text
stringlengths
181
608k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
138k
score
float64
1.5
5
int_score
int64
2
5
B. Chu and C. Wu, Light Scattering. M. Sibayama, H. Jinnai, and T. Hashimoto, Neutron Scattering. H. Itagaki, Fluoresence Spectroscopy. Ando et al., NMR Spectroscopy in Polymer Science. M. Mours and H.H. Winter, Mechanical Spectroscopy of Polymers. A. English and T. Tanaka, Gel-Phase Transitions. Successful characterization of polymer systems is one of the most important objectives of today's experimental research of polymers. Considering the tremendous scientific, technological, and economic importance of polymeric materials, not only for today's applications but for the industry of the 21st century, it is impossible to overestimate the usefulness of experimental techniques in this field. Since the chemical, pharmaceutical, medical, and agricultural industries, as well as many others, depend on this progress to an enormous degree, it is critical to be as efficient, precise, and cost-effective in our empirical understanding of the performance of polymer systems as possible. This presupposes our proficiency with, and understanding of, the most widely used experimental methods and techniques. This book is designed to fulfill the requirements of scientists and engineers who wish to be able to carry out experimental research in polymers using modern methods. Each chapter describes the principle of the respective method, as well as the detailed procedures of experiments with examples of actual applications. Thus, readers will be able to apply the concepts as described in the book to their own experiments. @bul:* Addresses the most important practical techniques for experimental research in the growing field of polymer science - The first well-documented presentation of the experimental methods in one consolidated source - Covers principles, practical techniques, and actual examples - Can be used as a handbook or lab manual for both students and researchers - Presents ideas and methods from an international perspective Techniques addressed in this volume include: subbul:* Light Scattering - Neutron Scattering and X-Ray Scattering - Fluorescence Spectroscopy - NMR on Polymers - Gel Experiments Practitioners involved in the polymer industry; those dealing with the experimental research and development of polymer systems, in both academia (researchers and students in chemistry, materials science, physics, and chemical engineering departments) and in industry, particularly in research and development departments in chemical, pharmaceutical, medical, and agricultural industries. - No. of pages: - © Academic Press 2000 - 2nd December 2012 - Academic Press - eBook ISBN: - Hardcover ISBN: @qu:"This is a timely book in many respects: the field of polymer science is expanding at the moment due to the continuing interest in and development of nanoscale science, and polymeric materials are expected to play a crucial role in this arena. A complete understanding of the structure and physical properties of these materials is essential. The book is well written in its coverage." "Two particular pleasing aspects of the work are the comprehensive reference list associated with each chapter and the prescence of reference from recent years. The devotion of a considerable section of each chapter to the description of actual experiments and the applications of these various techniques is also an extremely useful approach and successfully demonstrates the advantage and disadvantages of each physical technique." "This book is highly recommended as a reading and advanced teaching tool to a wide range of researchers in the general field of polymer science. It is particularly well suited to the non experts in these various fields and serves as a practical guige to characterization." @source:--Craig J. Hawker, IBM Almaden Research Center, JOURNAL OF THE AMERICAN CHEMICAL SOCIETY, Vol. 122, No. 31. @qu:"...an excellent collection of highly authoritative reviews of the experimental methods that are presented...a highly valuable resource for the research libraries of institutions and companies with an interest in polymer science and engineering." @source:--POLYMER NEWS, Vol. 26, No. 3, 2001 Massachusetts Institue of Technology, Cambridge, U.S.A.
<urn:uuid:c992fe6e-4db1-422c-a5f8-2cc1dfb6db45>
CC-MAIN-2017-04
https://www.elsevier.com/books/experimental-methods-in-polymer-science/tanaka/978-0-08-050612-8
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280410.21/warc/CC-MAIN-20170116095120-00458-ip-10-171-10-70.ec2.internal.warc.gz
en
0.906105
844
1.882813
2
Cherax destructorKeith A. Crandall Baillie, Jonathan, and Brian Groombridge. 1996. IUCN Red List of Threatened Animals. Crandall, Keith A., James W. Fetzner, Jr., Carlos G. Jara, and Ludwig Buckup. 2000. On the Phylogenetic Positioning of the South American Freshwater Crayfish Genera (Decapoda: Parastacidae). Journal of Crustacean Biology, 20(3): 530-540. Keith A. Crandall Brigham Young University, Provo, Utah, USA Page copyright © 2001 Keith A. Crandall Page: Tree of Life Cherax destructor. Authored by Keith A. Crandall. The TEXT of this page is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike License - Version 3.0. Note that images and other media featured on this page are each governed by their own license, and they may or may not be available for reuse. Click on an image or a media link to access the media data window, which provides the relevant licensing information. For the general terms and conditions of ToL material reuse and redistribution, please see the Tree of Life Copyright Policies. Citing this page: Crandall, Keith A. 2001. Cherax destructor. Version 01 January 2001 (under construction). http://tolweb.org/Cherax_destructor/7751/2001.01.01 in The Tree of Life Web Project, http://tolweb.org/
<urn:uuid:a3baa74d-94b1-4e9d-bf8e-c3437d6695c2>
CC-MAIN-2017-04
http://tolweb.org/Cherax_destructor/7751
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00377-ip-10-171-10-70.ec2.internal.warc.gz
en
0.703055
330
1.992188
2
Burning a More Responsible Fire Heating with Wood & the Environment: Part 3 – Burning a More Responsible Fire In this article, we discuss environmentally responsible practices for lighting and burning your fire. This continues our series discussing how you can enjoy wood heat in a more environmentally friendly way. In Part 1, we described the environment impacts of burning wood. Recall that when something is burned, there will be harmful emissions. Fine particulate matter (which is soot when no longer airborne) is normally the biggest culprit when wood is burned; reducing wood smoke generally reduces particulate matter. In Part 2, we discussed how to select the right firewood to reduce negative environmental impacts. Here, we learned how to look up species of wood that produce less smoke, and we learned the importance of using seasoned (dried), chemical-free wood. We also learned about the benefits of using responsibly and locally sourced firewood. So now you know to use the right firewood, and you know to reduce harmful emissions. We assume you already know it’s not good to catch fire to things you did not intend to catch fire to. You’re now ready to review best operating practices to burn clean, smart, and safe. 10 Rules to Burning a More Responsible Fire 1. Always burn good firewood. Hey, it’s worth repeating. Never burn garbage, paper with colored ink (the ink becomes toxic), glossy paper, cardboard, or wood that is rotted or diseased. Wet wood produces more smoke since it burns less efficiently. Never burn wood that has been treated in any way (coated, painted, pressure treated, or glued). Avoid burning wood sourced more than 50 miles away or that contributes to deforestation. Be careful with artificial logs – they are not meant to be burned the same way as real wood. Always burn dry, well-seasoned, safe, quality firewood. 2. Have a “clear zone” around the fire. Make sure there is nothing flammable nearby the fire – sparks can travel a distance. Potentially flammable materials include rugs, grass, newspapers, and blankets. Remember, house fires and forest fires are not exactly good for the environment – or you. 3. Protect your home by using a carbon monoxide detector and keeping a fire extinguisher handy. 4. Build a moderately sized, hot fire. Really small fires have a proportionately longer start and smolder period, which means more smoke. Cool, smoldering fires produce more smoke. Hot fires burn more efficient. Just remember not to get too crazy building a fire so hot it’s dangerous. Overloaded fireplaces are dangerous because a huge fire can overheat your walls or roof. 5. Be kind with your kindling. Kindling should only be used as kindling, never as your main fuel source because it burns inefficiently. Remember to avoid using toxic materