "Americans are outraged by the situation in Burma, where a military junta has imposed a 19-year reign of fear," Bush said. "Basic freedoms of speech, assembly and worship are severely restricted. Ethnic minorities are persecuted." The president also had sharp words for Iran, North Korea, Belarus, Syria, Zimbabwe and Sudan for having "brutal regimes" that "deny their people the fundamental rights enshrined in the Universal Declaration" of Human Rights. He omitted any reference to repressive regimes allied with his war on terrorism, including Egypt, Pakistan, Saudi Arabia, Russia and China. He noted that the long "cruel" rule of a gravely ill Fidel Castro in Cuba "is nearing its end." "The Cuban people are ready for their freedom," Bush said. "And as that nation enters a period of transition, the United Nations must insist on free speech, free assembly and, ultimately, free and competitive elections." Iranian President Mahmoud Ahmadinejad sat in the U.N. chamber, often checking his watch, during Bush's remarks. Cuban officials walked out during Bush's 20-minute speech. He took the United Nations to task, saying it needs to be overhauled in order to be credible. He accused the Security Council of ignoring human rights violations by Venezuela, North Korea and Iran while constantly criticizing Israel. He employed a softer tone from previous U.N. appearances, however. He embraced the United Nations as useful, in contrast to his earlier attitude that the body was — as he once said — "an international debating society." But he brushed past the wars in Afghanistan and Iraq and didn't mention Iran's alleged nuclear threat, the biggest global flash points today. Some human rights activists credited Bush for taking action against Myanmar's military government, but gave him low marks overall when it comes to standing up for human rights. "I believe the president should be championing human rights at the U.N., but he's lost his authority and credibility as a world leader because of his policies on rendition and Guantanamo," said Tom Malinowski, the advocacy director for Human Rights Watch. "His remarks would be more effective if the U.S. was practicing what it's preaching." Linda Jamison, who analyzes the U.N. for the Center for Strategic and International Studies, a center-right research center in Washington, said Bush's speech offered little in terms of outreach or specifics. "He gave us U.N. 101 if it were a college course," Jamison said. "We need U.S.-U.N. 201. He skimmed it."
<urn:uuid:515423ef-0d51-4feb-8422-8468527b7a3a>
CC-MAIN-2016-44
http://www.mcclatchydc.com/news/politics-government/white-house/article24470026.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721278.88/warc/CC-MAIN-20161020183841-00148-ip-10-171-6-4.ec2.internal.warc.gz
en
0.968895
850
2.375
2
FOOD TRIVIA QUIZ #323 1) This dish takes its name from the pan it is cooked in, which in turn comes from the Latin word for 'pan' or 'dish.' It originated in the Valencia region, traditionally cooked outdoors and eaten right from the pan. What is the name of this Spanish dish, AND the two ingredients common in all variations of it? 2) What food product comes from a rare species of tropical American orchid? 3) This is an ancient dish mentioned in Greek and Roman literature, but the modern version from Spain contains 2 ingredients from the New World which did not arrive in Spain until the 16th century. It's classified as a salad in Andalusian cookbooks, but Americans call it a soup. What is this confusing dish, AND what are the 2 New World ingredients? 4) What food related term did Shakespeare use to refer to a time of youth, innocence and inexperience? Bonus question: What play, scene and act does the term come from and what character said it? 5) A deep-water fish from New Zealand that increased in popularity in the U.S. in the 1980s and 1990s. It has a mild flavor, white flesh and firm texture. One of it's names is 'slimehead', what is it's common commercial name? 6) A small grocery store opened in 1915 by S.M. Skaggs in American Falls, Idaho grew into a chain of supermarkets which had 3,527 stores by 1931, and is still one of the largest supermarket chains. What is the name of this grocery chain? 7) This is the name of a tart, unripened cheese from central Europe. In German, the word is used as a figure of speech for "nonsense." It is also the name of a group of six hypothetical particles that form the basic constituents of 'hadrons'. It is also a word from a line in 'Finnegans Wake' by James Joyce ("Three ______ for Muster Mark!"). What is this curious word? 8) According to the Code of Hammurabi of ancient Babylonia (c.1750 B.C.) what was the punishment for a merchant found diluting his beer? 9) Who brought the first eggplants to the United States? 10) How much chocolate can prove lethal to a small dog?
<urn:uuid:7e2b8229-655a-4141-a3cb-f0ea24e8d4f2>
CC-MAIN-2017-04
http://www.foodreference.com/quiz/html/quiz-323.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00138-ip-10-171-10-70.ec2.internal.warc.gz
en
0.959594
497
2.578125
3
In gum disease, the gums become infected and inflamed. Doctors in one study thought the anti-inflammatory properties of omega-3s might reduce the likelihood of gum disease. Researchers measured the diets of 9,182 men and women, aged at least 20, who had been given a dental exam. Those who consumed the most DHA (docosahexaenoic acid) were 20 percent less likely to have gum disease compared to those who got the least DHA. Results were similar but slightly less for EPA (eicosapentaenoic acid). Some people inherit the tendency to have both high cholesterol and high triglycerides. In one study, 67 people with this inherited condition took omega-3s or a placebo. After 12 weeks, LDL cholesterol had not changed in either group, but compared to placebo, those who had taken omega-3 had 7 percent lower blood pressure, 8 percent lower levels of a sign of inflammation (high-sensitivity C-reactive protein) and 19 percent lower levels of triglycerides.
<urn:uuid:b2bdccea-9aec-4b03-bbf5-379d2ffe6cda>
CC-MAIN-2017-04
https://www.nutritionexpress.com/article+index/newsletters/2011+newsletters/march+2011/showarticle.aspx?articleid=1426
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00224-ip-10-171-10-70.ec2.internal.warc.gz
en
0.965325
210
3.03125
3
China Puts 'Guam Killer' Missile Into Service Amid Ongoing Drills Near Taiwan 16:14 26.04.2018(updated 16:29 26.04.2018) The Chinese Air Force has stated that the country's fighter jets, reconnaissance planes and bombers have taken part in "combat drills" around Taiwan as part of a series of exercises "to strengthen its capacity to safeguard national sovereignty and territorial integrity." Speaking at a monthly press conference, Defense Ministry spokesman Wu Qian said that the Chinese military had introduced into service the DF-26 intermediate range ballistic missiles, dubbed "Guam killer" in Chinese media for its ability to attack the US naval base in the Pacific Ocean both with a conventional or nuclear weapon. "The series of operations we are carrying out is directed against Taiwan independence forces and activities in the island. Their purpose is to prevent that the Taiwan independence forces' plot damages the welfare of the Taiwanese people. If the independence forces continue to wantonly take rash actions, we will take further action," Qian said. While Chinese state media blamed the drills on Taiwan, calling them a direct response to its "provocations," Taipei accused China of "saber rattling." Last week, China's Air force also confirmed that nuclear-capable H-6K bombers had conducted a "sacred" military patrol mission, circling Taiwan. "China has deliberately manipulated [the exercise] to pressure and harass Taiwan in an attempt to spark tensions between the two sides and in the region," Taiwan's Mainland Affairs Council spokesman Chiu Chiu-cheng told reporters, adding that Taipei "will never bow down to any military threat or incentive." US Taiwan Travel Act Sends False Signals Since April 18, China has been conducting a series of exercises around Taiwan, which Beijing regards as a breakaway province. The drills followed the signing of the Taiwan Travel Act into law by the United States, which would encourage state visits between officials of the two sides – China's Foreign Ministry has consistently slammed the law, saying that it contradicts the "One-China policy" and would lead to a deterioration of the situation in the region and spur more tensions between Beijing and Taipei. "We firmly oppose the US side signing the 'Taiwan Travel Act' and have lodged stern representations with the US side…. The 'Taiwan Travel Act' sends out very wrong signals to the 'pro-independence' separatist forces in Taiwan," Chinese Foreign Ministry spokesman Lu Kang said in a statement. The Trump administration has been strengthening its ties with Taiwan, which is considers a stumbling block in US-China relations: Taiwan is one of the most sensitive issues for Beijing – while the People's Republic of China and Taiwan, officially known as the Republic of China, technically remains a single country, each considers the other a "renegade province." "We urge the US side to correct its mistake, stop pursuing any official ties with Taiwan or improving its current relations with Taiwan in any substantive way, and handle Taiwan-related issues properly and cautiously so as to avoid causing severe damage to the China-US relations and cross-Straits peace and stability," the spokesman stressed. In summer 2016, Chinese diplomats formally suspended contacts with Taiwanese officials as a result of President Tsai Ing-wen's refusal to support the idea of a unified China. |Join the GlobalSecurity.org mailing list|
<urn:uuid:06229093-7236-4729-a3bb-6929f12f2d2d>
CC-MAIN-2022-33
https://www.globalsecurity.org/wmd/library/news/china/2018/china-180426-sputnik01.htm?_m=3n.002a.2276.mn0ao07jj2.23fo
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00273.warc.gz
en
0.951986
708
1.6875
2
Basic Life Science Research Associate, Biology Exploring the Occurrence of Classic Selective Sweeps in Humans Using Whole-Genome Sequencing Data Sets MOLECULAR BIOLOGY AND EVOLUTION 2014; 31 (7): 1850-1868 Genome-wide scans for selection have identified multiple regions of the human genome as being targeted by positive selection. However, only a small proportion has been replicated across studies, and the prevalence of positive selection as a mechanism of adaptive change in humans remains controversial. Here we explore the power of two haplotype-based statistics--the integrated haplotype score (iHS) and the Derived Intraallelic Nucleotide Diversity (DIND) test--in the context of next-generation sequencing data, and evaluate their robustness to demography and other selection modes. We show that these statistics are both powerful for the detection of recent positive selection, regardless of population history, and robust to variation in coverage, with DIND being insensitive to very low coverage. We apply these statistics to whole-genome sequence data sets from the 1000 Genomes Project and Complete Genomics. We found that putative targets of selection were highly significantly enriched in genic and nonsynonymous single nucleotide polymorphisms, and that DIND was more powerful than iHS in the context of small sample sizes, low-quality genotype calling, or poor coverage. As we excluded genomic confounders and alternative selection models, such as background selection, the observed enrichment attests to the action of recent, strong positive selection. Further support to the adaptive significance of these genomic regions came from their enrichment in functional variants detected by genome-wide association studies, informing the relationship between past selection and current benign and disease-related phenotypic variation. Our results indicate that hard sweeps targeting low-frequency standing variation have played a moderate, albeit significant, role in recent human evolution. View details for DOI 10.1093/molbev/msu118 View details for Web of Science ID 000339423800019 View details for PubMedID 24694833 Genome-wide signals of positive selection in human evolution 2014; 24 (6): 885-895 The role of positive selection in human evolution remains controversial. On the one hand, scans for positive selection have identified hundreds of candidate loci, and the genome-wide patterns of polymorphism show signatures consistent with frequent positive selection. On the other hand, recent studies have argued that many of the candidate loci are false positives and that most genome-wide signatures of adaptation are in fact due to reduction of neutral diversity by linked deleterious mutations, known as background selection. Here we analyze human polymorphism data from the 1000 Genomes Project and detect signatures of positive selection once we correct for the effects of background selection. We show that levels of neutral polymorphism are lower near amino acid substitutions, with the strongest reduction observed specifically near functionally consequential amino acid substitutions. Furthermore, amino acid substitutions are associated with signatures of recent adaptation that should not be generated by background selection, such as unusually long and frequent haplotypes and specific distortions in the site frequency spectrum. We use forward simulations to argue that the observed signatures require a high rate of strongly adaptive substitutions near amino acid changes. We further demonstrate that the observed signatures of positive selection correlate better with the presence of regulatory sequences, as predicted by the ENCODE Project Consortium, than with the positions of amino acid substitutions. Our results suggest that adaptation was frequent in human evolution and provide support for the hypothesis of King and Wilson that adaptive divergence is primarily driven by regulatory changes. View details for DOI 10.1101/gr.164822.113 View details for Web of Science ID 000336662200001 View details for PubMedID 24619126
<urn:uuid:d37d2a1a-f3bb-4919-aa83-a6c2db958838>
CC-MAIN-2016-44
https://profiles.stanford.edu/david-enard?releaseVersion=6.44.3
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720468.71/warc/CC-MAIN-20161020183840-00488-ip-10-171-6-4.ec2.internal.warc.gz
en
0.910899
774
1.90625
2
|Animals for $100 bucks||5||1,133| |How to weight two normally distributed random variables to minimize the variance of their sum||7||661| |Help please, solve for X - simple algebra||7||391| |question on math||5||39| Join the community of 500,000 technology professionals and ask your questions. Connect with top rated Experts 13 Experts available now in Live!
<urn:uuid:070acba2-2735-4e9c-9c84-c88eb7987140>
CC-MAIN-2017-04
https://www.experts-exchange.com/questions/21152417/Trilogy.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280900.71/warc/CC-MAIN-20170116095120-00001-ip-10-171-10-70.ec2.internal.warc.gz
en
0.763973
91
1.78125
2
Please visit our new website at www.nedoba.org Culture Conflict - Ebenezer Hall of Matinicus Island - 1757 Here we present two different perspectives of the same event. The death of Ebenezer Hall in the year 1757, during the French & Indian War (1754-1763). We at Ne-Do-Ba present you with these differing accounts of the event, not to pass judgement on Euroamericans of the time nor to put the Wabanaki People on a pedestal, but to teach you about research. Local, county, state, and regional histories are a wonderful place to start your research, but you must always keep in mind that they are written by Euroamericans about Euroamericans and are seldom "the whole truth, and nothing but the truth." We admit that we originally fell for the trap - accepting the first account which shows no previous involvement between Hall and his Native neighbors and finding no value for the Island except as a stepping stone in a travel route. Shame on us!!! Please learn from our mistake. Don't be willing to accept the first account you find of a person or event. Truth seldom comes without a price. Be willing to go beyond - the price may be high, but TRUTH is always worthy of our efforts. On this page you will see a demonstration of one way our History has been shaped by historians to fit a Euroamerican viewpoint. Our lesson begins when we noticed an Internet friend was a descendant of Ebenezer Hall "killed by Indians on Matinicus Island". We decided to look into this a bit and turned up the following account of Mr. Hall. Transcribed by N. Lecompte for Ne-Do-Ba from; "The History of the State of Maine; From its First Discovery (1602) to the Separation (1820), Inclusive" by William D. Williamson, Volume 2 (1832). Pg. 326-327 On the 1st of June, a party of Indians beset the dwelling house of Ebenezer Hall, on the Island of Matinicus, containing his wife and a young family of two sons, three daughters, and a son-in-law. He was a man of courage, and some destination, having been a lieutenant at the reduction of Cape Breton. The attacks were renewed several days, and the house resolutely defended by him and his wife, at the imminent hazard of their lives, until the 10th; when he was killed, his house broken up, rifled of its contents, and reduced to ashes. The brave Hall was then scalped, and his wife and children carried into captivity. At some place up the river Penobscot, she underwent the painful trial of being sperated from them; -thence compelled to take up the tedious journey to Quebec. The fair captive was a woman of piety and charms, which attracted every eye. Captivated by her uncommon abilities and beauty, Capt. Andrew Watkins, in a spirit of honor and generosity, paid her ransom, amounting to 215 livres, and finding a vessel bound to England, procured a passage for her thither. From that country she re-crossed the Atlantic, returning by way of New York to Falmouth, after an absence of 13 months. But notwithstanding her inquires were pursued for her captive children, through a long life, with energetic perseverance which marked her character, she never could gain the least knowledge of either. A son of 12 years old, by a former husband, Mr. Greene, who was in the house when it was assailed, escaped and hid himself, till the savages were gone; and after three days, he ventured with an old canoe into the bay, where he was taken on board of a vessel. Subsequent to the war, his mother and he returned to the Island, and dwelt there till her death*. *He was living, A.D. 1825, aged 80, on one of the Fox Islands. His mother, Mary Hall, also lived to a great age - N[orM?]S. Letter - 11 Jour.House of Rep. p.236. An interesting and somewhat typical account of an Indian raid on a poor settler, filled with bravery, romance, and hardship. Just what any descendant would like to hear about an ancestor that was "killed by Indians". Now this Internet friend asked "... why Indians would attack an Island 15 miles into the Atlantic? Was this their ancestral home, fishing or hunting grounds? Such a remote island would have little value that I can see." Checking a few resources, we found nothing specific about the Island, but knew that the Wabanaki used coastal islands as stops along their travel routes and that this event occurred during a period of war. Our reply included some general background and stated, "The Island was probably part of the Native coastal travel route. Most likely he was simply in the wrong place at the wrong time." Well, some time after that we came across another account of Mr. Hall, which provided some interesting background information and a very different perspective of this event based on documentation. And we were reminded of our earlier laziness. We are indebted to the work of Emma Lewis Coleman and C. Alice Baker, for their dedication to discovering TRUTH and their willingness to put it in print for future generations. Transcribed by N. Lecompte for Ne-Do-Ba from; "New England Captives Carried to Canada; Between 1677 and 1760 During the French and Indian Wars" by Emma Lewis Coleman, originally printed 1925, reprinted 1989 by Heritage Books, Inc. Vol.II, pg. 278-281 Matinicus Island - "Beautiful Isle of the Sea." 1757, June 10 HALL, THE FAMILY OF EBENEZER Marah (Bloom), his second wife, had previously married David Green, who was killed at Louisburg. She married Ebenezer in the summer of 1746. Taken with her were four children; Sarah Green (Joseph Green, older, escaped), Peter, Phebe and Tabitha Hall. With these names, which she later sent to the secretary's office, (65) was that of Benjamin Magrage. Was he, perhaps, employed by Hall "in the fishing business"? Ebenezer had a son of the same name, b. 1736. (66) Williamson gives to Ebenezer a better character than can be accepted by what follows. He calls him "a man of courage and some distinction having been a Lieutenant at the reduction of Cape Breton." The story of disaster begins, according to the affidavit of one of his men, in the summer of 1751 when two Indians came to the island and Hall, aided by his son, shot both and buried them in his garden. He burned their canoe and kept their guns. Another story is that Hall burned over a small island (Green's) that he might have better hay and paid no heed to the Indians' warning not to repeat the offense. In October of the next year, at a grand conference at the truckhouse, Colonel Louis, a Penobscot chief - the Indians loved titles - complained that "one Hall and family, who live at Matinicus interrupt us in our killing seals, and in our fowling; they have no right to be there; the land is our own." Perhaps it was at this time that the Indians sent a letter to Boston, which is not found in our Archives, but on 25 April, 1753, another was forwarded from Fort Richmond by Captain Lithgow to Lieutenant-Governor Phips saying: "Brother, you did not hearken to us about the Englishman on the Island, he hurts us in our Seiling & fowling ; its our livelihood & yours too, for what we get we bring to your Truck house, we don't hinder him from fishing & if you don't Remove him in two months, we shall be obliged to do it ourselves. We have writ to you before and have had no Answer, if you don't answer to this we shant write again, its our Custom if our Letters are not answered not to Write again, but if you please we will bring a Living Letter. I salute you and all the Council . . . In behalf of the Penobscot Tribe." signed by four sachems." (67) Then Massachusetts did "hearken," and His Honour was "desired to give orders that the Englishmen gott on Montinicus Island be Emediately removed from thence he having no right to sd island." (68) And next we find an undated, rough draft of a warrant to be given probably to Lithgow: "You are therefore hereby required when you arrive at St. Georges River to go over to said Island of Matinicus & take the said Ebenezer Hall & his said son into your custody & bring them safe to Boston that so they may Answer before me & his Majestys Council for their contempt in Disobeying the orders of the Governor & likewise that you remove the said Family of the said Ebenezer from the island of Matinicus." (69) This shows that a previous effort to right the wrong had been made. So far as known this one accomplished nothing, but whether or no anything happened the Indians waited not two months, as they threatened, but four years before they brought the "Living Letter" and "Removed" the Englishman. The widow Mary's petition, dated 14 Jan., 1760, (70) tells the manner of the removal. In June, 1757, the Indians beset the house, which her husband resolutely defended several days, but on the tenth, he was killed, the house broken up & rifled, she and four children carried away. First to the Penobscot, where she was separated from her children, "and has not seen nor heard any Thing of them since." She was then taken to Quebec, where having tarried some time, she interceded with one Capt. Andrew Watkins, a New England Gentleman, then a prisoner to pay her ransom, which he did. She then took passage to England and thence to New York, having been absent about eighteen months. Now she is called upon by the widow of sd Mr. Watkins for the money and having nothing to pay it with, nor anywhere to put her Head nor anything to subsist on, she begs for compassion and makes her mark. She was certainly at home in September, 1758, when she sends the names of her children to the secretary's office. They were probably lost among the Indians. A local account adds some details to Mrs. Hall's story. When the Indians came the two Ebenezers were away fishing, and as the younger is not mentioned he probably did not come back with his father, whose return was the signal to attack. Hall within the house, when "near the door and parleying" was instantly killed. His wife threw open the door and asked for quarter, but she and the children were carried up the river in their own schooner. Joseph Green, who was about twelve years old, escaped by hiding, and after he had "lived for a week on the milk of the family cow" put out into the bay in an old canoe and was picked up by a passing vessel, whose captain tarried long enough to bury Hall before he took the boy to Camden. The boy when a man lived on Green Island. The General Court neglected Mrs. Hall's appeal of 1760 and Jane, the widow of Captain Watkins, sent in her Memorial.(71) She does not say as does Williamson that Mrs. Hall was "a woman of piety and charms which attracted every eye," and that Captain Watkins "was captivated by her uncommon abilities and beauty," but only that she was "a poor woman her husband had helped." He, taken at Oswego, was long detained in Canada and was then sent to France where he died of smallpox. While in Canada he obtained credit from some English gentlemen of fortune, who were fellow-prisoners, and used it, "not only for his own Subsistance; But also to ransome Several of his Poor Country people, who he found in Captivity there. That among them was a poor woman, one Mary Hall, belonging to the Eastern part of this province for whose ransom he paid 213 liv 15 sols which is 12, 16, 6 Lawful money . . . for which your petitioner has received nothing, nor is it likely she ever will. The said Mary Hall having lost her Husband in the present warr & by that means is reduced to the lowest state of Indigence." The Court paid the full amount. Mary's charms did not leave her; she captivated Chipman Cobb and married him in 1765, moved from Portland to Gorham about 1775, and died there in her ninetieth year. (72) (65) Massachusetts Archives 77, 657 (66) "Bangor Hist. Mag.," 7, 117 (67) Massachusetts Archives 32, 353 (68) In Council, 13 June, 1753. Massachusetts Archives 32, 364 (69) Massachusetts Archives 32, 412 (70) Massachusetts Archives 78, 757 (71) Massachusetts Archives 80, 190, dated 24 April, 1762 (72) "Bangor Hist. Mag.," 7, 117 NOW - here we see a substantially different picture! Documentation shows Wabanaki People trying to live up to previous treaty agreements by making use of proper channels to settle conflicts. They put forth a fair argument for Hall's removal and point out why this would also be in the best interest of the colonists - ie trade profits. They warn of their willingness to take this matter into their own hands if the authorities ignore their concerns, demonstrating that this matter is of great importance to them. We also see some attempt by the government to live up to it's obligations, but the attempt appears to fall short, for whatever reason. Discovering additional documents may shed some light on whether or not Mr. Hall was ever actually removed from the island or whether he obtained legal right (by colonial law) to remain there. In any event, he maintains a home on the island with his family in 1757 and the "Indians" have shown reason to remove him. He was disruptive to important Native subsistence patterns, apparently had little concern for "Indian rights", and was possibly a murderer who escaped justice. This is not at all like the man or event described in the first account! Upon receiving this new information about Mr. Hall, our friend had this to say "Well, I suspected that not all of my ancestors were of upstanding character ... I'll add your information to mine, to give history some balance ..." We applaud our friend for being willing to accept alternate perspectives with grace. If there is anyone out there who has additional information concerning the life or death of Mr. Hall or the history of Matinicus Island, we encourage you to contribute your material to this page. We also encourage anyone that finds this event of interest to do some more digging. There are still many holes to be filled before we can truly understand this series of events.
<urn:uuid:f5623f42-4210-4a3b-9f45-367e3d1158a7>
CC-MAIN-2016-44
http://www.nedoba.org/ne-do-ba/nhis_hal.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721027.15/warc/CC-MAIN-20161020183841-00549-ip-10-171-6-4.ec2.internal.warc.gz
en
0.980816
3,163
3.203125
3
Prevention and treatment for those nasty little nits By Elisabeth Frankel Reed Bugs crawling through a child's hair-the thought alone is enough to make any parent wince. While exposure is inevitable for young kids, especially as school swings back in session and campers return from destinations both near and far, lice evoke more fear than necessary. According to experts, there are plenty of convenient and effective measures for prevention and, if need be, a foolproof treatment plan. Many of the common nit-driven misconceptions encompass the who and the how. To set the record straight: kids can't get lice from playing with animals, nor can the tiny bugs fly (phew!) or even live for very long on furniture-they can only be transmitted by close contact with other people. Dalya Harel, CEO of LiceBustersNYC, a lice removal service, can certainly attest to this-she has frequently seen heightened demand for her services after sleepover parties-"the more, the merrier," she jokes. Contrary to popular opinion, lice don't like dirty hair-they prefer clean coifs where they can easily hold onto the hair follicles and their eggs will stick to the scalp. "Lice are very hygienic, they only come to clean people," Harel says. Letting children's hair stay a bit oily will help prevent lice from setting up residence, but there are also shampoos, conditioners and sprays that contain repellant to keep the bugs at bay. Harel even recommends using a drop of garlic extract on the hair. Risa Barash, founder of Fairy Tales Hair Care, emphasizes that "it's really head-to-head contact" that causes lice. She suggests keeping kids' coats, hats and scarves away from others to prevent the bugs from crawling over, as well as conducting biweekly head checks. "Just give a look, check behind the ears, check the back of the neck, look at the part lines." For a more comprehensive description of what to look for, the "Is it Lice?" App, now available in the iTunes App Store from Hair Whisperers and the Kazu Agency, provides step-by-step instructions and video demonstrations. It also shows what to do if lice are found and provides links to local services that will assist with treatment. Got lice at home? Don't panic. The standard remedy remains washing with a special shampoo to kill the bugs and thoroughly combing the hair with an extremely fine-toothed comb to ensure the removal of every egg. To help loosen eggs and get them to stick to the comb, Adie Horowitz, the owner of Licenders, a NYC-based head lice treatment studio, recommends using a thick hair conditioner mixed with baking soda and combing small sections at a time. There are also products that contain enzymes to break down the glue that attaches the eggs to hair. If it all seems a little overwhelming, her company is there to help. "Our goal is to take the horror away from parents and give them their lives back quickly." September is National Head Lice Prevention Month. For more information, visit headlice.org. - Babo Botanicals Rosemary Tea Tree Lice Repel Conditioning Spray Clinically proven to be 95% effective at repelling lice, especially when used in combination with the companion shampoo, this conditioner is certified organic. Rosemary, mint and tea tree oils combine to keep lice at bay. 8 oz. bottle, $18, babobotanicals.com - Fairy Tales Rosemary Repel Leave-In Conditioning Spray The so-good-smelling blend of rosemary, citronella, tea tree, lemongrass, peppermint and sage in this repellent conditioner has proven to be 92% effective at preventing lice. 8 oz. bottle, $10.95, fairytaleshaircare.com - Licenders Lice Shampoo An all-natural shampoo (containing zero pesticides) that relies on enzymes to kill lice by dissolving their shells. And unlike pesticides, insects won't develop a resistance because they use the same enzymes themselves. 8 oz. bottle, $34, licenders.com - So Cozy Boo! Shampoo and Conditioner These all-natural hair care products will not only clean, strengthen and detangle your kiddo's strands, they also contain tea tree, rosemary and lavender oils to spook the nits away-for good. 8 oz. bottle, $14.50, socozy.com MUST READ NEWS Sign up to get our newsletter emailed to you every week! - Enter your email address in the box below. - Select the newsletters you would like to subscribe to. - Click the 'SUBSCRIBE' button.
<urn:uuid:db99463d-9c95-471e-984a-8ab2bb2cbf71>
CC-MAIN-2017-04
http://www.nypress.com/lice-free-living/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00247-ip-10-171-10-70.ec2.internal.warc.gz
en
0.937592
1,018
2.109375
2
Bosnia inspires compromise plan for Russian troops June 13, 1999 WASHINGTON (CNN) -- The United States and Russia could look to Bosnia for inspiration in trying to resolve a standoff over the role of Russian troops in Kosovo. As presidents and generals of the two countries continue talks to iron out their differences, U.S. officials suggested Sunday that the Russians could have a "zone of responsibility" within an area controlled by NATO peacekeeping forces, similar to an arrangement in Bosnia. U.S. President Bill Clinton and his Russian counterpart, Boris Yeltsin, after an hourlong talk by phone on Sunday, agreed on one matter -- that NATO and Russian generals should figure out how to include Russian troops in the NATO-led force, said a White House spokesman. Clinton and Yeltsin agreed to speak by phone again on Monday, as military and diplomatic officials continue talks in Russia, Macedonia and Kosovo to resolve the conflict. To NATO's surprise, about 200 Russian troops on Saturday arrived ahead of alliance soldiers to take control of the airport in Pristina, Yugoslavia. On Sunday, the Russian force blocked British KFOR units from the strategic airfield. Moscow has insisted that Russian troops patrol their own sector. NATO has remained equally adamant that all troops with the Kosovo peacekeeping force, called KFOR, work under NATO command. Despite the tension, a compromise could be emerging. Russian and U.S. officials have worked out a "framework" to enable Russian troops to participate in KFOR, according to a Clinton administration official, who spoke on condition of anonymity. On CNN's "Late Edition," U.S. Gen. Hugh Shelton, chairman of the Joint Chiefs of Staff, suggested Sunday that Russian troops could have a "zone of responsibility" within one of the NATO-administered sectors. U.S. officials have pointed to the example of Bosnia, where 1,300 Russian troops in the U.S. sector receive "operational directions" from a U.S. general, but have a separate chain of command through a Russian general at NATO headquarters or Moscow. "It's worked out well in Bosnia," Defense Secretary William Cohen said on "Late Edition." "We think it will work well here. We just have to work out the details," he added. What about the Russian refusal to serve under NATO command? The compromise could allow the Russians to serve under a general from a non-NATO country, perhaps Finland, who would in turn report to NATO, sources told CNN. Shelton said the Russians would likely contribute about 2,000 troops to the peacekeeping operation, which is expected to total about 50,000 troops. KFOR will divide the Serbian province into five zones, controlled separately by British, French, Italian, German and U.S. troops. British Defense Secretary George Robertson suggested that Russian intransigence could have financial consequences. When the G-8 group of major industrial nations meets later this week, it will discuss continued economic aid to Russia. Military Affairs Correspondent Jamie McIntyre and Reporter Kathleen Koch contributed to this report. NATO peacekeeping commander arrives in Pristina |Back to the top|| © 2001 Cable News Network. All Rights Reserved.| Terms under which this service is provided to you. Read our privacy guidelines.
<urn:uuid:7a9bc96c-3fcd-4915-8432-1bb46558c5a4>
CC-MAIN-2022-33
http://www.cnn.com/US/9906/13/us.russia.02/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00669.warc.gz
en
0.955848
718
2.0625
2
Browse by author Lookup NU author(s): John Yarham, Dr Charlotte Alston, Professor Robert Taylor, Dr Joanna Elson, Professor Bobby McFarlandORCiD Full text for this publication is not currently held within this repository. Alternative links are provided below where available. Distinguishing pathogenic from polymorphic changes poses significant problems for geneticists and despite 30 years of postgenomic experience this remains the case in mitochondrial genetics. Base substitutions in mitochondrial tRNA (mt-tRNA) genes are particularly difficult, but important, because they are common causes of pathology and associated with high rates of transmission. Providing accurate genetic advice to patients and their families is of paramount importance in disease prevention, and brings into sharp focus the factors used to distinguish pathogenic from polymorphic variants. We have reevaluated our pathogenicity scoring system for mt-tRNA mutations following a considerable increase in the number reported since the system was devised in 2004. This allowed us to address notable issues including the underestimation of "definitely pathogenic" mutations resulting from insufficient data collection. We illustrate the robustness of our revised scoring system using novel pathogenic and previously reported polymorphic changes and conclude that while clear evidence from single-fiber and/or trans-mitochondrial cybrid studies remains the gold standard for assigning pathogenicity, our scoring system is valuable for deciding which mt-tRNA mutations to investigate further using these labor-intensive techniques. Hum Mutat 32: 1319-1325, 2011. (C) 2011 Wiley Periodicals, Inc. Author(s): Yarham JW, Al-Dosary M, Blakely EL, Alston CL, Taylor RW, Elson JL, McFarland R Publication type: Article Publication status: Published Journal: Human Mutation Print publication date: 19/09/2011 ISSN (print): 1059-7794 ISSN (electronic): 1098-1004 Publisher: John Wiley & Sons, Inc. Altmetrics provided by Altmetric
<urn:uuid:be08f1c3-805f-4ff2-aef8-fbb4886f6f07>
CC-MAIN-2022-33
https://eprints.ncl.ac.uk/180489
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00067.warc.gz
en
0.883397
489
1.617188
2
Twilight of the Blood Draws? A new technique lets doctors screen drops of dried blood rather than vials of the liquid. The method could revolutionize infant pharmacology and drug testing for athletes. Researchers who study how drugs like morphine affect infants are bedeviled by the fact that newborns’ tiny bodies can’t readily spare much blood for testing. As a result, pharmacology in babies often involves guesswork. That could soon change. A new method of screening miniscule amounts of dried blood for chemicals could allow researchers to get all the information they need from small amounts of blood. The researchers’ first goal is to produce a drug-dosing guide for infants. But the list of potential applications is far longer, says Jeffrey Galinkin, an anesthesiologist at the University of Colorado who heads the effort. Infection specialists could use the technique to diagnose HIV or tuberculosis, for instance, while sports officials could use it to monitor athletes for banned substances, he says. The new approach relies on technology called liquid chromatography-mass spectrometry (LC-MS/MS), in which mass spectrometers use an electric charge to turn molecules into ions that can be identified and counted. Recent design changes to increase the efficiency of ionization make modern LC-MS/MS devices up to 100 times more sensitive than older models, says Johnny Cardenas, a global marketing manager for the instrument maker AB Sciex. The test can be made even more sensitive by “cleaning up” the sample by using liquid chromatography—which sorts molecules by size, shape, or other parameters—before ionization. When administering medications, doctors tend to treat kids as if they were simply small adults. That’s a perilous approach, says Gregory Hammer, an anesthesiologist at Stanford University who is collaborating on the National Institutes of Health-funded research. Hammer cites morphine as an example. In newborns, roughly 85 percent of body weight is water, compared with 60 to 70 percent for adults, he explains. Dosing the painkiller by body weight will produce a relative concentration that’s more dilute in a baby. The result: “We’ll underdose them,” Hammer says. To examine the effects of morphine in babies now requires taking numerous blood samples from the infants, who only need the drug if they are hospitalized and critically ill. “We cannot draw very many samples” before jeopardizing their health, Hammer says. “But with dried blood spots, we can do as many samples as we want.” Unlike liquid blood, dried spots on blotter paper do not require rigorous storage and handling, says Galinkin, who has formed a company, iC42 Integrated Solutions, to commercialize the work. Samples can be put in an envelope and dropped in a mailbox. That dramatically reduces the cost of shipping samples, he says, while giving clinics and public-health researchers in developing countries access to state-of-the-art laboratories anywhere in the world. Those labs could examine dried blood to measure the progression of diseases—and the effects of treatments—by analyzing biomarkers, molecular indicators of illness, in the blood. The technique also could be used to screen athletes for performance-enhancing drugs. This would require only a single drop of blood taken under direct observation, avoiding the privacy issues involved with urine testing, notes Galinkin, who presented his group’s findings in October at the annual meeting of the American Society of Anesthesiologists. The researchers are now developing a panel to screen blood for between 100 and 200 drugs sanctioned by the World Anti-Doping Agency. Olivier Rabin, the agency’s science director, says the ability to analyze dried blood with the mass spectrometer technology appears “very promising.” Rabin notes that testing blood is the only way to detect the use of human growth hormone, some newer agents to stimulate the production of red blood cells, gene doping, and other sophisticated methods of cheating. Although certain blood compounds must be measured in fresh blood, he says, “anything that can help us to gain in sensitivity and limit the volume of biological fluids is certainly of high interest to us.”
<urn:uuid:c07c34a9-4d11-4aad-b502-8a43137b0d08>
CC-MAIN-2017-04
https://www.technologyreview.com/s/421594/twilight-of-the-blood-draws/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00349-ip-10-171-10-70.ec2.internal.warc.gz
en
0.93141
875
3.640625
4
Just three months ago, the Internet was swarming with news about Facebook Messenger hitting the 900 million monthly users mark (and Whatsapp going way over 1 billion). That is old news now, as the company announced today that the app has finally hit the 1 billion MAUs milestone. The announcement comes just four years after Messenger was released as a standalone app, which is saying something. To scale, WhatsApp took almost seven years to hit the same popularity as Messenger right now. Facebook took this opportunity to disclose various important and interesting statistics about its Messenger app. Most tech geeks know that Facebook recently passed the 1.6 billion monthly active users mark. With Messenger now coming in at a billion users, the company can now happily boast that more than 60 percent of its users are communicating using the mobile Messenger app. That’s not the whole story, though. Messenger comes in with more features than just instant messaging. We get voice calls, stickers, GIFs and even games on the platform to enjoy with your friends, family and loved ones. These services, Facebook says, are also performing extremely well. According to the social giant, 10 percent of all Voice over IP (VoIP) calls made globally take place within Messenger. This is saying something, as calling services came to messenger just three years ago. But, if you recall, CEO Mark Zuckerberg had promised that the quality of calls would increase as more people used the service. And true to his words, the service did flower that way. Voice calls on Messenger aren’t just limited to one-on-one conversations. You can hold group conversations, too which has also caught a great wind. Just like other IM services, Messenger allows you to share pictures, too. According to Facebook, more than 17 billion photos are distributed by Messenger each month and 22 million GIFs are shared every day i.e. just under 254 GIFs per second. The company also recently started introducing games into the app. In March, the company released a basketball game within Messenger that has been played more than a billion times since. Last month, it followed that success with a soccer game, just in time for the Euro 2016 tournament. As part of this journey to 1 billion, we focused on creating the best possible experiences in modern day communications, said Facebook’s vice president for Messenger, David Marcus. We remain focused on helping connect people to the people and businesses who matter most. The company, along with all these numbers, announced that as part of its app hitting a new milestone, it is adding a balloon gift in the app that you’ll be able to send to friends to add “a touch of whimsy and delight” to conversations.
<urn:uuid:130e5d9f-39ec-44a0-b08b-93a5e0d462c9>
CC-MAIN-2017-04
http://thetechportal.com/2016/07/20/facebook-messenger-passes-1-billion-monthly-active-users-mark/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281151.11/warc/CC-MAIN-20170116095121-00114-ip-10-171-10-70.ec2.internal.warc.gz
en
0.964819
557
1.5625
2
BYU-Idaho is building a Central Energy Facility to reduce its CO2 emissions, and construction is nearly complete. It is hoped that the completion of this facility will produce more eco-friendly energy for the university, as well as decrease its utility costs, according to an online statement released by the BYU-I Newsroom. “The new facility has helped the university to cut back its carbon footprint by replacing the old coal-fired plant with new, more eco-friendly, natural gas equipment,” according to the BYU-I Newsroom Web page. Wayne Clark, university operations managing director, said when President Gordon B. Hinckley announced in June 2000 that Ricks College would become BYU-I, he knew that changes would have to be made to keep up with the growth. “Ten years ago, the university was using an average of 50,000 pounds of steam per hour to heat campus on the coldest nights,” Clark said. “Today, with more than 1 million square feet added to campus, the university is using an average of 60,000 pounds per hour.” The new Central Energy Facility helps address this problem because it releases minimal waste by using a heat recovery system, highly efficient LED lights and condensation recovery tanks, according to the online statement. “Low flush, water efficient toilets have been installed in restrooms around campus, reducing water usage from 2.5 gallons to one-eighth of a gallon per flush,” Clark said. “The university has also replaced more efficient sprinkler heads in campus gardens and green spaces.” Clark said construction of the facility began in December 2013, but plans for the new plant began in the early 2000s. He said the facility has been providing electricity for buildings around campus since August 2015. The facility has two 45,000-pound-per-hour Cleaver-Brooks boilers which provide the campus with steam according to the online statement. The gas turbine generates five mega watts of power, easing the university’s demand for power. The school has also implemented several dual drinking fountain/water bottle fill stations to monitor water consumption, according to the online statement. “In the past five years, BYU-Idaho has decreased water usage by 1.6 million gallons per year,” according to the BYU-I Newsroom web page. Clark said that along with helping to create a greener environment, he and his associates have worked to make BYU-I as self-sustainable as possible. “We generate over half of our own energy here on campus,” Clark said.
<urn:uuid:f38a9d7a-4d5c-41b0-8e95-b1beef252e84>
CC-MAIN-2017-04
http://byuiscroll.org/byu-idaho-reduces-carbon-footprint/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00543-ip-10-171-10-70.ec2.internal.warc.gz
en
0.972594
545
2.625
3
What Is No-Code Development? True No-Code Development Crowd App Studio is a true no-code environment that can address a broad array of needs through a drag-and-drop interface. An app’s business logic is constructed through rule-building within the platform. Patterns, activities, attributes and packages replace traditional code. Integrations to third-party apps or existing code can be achieved with APIs instead of traditional coding. Crowd Machine’s platform supports the creation of comprehensive solutions, from the very simple to the very complex. Drive IT/Business Collaboration Collaboration between IT and business lines yields faster and better results. When these teams begin defining requirements, this is also the start of development of the application. While doing design work and logically defining how the app is going to function, IT can start dragging and dropping components onto the pallet and creating functional capabilities that will actually run. Within days, IT can show a working prototype, get immediate feedback from the business line in that development process and quickly move the app to staging and into production. Crowd Machine promotes an innovative AI-driven approach to the application lifecycle to achieve rapid and sophisticated solutions with better quality, less resource requirements, and increased productivity. Crowd Machine dramatically reduces the amount of time between development and deployment and ensures a streamlined process regardless of whether you’re improving, testing, or deploying a new feature. Why Your Business Can’t Grow Without a No-Code Platform No-Code Application Development Most have heard the phrase “every business is a digital business.” How businesses operate today has changed dramatically over the last decade, and this continuing change is happening at such a rapid pace that most businesses can’t keep up. In terms of technology, IT departments struggle to keep pace with the demands of the business line. Mission critical projects are scrapped, or left on the shelf, because the IT team simply does not have the time or resources to execute. It had become overwhelmingly clear, businesses must adapt or run the risk of falling behind, and becoming obsolete. This stark realization gave way to the low-code application development platforms, and shortly after that, the no-code platforms that completely eliminate the need to write code. No-code development platforms are rapidly gaining popularity, and companies are embracing the no-code development environments to accelerate application creation and deployment in an effort to keep up with the ever evolving market demands. No-code platforms offer your business numerous advantages, including, but not limited to: - Delivery of solutions to customers and the business line at a pace that enables competitive differentiation - Reduction of software project related costs and risk - Moving the solution delivery process closer to the point of domain experience and reducing the dependency on scarce and costly software engineers Technology has evolved to a point where sophisticated enterprise-grade applications can be created through the combination of logic visualization and expert systems. The combination allows domain experts to create mission critical applications without the historical limitations of predecessor products of this type. By utilizing no-code development technologies, domain experts are able to rapidly build applications without any prior coding knowledge. "Finally, a unified cloud platform with everything your business needs for rapid and continuous digital transformation" Build Apps Fast – Simplicity Without Sacrifice By replacing the need to code with a visual app building platform, the time spent building apps is significantly less. Crowd Machine is one of the only no-code platforms that also automates the underlying infrastructure. Apps built in the Crowd Machine App Studio, a no-code development environment, are easily deployed and managed. Using Crowd Machine as your app solution removes the time and energy wasted on deciding on what database is right for your business, what coding language to build your app in, or how to integrate your new app with your other business applications. Crowd Machine’s Crowd App Studio replaces the need to understand and use complicated database and integration jargon, and multiple coding languages, with drag-and-drop functionality and natural language-based rules. By also providing the underlying infrastructure, Crowd Machine allows you to focus on the requirements of your app, saving valuable time and money. Crowd App Studio provides everyone the ability to build, deploy and run apps fast: from seasoned code-writing developers to people with absolutely no development experience. Whether you are looking to enable your team to securely access data, collaborate seamlessly, or quickly create detailed and targeted reports, Crowd App Studio will provide the tools needed to solve the challenges your business faces, optimizing your business’ day-to-day operations. Imagine a world where everything is made easier… with the click a button, you’ve got a perfectly matched high-quality outfit to wear for the day, or a three course restaurant-quality dinner. Sounds fantastic, right? In the sphere of building apps and business solutions, that is exactly what the Crowd App Studio delivers. Simplicity without sacrifice. Shrinking App Delivery Time Minimizes Cost Regardless of whether you’re in a small business or a Fortune 500 enterprise, cost is often the most important factor when it comes down to initiating a new development project. Hiring talented developers can be cost prohibitive, and does not even take into consideration the remaining expenses associated with other key components the project will need, such as UI/UX, I.T, testing, launching, hosting…to name a few. Crowd App Studio removes the need for traditional developers, greatly reducing the overall resource cost involved. Depending on the size of the project, the savings can be dramatic, and give life to a project that may have never seen the blue light of the computer monitor. Reduce Risk And Complication Consider the following scenario: You have hired a team of developers and staff to design and develop a mission critical enterprise app for your business. Thousands of scarce dollars have already been spent, over six months have passed, and just when you think the app is near completion, and ready for testing, you realize that a small, but very significant feature is missing. You hear the last thing you would ever want to hear, “oh, I didn’t think of that,” or “I forgot to add that feature.” It happens more often than you think. There is a small but accurate quote when it comes to software development: “99 little bugs in the code. 99 little bugs in the code. Take one down, patch it around. 127 little bugs in the code.” With traditional app development approaches, fixing one thing often breaks another. With Crowd Machine, there are no lines of broken code. If a key component or feature is forgotten, simply jump back into the Crowd App studio, make the changes quickly and easily, get the solution you really need, all without interrupting the project workflow, timeline and budget. "Quickly turn your vision into a workable best-in-class app that fits your customer focused needs" Learn More About The Crowd Machine Platform With Crowd Machine, you can rapidly construct intelligent, enterprise-ready applications and highly functional microservices in a visual drag-and-drop development environment. Now building, testing and deploying new and innovative solutions are easier than ever before. The Crowd Machine platform is the fastest way to integrate and automate your business processes. Get an overview of the Crowd Machine platform and see how you can create visually stunning, sophisticated applications that are easier, less expensive, and much faster to build, than any other platform available today. Crowd App Studio A comprehensive no-code development platform that enables the rapid creation and iteration of enterprise-grade applications and intelligent microservices using a drag-and-drop rules based builder. Crowd Machine GO The ultimate solution that enables business users to snap together intelligent microservices that can integrate and modify, new or existing applications while remaining compliant with IT policies and security protocols. "If you can only have one platform for your business, this is the one you need" The Right Platform For The Job Crowd Machine’s extensive capabilities include; - Preserve legacy stability, while adding agility and functionality with tailored applications that can automate and simplify your daily workload. - Highly scalable applications that can meet the needs and requirements of any business. - Create new intelligent services and applications that reduce overall business costs and lower time and efforts required to manage particular systems. - Adapt to any technology or process and remove your dependence on siloed applications, data silos, and other outdated and inefficient technologies. - Better control and connection of your business. With Crowd Machine, your entire network of systems and applications, from general data and information to aspects relating to customers and employees, can be managed and controlled from within Crowd Machine. Learn more about Enterprise Application Integration and Crowd Machine’s powerful enterprise-grade platform by scheduling a time to chat with one of our friendly representatives, and seeing how Crowd Machine can benefit your business.
<urn:uuid:fca2c327-5c16-4826-ad44-ba4c9f1f46fc>
CC-MAIN-2022-33
https://www.crowdmachine.com/why-your-business-cant-grow-without-a-no-code-app-platform/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00071.warc.gz
en
0.918927
1,842
1.726563
2
Mark McGowan's first professional show saw him pushing a peanut for seven miles across the streets of London, using only his nose. This was 2003, and McGowan started out from Goldsmiths College, ending up at Downing Street, where he presented his well-travelled nut to a government representative. This was, he says, "a protest against student fees". Not long after his debut act, the 37- year-old performance artist claimed to have spent two weeks lying in a bath of baked beans, with a chip stuck up each nose, and 48 sausages strapped to his head. In case you were wondering, he did so in order to promote an important message: "I was advocating the consumption of the much-maligned breakfast," he says. In his own words, McGowan's work is driven by a deep social and political agenda, and the focus of his work varies, from to environmental issues to police accountability. In 2005, McGowan reconstructed the shooting of Jean Charles de Menezes at Stockwell Tube station and in the same year he planned to leave a tap running for 12 months, in a bid to highlight the environmental problem of water wastage. Before that, there was the epic Trolley Voyage of 2003. By way of "reconciliation for the William Wallace thing", Mark McGowan set out from his home in Peckham, south London, attempting to "sail" 400 miles to Glasgow, in a shopping trolley. Along the way, he would collect gifts from those he met, to present to the people of Scotland upon his arrival. Unfortunately, after 17 days and 65 miles, McGowan was forced to abandon his mission "due to bad weather and poor equipment". In response to this particular stunt, McGowan was branded "pointless" by one media pundit. Others have been more scathing. Following a series of recent public re-enactments, McGowan, who has a seven year-old son, has been described as "heartless, cruel" and "beyond imagination". One such project was the reconstruction of the 7/7 bombings, in which 52 people died. For this, McGowan filled a small room with smoke, inviting his audience to step inside to experience what those involved in the explosion might have felt at the time. McGowan feels that as an artist, cynicism is something he has to accept. "My performance is often a work of protest or bound with controversial social issues," he says. "The popular media is very sceptical when it comes to the art world and its motives, so it is natural that they should call into question the validity of what I'm doing." On several occasions, McGowan has been accused of using tragic events to his advantage, but he says it is his job to engage in public debate: "My work is a form of historical archive," he says. "I want people to look back at what I've done and to say: 'that is the period in which he lived.'" That people get upset is just part of the process: "It's important to provoke, isn't it?" he asks. His latest piece, The Re-enactment of the Death of Jade Goody, is a suitably controversial subject matter. The performance takes place in an unconventional exhibition space in east London, on a sunny bank-holiday weekend. Mark McGowan is not actually a direct participant in the reconstruction. Instead, he greets his crowd at the doorway of the gallery, escorting them inside the building in pairs or threes to see the show. "It will be a more intimate experience this way," he explains. The piece lasts for two hours, and during this time, 200 visitors pass through the doors. The performance takes place in the dank basement of a ramshackle brick terrace, filled with household rubbish and empty plastic bags. There are dirty dressing gowns taped to the walls, and a broken wooden aeroplane hangs from the ceiling. Tucked under a thin sheet on a small bed in the centre of the room, lays a slight figure with a cardboard box on her head; attached to it is a headshot of Goody, bald headed, in the final stages of the losing battle with cervical cancer. On one either side of her, her mother, Jackie, and husband, Jack, hold vigil. Both sit motionless, holding a hand each; cardboard boxes worn on their heads, with photographs stuck to them, to indicate who they are: Jackie's image is taken from Jade's funeral, her tear-stained face is contorted with grief, she looks utterly helpless. Jack, by comparison, looks decidedly smug. One of the first couples to go downstairs is a pair of Japanese tourists, who appear to have stumbled upon the event quite by accident. They exchange baffled glances as they try to work out where to stand, who to watch, and how long to stay there. For as long as they do – five minutes almost – the trio sits in silence, totally still, but for the occasional stir of Jade's leg or the flex of her fingers against her mother's palm. Ridiculous as the scene clearly is in one respect, it is actually rather powerful. There is a sense of discomfort, if not actual sadness. "Using cardboard boxes for heads rather than actual faces," McGowan explains, "suspends belief. It objectifies the subjects in a way that isn't otherwise possible". He compares the process to that of puppetry: "Marionettes always show you the strings, but you never take your eyes off the puppet," he says. "This makes for a very potent, almost spiritual atmosphere." It is difficult somehow to reconcile these words with the image of him descending into a freestanding bath filled with baked beans. So, is McGowan a misunderstood genius? He is certainly not an idiot. "My work can appear shallow, of course, ridiculous, even, but somehow that's where it gets its power," he says, letting it all out now. "I decided to take part in the spectacle, and entered it at the shallow end." Okay, so he can be deep, too. But aside from the bean baths and trolley ventures, there are other questions. It emerges that – unsurprisingly in some cases – sometimes when McGowan claims to do something, he simply does not bother. After an hour in the bath of baked beans, he left a mannequin in his place for the remaining fortnight, for example. So, what exactly then, are we supposed to think? Apparently, whether or not he actually does a piece of work when he says he does is neither here nor there: "My work is about being an artist and carrying a message," he says. "Peggy Phelan once said,'The power of a performance lies in it not really being there.' It is the narrative that is significant. Maybe I didn't do actually it, but I could have done, and that's the point." Even when I do actually give a performance," he concludes, "the next day, in the physical sense, it has gone. It is the memory that someone is left with that counts. My work will only exist in as much as one person chooses to describe it to the next." Well, there's a challenge. Stunt man Mark McGowan's strangest moments Kick George Bush's Ass In 2007, McGowan put on a George Bush mask and crawled around the streets of New York inviting passers by to "kick his butt". He described this as an act of "public service". In one live television interview, several members of the audience spoke of the "cathartic" nature of the experience they had given him. Artist Keys Car In 2005, Mark McGowan claimed to have scratched 47 random cars in the south London area, using a key. There was public outrage at his performance, which he described as an attempt to highlight the "pandemic of car-keying in the area". Despite publicly accepting responsibility for the acts, he had in fact merely photographed cars that he had found already vandalised. Christmas is coming In a campaign to create awareness about the "obesity pandemic" in Britain, at Christmas time in 2003, McGowan wore a 27lb turkey on his head and walked backwards for 11 miles, shouting at overweight passers-by through a homemade loudspeaker. Part of a series of environmental protests, McGowan planned to leave a tap running in House Gallery in south London for one year. In order to highlight the issue of water wastage, he attempted to, er, waste 15 million litres of water – but was forced to turn it off by Thames Water. For this piece, McGowan's message was simple: "millions of people have marched for fox hunting, and millions have marched against. But who is going to march for the crackheads?" This was in 2004, and by way of illustrating his point, he put on a dinner suit, drew up a chair at a small table in the middle of the street, and ate a fox. The Guy Hilton Gallery presents Mark McGowan's 'The Reenactment of the Manslaughter of Ian Tomlinson' on 25 May at 2pm, at the Royal Exchange, London EC3; McGowan also curates Police and Violence at the Sassoon Gallery, London, SE15 on 6 June (thesassoongallery. co.uk) Watch videos of the artist's performances at www.independent.co. uk/artReuse content
<urn:uuid:0760b120-9e41-4f88-ac06-4f22761c83bb>
CC-MAIN-2017-04
http://www.independent.co.uk/arts-entertainment/art/features/jade-goodys-death-inspires-controversial-new-work-by-britains-most-notorious-performance-artist-1688871.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00229-ip-10-171-10-70.ec2.internal.warc.gz
en
0.97721
1,962
1.75
2
A writing is |“||handwriting, typewriting, printing, photostating, photographing, photocopying, and other of means of recording, and includes letters, words, pictures, sounds, or symbols, or combinations thereof, and papers, maps, magnetic or punched cards, discs, drums, or other means of recording or retaining meaningful content.||”| Uniform Commercial Code Edit U.S. Code Edit |“||includes printing and typewriting and reproductions of visual symbols by photographing, multigraphing, mimeographing, manifolding, or otherwise.||”| U.S. copyright law Edit |“||to promote the Progress of Science and the useful Arts by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries."||”| Section 4 of the 1909 Copyright Act stated that “all the writings of an author” were subject to copyright. But sound recordings were not treated as “writings” in the early part of this century, largely based on the decision in White-Smith Music Publishing Co. v. Apollo Co. The Court's narrow reading of what constituted a “writing” underlay the approach legislators took toward bills proposed between 1909 and 1971 that might have defined recorded aural works as the writings of authors. Some courts noted that the contributions of performers rose to the level of a writing, but felt an amendment to the 1909 Copyright Act was necessary. In the 1970s there were a number of cases dealing with unauthorized duplication of pre-1972 sound recordings; these cases either assumed that the performers' contributions were protectable property, or simply stated the principle with little discussion. In 1971 Congress recognized sound recordings as “writings” deserving copyright protection. Copyright protection was granted, but owners of copyright in sound recordings were not granted the full array of exclusive rights afforded other authors; the controversial public performance right was withheld. |“||original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced or otherwise communicated, either directly or with the aid of a machine or device.||”| - ↑ Michigan Dept. of Tech., Management & Budget, 8000 Glossary (Jan. 6, 1997) (full-text). - ↑ U.C.C. §1-201(46). - ↑ 1 U.S.C. §1. - ↑ U.S. Const. art 1, §8, cl. 8. - ↑ 209 U.S. 1 (1908) (full-text). The U.S. Supreme Court held that since the perforations on a piano roll were not visually intelligible, the recording was not a copy of the underlying music, and the author of the composition had no control over the use of such a recording. - ↑ See Barbara Ringer, “The Unauthorized Duplication of Sound Recordings,” Study No. 26 in Copyright Law Revision, Studies Prepared for the committee on Patents, Trademarks and Copyrights of the Comm. on the Judiciary, U S. Senate, 86th Cong., 2d Sess. (Comm. Print 1961) (full-text). - ↑ See, e.g., Waring v WDAS Broadcast. Station, Inc. 327 Pa. 433, 194 A. 631 (1937); RCA Mfg. Co. v. Whiteman, 114 F.2d 86 (2d Cir.) (full-text), cert. denied, 311 U.S. 712 (1940); Capitol Records, Inc. v. Mercury Records Corp., 221 F.2d 657 (2d Cir. 1955) (full-text). - ↑ See, e.g., United Artists Records, Inc. v. Eastern Tape Corp. 19 N.C. App. 207, 198 SE 2d 452 (1973) (full-text); Mercury Records Productions, Inc. v. Economic Consultants, Inc., 64 Wis.2d 163, 218 N.W.2d 705 (1974) (full-text). - ↑ Sound Recordings Act, Pub. L. No. 140, 85 Stat. 39 (1971). - ↑ 17 U.S.C. §102(a).
<urn:uuid:255fd490-3bb7-49bf-a3e1-cc0f20933743>
CC-MAIN-2016-44
http://itlaw.wikia.com/wiki/Writing
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719215.16/warc/CC-MAIN-20161020183839-00199-ip-10-171-6-4.ec2.internal.warc.gz
en
0.909945
918
3
3
Full profile →'"> The author is a Forbes contributor. The opinions expressed are those of the writer. A central challenge for any digital transformation initiative is dealing with the ever-increasing pace of change – in the marketplace, in the technology environment, and in the world at large. Clearly, as customer expectations accelerate, our technology must keep up. Squeezing every last millisecond of performance leads to the demand for real-time – technology with no delays whatsoever, moving at the speed of thought itself. If we examine this real-time requirement more closely, however, important nuances emerge. First, real-time never actually means instantaneous, as it always takes a certain amount of time for bits to find their way to their destination. But even more important for any digital professional to understand, the concept of real-time has several subtly different meanings – and understanding the differences is critical for making effective technology decisions. What is Real-Time, Anyway? From the perspective of the digital effort, the most important definition of real-time is low latency. Latency refers to how long a web site or app takes to respond to a click or other user interaction (either on a computer or a mobile device), and thus the faster, the better. Consumers are notoriously fickle, after all – add a few milliseconds of delay and they’ll defect in droves. Real-time may also refer to up-to-date information. In a breaking news situation, for example, people want the very latest information. I heard about the latest California earthquake in real-time from friends on Twitter – the news Web sites were at least ten minutes behind. Real-time airline or theater seat availability falls under this definition as well. A third sense of real-time refers to human interactions. If you and your gamer buddies are going after zombies in a multiplayer game, for instance, you want the action to be real-time. Online voice conversations and some fast-paced auction sites also require this type of real-time. Finally, we may be referring to real-time processing of information. Stock trading and online ad placement are two of the most familiar examples. Yes, latency must be as low as possible, but the bottleneck isn’t just serving up information to the user – it’s all the number crunching behind the scenes that must also take place at a blisteringly fast pace. With these various definitions in mind, then, let’s take a quick look at several software vendors who all have real-time offerings of one sort or another – and yet, all with different meanings of real-time. When Speed is Paramount: Aerospike For Aerospike, real-time means high performance and thus low latency. To this end, they offer a database optimized for solid-state flash drives. While most databases still run on the spinning disk technology we’ve had for decades, newer flash technology promises greater speed and reliability. Aerospike has taken their technology to the extreme, achieving remarkable performance and low latency on this newer technology. Aerospike Founder and CTO Brian Bulkowski describes the benefits of the Aerospike technology to their customer Yashi, a leader in location-focused online video advertising. “Yashi is one of the foremost innovators in harnessing the power of geo-targeting to help marketers strengthen their digital video advertising campaigns,” says Bulkowski. Aerospike gives Yashi the advantage of their real-time capabilities, including “near-linear scaling, predictable real-time performance, and reliable self-management of our Aerospike database.” Real-Time Information Flows: Fiorano Software Enterprise Service Bus (ESB) middleware vendor Fiorano Software leverages an innovative architecture to achieve real-time performance both in and out of the Cloud. “Fiorano implements peer-to-peer distributed ESB platform technology that allows enterprises to implement real-time systems in a linearly-scalable manner,” explains Atul Saini, CEO of Fiorano. “The unique peer-to-peer architecture ensures that data flows directly between distributed endpoints while control is managed centrally, allowing controlled, unbounded scalability.” As an enterprise infrastructure vendor, furthermore, Saini has an important perspective on the meaning of real-time. “Real-time means ‘as it happens,’” according to Saini. “So real-time information flows imply that information emerging from one system is instantly directed to another system (depending on what the business needs or wants) with no delay.” However, Saini offers a warning: “In many cases, customers want information to flow across systems ‘as it is generated’ (i.e. in real-time) but they don’t always know that such information flows can actually be implemented” – hence the important real-time niche that Fiorano fills in the middleware market. Situation Awareness and Semantics: Profium
<urn:uuid:bacdea11-dabd-4050-9e52-0227d446d03e>
CC-MAIN-2017-04
http://www.forbes.com/sites/jasonbloomberg/2014/08/29/transforming-digital-business-in-real-time/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281069.89/warc/CC-MAIN-20170116095121-00272-ip-10-171-10-70.ec2.internal.warc.gz
en
0.931571
1,043
2.203125
2
Bacteria have a reputation for causing disease, so the idea of tossing down a few billion a day for your health might seem — literally and figuratively — hard to swallow. But a growing body of scientific evidence suggests that you can treat and even prevent some illnesses with foods and supplements containing certain kinds of live bacteria. Northern Europeans consume a lot of these beneficial microorganisms, called probiotics (from pro and biota, meaning "for life"), because of their tradition of eating foods fermented with bacteria, such as yogurt. Probiotic-laced beverages are also big business in Japan. Enthusiasm for such foods has lagged in the United States, but interest in probiotic supplements is on the rise. Some digestive disease specialists are recommending them for disorders that frustrate conventional medicine, such as irritable bowel syndrome. Since the mid-1990s, clinical studies suggest that probiotic therapy can help treat several gastrointestinal ills, delay the development of allergies in children, and treat and prevent vaginal and urinary infections in women. Self-dosing with bacteria isn't as outlandish as it might seem. An estimated 100 trillion microorganisms representing more than 500 different species inhabit every normal, healthy bowel. These microorganisms (or microflora) generally don't make us sick; most are helpful. Gut-dwelling bacteria keep pathogens (harmful microorganisms) in check, aid digestion and nutrient absorption, and contribute to immune function. Probiotics and gastroinstestional issues The best case for probiotic therapy has been in the treatment of diarrhea. Controlled trials have shown that Lactobacillus GG can shorten the course of infectious diarrhea in infants and children (but not adults). Although studies are limited and data are inconsistent, two large reviews, taken together, suggest that probiotics reduce antibiotic-associated diarrhea by 60%, when compared with a placebo. Probiotic therapy may also help people with Crohn's disease and irritable bowel syndrome. Clinical trial results are mixed, but several small studies suggest that certain probiotics may help maintain remission of ulcerative colitis and prevent relapse of Crohn's disease and the recurrence of pouchitis (a complication of surgery to treat ulcerative colitis). Because these disorders are so frustrating to treat, many people are giving probiotics a try before all the evidence is in for the particular strains they're using. More research is needed to find out which strains work best for what conditions. Probiotics and vaginal health Probiotics may also be of use in maintaining urogenital health. Like the intestinal tract, the vagina is a finely balanced ecosystem. The dominant Lactobacilli strains normally make it too acidic for harmful microorganisms to survive. But the system can be thrown out of balance by a number of factors, including antibiotics, spermicides, and birth control pills. Probiotic treatment that restores the balance of microflora may be helpful for such common female urogenital problems as bacterial vaginosis, yeast infection, and urinary tract infection. Many women eat yogurt or insert it into the vagina to treat recurring yeast infections, a "folk" remedy for which medical science offers limited support. Oral and vaginal administration of Lactobacilli may help in the treatment of bacterial vaginosis, although there isn't enough evidence yet to recommend it over conventional approaches. (Vaginosis must be treated because it creates a risk for pregnancy-related complications and pelvic inflammatory disease.) Probiotic treatment of urinary tract infections is under study. Probiotics are generally considered safe — they're already present in a normal digestive system — although there's a theoretical risk for people with impaired immune function. Be sure the ingredients are clearly marked on the label and familiar to you or your health provider. There's no way to judge the safety of unidentified mixtures. In the United States, most probiotics are sold as dietary supplements, which do not undergo the testing and approval process that drugs do. Manufacturers are responsible for making sure they're safe before they're marketed and that any claims made on the label are true. But there's no guarantee that the types of bacteria listed on a label are effective for the condition you're taking them for. Health benefits are strain-specific, and not all strains are necessarily useful, so you may want to consult a practitioner familiar with probiotics to discuss your options. As always, let your primary care provider know what you're doing. To find out more
<urn:uuid:24528ee5-4e0b-4b49-8878-a21a1c1a9d55>
CC-MAIN-2017-04
http://www.health.harvard.edu/vitamins-and-supplements/health-benefits-of-taking-probiotics
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00531-ip-10-171-10-70.ec2.internal.warc.gz
en
0.95007
907
3.34375
3
What's on the Technology Horizon? ILI 2011 Conference Brian Kelly presented a talk on "What's on the Technology Horizon?" at the ILI 2011 conference which was held at the Copthorne Tara Hotel, London on 27-28 October 2011. Note that the talk has been highlighted in an article published in Information Today Europe and was also summarised in Information Today . The talk was also mentioned in a post on the UK Web Focus blog. - What's on the Technology Horizon? - What's happening on the technology front line? Technology experts discuss how today's cutting edge developments could impact information use and provision in the near future, and disrupt the way we work and the services our users expect us to provide. From new devices to new ways of engaging users, what are the implications and opportunities of technological innovation for libraries? Come and find out. - Track A - Technology Developments and Trends, session A101 - Date and Time - 15-20 minutes talk in session running from 10.45 - 11.30 on 27 October 2011 - [MS PowerPoint] The slides are also available on Slideshare and embedded below. Note that in addition to giving this talk Brian also chaired session A103 on "New Ways of Analysing to Prove Value" and session A105 on "Cutting-Edge Technology Projects". Brian Kelly is based at UKOLN, a national centre of expertise in digital information management which is located at the University of Bath. In his role as UK Web Focus he advises the UK's higher and further education communities on best practices in use of the Web. Brian is an experienced presenter and has spoken at previous ILI conferences. Brian has given many presentations on Web 2.0 and Library 2.0. In recent years Brian has been an invited plenary speaker at international conferences held in Stockholm, Taiwan, Singapore and Melbourne. Brian is also a passionate user of a variety of Social Web tools, including his UK Web Focus blog which has been shortlisted for several awards. Brian's areas of interest include ways in which Web 2.0 and the Social Web can be used to support professional, scholarly and research activities, Web standards, Web accessibility and Web metrics. In addition his interests in open content has led in recent years to taking a pro-active role in the provision of 'amplified events' in order to maximise discussions at an event and to enhance the outreach by encouraging participation with a remote audience.
<urn:uuid:646e4213-1e81-48ec-9927-4b230b296c12>
CC-MAIN-2017-04
http://www.ukoln.ac.uk/web-focus/events/conferences/ili-2011/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00136-ip-10-171-10-70.ec2.internal.warc.gz
en
0.958028
505
1.539063
2
Epsom 6 Furlongs This chart shows horse racing results for horses aged 3 years or older only. The results are plotted winning stall number against the number of runners. The resultant chart shows the Draw Advantage Pattern produced by the winning stall numbers. Results on good or better going are shown in black. Results on good to soft or softer going are shown in red. WINNING STALL NUMBER 2000 - 2015 The six furlongs at Epsom is run around a left handed bend, however they start on a chute and the turn is nowhere near as severe as the 7 furlong races. This could explain why it appears to be a big advantage to be drawn low over 7 furlongs, but no real advantage at all to be drawn low over 6 furlongs at Epsom, and in actual fact being drawn high appears to be a bit of an advantage.
<urn:uuid:52301d8d-746a-4884-9cdb-30d71c0ee346>
CC-MAIN-2022-33
https://www.drawbias.com/courses/Epsom/Epsom6.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00273.warc.gz
en
0.789014
433
1.5
2
“Beautiful Decay” – Many of the drawing subjects I’m most attracted to are those objects and architecture that are in decline and worn, with an intriguing tarnish caused by weathering and neglect. The presence of chipped paint & plaster, mould, rusted corrugation, broken objects, and clutter immediately attract the sketcher in me. Through my artist’s eyes, these buildings seem to become more beautiful with age and decay. Penang and Johor Bahru are both Malaysian cities with “faded splendor”— classic structures from their rich history that still stand, but are disintegrating in the tropical climate of SE Asia. Many are also endangered by encroaching ‘modern progress’. Through my drawings, I want to record these buildings before they are demolished and lost forever. My sketch work is representational in nature, and is mainly done in pen and ink, with the addition of watercolor and graphite tonal washes. In the studio, I also enjoy working in the mediums of scratchboard, colored pencil and pastels. My reasons for coming to live in SE Asia in 1995 are numerous, and even a bit difficult to identify. But one reason was the opportunity to draw the lands, temples and people I observed – environments that not everyone gets a chance to see. As an artist, I’ve visited and drawn at Borobudor Temple in Java, Singapore’s Raffles Hotel, historic temples in Thailand, Chinese shophouses of Old Penang, and at the base of magnificent Mount Fuji – moments I will cherish forever through my sketches. - Follow Buz's work on flickr at www.flickr.com/photos/buzwalker
<urn:uuid:53e55547-e6e4-43f1-9478-3ac9b225faaf>
CC-MAIN-2017-04
http://www.urbansketchers.org/2014/09/meet-correspondent-bernard-buz-walker.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00188-ip-10-171-10-70.ec2.internal.warc.gz
en
0.95496
358
1.609375
2
Gathering thinkers as diverse as Immanuel Levinas, Eugen Fink and Friedrich Schelling, this book certainly awakens the desire for a philosophical surprise; what can we expect from such a theme, especially since the book promises to reveal a new perspective on aesthetics? Jadranka Skorin-Kapov's book is a contribution to the discussion of what, after German idealism, phenomenology, and its development in, for instance, French 20th century philosophy, can be considered as aesthetic experience. In this vein, she defines what she calls aesthetic experience proper in the following way: it originates in a desire beyond the objective, transports us into an enigmatic moment of break which can be described in terms of not yet and no longer, a speculative moment in which desire develops into surprise. Surprise brings with it something radically new, and is mind-altering; it lingers with us, and changes the way we see things. Skorin-Kapov makes the normative claim that this figure accounts for the aesthetic proper: we are to understand that this is what must take place in order for an aesthetic experience to occur. Desire (for something that lies beyond representation, the object, etc,) is a prerequisite, followed by the phases of excess, rupture and recuperation. Surprise is to count as the phase of recuperation. In Skorin-Kapov's reading, aesthetics is not, as in Alexander Baumgarten's classic definition, attached to reflection on sensual experience, and it is not at all attached to knowledge. Skorin-Kapov describes how such a moment has been negotiated in the history of philosophy under various guises. We encounter it in, for instance, Levinas' notion of the face, Philippe Lacoue-Labarthe's notion of the caesura, Gilles Deleuze's plane of consistency, Maurice Blanchot's concept of the neuter, George Bataille's notion of excess, which in turn is intimately linked to evil in literature, in Michel Foucault's philosophy of transgression, in Slavoj Žižek's notion of the real, and in Maurice Merleau-Ponty's notion of the flesh. These examples by no means exhaust the book as a resource of reflection on the phenomenon of rupture and surprise. Skorin-Kapov calls on a long line of philosophers as "lawyers" to make her case. I would argue, however, that the book's strength is in her imaginative reading of the history of philosophy rather than in the normative force of her argument. After all, there are many alternative ways of accounting for aesthetic experience, as has been shown throughout the history of philosophy: it can be linked to truth, the imaginary, the senses, affects, judgment, contemplation, and so on. One can also argue that aesthetics can be linked to a kind of knowledge rather than being distinctly set apart from it. But more important than any argument is the fact that Skorin-Kapov's readings of historical texts point to the existence of a certain figure of thought that exists not in a single tradition, but in a wide net of interconnections between philosophers and traditions. This makes the book worthwhile, but it also points to a certain lack. The book would have been stronger if its horizon had been broadened to include thinkers such as Julia Kristeva, Édouard Glissant and (especially, given the theme) Iris Murdoch. There are, however, also connections made to the writings of Hegel, Lyotard, Foucault, Jaspers, Nietzsche and others. With a such a long line of thinkers giving witness to the uniqueness of aesthetic experience, this experience must indeed present itself as complex. Skorin-Kapov's argument builds up to this complexity: surprise, although a recuperative moment in her initial formulation, is by no means an easily accessible phenomenon. Skorin-Kapov describes it phenomenologically, first at the level of sensibility, then at the level of reflection, as astonishment; then as the kind of wonder that is inherent in sublimity, and branching out from there. On the one hand, surprise can lead to the kind of admiration that we enjoy in art or that we find ourselves contemplating in science. On the other hand, it can also produce the deeply felt experience of responsibility that grounds the ethical. Surprise in this sense can by no means be reduced to wonder or astonishment; it cannot be described in terms of a brief moment of sensation but lasts and develops into more profound and more complex forms of reflection. Using the speculative method of Fink, the author argues for a kind of "overflow" departing from the phenomenologically described moment of surprise, taking surprise as a beginning, and then proceeding to discuss the way in which it branches into other forms of experience. In this way, it becomes clear that aesthetic experience must be accounted for as something which is more encompassing than the isolated contemplation of artworks. What is to count as aesthetic connects in a wider sense to the desire of excess, a desire that is perhaps opened to us by artworks such as films, but not necessarily stuck in the encounter with isolated works of art. In this way aesthetics becomes a branch of philosophy that is not about works of art, but more about an approach to the singular event of surprise, irreducible to other kinds of experience. Skorin-Kapov's book is in many ways an interesting contribution to an important discussion. How are we to conceive of aesthetic experience in terms that take us beyond the constrictive definitions in the 18th century? How can we finally move beyond the modernist paradigm of art's autonomy as a given condition of what is to count as aesthetic, and frame, instead, what goes on at the level of experience? How can we describe what occurs in aesthetic experience that must be deemed as unique and singular, irreducible to any other kind of experience? In pointing to desire and surprise as distinct components of this kind of experience, Skorin-Kapov's argument could in fact be aligned with an older tradition, although this is not an argument she makes. In the 17th century, the notion of wonder was indeed used as a paradigm for what we may call aesthetic experience in a wide sense: think of the Wunderkammer that gathered a collection of objects of desire and surprise, and think of the Cartesian passion of wonder that made its way into the aesthetics of Handel's operas, for instance. In this way, what Skorin-Kapov is exploring is a theme with a long history, adding to it a new sense of profundity with the help, in particular, of 20th century phenomenology. I certainly welcome this contribution, not least since it may give impulses to new ways of rethinking and reformulating the modernist paradigm of aesthetics. For that reason I wished at times that the book were written in a more accessible way and that the arguments were developed in a more concentrated manner. Personally, to take only one example, I am much attracted to the idea of rereading the work of Friedrich Schelling in this framework. But I would have liked to see a more detailed, responsive reading: how does wonder occur, what happens in the experience of excess in his writings, how does he formulate the experience? As we sift through centuries of philosophical thought, I would have liked to linger a bit longer on a few favored examples, from both films and textual discussions. Having said that, I believe that Skorin-Kapov is on to something important as she points to the figuration of desire and surprise as a manner of describing aesthetic experience. She argues that it is aesthetic experience proper; I would argue that it is one of several possible ways of describing it. In any case, Skorin-Kapov's book connects well with a history of aesthetics that deserves to be scrutinized and rewritten from new exciting angles.
<urn:uuid:ecbf4689-bc64-49b8-aeb7-47e57aa441c1>
CC-MAIN-2022-33
https://ndpr.nd.edu/reviews/the-aesthetics-of-desire-and-surprise-phenomenology-and-speculation/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00265.warc.gz
en
0.959592
1,647
1.75
2
a unit of weight used in Islamic countries, varying widely in value, but of the order of the pound. a varying unit of dry measure, used in the same areas. noun (pl) rotls, artal (ˈɑːtɑːl) a unit of weight used in Muslim countries, varying in value between about one and five pounds (“Longimanus”) died 424 b.c, king of Persia 464–24. (“Mnemon”) died 359? b.c, king of Persia 404?–359?. Historical Examples He was cupbearer to artaxerxes, a position of much ease and wealth. Training the Teacher A. F. Schauffler artaxerxes married two of his daughters.1688 The Ptolemies adopted this practice. Folkways William Graham Sumner Of the internal administration […] - Artaxerxes i (“Longimanus”) died 424 b.c, king of Persia 464–24. noun died 425 bc, king of Persia (465–425): son of Xerxes I - Artaxerxes ii (“Mnemon”) died 359? b.c, king of Persia 404?–359?. Historical Examples In 404 he died after a reign of nineteen years, and was followed by Artaxerxes II. Encyclopaedia Britannica, 11th Edition, Volume 7, Slice 9 Various noun died ?358 bc, king of Persia (?404–?358). He defeated his brother Cyrus the Younger at Cunaxa (401) artcc air route traffic control center
<urn:uuid:6901eb24-608b-4733-80a1-8bc54c24c723>
CC-MAIN-2017-04
http://definithing.com/define-dictionary/rotl/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280825.87/warc/CC-MAIN-20170116095120-00207-ip-10-171-10-70.ec2.internal.warc.gz
en
0.916281
354
3.453125
3
Analysts have dubbed Australia's upcoming elections a "khaki election" - one influenced by war-time rhetoric - as incumbent Prime Minister Scott Morrison has zeroed in on rising security tensions in the Pacific islands during the final months of his campaign. The tension came after the Solomon Islands — a small nation to the northeast of Australia, where the United States lost around 7,000 troops in an island-hopping campaign against Japan in World War II — signed a security pact with China in April that would allow Beijing to deploy armed police and military personnel to the island, according to a draft of the document leaked by opposition parties. Although Sogavare has repeatedly said that his government will not permit China to militarize, there is still concern over whether China’s new Pacific posting would operate as a military base in all but name. It’s hard to tell whether China will use its new foothold in the Solomon Islands as “bases,” ports with the capacity to fuel and service ships, or “places,” where commercial ships can dock, said Jacob Stokes, a fellow for the Indo-Pacific Security Program at the Center for a New American Security. Read the full story and more from Foreign Policy.
<urn:uuid:fa0cf6b4-cf9e-4feb-b7fd-5b0714afb213>
CC-MAIN-2022-33
https://www.cnas.org/press/in-the-news/australias-got-a-solomon-islands-headache-again
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00271.warc.gz
en
0.964808
255
1.898438
2
(PRWEB) July 14, 2014 In this jazz rhythm guitar lesson Jon MacLennan teaches an exercise to work on jazz voicings on the lower strings of the guitar. Jon starts off in the key of F at the first fret and ascends up the fret board diatonically through all of the chords in the scale. The chord voicing’s that Jon demonstrates are as follows; FM7 (F major seven), Gm7 (G minor seven), Am7 (A minor seven), BbM7 (B flat major seven), C7, Dm7 (D minor seven), Em7b5 (E minor seven flat five), and finally FM7 again, but one octave higher. To get the most benefit from this exercise it is recommended to practice it both ascending and descending. Guitar TAB’s are available for this easy jazz guitar lesson at GuitarControl.com. Los Angeles based guitarist Jon MacLennan began his career at the age of 16 and is one of the busiest upcoming session guitarist, artist, composer, producer, and professional educator in LA. Jon has done session work for Julian Lennon, Steven Tyler, and British pop star Jamie Cullum. He has appeared on Disney channels “The Suite Life of Zack and Cody” and on the sound track to the movie “Marley and Me 2 – The Puppy Years”. MacLennan earned a bachelor’s in ethnomusicology and jazz guitar studies from University of California, Los Angeles, and has been mentored by Carl Verheyen, Wolf Marshall, Kenny Burrell, Anthony Wilson, Tamir Hendelmen, Jimmy Wyble and Ron Anthony which has made him a highly sought after guitar instructor today. GuitarControl.com is the leader in modern guitar instruction. It’s packed with recourses including articles, video lessons, and the best videos in the business for the beginner to the advanced guitar student taught by the best instructors out there. Weather you are into the blues, rock, jazz, metal, folk, or anything in between, they have you covered.
<urn:uuid:325ce72a-6bec-4eaf-bf7f-01ad370c51df>
CC-MAIN-2017-04
http://www.prweb.com/releases/2014/07/prweb12016822.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280483.83/warc/CC-MAIN-20170116095120-00292-ip-10-171-10-70.ec2.internal.warc.gz
en
0.941326
437
1.726563
2
- Status Report - August 8, 2022 Joint USAF/NOAA Solar Geophysical Activity Report and Forecast 28 April 2021 Joint USAF/NOAA Solar Geophysical Activity Report and Forecast SDF Number 118 Issued at 2200Z on 28 Apr 2021 IA. Analysis of Solar Active Regions and Activity from 27/2100Z to 28/2100Z: Solar activity has been at very low levels for the past 24 hours. There are currently 3 numbered sunspot regions on the disk. IB. Solar Activity Forecast: Solar activity is expected to be very low with a chance for a C-class flares on days one, two, and three (29 Apr, 30 Apr, 01 May). IIA. Geophysical Activity Summary 27/2100Z to 28/2100Z: The geomagnetic field has been at quiet levels for the past 24 hours. Solar wind speed reached a peak of 490 km/s at 27/2245Z. Electrons greater than 2 MeV at geosynchronous orbit reached a peak level of 1063 pfu. IIB. Geophysical Activity Forecast: The geomagnetic field is expected to be at quiet levels on day one (29 Apr) and quiet to unsettled levels on days two and three (30 Apr, 01 May). III. Event probabilities 29 Apr-01 May Class M 01/01/01 Class X 01/01/01 IV. Penticton 10.7 cm Flux Observed 28 Apr 078 Predicted 29 Apr-01 May 078/078/075 90 Day Mean 28 Apr 076 V. Geomagnetic A Indices Observed Afr/Ap 27 Apr 008/009 Estimated Afr/Ap 28 Apr 005/005 Predicted Afr/Ap 29 Apr-01 May 005/005-008/008-006/008 VI. Geomagnetic Activity Probabilities 29 Apr-01 May A. Middle Latitudes Minor Storm 01/10/10 Major-severe storm 01/01/01 B. High Latitudes Minor Storm 20/25/25 Major-severe storm 10/30/40
<urn:uuid:59116bf8-bf9f-461a-895d-c43c6ab346b1>
CC-MAIN-2022-33
https://spaceref.com/status-report/joint-usafnoaa-solar-geophysical-activity-report-and-forecast-28-april-2021/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00077.warc.gz
en
0.817023
487
1.921875
2
There needs to be an immediate humanitarian ceasefire in Syria, the UN human rights chief has declared, saying the situation has deteriorated rapidly as the Syrian government steps up its onslaught against the opposition. Navi Pillay, the UN High Commissioner for Human Rights, said the world has to take action to prevent Syrian security forces from continuing their bombardments and other attacks against civilians, which she said had resulted in "countless atrocities". GENEVA, Switzerland (February 28, 2012) -- There needs to be an immediate humanitarian ceasefire in Syria, the UN human rights chief has declared, saying the situation has deteriorated rapidly as the Syrian government steps up its onslaught against the opposition. Navi Pillay, the UN High Commissioner for Human Rights, said the world has to take action to prevent Syrian security forces from continuing their bombardments and other attacks against civilians, which she said had resulted in "countless atrocities". Speaking at an urgent meeting of the UN Human Rights Council on Tuesday, Pillay urged Syria to end all fighting, allow international monitors to enter the country and give unhindered access for aid agencies to enter the besieged city of Homs and other embattled cities. The appeal prompted a bitter response from Syria's ambassador to the United Nations in Geneva, who accused the 47-nation council of promoting terrorism in his country. Before storming out of the room, Fayssal al-Hamwi said Tuesday's meeting would only prolong the crisis in Syria. "The call for holding the session is part of a pre-established plan," he said. "It is aimed at attacking the Syrian state and its institutions under the pretext of humanitarian needs." The UN has estimated at least 5,400 people have been killed since the uprising began in March, but anti-government activists put the current figure at over 8,000. The diplomatic developments came as reports said a wounded British journalist who was trapped in Homs along with other journalists and activists, had been smuggled to safety in neighbouring Lebanon. Poke at Russia A senior US diplomat said the time had come for nations to stop all financial and material support to President Bashar Assad's government - a poke at Russia, which has long sold arms to Syria and together with China has repeatedly used its Security Council veto to block international action on Syria. "None can deny that Bashar al-Assad and his criminal cohort are waging a brutal campaign of slaughter, bombardment, torture, and arrest that already has murdered thousands of women, men and children, with more killed each day," said Esther Brimmer, the US assistant secretary of state for International Organisation Affairs. "Without a halt to the killing and a guarantee of immediate humanitarian access, this despicable regime will murder many more before this heinous chapter in Syria's history is over." Pillay cited the report of a UN expert panel last week, which concluded that Syrian government officials were responsible for "crimes against humanity" committed by security forces against opposition members. The crimes included shelling civilians, executing deserters and torturing detainees. Some opposition groups, too, had committed gross abuses, it said. The panel has compiled a confidential list of top-level Syrian officials who could face prosecution over the atrocities. Pillay reiterated her call for Syria to be referred to the International Criminal Court "in the face of the unspeakable violations that take place every moment". "More than at any other time, those committing atrocities in Syria have to understand that the international community will not stand by and watch this carnage and that their decisions and the actions they take today ultimately will not go unpunished," she said. Members of the council are expected to pass a resolution on Tuesday condemning "widespread and systematic violations of human rights and fundamental freedoms by the Syrian authorities". A draft resolution supported by many Arab and Western countries says the Syrian government's use of heavy artillery and tanks to attack civilian areas has contributed to the deaths of thousands. While the resolution is not expected to include a reference to the ICC referral, diplomats have indicated that this issue will be revisited next month.
<urn:uuid:fb42d3d2-fc78-4e18-8b49-2ec8f02a5c71>
CC-MAIN-2017-04
http://www.envirosagainstwar.org/know/read.php?itemid=12023
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00224-ip-10-171-10-70.ec2.internal.warc.gz
en
0.970444
829
2.046875
2
More tongues mean more sales For years English-speaking countries were regarded as the globally dominant force in business because of their preeminence in the marketplace. Financial successes were based almost solely upon the close relationships with former colonies, and upon the high quality of the product or services that were being offered. The nature or quality of the transactions themselves had little regard. However, in today's increasingly competitive marketplace, and with colonial ties loosening, it's easy to see that business dominance slipping. While internationally it is recognized that language is the key to business success, native English speakers are only just beginning to wake up to the world. Preeminent or merely pushy? Because many English-speaking companies have tended to view language training as an employee benefit, to be exercised at the option of the individual, most English-speaking professionals lack the basic language skills needed to cultivate successful working relations with foreign colleagues. This lack of language skill routinely excludes them from easy access to new ideas and developments from abroad - ideas that could translate into larger market shares and increased sales. Rick Sullivan, recently relocated to Tokyo to assume the position of director of brewing operations, Asia, for Anheuser-Busch, recognized the importance of learning about the language and culture of Japan. "Even if I knew I could nail down business contracts using only English, I would still study Japanese, in order to build friendships." Moreover, Sullivan adds, "Even though there are written contracts now, a relatively new concept in Japan, the Japanese still put a lot of stock in personal relationships in trust and the spoken word." The Japanese are not alone in their regard for relationships. The French view the relationship, which includes several preceding visits, shared culinary delights, and a healthy exchange of non-business ideas, as more important than the actual business. Any attempt to forgo or even rush the former could result in no business at all. Leonard Lauder, president of cosmetics giant Estee Lauder, put the problem into a simple context: "It is self-evident that you can't sell unless there is a demand for the product. It is also self-evident that you cannot begin to understand what a people demand if you can't talk to them on their own terms. Their own terms, of course, means their own language." U.S. business must let go of the idea that English is the "Language of Business." International trade, to be successful, must speak the language of the consumer, because when you speak to them in English, you speak to their intellect, but when you speak in their native language you speak to their soul. That realization has been slow in coming. Americans have a lot of image to rebuild if they want to be considered as equals in the international language arena. In France, for example, it is common belief that the American negotiating team rides into town slinging fast talk and American slang in an effort to dominate discussions and win the right to more business territory. The American executive's lack of foreign language skills is often viewed as a deliberate attempt to promote a "superior" culture, rather than the simple oversight it has traditionally been. Whether it's a plant manager going to work in China, an advertising magnate looking after a multilingual marketing campaign from London, or a salesperson doing rounds in Latin America, more and more companies are finding it good business to make sure their staffs are proficient in the languages of the countries in which they are doing business. This respect for other cultures and their accompanying languages makes economic sense not only for the employer, but also for the employee as well. Anecdotal evidence suggests that a U.S. college graduate who speaks fluent Japanese can add another U.S. $15,000 to his take-home pay. And the company benefits in having a Japanese-speaking employee to deal with customers from Japan. But the fact remains that only 10 percent of native English speakers are bilingual (compared to 40 percent of Luxembourg natives who are quadrilingual!) Statistics in the U.S. are even more alarming. The U.S. remains one of the only places on earth where a Ph.D. can be earned without learning a foreign language. The following excerpt was taken from an Alaska Pacific University survey: "It has been found that just under four percent of 300 U.S.-based multinational corporations indicated that a foreign language capability was required for international employees." The American lack is due in large part to the educational system. Statistics show that only five percent of U.S. college graduates are fluent in any language other than English. The majority of English-speaking companies, it seems, are only just beginning to see the disadvantage this educational system has created, and are now trying to find the most effective way to overcome it. Within the companies that do provide language training for their executives, as much is spent on private instruction as is spent on a college education - and that language training requires hours of intensive study away from the office. Certainly a more feasible solution to American employees' language needs must exist. Returning to the case of the plant manager who faces relocation to China in six short months, the offer comes as a mixed blessing. Refusing the post would significantly diminish, or even stifle his career opportunities, but can he find the time and energy to devote to learning this new language and culture in such a short time? Is it really possible to pick up enough language and cultural information to be able to work effectively in China? Is there really any choice? What's the next step? Jeffrey Norton is a strong advocate of learning foreign languages through self-instruction. Norton, the publisher of Audio Forum, the world's largest producer of foreign language tapes, suggests there are three important factors that separate self-instruction from classroom instruction and make it the best way to learn a language. Self-instruction provides the building blocks of effective language learning: memorization, repetition and drills. Norton notes, "The purpose of the tapes is not just to speak, but to help you think in the language, which eliminates the need to translate from English into the target language. This way you learn the language in the same manner you learned English: by listening, repeating and memorizing." Perhaps the most important advantage of audio cassettes in today's fast-paced business world is the flexibility. Self-instruction cassettes particularly appeal to busy executives. The tapes are portable and can be used at their leisure, eliminating the need to tie up valuable hours in the language classroom. Languages can be studied in the car, home, office, airplane or in the foreign country itself upon arrival. In addition, language specialists have discovered a secondary advantage to audio cassettes as a result of their portability. While they are most often used for active learning and exercises, they also can be used for passive listening, acquainting the listener's ear to the intonation, accent and pronunciation of the language, from a relaxed perspective, without the need for active concentration or participation. Proficiency can be obtained in as short as two months. Seventeen hours of recorded material and an instructional book round out the typical self-instruction course. The time saved in learning is remarkable, when considering that an average language class would take a series of eight-hour days, outside of the office, to become proficient. Language trainers know that some people fear embarrassment in the classroom so much they never progress. Others prefer to take more time memorizing, or more time speaking. With the audio cassette method, language learning seems to allow a less "painful" experience, and maybe even affords a little fun. For today's cost-conscious manager, it is clear that serving more employees for less is a most attractive alternative. Companies are increasingly opting for the financial and educational benefits of self-instruction and have begun to set up inhouse language facilities, providing more variety and availability of foreign language training to more employees. American-based 3M, which earns more than $7 billion in annual sales overseas, has long been in the forefront of corporate language instruction, sponsoring an in-house Language Society for the past 27 years. The Society provides translation and interpretation services for the company's worldwide marketers' business units, offers cultural assistance to employees relocating overseas, and orchestrates lunchtime classes for more than 1,000 employees in 17 languages, using audio tapes as the primary instruction source. "The society's usage has grown 15 to 20 percent annually as the company becomes more global," according to Arlan Tietel, a manager for 3M's language services. Other companies, such as the French computer giant, Bull, have followed 3M's lead. Bull has begun cost-effective luncheon discussions and activities in foreign languages (including English!), international news hours, and on-site "mediatheques" full of audiovisual and varied reading materials to prepare employees for doing business in a changing world. The joke used to be: "What do you call a person who speaks only one language?" The answer was "French." Now, the most logical response would be "a native English speaker." In an increasingly competitive global economy, the success of international companies based in English-speaking countries will depend in part upon their employees' ability to understand the languages and cultures of the countries in which they do business. Self-instruction, with its extended reach and cost-effective structure, looks to be a practical and cost-effective means for companies to do business as we approach the new millennium. RELATED ARTICLE: Facts & Fictions about Europeans While English speakers have their own ethno-centric problems, Europeans are a lot different from what Americans perceive them to be. Americans perceive them to be . . . Sophisticated Worldly Negative Articulate Progressive Polite Proud Homogeneous Team players What they really are . . . Cultured Fiercely regionalist Introspective Consider conversation to be an art form Have thousands of years of history to learn from Accustomed to a crowded life Very interested in other cultures (particularly U.S.) Europe is experiencing tremendous immigration Family is the most important team, all else is second John Freivalds heads jfa, a Minneapolis, Minn.-based group that specializes in foreign language products and services. |Printer friendly Cite/link Email Feedback| |Date:||Dec 1, 1995| |Previous Article:||Sunrise, day one, year 2000.| |Next Article:||East meets U.S. Midwest.|
<urn:uuid:43622fad-dbda-486f-9c1b-4e4a94932e20>
CC-MAIN-2022-33
https://www.thefreelibrary.com/Learning+languages.-a017781971
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00668.warc.gz
en
0.962331
2,203
2.328125
2
Passive low frequency spectral analysis: Exploring a new field in geophysics /// In 2003, a group of scientists in Switzerland set out to answer some intriguing questions with implications for the way oil and gas reserves are discovered and produced. Research conducted by Dr. Stefan Dangel at the University of Zurich had highlighted a strong and consistent empirical relationship between low-frequency spectral anomalies in seismic background wavefields and geological characteristics of a collection of reservoirs, mainly in the Middle East. Similar observations have also been reported in the Russian literature since the early 1990s. Dangel's research was robust by any standard, but focused on one feature in particular: curious amplitude peaks clustered around 3 Hz in surface velocity data measured above hydrocarbon reservoirs.1 The possibility of a universal hydrocarbon-indicator, while attention-grabbing, did not sit well with the real-world complexities that the industry confronts day-to-day. Moreover, the reasons for such features were left largely open. Log in to view this article. Not yet a subscriber? Get started now for immediate access to this content and more. Join Our Newsletter /// Sign-up for World Oil Daily News Latest News ///More
<urn:uuid:fc7cd691-b421-4b23-97e0-098dc8265b7f>
CC-MAIN-2017-04
http://www.worldoil.com/magazine/2007/january-2007/features/passive-low-frequency-spectral-analysis-exploring-a-new-field-in-geophysics
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282926.64/warc/CC-MAIN-20170116095122-00399-ip-10-171-10-70.ec2.internal.warc.gz
en
0.944322
242
2.546875
3
What is the value of investigative journalism in modern society? Nick Davies in his book Flat Earth News highlights the fact that journalism has become merely ‘churnalism’, putting much of the blame on media conglomerates, which are keen on putting advertisers’ interests to the top of their priority list and at the same time applying minimal or no emphasis on producing good quality journalistic material for print and broadcast alike. If the daily news is in a dire state then what chance exists for investigative journalism to survive amidst this ever-changing world of news? Fortunately, investigative journalism is far from churnalism. It requires considerable research and evidential backing in revealing the fraud, corruption or deceit. But it also involves a lot of risk which, not only at times jeopardises the lives of the journalist, but also the lives of their near and dear ones. So, is it worth it? Why is investigation not left up to the police to undertake? Why can’t journalists content themselves with simply news gathering? Are the police happy with investigative work carried out by journalists? What would be the pros and cons of investigative journalism? What is the governing framework within which the police and journalists are required to work? Relevance of investigative journalism: This paper is arguing in favour of investigative journalism without taking into account the risks or perils associated with the profession. Before proceeding or embarking in finding answers to these questions it becomes essential to define what is investigative journalism. In a personal interview conducted by the author, distinguished investigative journalist and author Phillip Knightley, defined it as, ‘it is usually to do with a story and injustice preferably an injustice or something that is wrong in society; which has been there for sometime unnoticed by other ordinary reporters and you as an investigator bring it to the public’s attention to bring about social legal reforms.’ (Phillip Knightley: 2008 ) Hugo (2000:68 ) states how the trend began which justified investigative journalism, ‘The development of investigative journalism in Britain in the 1960s and the 1970s resulted in a spate of inquiries into maladministration and corruption that shocked Britons, who had come to assume that corruption was something that happened only in foreign parts. It justified journalism by demonstrating that the public service could not be trusted to police itself.’ Hugo says that investigations cannot be left solely to the police because the police may not be able to ‘understand’ (Hugo, 2006: 76) the victim’s point of view and may not be able to be ‘objective’ (Hugo, 2006: 76). Yet another advantage journalists have over the police in carrying out investigations is the ability to keep their sources anonymous. This means the sources can offer information to journalists knowing that their identities will not be revealed. This is important as an individual would be unlikely to offer information to the police knowing that he or she may end up in court and open to reproach. Of course, with many investigative reports leading to police investigations this situation is challenged. There have been many instances where the police have attempted to obtain details of sources from journalists. ‘In the Bill Goodman case, the European Human Rights Commission argued that forcing journalists to reveal sources would impair their ability to inform the public: compulsion should only be used in exceptional circumstances.’ (David Spark, 1999: 102). On May 19th 2008, Nina Teggarty (Channel 4, 2008), highlights the growing concern amongst leading journalists and civil liberties groups who warn against “a serious threat to the future of investigative journalism..” This article raises concerns over the fact that the Greater Manchester Police (GMP), has demanded Shiv Malik’s notebook containing confidential information relating to his work with a former Islamist activist, Hassan Butt. Shiv Malik is an investigative journalist who has been working as an investigator in extremist activities. In an interview with Nina, Shiv Malik explains that, ‘journalists aren’t the police, we are not paid to do their job and we wouldn’t ask for example the police to give up their own sources to scrutiny in the public.’ In a court hearing later this week, Shiv Malik could be ordered to hand over the notes under the counter terrorism legislation, thus revealing his sources. If the police win the case it will be a landmark decision. Future investigative reports would be made much more difficult, if not impossible, to develop because nobody will come forward in the public interest for fear of exposure. Also, the difference between the way the police and journalists operate is that they work under different ethical frameworks. Ethics deals with how to distinguish between right and wrong. It can be said that journalists work on the thin line between legal and illegal, and they often cross it. This means that journalists can obtain information, often by deception, using false identities and using hidden cameras and/or microphones. This is an area of concern. Does getting a good or important story justify the way in which the reporter gets his or her information? The answer to this question is perhaps an essay in its own right, but it does highlight the fact that journalists can play detective using a different set of rules than the police. Investigative journalists have uncovered many instances of ‘maladministration’ (Hugo, 2000: 68), injustice in society, fraud, scandal and illegal dealings, but it is worth mentioning that the police have also suffered at their hands. In reference to the Stephen Lawrence murder case in 1993, ‘A catalogue of incompetence was cited including the failure of the police to treat Lawrence’s condition or the incident as an emergency since they assumed Lawrence had provoked the fight because he was black. Prompted by the lobbying work of Stephen Lawrence’s parents, British journalists took the lead in exposing the incompetence, evasiveness and indifference of the Metropolitan Police.’ (Hugo, 2000: 101). The Stephen Lawrence case and the journalistic investigation that followed, shows another value of journalism in modern society – that is, ‘the concept of objectivity’ (Hugo, 2000:74). A journalist’s job as Fox, 1996 (in Hugo 2000: 76) states, is ‘to give us the facts and it is to seek to explain these facts by attempting to uncover the reasons why events occurred in the way they did’. It just gives the true story and has the evidence to back the story up. Later, in the essay it is discussed how some of that objectivity was lost and the effect that this had on the public. An interview with BBC journalist Mark Daly, conducted by John Mair, at Coventry Conversations, brings home the fact that investigative journalism is rewarding. Daly’s ‘Secret Policeman’ reports, which revealed racism within the Greater Manchester Police (GMP) service, UK’s largest police force, won several awards. He said, ‘to go as an undercover agent in the police was a task that no one had ever done in the world.’ But before setting off to do this perilous task Daly says, ‘we had to satisfy a team of lawyers at the BBC, proving to them that we have a Prima Facie case.’ The evidence was there and Daly was confident to go ahead with it as he knew that the BBC, being a large organisation would be able to protect him if he was discovered. Daly says, the GMP, ‘arrested me for producing false documents: I had had to have laser surgery to pass the eye test. You are not allowed to have laser surgery in joining the police.’ Daly agrees it was incorrect. In addition, in order to get this story, Mark used hidden cameras and microphones during his training period to secretly record the behaviour of the trainers and new recruits. For the ‘Secret Policeman’ Mark Daly, it seems as though the results justified the means. Daly said in the interview, as a consequence of his report ten officers were forced to resign their posts and a national investigation into racism in the police was carried out. Good investigative reports are done by journalists who follow a number of fundamental principles. These are stated by the Canadian Association of Journalists and are defined as truthfulness, transparency, accountability, fairness and privacy. Good investigative reports clearly show what evidence they have, and ensure that different and independent sources corroborate the important elements of the story. John Pilger in his book, Tell me no lies says that the term investigative journalism did not exist when he began his career. According to him the term investigative journalism, ‘became fashionable in the 1960s and 1970s with investigations like Seymour Hersh’s expose of the My Lai massacre in Vietnam, Phillip Keighley’s account of the London Sunday Time’s tortuous disclosure of the scandal of the drug thalidomide and the Watergate scandal,’ (Pilger: 2005, xiv). It was the first time the mass media were exposed to scandals and other wrongdoings that affected the public interest. Investigative journalists were held in high regard and seen as champions of the people. This view, coupled with the public demand for these types of public interest stories led to increased pressure on journalists to uncover them. But the popularity had its downside as well as this led to an increase in poor reporting. Tessa Mayes, awarding winning journalist, summarised this point speaking at Goodenough College, London, ‘The journalist’s weapon, the pen, was now all too often turned against their own profession.’ Mayes cited the Jason Blair fraud case, the Valerie Plame scandal (‘Plamegate’) and ‘sexed-up’ dossier on Iraq WMDs. ‘While each case had its own intricacies, they all spurred investigations into the investigations. Now the reporters were being reported on. The consequence of all this is that now the onus is on journalists to reveal their sources.’ Excellent investigative reports are not uncommon, but also there are many instances of journalists getting it wrong or even fabricating reports to grab headlines. In a personal interview conducted by the author, Professor Richard Keeble, City University, said, that in his opinion, ‘there is still some good investigative work going on but given the enormous expansion of the media the internet, the enormous size of the newspapers these days, it’s right to say that the overall picture is very disappointing.’ Prof. Keeble, remarks that although there is a need for good investigations there is also the unavoidable fact that the appetite for investigative journalism has been affected by the changes that the way media organisations are financed: Prof. Keeble quotes Nick Davies in Flat Earth News, ‘many media organisations don’t have the desire or the resources to invest in it.’ Prof. Keeble goes on to suggest, ‘But finance is not the only issue here. There is also the intent’. Increasingly over the years, media generated more and more revenue from advertising. Today this is big business. The focus of today’s media is to appeal to the masses with short turn-around stories that generate readership and therefore the audience for advertisers. This affects investigative journalism in two ways: firstly, those media organisations often do not want the overhead of long investigations, and secondly, that they do not wish to alienate their corporate sponsors. Prof. Keeble explains how the mainstream media relies so heavily on advertising. One such group of advertisers is estate agents. Most of the scandals in local property have gone largely unreported because of the close ties between estate agents and local newspapers. According to Prof. Keeble, another factor hindering investigative journalism would be fear of the law. For example, ‘investigations of Robert Maxwell was obstructed because he just flung libel writs around to prevent journalists from investigating his activities relating to his pension funds of his companies so libel can impeach investigative journalists. Obviously we have the official secrets act now which are appearing to impede journalists and not only that the Anti- terrorism Act also are threatening journalists investigations. It seems that journalists interviewing a suspected terrorist are now being forced to hand over their interview tapes and notes. So, there are increasing legal threats to investigative journalism.’ According to McNae’s (2007), The Official Secrets Act 1989 makes it an offence to make an unauthorised disclosure which is, or is likely to be, damaging, of information on security, intelligence, defence, or international relations or of information entrusted in confidence by Britain to another country. Also, the Anti-Terrorism, Crime and Security Act 2001 amended the 2000 Act by introducing a new offence, wit severe penalties, of withholding information on suspected terrorist offences. ‘Withholding’ information includes failing to volunteer it (Welsh et.al, 2007:92). According to Prof. Keeble, for these reasons, it seems that investigative journalism articles tend to appear in specific print media (examples of these are ‘The Spectator’ and ‘Private Eye’) or tend to be reported in public interest documentaries (examples of these are ‘Watchdog’ and ‘Real Story’). Before looking into the challenges faced by investigative journalism let’s determine why investigative journalists do what they do. Why do they risk not only their lives and also very often the lives of their families in their curious attempt to dig deeper? Is their work appreciated? Prof. Keeble explains, ‘it’s this thing called the public interest when some element of corruption is suspected then it’s the responsibility of the journalist to investigate…journalists operate at the margins of legality in, sort of, spaces left by the authorities. I guess one of the main functions of the media is to expose corruption, hypocrisy and the like… I guess there is also challenge: it can be exciting and it is certainly better than writing the odd press release.’ (Richard Keeble: 2008 ) Philip Knightley, who has done some excellent work in this field, disagrees that investigative journalists have to necessarily work undercover as ‘everything is written down somewhere because of the bureaucracy…so I am not happy about the idea that investigative journalism involves going undercover.’ It is obvious that investigative journalism has an important role to play in our society. The fact that journalists are prepared to go to such lengths in the public interest means that organisations or individuals are always accountable for their actions. Sadly, the problem is that only a small proportion of society really appreciates investigative journalism. In the main people do not watch programmes such as Panorama or Watchdog. Neither do they buy newspapers for the in-depth journalistic investigative stories. The most popular papers are tabloids. Society as a whole needs to be educated about the role that investigative journalism. Journalists, often referred as the ‘Fourth Estate’, provide a public service keeping governments and organisations in check not allowing any abuse paper. Perhaps the value of investigative journalism is undersold. According to Prof. Keeble, ‘the media underestimates the intelligence of the audience and properly marketed good investigative journalism would attract appropriate audiences.’ Investigative journalists have to be careful how they work. They also need to be accountable. Most journalists work under very clear journalistic principles and as a result get good reports that make a clear difference. A good report may change a government, put criminals behind bars or cause an organisation to completely change the way it runs. There has been much evidence to show how a good investigative report has brought about social change. It’s value is clearly visible. Burgh, Hugo de. (2000), Investigative Journalism, London: Routledge. Canadian Association of Journalists. (2004), Statement of Principles for Investigative Journalism [online] available from <http://www.caj.ca/principles/principles-statement-investigative-2004.htm> Davies, Nick. (2008), Flat Earth News, London: Chatto & Windus. Hochuli, A. (2006), What Has Happened to Investigative Journalism [online] available from http://culturewars.org.uk/2006-01/portmayes.htm, Keeble, R. (2001), The Newspaper Handbook, London: Routledge. McCarthy, Kieren. (Date not given), Phillip Knightley.com [online] available from <http://www.phillipknightley.com/pages/biography.html> Pilger, John. (2005), Tell Me No Lies, London: Vintage. Randall, D. (2000), The Universal Journalist, London: Routledge. Shepherd, Rob. (2007), Roger Cook [online] available from http://broadcastnow.co.uk/news/interviews/roger_cook.html Spark, David. (1999), Investigative reporting, A study in technique, Oxford: Focal Press. Teggarty, Nina. (2008), Threat to Investigative journalism [online] available from http://www.channel4.com/news/articles/society/law_order/threat+to+investigative+journalism/2219747 Welsh, T. & Greenwood, W. (2005), McNae’s Essential Law for Journalists, N. York: Ox UP.
<urn:uuid:f3056d99-3e05-402e-b841-94d2b8a9de78>
CC-MAIN-2017-04
https://cjr08.wordpress.com/2008/06/06/what-is-the-value-of-investigative-journalism-in-modern-society/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00472-ip-10-171-10-70.ec2.internal.warc.gz
en
0.956995
3,595
2.5
2
I’ve created a task for all my ESL students out there in terms of what we’ve covered in grammar. This is not in podcast form; only in writing. I’m going to list the rules for you down below, then I will post a picture and you’ll have to fill in the blank with what’s happening. Present Simple & Present Continuous a. We usually watch films on Saturday afternoons. b. He’s reading a magazine. c. What are you cooking? d. I make dinner every Friday. Routine actions normally have an adverb of frequency: never, often, sometimes, frequently, usually, always, every Actions happening now have indicators: at the moment, right now, now. Look at the picture and fill in the text down below. Or, you can post on my blog or FB page: Arsenio’s TOEIC-TOEFL-IELTS Malorie: Hey, Sarah! What ________________ you _______________(do)? Sarah: I ________________(drive) to the football match. Malorie: ________________ you usually _______________ (drive) to the games? Or do you take public transportation? Sarah: No, I sometimes _______________(go) with mark if he’s free, but today he has to _______________ (stay) home. His mother usually _____________(stay) home every Friday night, but this evening she __________________(go) to dinner. Mark doesn’t have the car to pick me up. Malorie: Awwwwww bummer. Well, I hope all is well!
<urn:uuid:440fd7cd-386c-40ae-a3b7-4d00bb7995d2>
CC-MAIN-2022-33
https://thearseniobuckshow.wordpress.com/2018/06/05/arsenios-esl-task-episode-1-present-simple-continuous/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00277.warc.gz
en
0.877625
357
2.734375
3
Summer events planned for youth Passages, Inc., will offer a Summer Youth Enrichment Program. The program is designed for individuals, ages 12 to 22, with intellectual disabilities who are enrolled in a Whitley County school program. The program focuses on practicing and enhancing academic, social, and vocational skills in a structured and “fun” environment. The summer program will be held at the First Church of God, 1200 W. Depoy Dr. in Columbia City.Sessions dates are: Session I: June 16 through July 3Session II: July 8 through July 25Sessions will meet Mondays through Fridays 8:30 a.m. to 3 p.m.Activities will include field trips to local and area attractions, as well as games, arts and crafts, and many other summer events. Students will also benefit from enhanced academic experiences, including studies in science, history and patriotism, the arts, and career exploration.According to a parent, for approximately two weeks after the program was over, his child kept asking if they were going to go to Passages for the summer program.In the past, teachers have said students were able to transition back to the classroom easier after participating in this structured program throughout the summer. Class size is limited. Application deadline is Friday, May 30. For more information, or to reserve your spot for a session, contact Pam Hoyt, program coordinator at 244-9327, or email at firstname.lastname@example.org.The program is funded in part by the United Way of Whitley County.Passages, Inc. is a nonprofit corporation established in Columbia City in 1954. The organization currently serves more than 175 individuals; offering a variety of community-based programs and services for individuals with an intellectual disability. For more information on Passages, Inc. visit www.passagesinc.org or contact Jason Meyer at 244-9310 or email@example.com.
<urn:uuid:aa19b603-ee38-4a59-9343-c14c244fd352>
CC-MAIN-2017-04
http://www.thepostandmail.com/content/summer-events-planned-youth?quicktabs_2=2
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280761.39/warc/CC-MAIN-20170116095120-00099-ip-10-171-10-70.ec2.internal.warc.gz
en
0.958207
394
1.632813
2
God, sex, drugs and politics A new vaccine sparks controversy “THE governor's action seems to signify that God's moral law regarding sex outside of marriage can be transgressed without consequence.” Those words came this week from Rick Scarborough of Vision America, a Christian lobbying group. The US Pastor Council and various Republican politicians have piled in too. Usually, this sort of right-wing animosity is reserved for the likes of Hillary Clinton, but this week's attack was on one of the Christian right's favourite sons: Rick Perry, the deeply religious Republican governor of Texas. His offence? Promoting the use of a highly effective new vaccine that is sure to save many women from a nasty form of cancer. But to some people, it is tantamount to encouraging promiscuity. On February 2nd Mr Perry bypassed the state legislature and mandated vaccination against the human papilloma virus (HPV). His order would affect all girls entering sixth grade (at about 11) unless their parents opt out in writing. Perhaps 20m Americans carry this virus, making it one of the most common sexually transmitted diseases in the country. Most strains are harmless, but a few can lead to cervical cancer, the second most deadly form of cancer in women. Merck, a drugs giant, won federal approval for its HPV vaccine last year and has been lobbying for its adoption. California, South Dakota, New Hampshire and other states now make it available. Virginia, Maryland and the District of Columbia are considering the matter, while Washington state this week announced a voluntary scheme. But no state has mandated its use until now. Why did Mr Perry do it? Some sneerers have noted that his former chief of staff is now a lobbyist for Merck. Others think that the wily governor is distancing himself from his conservative base so that he can make a plausible vice-presidential candidate in 2008. But there is another explanation: that he had the courage to make a politically difficult but sound policy decision. As he said this week: “If the medical community developed a vaccine for lung cancer,” he asked, “would the same critics oppose it, claiming it would encourage smoking?” This article appeared in the United States section of the print edition under the headline "God, sex, drugs and politics" From the February 10th 2007 edition Discover stories from this section and more in the list of contentsExplore the edition The Inflation Reduction Act is weakened by big compromises, but is still a big deal The inquiry seems to involve documents brought to Florida from the White House Extremists are adapting to a post-January 6th America—by entering electoral politics
<urn:uuid:8c1efd84-e450-479c-a32c-e660c8503e27>
CC-MAIN-2022-33
https://www.economist.com/united-states/2007/02/08/god-sex-drugs-and-politics
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00278.warc.gz
en
0.968333
547
1.53125
2
Trump (again) threatens to seal U.S.-Mexico border. Can he do it? In a series of tweets fired off Friday morning, President Donald Trump revived a long-standing threat to seal off the southern border if Mexico doesn't do more to stop U.S.-bound migrants crossing through that country. "If Mexico doesn’t immediately stop ALL illegal immigration coming into the United States throug our Southern Border, I will be CLOSING…the Border, or large sections of the Border, next week," he tweeted. Trump's threat revived the same questions posed when Trump first made his threat in October: Can he do it? And should he do it? The first question, whether Trump can close the border, is a simple one to answer: yes. "You can certainly stop entries coming across the border, whether it's truck traffic or cars or pedestrians," said Gil Kerlikowske, former commissioner of U.S. Customs and Border Protection. "Logistically, that's possible. The gates are closed, and you say, 'Right now we're not taking entry.'" Other presidents have done that in extreme situations. President George W. Bush partially closed the southern border following the 9-11 terrorist attacks, requiring full inspections of every incoming pedestrian and vehicle that led to days-long waits. President Ronald Reagan temporarily closed ports of entry along the southern border in 1985 following the kidnapping and murder of a DEA agent in Mexico. But those closures were not nearly as controversial, leaving a Trump border closure open to potential lawsuits. The Trump administration has already been shot down by federal judges over multiple attempts to limit migrants trying to cross the southern border, including an attempt to cut off asylum for migrants who enter the country illegally. The broader question of whether Trump should close the border is even more difficult to answer. Peter Boogaard, a former Homeland Security official in the Obama administration now working for fwd.us, an immigration advocacy group, said closing down border crossings with America's third-largest trading partner would be a crippling blow to the economy. He said the damage would be felt throughout the country, not just the four border states. "We're talking about more than a billion dollars a day, including a huge percentage of the food that is in grocery stores," Boogaard said. "We’re literally talking about an inability to stock grocery stores because of the amount of produce that comes from Mexico." The U.S. State Department estimates that $1.7 billion in goods and services, and hundreds of thousands of people, legally cross the border each day. The U.S. gets nearly half (44 percent) of its fresh fruits and vegetables from Mexico, according to the U.S. Department of Agriculture. Even groups that generally approve of Trump's efforts to limit legal and illegal immigration have expressed reservations over his threats to seal the border. "There's a reason ports of entry exist," Mark Krikorian, executive director of the Center for Immigration Studies, said in October after Trump first started making the threats. That’s why Krikorian said Trump cannot seriously be considering a full closure of the border. Krikorian believed Trump is either bluffing to get Mexico to stop the caravan for him, or simply using the threat to rile up the Republican base. "This really does exemplify how Trump articulates what a lot of ordinary people feel when they see," a caravan of migrants headed toward the U.S., he said. "That's part of his strength — he gives voices to the reaction that normal people have to news events." It's also unclear how closing ports of entry would stop migrants seeking to request asylum in the U.S. The Trump administration has limited the number of migrants who can request asylum each day at the ports of entry along the southern border. But U.S. law allows migrants to enter the country illegally and then request asylum. That's what tens of thousands of Central Americans have been doing in recent months. They've been crossing the border between ports of entry, seeking out a Border Patrol agent, and requesting asylum that way. "Sealing the border does absolutely nothing to impact this," Boogaard said. Trump's threat was part of an administration-wide offensive to portray the situation along the southern border as a "crisis" that has reached the "breaking point," with the heads of the Department of Homeland Security and Customs and Border Protection claiming the flood of asylum-seeking migrants from Central America has overwhelmed the U.S. capacity to process them.
<urn:uuid:d8e8ad94-ce20-401d-8f80-e977dd634fd4>
CC-MAIN-2022-33
https://www.theleafchronicle.com/story/news/politics/2018/10/18/trump-threatens-seal-southern-border-over-migrant-caravan-can-he/1684534002/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00067.warc.gz
en
0.962848
940
1.570313
2
- Created: 27 February 2012 In every nation of the world, women's shelters and crisis centres provide lifesaving refuge and support for women and children fleeing violence, helping them to plan for safety and new lives. In the conference workshops, plenary sessions, caucuses and regional meetings, delegates from 96 countries will share their knowledge, experiences, and effective strategies on wide-ranging issues addressed by women's shelters, refuges, transition houses and crisis centers. Bringing together more than 1,400 delegates and women world leaders from 96 countries, including Canada, Australia, Sweden, New Zealand, Denmark, Mexico, Iran, Mongolia, Egypt and the Syrian Arab Republic, and four U.S. territories, and 220 presenters from 35 countries, the 2nd World Conference of Women’s Shelters provides a unique opportunity to create an ongoing global network that supports survivors worldwide. Survivors and advocates will share experiences and learn from each other, which will strengthen everyone's approaches to addressing violence against women in communities globally. Attending advocates include leading international experts in healthcare and public policy; survivors and family members who have been struck by tragedy; and front-line advocates doing life-saving work everyday. We are also pleased to be joined by Her Royal Highness Crown Princess Mary of Denmark; Actress, Avon Ambassador and Honorary Chair of the Avon Foundation, Reese Witherspoon; Actor, Athlete, Activist, Author Victor Rivers; Singer and champion for women’s rights, Gloria Gaynor; Senior Advisor to President Barack Obama and Chair of the White House Council on Women and Girls, Valerie Jarrett; Director of the United States Department of Justice's Office on Violence Against Women, Susan B. Carbon; United States Ambassador-at-Large for Global Women's Issues, Ambassador Melanne Verveer; corporate leaders from The Allstate Foundation, Avon and Avon Foundation for Women, and Verizon Foundation. Global ambassadors and dignitaries joining Crown Princess Mary of Denmark include Ambassador Peter Taksøe-Jensen (Danish Embassy), Ambassador Shankar Sharma (Nepal Embassy), Ambassador Constancio Pinto (Timor-Leste), and Secretary of State for the Promotion of Equality Idelta Rodrigues (Timor-Leste).
<urn:uuid:a29ef12e-175d-4902-abcf-d498591ad1d7>
CC-MAIN-2017-04
http://gnws.org/en/news/gnws-news/58-2ndwcws.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00184-ip-10-171-10-70.ec2.internal.warc.gz
en
0.927542
460
1.734375
2
You might be surprised, as we were, to view the results of a CNN/Opinion Research poll released Friday, April 1. A survey of more than 1,000 adult Americans last month indicated that seven percent believe public broadcasting funding accounts for more than half the federal budget. Sixteen percent think more than one-fifth of the federal budget is directed toward NPR and PBS. Seven in ten Americans think more than one percent of their tax dollars are used for public broadcasting. The actual percentage is so small, we had to look it up. In fiscal year 2010, the federal budget was $3.456 trillion. The allocation to the Corporation for Public Broadcasting (CPB), the private, non-profit corporation that funds NPR and PBS stations, was $506 million. That amounts to about .00014 percent of the federal budget. One seventieth of one percent. CPB funding is a tiny line item in the federal budget — grossly disproportionate to any number of other spending programs that have been discussed far less on the House floor or in the news media — but, in the budgets of more than 1,300 public broadcasting stations, including WFIU, federal support is essential. And in recent weeks, it has been under attack like never before. Federal funding for CPB has been threatened in Congress numerous times, but here’s how H.R. 1076, which passed the House on March 17, was without precedent: it directly affected station choice. In essence, the bill “to defund NPR” would have minimal effect on NPR (only 4% of NPR’s budget comes directly from federal sources), but would have drastic effects on local stations, particularly rural ones with small populations whose operating budgets often rely heavily on federal funds. H.R. 1076 would take away from local stations the right to use federal funds to purchase programs from external sources (not just NPR’s): that could mean, on your local station, Morning Edition, All Things Considered, Car Talk, This American Life, A Prairie Home Companion, Performance Today, BBC World Service, and in some cases, locally produced programs. And, through legislation, the bill would in effect empower legislators to make programming decisions on behalf of the American public. This scenario was exactly the one that the original Public Broadcasting Act of 1967 was crafted to avoid – placing a firewall between politicians and journalism, so that the political interests could not “buy” journalistic reporting. Amidst all the bad faith and misunderstanding, the CNN poll carries a glimmer of hope: 53 percent of those polled would like to see federal funding for public broadcasting maintained or increased. You can make your opinion on this topic known to legislators. Was H.R. 1076 acceptable to you? Do you want to see similar legislation move through the Senate and onto the President’s desk? You can speak your mind at 170MillionAmericans.org.
<urn:uuid:2673dc1d-69c7-4ae2-ba72-8d2b72457665>
CC-MAIN-2017-04
http://indianapublicmedia.org/radio/perception-problem/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00085-ip-10-171-10-70.ec2.internal.warc.gz
en
0.957182
596
2.21875
2
Detroit's Beautiful Ruins Back to the Drawing Board Goodbye, 2 Columbus CircleA refurbished New York landmark fails to preserve the spirit of the original. Bringing Brutal BackCan restoring Paul Rudolph's signature building rescue the architect's reputation as well? Renzo Piano's California Adventure Part II Renzo Piano's California AdventurePart I: Los Angeles. Obama's ColumnsWhat they really symbolized. Instant HouseWould you buy a home that was made in a factory? Thom Mayne's U.S. Federal Building Forgotten EeroRediscovering Saarinen, the man behind the Gateway Arch, Dulles, and some really comfy chairs. Mirror ImagesWhy is symmetry so satisfying? The Architecture of Edward HopperExploring the painter's buildings, from his famous diner to his cottage on Cape Cod. Borrowed TimeHow do you build a public library in the age of Google? Back to the Drawing Board Louis Kahn and the lost art of sketching. That Dogma Won't HuntWhy are architects so obsessed with schools and rules? Can Cities Save the Planet?Scientists are skeptical. Planners are hopeful. The Dutch are pragmatic. For Sale: 200,000-Square-Foot BoxWhat happens to the store when Wal-Mart leaves town? Renzo Piano's California AdventurePart II: San Francisco. Renzo Piano's California Adventure Part I The Pentagon MemorialIt tells us more than we need to know—and, at the same time, not enough. Thom Mayne's U.S. Federal BuildingCan the iconoclastic architect design a structure that's cheap, green, and secure? Buckminster Fuller Inventor, tireless proselytizer, inspirational cult figure, something of a flimflammer. If You Build ItTwo visions of the ideal city rise in the Persian Gulf. Architecture Is a Team SportSo why do they award the Pritzker Prize to just one person? The Architecture of Edward Hopper
<urn:uuid:051f1c13-3920-4d84-8898-d2b52f57d54c>
CC-MAIN-2017-04
http://www.slate.com/articles/arts/architecture.3.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280929.91/warc/CC-MAIN-20170116095120-00425-ip-10-171-10-70.ec2.internal.warc.gz
en
0.876959
423
1.59375
2
I want to configure apache listening to 2 different documentRoot. Is this is possible ??? I know their is a way using alias but I have question their as well Suppose I 've two different path /www/htdocs/top => in this directory and below this directory all the css & js & other common files are be placed /www1/htdocs/abc => here I've all the source code for different projects Now my question is from /abc/1.html If i include some css or js it not refereeing the file from the /www/htdocs/top directory. Do I need to copy that /top directory in /www1/htdocs also ? When I tried with copying that folder I can able to view the pages clearly. Is their is a way that with the help of configuration I can reuse the code without duplicating ? Please suggest how to handle this case ? Thanks in advance
<urn:uuid:536df471-e74c-454c-b939-d9798c3dab25>
CC-MAIN-2016-44
https://community.apachefriends.org/f/viewtopic.php?f=5&t=26811
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719547.73/warc/CC-MAIN-20161020183839-00395-ip-10-171-6-4.ec2.internal.warc.gz
en
0.937156
199
1.726563
2
Tips to Keep Your House Cool Summers in the Northern Virginia area are notorious for being hot, sticky, and generally pretty miserable (but we still love them). This means you have to crank up the air conditioner and watch as your energy bills increase. But there are alternative ways to keep your house cool that can make a noticeable difference in your energy bills. Here are a few tips to keep your Fairfax, Arlington, or Loudoun County home comfortable in the summer – try them and see what works the best for your home! Close Blinds or Shades Your home can noticeably heat up just from sunlight coming through your windows. If you have any windows that get direct sunlight make sure to cover them during the day. You’ve probably noticed the change in temperature when you walk past these particular windows. You get a lot of heat from the sun, especially in the summer, and that can throw off your AC’s cooling ability. Closing your shades, blinds, or other window coverings will keep the heat out so your air conditioner doesn’t have to over-exert itself. But don’t feel like you have to avoid sunlight all together! Just cover up windows that have a lot of sunlight pouring in to keep your house cool. You can still have other windows open to get natural light in your home, just make sure these are getting indirect as opposed to direct sunlight. Seal Windows and Doors Put your hand around the edges of your windows and doors. Can you feel a rush of hot air? That means heat is getting into your home and making your air conditioner work extra hard. Replacing your windows and doors is one of the more expensive ways to keep your house cool, but it can end up saving you money in energy costs in the long-run. If you don’t want to get replacements, a little sealing can be effective as well. Weather stripping is useful as well as sealing up any cracks. The better the hot air stays out and the cold air stays in, the better you will keep your house cool! Maintain Your Air Conditioner An air conditioner that isn’t well-maintained won’t run at its optimal level. If you don’t already do so, make sure to regularly maintain your air conditioner. You can do this by changing your filters, getting professional inspections, and repairing problems when they arise instead of waiting for a breakdown. If you take care of your equipment, it will last you for many more years. At John Nugent & Sons, we make it easy. We provide HVAC service agreements in Northern Virginia so we come check out your equipment twice a year to make sure everything is working as it should. That way we can catch small problems before they turn into huge disasters. We Can Help Keep Your House Cool in Northern Virginia Whether you live in McLean, Arlington, Vienna, or anywhere in Northern Virginia, John Nugent & Sons can provide all the services you need to keep your house cool. In addition to the brand name air conditioners we carry, our Sterling, VA HVAC experts also perform installation, replacement, and repair services. We’ll make sure your equipment is working so you can keep your house cool. Contact us to learn more about our services today!
<urn:uuid:244e32b6-0af3-4a7e-b56b-355c80e15f0d>
CC-MAIN-2022-33
https://www.nugentsons.com/blog/keep-your-house-cool
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00076.warc.gz
en
0.943978
680
1.632813
2
Internet is crowded with tons of useful and useless websites. Internet can provide information to solve your problems and helps you to complete your projects to connect people around the globe. It is also infamous for the notorious websites and wrong information. How to find the right one without visiting the worst one. Here are a list of websites that grab your eyeballs. Some websites names are very easy to remember some are very difficult. Some websites are very familiar to us, like Facebook, Google, Wikipedia, etc. Here is a list of websites that grabs your attention and at the time they will get the attention they deserve. The list is arranged in alphabetical order and the website’s address is placed inside the brackets. To go to the website click the website link. - About.me – (https://about.me/) – Create a page to promote who you are and what you do in one link. - Adobe Color – (https://color.adobe.com) – Create colourschemes with the colourwheel or browse thousands of colourcombinations. - Alexa – (https://www.alexa.com/) – Boost traffic and revenue with a full suite of SEO and competitor analysis tools. Find traffic statistics for any site using Alexa’s advanced analysis tool (https://www.alexa.com/siteinfo). Understand rank, sources of traffic, competitors, top keywords and more. - Allrecipes – (https://www.allrecipes.com/) – Find and share everyday cooking inspiration on Allrecipes. Discover recipes, cooks, videos, and how-tos based on the food you love and the friends you follow. Alternativeto– (https://alternativeto.net/) – Find related apps and software for Windows, Mac, Linux, iPhone, iPad, Android, Android Tablets, Web Apps, Online and Windows Tablets. - Anchor – (https://anchor.fm/) – The easiest way to make a podcast. - Archive – (https://archive.is/) – It takes a ‘snapshot’ of a webpage that will always be online even if the original page disappears ( a time capsule for web pages). - Autodraw – (https://www.autodraw.com/) – Fast drawing for everyone. Boredbutton– (https://www.boredbutton.com/) – Clicking the red button on the website will instantly take you to one of the hundreds of interactive websites specially selected to alleviate boredom. Builtwith– (https://builtwith.com/) – Web technology information profiler tool. Find out what a website is built with. - Buffer – (https://buffer.com/) – Buffer makes it easy for businesses and marketing teams to schedule posts, analyze performance, and manage all their accounts in one place. - Calm – (https://www.calm.com/) – Learn the life-changing skill of meditation. Copychar– (http://copychar.cc/) – A basic app that allows you to find and copy special characters to your clipboard. Click or tap on a character and it will be copied to your clipboard. - Codeacademy – (https://www.codeacademy.com/) – Learn the technical skills you need for the job you want. - Canva – (https://www.canva.com/) – Create beautiful designs with your team. Use Canvas drag-and-drop feature and layouts to design, share and print business cards, logos and presentations. - Cheatography – (https://www.cheatography.com/) – Build Cheat Sheets and share. - Clipconverter – (https://www.clipconverter.cc/) – A free online media conversion application, which allows you to record, convert and download nearly any audio or video URL to common formats. - Copypastecharacter – (https://www.copypastecharacter.com/) – Allows you to add awesome emojis, icons, and symbols to your emails, tweets, and docs. - Cvmkr – (https://cvmkr.com/) – Create beautiful, professional resumes in minutes, free. - Couchsurfing – (https://www.couchsurfing.com/) – Couchsurfing is a vibrant travel community of over 14 million locals and - Corrupt-a-file – (https://corrupt-a-file.net/) – This site can corrupt any kind of file: Word, Excel, archives, MP3 or anything. Just submit your files and they corrupt them! - Downforeveryoneorjustme – (https://downforeveryoneorjustme.com/) – Easy way to check if a site is down for everyone or just for you. - Duolingo – (https://www.duolingo.com/) – Learn a language for free. - Duckduckgo – (https://duckduckgo.com/) – The search engine that doesn’t track you. - Dead Man’s Switch – (https://www.deadmansswitch.net/) – If something does happen, you might wish there was something you had told the people around you. You write a few e-mails and choose the recipients. These emails are stored privately until they’re sent. Your switch will email you every so often, asking you to show that you are fine by clicking a link. If something were to… happen… to you, your switch would then send the emails you wrote to the recipients you specified. - Deviantart – (https://www.deviantart.com/) – The largest online social community for artists and art enthusiasts, allowing people to connect through the creation and sharing of art. Differencebetween– (http://www.differencebetween.net/) – Difference Between Similar Terms and Objects. - Distrowatch – (https://distrowatch.com/) – News and feature lists of Linux and BSD distributions. - Documentaryheaven– (https://documentaryheaven.com/) – This site filled with thousands of free online documentaries just waiting to be seen, so come on in and embrace the knowledge. - Draw – (https://www.draw.io/) – A free online diagram software for making flowcharts, process diagrams, org charts, UML, ER - Eggtimer – (http://e.ggtimer.com/) – E.ggTimer.com is a simple countdown timer or egg timer. Set a time and bookmark it for repeated use. Everytimezone– (https://everytimezone.com/) – Never warp your brain with time zone math again. - Fontstruct – (https://fontstruct.com/) – Build, Share, Download Fonts. - File pizza – (https://file.pizza/) – Free peer-to-peer file transfers in your browser. The site never stores anything. - File – (https://www.file.io/) – Convenient, anonymous and secure file sharing. - Fiverr – (https://www.fiverr.com/) – Fiverr is the world’s largest freelance services marketplace for lean entrepreneurs to focus on growth & create a successful business at affordable costs. - Flightstats – (https://www.flightstats.com/v2/) – Track real-time flight status, departures and arrivals, airport delays, and airport information using FlightStats Global Flight Tracker. - Grammarly – (https://www.grammarly.com/) – Grammarly English grammar correction app, corrects everything you type is clear, effective, and mistake-free. - Gtmetrix – (https://gtmetrix.com) – GTmetrix gives you insight into how well your site loads and provides actionable recommendations on how to optimize it. - Goodreads – (https://www.goodreads.com/) – Find and read more books you’ll love, and keep track of the books you want to read. The world’s largest community of book lovers. - Glassdoor – (https://www.glassdoor.com) – Search millions of jobs and get the inside scoop on companies with employee reviews, personalized salary tools, and more. - Giphy – (https://giphy.com/) – GIPHY is the top source for the best & newest GIFs & Animated Stickers online. Getnotify– (https://www.getnotify.com/) – GetNtoify is a Free Email Tracking & Email Marketing service which tracks your sent emails and get email open and email read confirmation. - Hulu – (https://www.hulu.com/) – Watch TV shows and movies online. Homestyler– (https://www.homestyler.com) – Visualize your floor plan and home design in 3D with real-life furniture. - Honey – (https://www.joinhoney.com/) – Honey finds you the Internet’s best discount codes. Howstuffworks– (https://www.howstuffworks.com/) – HowStuffWorks explains thousands of topics, ranging from the flu to black holes to conspiracy theories, with video and illustrations. Howtopronounce– (https://www.howtopronounce.com) – Free Online Audio Pronunciation, multilingual dictionaries. - Instructables – (https://www.instructables.com/) – Learn how to make anything with Instructables. Easy to follow step-by-step instructions, online classes, and a vibrant maker community. Imdb– (https://www.imdb.com/) – The most popular and authoritative source for movie, TV and celebrity content. - Imgur – (https://imgur.com/) – Imgur is the easiest way to discover everything from funny pics of pets, tofunny GIFs from movies and TV shows and LOL pics. - Jotti – (https://virusscan.jotti.org) – J otti’smalware scan is a free service that lets you scan suspicious files with several anti-virus programs. - Khanacademy – (https://www.khanacademy.org/) – You can learn anything. Expert-created content and resources for every course and level. - Listly – (https://list.ly/) – Make cool lists and fun listicles on Listly, share them on Facebook and Twitter. - Lynda – (https://www.lynda.com/) – Learn software, creative, and business skills to achieve your personal and professional goals. Join today to get access to thousands of courses. - Mailstrom – (https://mailstrom.co/) – The faster way to clean out your inbox, remove hundreds of messages from your inbox all at once. - Marker – (http://marker.to/) – Marker.to is a simple annotation tool. - Mathway – (https://www.mathway.com) – Free math problem solver answers your algebra homework questions with step-by-step explanations. - Meetup – (https://www.meetup.com/) – Find Meetups so you can do more of what matters to you. Or create your own group and meet people near you who share your interests. - Mockaroo – (https://mockaroo.com/) – A free test data generator and API mocking tool – Mockaroo lets you create custom CSV, JSON, SQL, and Excel datasets to test and demo your software. Mefancy– (https://www.mefancy.com/) – Web BasedText HTML tools, you can easily manipulate reform change your text and htmlfiles. - Netflix – (https://www.netflix.com) – Watch Netflix movies & TV shows online or stream right to your smart TV, game console, PC, Mac, mobile, tablet and more. - Whitesmoke – (http://www.whitesmoke.com/) – WhiteSmoke is a grammar checker, spell checker, style checker in a single package.
<urn:uuid:f6985411-8210-40d7-9d48-49727bc85fb1>
CC-MAIN-2022-33
https://coolefriend.com/the-101-incredibly-useful-websites-you-wish-you-knew-earlier/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573667.83/warc/CC-MAIN-20220819100644-20220819130644-00074.warc.gz
en
0.831941
2,552
1.664063
2
Studying Our Past to Preserve Our Future Spearheaded by the East Side Neighborhood Association and the Pueblo Historic Preservation Commission (HPC), the City of Pueblo pursued a certified local government (CLG) grant to develop an historical and architectural context of Pueblo’s East Side Neighborhood. The city received the grant on January 9, 2008, and in March contracted Historitecture to research and write the document. Historians Jeffrey DeHerrera and Adam Thomas completed the booklet, entitled "A Place Set Apart: The History and Architecture of Pueblo’s East Neighborhood," in July 2009. The context represented one of the most significant scholarly works ever written about the little-researched neighborhood and served as a catalyst for historic preservation and other renewal projects. Making Sound Preservation Decisions Acting upon the inertia of the context’s emerging success, even in the draft stages, the City of Pueblo immediately proposed to intensively survey 45 properties in the East Side Neighborhood area. Again the City applied for a CLG grant, which it received in January 2009. And again it contracted Historitecture to conduct the survey, the results of which are presented in the Pueblo East Side Architectural and Historical Selective Inventory Report.
<urn:uuid:0f9054c2-34f9-4ba5-b00d-cd2b691fbcf1>
CC-MAIN-2017-04
http://pueblo.us/355/East-Side-Historic-Building-Inventory
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280730.27/warc/CC-MAIN-20170116095120-00244-ip-10-171-10-70.ec2.internal.warc.gz
en
0.936779
264
2.546875
3
A sufficient cause interaction between two exposures signals the presence of individuals for whom the outcome would occur only under certain values of the two exposures. When the outcome is dichotomous and all exposures are categorical, then under certain no confounding assumptions, empirical conditions for sufficient cause interactions can be constructed based on the sign of linear contrasts of conditional outcome probabilities between differently exposed subgroups, given confounders. It is argued that logistic regression models are unsatisfactory for evaluating such contrasts, and that Bernoulli regression models with linear link are prone to misspecification. We therefore develop semiparametric tests for sufficient cause interactions under models which postulate probability contrasts in terms of a finite-dimensional parameter, but which are otherwise unspecified. Estimation is often not feasible in these models because it would require nonparametric estimation of auxiliary conditional expectations given high-dimensional variables. We therefore develop ‘multiply robust tests’ under a union model that assumes at least one of several working submodels holds. In the special case of a randomized experiment or a family-based genetic study in which the joint exposure distribution is known by design or Mendelian inheritance, the procedure leads to asymptotically distribution-free tests of the null hypothesis of no sufficient cause interaction. Double robustness; Effect modification; Gene-environment interaction; Gene-gene interaction; Semiparametric inference; Sufficient cause; Synergism Collaborative double robust targeted maximum likelihood estimators represent a fundamental further advance over standard targeted maximum likelihood estimators of a pathwise differentiable parameter of a data generating distribution in a semiparametric model, introduced in van der Laan, Rubin (2006). The targeted maximum likelihood approach involves fluctuating an initial estimate of a relevant factor (Q) of the density of the observed data, in order to make a bias/variance tradeoff targeted towards the parameter of interest. The fluctuation involves estimation of a nuisance parameter portion of the likelihood, g. TMLE has been shown to be consistent and asymptotically normally distributed (CAN) under regularity conditions, when either one of these two factors of the likelihood of the data is correctly specified, and it is semiparametric efficient if both are correctly specified. In this article we provide a template for applying collaborative targeted maximum likelihood estimation (C-TMLE) to the estimation of pathwise differentiable parameters in semi-parametric models. The procedure creates a sequence of candidate targeted maximum likelihood estimators based on an initial estimate for Q coupled with a succession of increasingly non-parametric estimates for g. In a departure from current state of the art nuisance parameter estimation, C-TMLE estimates of g are constructed based on a loss function for the targeted maximum likelihood estimator of the relevant factor Q that uses the nuisance parameter to carry out the fluctuation, instead of a loss function for the nuisance parameter itself. Likelihood-based cross-validation is used to select the best estimator among all candidate TMLE estimators of Q0 in this sequence. A penalized-likelihood loss function for Q is suggested when the parameter of interest is borderline-identifiable. We present theoretical results for “collaborative double robustness,” demonstrating that the collaborative targeted maximum likelihood estimator is CAN even when Q and g are both mis-specified, providing that g solves a specified score equation implied by the difference between the Q and the true Q0. This marks an improvement over the current definition of double robustness in the estimating equation literature. We also establish an asymptotic linearity theorem for the C-DR-TMLE of the target parameter, showing that the C-DR-TMLE is more adaptive to the truth, and, as a consequence, can even be super efficient if the first stage density estimator does an excellent job itself with respect to the target parameter. This research provides a template for targeted efficient and robust loss-based learning of a particular target feature of the probability distribution of the data within large (infinite dimensional) semi-parametric models, while still providing statistical inference in terms of confidence intervals and p-values. This research also breaks with a taboo (e.g., in the propensity score literature in the field of causal inference) on using the relevant part of likelihood to fine-tune the fitting of the nuisance parameter/censoring mechanism/treatment mechanism. asymptotic linearity; coarsening at random; causal effect; censored data; crossvalidation; collaborative double robust; double robust; efficient influence curve; estimating function; estimator selection; influence curve; G-computation; locally efficient; loss-function; marginal structural model; maximum likelihood estimation; model selection; pathwise derivative; semiparametric model; sieve; super efficiency; super-learning; targeted maximum likelihood estimation; targeted nuisance parameter estimator selection; variable importance The current goal of initial antiretroviral (ARV) therapy is suppression of plasma human immunodeficiency virus (HIV)-1 RNA levels to below 200 copies per milliliter. A proportion of HIV-infected patients who initiate antiretroviral therapy in clinical practice or antiretroviral clinical trials either fail to suppress HIV-1 RNA or have HIV-1 RNA levels rebound on therapy. Frequently, these patients have sustained CD4 cell counts responses and limited or no clinical symptoms and, therefore, have potentially limited indications for altering therapy which they may be tolerating well despite increased viral replication. On the other hand, increased viral replication on therapy leads to selection of resistance mutations to the antiretroviral agents comprising their therapy and potentially cross-resistance to other agents in the same class decreasing the likelihood of response to subsequent antiretroviral therapy. The optimal time to switch antiretroviral therapy to ensure sustained virologic suppression and prevent clinical events in patients who have rebound in their HIV-1 RNA, yet are stable, is not known. Randomized clinical trials to compare early versus delayed switching have been difficult to design and more difficult to enroll. In some clinical trials, such as the AIDS Clinical Trials Group (ACTG) Study A5095, patients randomized to initial antiretroviral treatment combinations, who fail to suppress HIV-1 RNA or have a rebound of HIV-1 RNA on therapy are allowed to switch from the initial ARV regimen to a new regimen, based on clinician and patient decisions. We delineate a statistical framework to estimate the effect of early versus late regimen change using data from ACTG A5095 in the context of two-stage designs. In causal inference, a large class of doubly robust estimators are derived through semiparametric theory with applications to missing data problems. This class of estimators is motivated through geometric arguments and relies on large samples for good performance. By now, several authors have noted that a doubly robust estimator may be suboptimal when the outcome model is misspecified even if it is semiparametric efficient when the outcome regression model is correctly specified. Through auxiliary variables, two-stage designs, and within the contextual backdrop of our scientific problem and clinical study, we propose improved doubly robust, locally efficient estimators of a population mean and average causal effect for early versus delayed switching to second-line ARV treatment regimens. Our analysis of the ACTG A5095 data further demonstrates how methods that use auxiliary variables can improve over methods that ignore them. Using the methods developed here, we conclude that patients who switch within 8 weeks of virologic failure have better clinical outcomes, on average, than patients who delay switching to a new second-line ARV regimen after failing on the initial regimen. Ordinary statistical methods fail to find such differences. This article has online supplementary material. Causal inference; Double robustness; Longitudinal data analysis; Missing data; Rubin causal model; Semiparametric efficient estimation In this paper, we are concerned with how to select significant variables in semiparametric modeling. Variable selection for semiparametric regression models consists of two components: model selection for nonparametric components and select significant variables for parametric portion. Thus, it is much more challenging than that for parametric models such as linear models and generalized linear models because traditional variable selection procedures including stepwise regression and the best subset selection require model selection to nonparametric components for each submodel. This leads to very heavy computational burden. In this paper, we propose a class of variable selection procedures for semiparametric regression models using nonconcave penalized likelihood. The newly proposed procedures are distinguished from the traditional ones in that they delete insignificant variables and estimate the coefficients of significant variables simultaneously. This allows us to establish the sampling properties of the resulting estimate. We first establish the rate of convergence of the resulting estimate. With proper choices of penalty functions and regularization parameters, we then establish the asymptotic normality of the resulting estimate, and further demonstrate that the proposed procedures perform as well as an oracle procedure. Semiparametric generalized likelihood ratio test is proposed to select significant variables in the nonparametric component. We investigate the asymptotic behavior of the proposed test and demonstrate its limiting null distribution follows a chi-squared distribution, which is independent of the nuisance parameters. Extensive Monte Carlo simulation studies are conducted to examine the finite sample performance of the proposed variable selection procedures. Nonconcave penalized likelihood; SCAD; efficient score; local linear regression; partially linear model; varying coefficient models There is an active debate in the literature on censored data about the relative performance of model based maximum likelihood estimators, IPCW-estimators, and a variety of double robust semiparametric efficient estimators. Kang and Schafer (2007) demonstrate the fragility of double robust and IPCW-estimators in a simulation study with positivity violations. They focus on a simple missing data problem with covariates where one desires to estimate the mean of an outcome that is subject to missingness. Responses by Robins, et al. (2007), Tsiatis and Davidian (2007), Tan (2007) and Ridgeway and McCaffrey (2007) further explore the challenges faced by double robust estimators and offer suggestions for improving their stability. In this article, we join the debate by presenting targeted maximum likelihood estimators (TMLEs). We demonstrate that TMLEs that guarantee that the parametric submodel employed by the TMLE procedure respects the global bounds on the continuous outcomes, are especially suitable for dealing with positivity violations because in addition to being double robust and semiparametric efficient, they are substitution estimators. We demonstrate the practical performance of TMLEs relative to other estimators in the simulations designed by Kang and Schafer (2007) and in modified simulations with even greater estimation challenges. censored data; collaborative double robustness; collaborative targeted maximum likelihood estimation; double robust; estimator selection; inverse probability of censoring weighting; locally efficient estimation; maximum likelihood estimation; semiparametric model; targeted maximum likelihood estimation; targeted minimum loss based estimation; targeted nuisance parameter estimator selection For nonnegative measurements such as income or sick days, zero counts often have special status. Furthermore, the incidence of zero counts is often greater than expected for the Poisson model. This article considers a doubly semiparametric zero-inflated Poisson model to fit data of this type, which assumes two partially linear link functions in both the mean of the Poisson component and the probability of zero. We study a sieve maximum likelihood estimator for both the regression parameters and the nonparametric functions. We show, under routine conditions, that the estimators are strongly consistent. Moreover, the parameter estimators are asymptotically normal and first-order efficient, while the nonparametric components achieve the optimal convergence rates. Simulation studies suggest that the extra flexibility inherent from the doubly semiparametric model is gained with little loss in statistical efficiency. We also illustrate our approach with a dataset from a public health study. Asymptotic efficiency; Partly linear model; Sieve maximum likelihood estimator; Zero-inflated Poisson model A primary focus of an increasing number of scientific studies is to determine whether two exposures interact in the effect that they produce on an outcome of interest. Interaction is commonly assessed by fitting regression models in which the linear predictor includes the product between those exposures. When the main interest lies in the interaction, this approach is not entirely satisfactory because it is prone to (possibly severe) bias when the main exposure effects or the association between outcome and extraneous factors are misspecified. In this article, we therefore consider conditional mean models with identity or log link which postulate the statistical interaction in terms of a finite-dimensional parameter, but which are otherwise unspecified. We show that estimation of the interaction parameter is often not feasible in this model because it would require nonparametric estimation of auxiliary conditional expectations given high-dimensional variables. We thus consider ‘multiply robust estimation’ under a union model that assumes at least one of several working submodels holds. Our approach is novel in that it makes use of information on the joint distribution of the exposures conditional on the extraneous factors in making inferences about the interaction parameter of interest. In the special case of a randomized trial or a family-based genetic study in which the joint exposure distribution is known by design or by Mendelian inheritance, the resulting multiply robust procedure leads to asymptotically distribution-free tests of the null hypothesis of no interaction on an additive scale. We illustrate the methods via simulation and the analysis of a randomized follow-up study. Double robustness; Gene-environment interaction; Gene-gene interaction; Longitudinal data; Semiparametric inference Missing data are common in medical and social science studies and often pose a serious challenge in data analysis. Multiple imputation methods are popular and natural tools for handling missing data, replacing each missing value with a set of plausible values that represent the uncertainty about the underlying values. We consider a case of missing at random (MAR) and investigate the estimation of the marginal mean of an outcome variable in the presence of missing values when a set of fully observed covariates is available. We propose a new nonparametric multiple imputation (MI) approach that uses two working models to achieve dimension reduction and define the imputing sets for the missing observations. Compared with existing nonparametric imputation procedures, our approach can better handle covariates of high dimension, and is doubly robust in the sense that the resulting estimator remains consistent if either of the working models is correctly specified. Compared with existing doubly robust methods, our nonparametric MI approach is more robust to the misspecification of both working models; it also avoids the use of inverse-weighting and hence is less sensitive to missing probabilities that are close to 1. We propose a sensitivity analysis for evaluating the validity of the working models, allowing investigators to choose the optimal weights so that the resulting estimator relies either completely or more heavily on the working model that is likely to be correctly specified and achieves improved efficiency. We investigate the asymptotic properties of the proposed estimator, and perform simulation studies to show that the proposed method compares favorably with some existing methods in finite samples. The proposed method is further illustrated using data from a colorectal adenoma study. Doubly robust; Missing at random; Multiple imputation; Nearest neighbor; Nonparametric imputation; Sensitivity analysis We consider a class of semiparametric normal transformation models for right censored bivariate failure times. Nonparametric hazard rate models are transformed to a standard normal model and a joint normal distribution is assumed for the bivariate vector of transformed variates. A semiparametric maximum likelihood estimation procedure is developed for estimating the marginal survival distribution and the pairwise correlation parameters. This produces an efficient estimator of the correlation parameter of the semiparametric normal transformation model, which characterizes the bivariate dependence of bivariate survival outcomes. In addition, a simple positive-mass-redistribution algorithm can be used to implement the estimation procedures. Since the likelihood function involves infinite-dimensional parameters, the empirical process theory is utilized to study the asymptotic properties of the proposed estimators, which are shown to be consistent, asymptotically normal and semiparametric efficient. A simple estimator for the variance of the estimates is also derived. The finite sample performance is evaluated via extensive simulations. Asymptotic normality; Bivariate failure time; Consistency; Semiparametric efficiency; Semiparametric maximum likelihood estimate; Semiparametric normal transformation Regression methods for survival data with right censoring have been extensively studied under semiparametric transformation models such as the Cox regression model and the proportional odds model . However, their practical application could be limited due to possible violation of model assumption or lack of ready interpretation for the regression coefficients in some cases. As an alternative, in this paper, the proportional likelihood ratio model introduced by Luo and Tsai is extended to flexibly model the relationship between survival outcome and covariates. This model has a natural connection with many important semiparametric models such as generalized linear model and density ratio model, and is closely related to biased sampling problems. Compared with the semiparametric transformation model, the proportional likelihood ratio model is appealing and practical in many ways because of its model flexibility and quite direct clinical interpretation. We present two likelihood approaches for the estimation and inference on the target regression parameters under independent and dependent censoring assumptions. Based on a conditional likelihood approach using uncensored failure times, a numerically simple estimation procedure is developed by maximizing a pairwise pseudo-likelihood . We also develop a full likelihood approach and the most efficient maximum likelihood estimator is obtained by a profile likelihood. Simulation studies are conducted to assess the finite-sample properties of the proposed estimators and compare the efficiency of the two likelihood approaches. An application to survival data for bone marrow transplantation patients of acute leukemia is provided to illustrate the proposed method and other approaches for handling non-proportionality. The relative merits of these methods are discussed in concluding remarks. conditional likelihood; pairwise pseudo-likelihood; profile likelihood; proportional likelihood ratio model; right-censored data Most statistical methods for microarray data analysis consider one gene at a time, and they may miss subtle changes at the single gene level. This limitation may be overcome by considering a set of genes simultaneously where the gene sets are derived from prior biological knowledge. We call a pathway as a predefined set of genes that serve a particular cellular or physiological function. Limited work has been done in the regression settings to study the effects of clinical covariates and expression levels of genes in a pathway on a continuous clinical outcome. A semiparametric regression approach for identifying pathways related to a continuous outcome was proposed by Liu et al. (2007), who demonstrated the connection between a least squares kernel machine for nonparametric pathway effect and a restricted maximum likelihood (REML) for variance components. However, the asymptotic properties on a semiparametric regression for identifying pathway have never been studied. In this paper, we study the asymptotic properties of the parameter estimates on semiparametric regression and compare Liu et al.’s REML with our REML obtained from a profile likelihood. We prove that both approaches provide consistent estimators, have n convergence rate under regularity conditions, and have either an asymptotically normal distribution or a mixture of normal distributions. However, the estimators based on our REML obtained from a profile likelihood have a theoretically smaller mean squared error than those of Liu et al.’s REML. Simulation study supports this theoretical result. A profile restricted likelihood ratio test is also provided for the non-standard testing problem. We apply our approach to a type II diabetes data set (Mootha et al., 2003). Gaussian random process; Kernel machine; Mixed model; Pathway analysis; Profile likelihood; Restricted maximum likelihood In social and health sciences, many research questions involve understanding the causal effect of a longitudinal treatment on mortality (or time-to-event outcomes in general). Often, treatment status may change in response to past covariates that are risk factors for mortality, and in turn, treatment status may also affect such subsequent covariates. In these situations, Marginal Structural Models (MSMs), introduced by Robins (1997), are well-established and widely used tools to account for time-varying confounding. In particular, a MSM can be used to specify the intervention-specific counterfactual hazard function, i.e. the hazard for the outcome of a subject in an ideal experiment where he/she was assigned to follow a given intervention on their treatment variables. The parameters of this hazard MSM are traditionally estimated using the Inverse Probability Weighted estimation (IPTW, van der Laan and Petersen (2007), Robins et al. (2000b), Robins (1999), Robins et al. (2008)). This estimator is easy to implement and admits Wald-type confidence intervals. However, its consistency hinges on the correct specification of the treatment allocation probabilities, and the estimates are generally sensitive to large treatment weights (especially in the presence of strong confounding), which are difficult to stabilize for dynamic treatment regimes. In this paper, we present a pooled targeted maximum likelihood estimator (TMLE, van der Laan and Rubin (2006)) for MSM for the hazard function under longitudinal dynamic treatment regimes. The proposed estimator is semiparametric efficient and doubly robust, hence offers bias reduction and efficiency gain over the incumbent IPTW estimator. Moreover, the substitution principle rooted in the TMLE potentially mitigates the sensitivity to large treatment weights in IPTW. We compare the performance of the proposed estimator with the IPTW and a non-targeted substitution estimator in a simulation study. The inverse of the nonparametric information operator is key to finding doubly robust estimators and the semiparametric efficient estimator in missing data problems. It is known that no closed-form expression for the inverse of the nonparametric information operator exists when missing data form nonmonotone patterns. Neumann series is usually applied to approximate the inverse. However, Neumann series approximation is only known to converge in L2 norm, which is not sufficient for establishing statistical properties of the estimators yielded from the approximation. In this article, we show that L∞ convergence of the Neumann series approximations to the inverse of the non-parametric information operator and to the efficient scores in missing data problems can be obtained under very simple conditions. This paves the way to the study of the asymptotic properties of the doubly robust estimators and the locally semiparametric efficient estimator in those difficult situations. Auxiliary information; Induction; Rate of convergence; Weighted estimating equation We study the regression relationship among covariates in case-control data, an area known as the secondary analysis of case-control studies. The context is such that only the form of the regression mean is specified, so that we allow an arbitrary regression error distribution, which can depend on the covariates and thus can be heteroscedastic. Under mild regularity conditions we establish the theoretical identifiability of such models. Previous work in this context has either (a) specified a fully parametric distribution for the regression errors, (b) specified a homoscedastic distribution for the regression errors, (c) has specified the rate of disease in the population (we refer this as true population), or (d) has made a rare disease approximation. We construct a class of semiparametric estimation procedures that rely on none of these. The estimators differ from the usual semiparametric ones in that they draw conclusions about the true population, while technically operating in a hypothetic superpopulation. We also construct estimators with a unique feature, in that they are robust against the misspecification of the regression error distribution in terms of variance structure, while all other nonparametric effects are estimated despite of the biased samples. We establish the asymptotic properties of the estimators and illustrate their finite sample performance through simulation studies, as well as through an empirical example on the relation between red meat consumption and heterocyclic amines. Our analysis verified the positive relationship between red meat consumption and two forms of HCA, indicating that increased red meat consumption leads to increased levels of MeIQA and PhiP, both being risk factors for colorectal cancer. Computer software as well as data to illustrate the methodology are available at http://wileyonlinelibrary.com/journal/rss-datasets. Biased samples; Case-control study; Heteroscedastic regression; Secondary analysis; Semiparametric estimation We consider causal inference in randomized survival studies with right censored outcomes and all-or-nothing compliance, using semiparametric transformation models to estimate the distribution of survival times in treatment and control groups, conditional on covariates and latent compliance type. Estimands depending on these distributions, for example, the complier average causal effect (CACE), the complier effect on survival beyond time t, and the complier quantile effect are then considered. Maximum likelihood is used to estimate the parameters of the transformation models, using a specially designed expectation-maximization (EM) algorithm to overcome the computational difficulties created by the mixture structure of the problem and the infinite dimensional parameter in the transformation models. The estimators are shown to be consistent, asymptotically normal, and semiparametrically efficient. Inferential procedures for the causal parameters are developed. A simulation study is conducted to evaluate the finite sample performance of the estimated causal parameters. We also apply our methodology to a randomized study conducted by the Health Insurance Plan of Greater New York to assess the reduction in breast cancer mortality due to screening. All-or-nothing compliance; Complier average causal effect; Instrumental variable; Randomized trials; Survival analysis; Semiparametric transformation models Researchers often seek robust inference for a parameter through semiparametric estimation. Efficient semiparametric estimation currently requires theoretical derivation of the efficient influence function (EIF), which can be a challenging and time-consuming task. If this task can be computerized, it can save dramatic human effort, which can be transferred, for example, to the design of new studies. Although the EIF is, in principle, a derivative, simple numerical differentiation to calculate the EIF by a computer masks the EIF’s functional dependence on the parameter of interest. For this reason, the standard approach to obtaining the EIF relies on the theoretical construction of the space of scores under all possible parametric submodels. This process currently depends on the correctness of conjectures about these spaces, and the correct verification of such conjectures. The correct guessing of such conjectures, though successful in some problems, is a nondeductive process, i.e., is not guaranteed to succeed (e.g., is not computerizable), and the verification of conjectures is generally susceptible to mistakes. We propose a method that can deductively produce semiparametric locally efficient estimators. The proposed method is computerizable, meaning that it does not need either conjecturing, or otherwise theoretically deriving the functional form of the EIF, and is guaranteed to produce the desired estimates even for complex parameters. The method is demonstrated through an example. Compatibility; Deductive procedure; Gateaux derivative; Influence function; Semiparametric estimation; Turing machine Rationale and Objectives Semiparametric methods provide smooth and continuous receiver operating characteristic (ROC) curve fits to ordinal test results and require only that the data follow some unknown monotonic transformation of the model's assumed distributions. The quantitative relationship between cutoff settings or individual test-result values on the data scale and points on the estimated ROC curve is lost in this procedure, however. To recover that relationship in a principled way, we propose a new algorithm for “proper” ROC curves and illustrate it by use of the proper binormal model. Materials and Methods Several authors have proposed the use of multinomial distributions to fit semiparametric ROC curves by maximum-likelihood estimation. The resulting approach requires nuisance parameters that specify interval probabilities associated with the data, which are used subsequently as a basis for estimating values of the curve parameters of primary interest. In the method described here, we employ those “nuisance” parameters to recover the relationship between any ordinal test-result scale and true-positive fraction, false-positive fraction, and likelihood ratio. Computer simulations based on the proper binormal model were used to evaluate our approach in estimating those relationships and to assess the coverage of its confidence intervals for realistically sized datasets. In our simulations, the method reliably estimated simple relationships between test-result values and the several ROC quantities. The proposed approach provides an effective and reliable semiparametric method with which to estimate the relationship between cutoff settings or individual test-result values and corresponding points on the ROC curve. Receiver operating characteristic (ROC) analysis; proper binormal model; likelihood ratio; test-result scale; maximum likelihood estimation (MLE) Due to the need to evaluate the effectiveness of community-based programs in practice, there is substantial interest in methods to estimate the causal effects of community-level treatments or exposures on individual level outcomes. The challenge one is confronted with is that different communities have different environmental factors affecting the individual outcomes, and all individuals in a community share the same environment and intervention. In practice, data are often available from only a small number of communities, making it difficult if not impossible to adjust for these environmental confounders. In this paper we consider an extreme version of this dilemma, in which two communities each receives a different level of the intervention, and covariates and outcomes are measured on a random sample of independent individuals from each of the two populations; the results presented can be straightforwardly generalized to settings in which more than two communities are sampled. We address the question of what conditions are needed to estimate the causal effect of the intervention, defined in terms of an ideal experiment in which the exposed level of the intervention is assigned to both communities and individual outcomes are measured in the combined population, and then the clock is turned back and a control level of the intervention is assigned to both communities and individual outcomes are measured in the combined population. We refer to the difference in the expectation of these outcomes as the marginal (overall) treatment effect. We also discuss conditions needed for estimation of the treatment effect on the treated community. We apply a nonparametric structural equation model to define these causal effects and to establish conditions under which they are identified. These identifiability conditions provide guidance for the design of studies to investigate community level causal effects and for assessing the validity of causal interpretations when data are only available from a few communities. When the identifiability conditions fail to hold, the proposed statistical parameters still provide nonparametric treatment effect measures (albeit non-causal) whose statistical interpretations do not depend on model specifications. In addition, we study the use of a matched cohort sampling design in which the units of different communities are matched on individual factors. Finally, we provide semiparametric efficient and doubly robust targeted MLE estimators of the community level causal effect based on i.i.d. sampling and matched cohort sampling. causal effect; causal effect among the treated; community-based intervention; efficient influence curve; environmental confounding Semiparametric linear transformation models have received much attention due to its high flexibility in modeling survival data. A useful estimating equation procedure was recently proposed by Chen et al. (2002) for linear transformation models to jointly estimate parametric and nonparametric terms. They showed that this procedure can yield a consistent and robust estimator. However, the problem of variable selection for linear transformation models is less studied, partially because a convenient loss function is not readily available under this context. In this paper, we propose a simple yet powerful approach to achieve both sparse and consistent estimation for linear transformation models. The main idea is to derive a profiled score from the estimating equation of Chen et al. (2002), construct a loss function based on the profile scored and its variance, and then minimize the loss subject to some shrinkage penalty. Under regularity conditions, we have shown that the resulting estimator is consistent for both model estimation and variable selection. Furthermore, the estimated parametric terms are asymptotically normal and can achieve higher efficiency than that yielded from the estimation equations. For computation, we suggest a one-step approximation algorithm which can take advantage of the LARS and build the entire solution path efficiently. Performance of the new procedure is illustrated through numerous simulations and real examples including one microarray data. Censored survival data; Linear transformation models; LARS; Shrinkage; Variable selection We consider tests of hypotheses when the parameters are not identifiable under the null in semiparametric models, where regularity conditions for profile likelihood theory fail. Exponential average tests based on integrated profile likelihood are constructed and shown to be asymptotically optimal under a weighted average power criterion with respect to a prior on the nonidentifiable aspect of the model. These results extend existing results for parametric models, which involve more restrictive assumptions on the form of the alternative than do our results. Moreover, the proposed tests accommodate models with infinite dimensional nuisance parameters which either may not be identifiable or may not be estimable at the usual parametric rate. Examples include tests of the presence of a change-point in the Cox model with current status data and tests of regression parameters in odds-rate models with right censored data. Optimal tests have not previously been studied for these scenarios. We study the asymptotic distribution of the proposed tests under the null, fixed contiguous alternatives and random contiguous alternatives. We also propose a weighted bootstrap procedure for computing the critical values of the test statistics. The optimal tests perform well in simulation studies, where they may exhibit improved power over alternative tests. Change-point models; contiguous alternative; empirical processes; exponential average test; nonstandard testing problem; odds-rate models; optimal test; power; profile likelihood We study a class of semiparametric skewed distributions arising when the sample selection process produces non-randomly sampled observations. Based on semiparametric theory and taking into account the symmetric nature of the population distribution, we propose both consistent estimators, i.e. robust to model mis-specification, and efficient estimators, i.e. reaching the minimum possible estimation variance, of the location of the symmetric population. We demonstrate the theoretical properties of our estimators through asymptotic analysis and assess their finite sample performance through simulations. We also implement our methodology on a real data example of ambulatory expenditures to illustrate the applicability of the estimators in practice. robustness; selection bias; semiparametric model; skewness; skew-symmetric distribution In longitudinal and repeated measures data analysis, often the goal is to determine the effect of a treatment or aspect on a particular outcome (e.g., disease progression). We consider a semiparametric repeated measures regression model, where the parametric component models effect of the variable of interest and any modification by other covariates. The expectation of this parametric component over the other covariates is a measure of variable importance. Here, we present a targeted maximum likelihood estimator of the finite dimensional regression parameter, which is easily estimated using standard software for generalized estimating equations. The targeted maximum likelihood method provides double robust and locally efficient estimates of the variable importance parameters and inference based on the influence curve. We demonstrate these properties through simulation under correct and incorrect model specification, and apply our method in practice to estimating the activity of transcription factor (TF) over cell cycle in yeast. We specifically target the importance of SWI4, SWI6, MBP1, MCM1, ACE2, FKH2, NDD1, and SWI5. The semiparametric model allows us to determine the importance of a TF at specific time points by specifying time indicators as potential effect modifiers of the TF. Our results are promising, showing significant importance trends during the expected time periods. This methodology can also be used as a variable importance analysis tool to assess the effect of a large number of variables such as gene expressions or single nucleotide polymorphisms. targeted maximum likelihood; semiparametric; repeated measures; longitudinal; transcription factors This paper investigates the appropriateness of the integration of flexible propensity score modeling (nonparametric or machine learning approaches) in semiparametric models for the estimation of a causal quantity, such as the mean outcome under treatment. We begin with an overview of some of the issues involved in knowledge-based and statistical variable selection in causal inference and the potential pitfalls of automated selection based on the fit of the propensity score. Using a simple example, we directly show the consequences of adjusting for pure causes of the exposure when using inverse probability of treatment weighting (IPTW). Such variables are likely to be selected when using a naive approach to model selection for the propensity score. We describe how the method of Collaborative Targeted minimum loss-based estimation (C-TMLE; van der Laan and Gruber, 2010) capitalizes on the collaborative double robustness property of semiparametric efficient estimators to select covariates for the propensity score based on the error in the conditional outcome model. Finally, we compare several approaches to automated variable selection in low-and high-dimensional settings through a simulation study. From this simulation study, we conclude that using IPTW with flexible prediction for the propensity score can result in inferior estimation, while Targeted minimum loss-based estimation and C-TMLE may benefit from flexible prediction and remain robust to the presence of variables that are highly correlated with treatment. However, in our study, standard influence function-based methods for the variance underestimated the standard errors, resulting in poor coverage under certain data-generating scenarios. C-TMLE; IPTW; variable reduction Most randomized efficacy trials of interventions to prevent HIV or other infectious diseases have assessed intervention efficacy by a method that either does not incorporate baseline covariates, or that incorporates them in a non-robust or inefficient way. Yet, it has long been known that randomized treatment effects can be assessed with greater efficiency by incorporating baseline covariates that predict the response variable. Tsiatis et al. (2007) and Zhang et al. (2008) advocated a semiparametric efficient approach, based on the theory of Robins et al. (1994), for consistently estimating randomized treatment effects that optimally incorporates predictive baseline covariates, without any parametric assumptions. They stressed the objectivity of the approach, which is achieved by separating the modeling of baseline predictors from the estimation of the treatment effect. While their work adequately justifies implementation of the method for large Phase 3 trials (because its optimality is in terms of asymptotic properties), its performance for intermediate-sized screening Phase 2b efficacy trials, which are increasing in frequency, is unknown. Furthermore, the past work did not consider a right-censored time-to-event endpoint, which is the usual primary endpoint for a prevention trial. For Phase 2b HIV vaccine efficacy trials, we study finite-sample performance of Zhang et al.'s (2008) method for a dichotomous endpoint, and develop and study an adaptation of this method to a discrete right-censored time-to-event endpoint. We show that, given the predictive capacity of baseline covariates collected in real HIV prevention trials, the methods achieve 5-15% gains in efficiency compared to methods in current use. We apply the methods to the first HIV vaccine efficacy trial. This work supports implementation of the discrete failure time method for prevention trials. Auxiliary; Covariate Adjustment; Intermediate-sized Phase 2b Efficacy Trial; Semiparametric Efficiency We consider estimation, from a double-blind randomized trial, of treatment effect within levels of base-line covariates on an outcome that is measured after a post-treatment event E has occurred in the subpopulation 𝒫E,E that would experience event E regardless of treatment. Specifically, we consider estimation of the parameters γ indexing models for the outcome mean conditional on treatment and base-line covariates in the subpopulation 𝒫E,E. Such parameters are not identified from randomized trial data but become identified if additionally it is assumed that the subpopulation 𝒫Ē,E of subjects that would experience event E under the second treatment but not under the first is empty and a parametric model for the conditional probability that a subject experiences event E if assigned to the first treatment given that the subject would experience the event if assigned to the second treatment, his or her outcome under the second treatment and his or her pretreatment covariates. We develop a class of estimating equations whose solutions comprise, up to asymptotic equivalence, all consistent and asymptotically normal estimators of γ under these two assumptions. In addition, we derive a locally semiparametric efficient estimator of γ. We apply our methods to estimate the effect on mean viral load of vaccine versus placebo after infection with human immunodeficiency virus (the event E) in a placebo-controlled randomized acquired immune deficiency syndrome vaccine trial. Counterfactuals; Missing data; Potential outcomes; Principal stratification; Structural model; Vaccine trials
<urn:uuid:ab7f7be9-c27a-4dd7-a626-cff9aa43970d>
CC-MAIN-2017-04
http://pubmedcentralcanada.ca/pmcc/solr/mlt?mltid=2181965&idtype=acc&term=author%3A(%22Rotnitzky%2C+Andrea%22)&pageSize=25
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00329-ip-10-171-10-70.ec2.internal.warc.gz
en
0.872792
8,590
1.5625
2
191 Iconic Buildings to explore in United States Third largest and third most populous country in the world. Size-wise, it is almost as large as the continent of Europe. A 42,000-square-foot gourmet food hall in Downtown Anaheim. It is one of the few remaining packing houses in Orange County, and the only one in Anaheim. The packing house was added to the National Register of Historic Places as the Anaheim Orange and Lemon Association Packing House in 2015. Along with the Packard Building, a renovated 1925 Mission Revival style building, and a farmer's market, it makes up a shopping center called the Anaheim Packing District. The Animas Museum is a small, local history museum owned and operated by the La Plata County Historical Society. Its mission is to collect, preserve and interpret the history, culture and heritage of the San Juan Basin, with a focus on La Plata County. It also offers a wide variety of exhibits and educational programs to people of all ages; a research library and photo archive; a gift shop; award-winning gardens; and a restored pioneer log cabin. The Sanguinetti House Museum and Gardens are open to the public for tours and tea throughout the day. Enjoy our exhibits and treat yourself to a delightfully decadent sweet from the Sanguinetti Chocolate Shoppe. Discover why the Sanguinetti House Museum and Gardens are known as the Jewel of Historic Yuma. The Arizona Science Center is a science museum located in Heritage and Science Park in the heart of downtown Phoenix. Home to over 350 permanent hands-on exhibits, the Center provides 400,000 annual visitors with interactive experiences. It has featured a number of nationally traveling exhibitions. Along with daily demonstrations throughout the Center, the Center provides shows in the Dorrance Planetarium and in a five-story, giant screen IMAX Theater. The Arizona State Capitol in Phoenix, Arizona, United States, was the last home for Arizona's Territorial government, until Arizona became a state in 1912. Initially, all three branches of the new state government occupied the four floors of the statehouse. As the state expanded the branches relocated to adjacent buildings and additions. The 1901 portion of the Capitol is now maintained as the Arizona Capitol Museum with a focus on the history and culture of Arizona. Historic building Augusta Cotton Exchange Buildingwas designed by Enoch William Brown and built in the mid-1880s during a cotton boom. It was added to the National Register of Historic Places on July 20, 1978. It is located on Reynolds Street. This is a historic movie theatre in downtown San Diego, US, built in 1924. It now hosts the Mainly Mozart Festival, special events, and touring companies of Broadway productions. The city of San Diego holds the annual "State of the City" address at the theatre. It was listed on the National Register of Historic Places. Bank of America Plaza is a skyscraper located in between Midtown Atlanta and Downtown Atlanta. At 311.8 m , the tower is the 107th-tallest building in the world. It is the 21st tallest building in the U.S., the tallest building in Georgia, and the tallest building in any U.S. state capital, overtaking the 250 m , 50-story One Atlantic Center in height, which previously held the record as Georgia's tallest building. This is a former mining and recreational property from the 1940s to the 1960s, it is infamous due to its association with Charles Manson and his "family". It is located inside Death Valley National Park in eastern California. There is a small one-room guest house located to the side of the main house. There is also a five-thousand-gallon "swimming pool" made from cement and rock boulders towards the back of the property. The Beaver Meadows Visitor Center is a window into the past. When the center was built in 1967, its design was based on the historic Rocky Mountain National Park Headquarters building that stood at the same site. Today, the visitor center houses a museum that tells the story of the park and its many visitors. In addition to exhibits on the history of the area, It also features interactive displays that allow visitors to explore the park's wildlife and geology. Belvedere Castle is a folly in Central Park in Manhattan. It contains exhibit rooms and an observation deck, and since 1919, it has also housed the official Central Park weather station. Its name comes from belvedere, which means "beautiful view" in Italian. This is a beautiful, three-story, 26 room Victorian House Museum that stands as a memorial to John and Annie Bidwell. John Bidwell was known throughout California and across the nation as an important pioneer, farmer, soldier, statesman, politician and philanthropist. Now a museum and State Historic Park, it is California Historical Landmark #329 and is listed on the National Register of Historic Places. The mansion was a $60,000 project, and was finished in May 1868. Bishop Castle is an "elaborate and intricate "one-man project" named after its constructor, Jim Bishop, that has become a roadside attraction in central Colorado.The "castle" is located in south central Colorado on State Highway 165 in the Wet Mountains of Southern Colorado in the San Isabel National Forest, southwest of Pueblo, Colorado. The Bowles House in Westminster, Colorado is a brick Italianate house built in 1871 by Edward Bruce Bowles and his wife Mahala Elizabeth Longan. Bowles is largely credited for bringing the Colorado & Southern Railroad to the present-day Westminster area. it was originally constructed as a wood frame homestead cabin but was rebuilt entirely from brick in 1876. Brentsville Courthouse and Jail is a historic courthouse and jail located at Brentsville, which was built in 1822, and is a two-story, Federal-style brick building. It features a fanlight over the main entrance, within a keyed, semicircular brick arch and an octagonal-roofed, frame-built cupola. Broadway at the Beach is a shopping center and entertainment complex located in Myrtle Beach, South Carolina. Broadway at the Beach is owned and operated by Burroughs & Chapin. The complex is divided into several distinct zones named New England Fishing Village, Caribbean Village, Charleston Boardwalk, Heroes Harbor and Celebrity Square, a warehouse district-themed nightclub district that stays open later than the rest of the districts.
<urn:uuid:c200b9d7-3bf0-4446-b614-d91fd2657200>
CC-MAIN-2022-33
https://www.travalour.com/destination/235-united-states/79-iconic-buildings-in-united-states
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00275.warc.gz
en
0.969469
1,330
2.453125
2
One of the things that many don’t consider in detail is production set safety, however this is one of the most important factors on any production set. For a moment, consider the number of people on set (from crew to talent), as well as electricity and power running everywhere, vehicles, and more! Today, we’re going to give brief insight into production set safety, in conjunction with our podcast, The Filmmakers Guide to the Industry (aka: FGI). Production Set Safety tips On episode 28 of FGI, we spoke with Fernando Garcia, a rigging grip in Atlanta, GA. The topic we elaborated on is set safety. For those who are unaware, Kevin worked in the grip and electric (G&E) department under Key Grip Josh Long, whom Fernando also worked under. Josh, the co-host of FGI, constantly preaches set safety. Tthis is not because any accidents ever occurred, but rather to ensure one never will happen. Minor accidents happen on set and sometimes they are just that, an accident. What is unfortunate is that major accidents happen. Those are the ones that are typically preventable. Utilizing proper set safety is how all crew are safe from the moment they arrive to when everyone is wrapped. creating a safe production set Two of the main contributors to a safe set are common sense and not rushing. Common sense comes with time, age, and the willingness to speak up if something does not look right. The not rushing part is sometimes the hardest thing to drill into the film crew. Sets can be hectic and loud, and directions can come from your superiors at any time. Rather than rushing to get a job done in 1 minute and running, slow down. It’s okay to take 3 minutes and walk fast, yet be in control of what you are doing. As well as being aware of those around you. There truthfully is no harm to the overall production with taking your time. Kevin, Josh, and Fernando talk about instances that have happened to them (for instance – when Kevin had to leave a production because of an eye injury!). We also discuss how they could have been prevented and tell tale signs of something about to happen. Listen to the full episode below to hear more and learn the importance of set safety.
<urn:uuid:5b9e0ed0-6bdd-405f-b97b-965009e5cc2c>
CC-MAIN-2022-33
https://www.twostoriesmedia.com/2020/08/17/production-set-safety/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00077.warc.gz
en
0.970172
472
2.078125
2
Are "Liquid Ounces" the Same as "Ounces"? The Answer Might Make or Break Your Baking Recipes Take a peek at many of the recipes in the EatingWell archives and you'll likely find mention of "ounces" on the ingredient list. This five-star Cherry-Pineapple Dump Cake recipe, for instance, calls for 16 ounces of cake mix and 20 ounces of crushed pineapple. If those didn't already come in pre-measured cans or boxes, you might think that you'd measure them the same way. We wish we could say, "Yes, it's just that easy!" But, "fluid ounces" actually differ from "ounces." The former measures volume while the later measures weight. Related: 26 Ways to Be a Better Cook Fluid Ounces vs. Ounces in Recipes Consider 1 cup of white sugar and 1 cup of milk. Both take up the same amount of space (volume), but they have very different weights. The sugar clocks in at 7.1 ounces, while the milk weighs 8.6 ounces. Ounces measure weight. The best way to accurately measure ounces is with a kitchen scale. Check out our top Test Kitchen-approved models. Fluid ounces measure volume (the amount of space something takes up). The best way to measure fluid ounces is with a glass measuring cup with tick marks noting the volume along the side. (Psst…use a pro tip from our guide on how to measure ingredients. Make sure you eyeball the level with the cup positioned on a flat surface, such as a counter.) In case you need a refresher, here's a quick guide with common liquid measures and their equivalents in fluid ounces: - 1 tablespoon = ½ fluid ounce - 1 cup = 8 fluid ounces - 1 pint = 16 fluid ounces - 1 quart = 32 fluid ounces - 1 gallon = 128 fluid ounces Using a scale is the most exacting way to measure weight for dry ingredients. To clear up any confusion, here are a couple examples with conversions. One cup of all-purpose flour weighs 4 ½ ounces, not 8 ounces, while 1 cup of chocolate chips weighs 6 ounces. Our baking recipes often call for cup equivalent measurements for ease, so use our level-and-spoon strategy for a fairly accurate weight per cup for items like flour and sugar. But if you come across a recipe that calls for ounces of a dry ingredient, your most accurate option is to dial things in with a kitchen scale. (It's so worth the $30-ish investment!) Water (and similar liquids that are mostly water like milk and strained fruit juices) has the exact same volume measure as weight: 8 fluid ounces (volume) of water weighs 8 ounces. The Bottom Line Unless you're measuring water, do not use liquid measuring cups and dry measuring cups interchangeably, and try to keep the difference between fluid ounces (volume) and ounces (weight) top of mind the next time you preheat your oven.
<urn:uuid:4be022fa-c85f-4666-9134-78cff3e67e2b>
CC-MAIN-2022-33
https://www.eatingwell.com/article/7984934/are-liquid-ounces-the-same-as-ounces/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00065.warc.gz
en
0.937156
623
2.578125
3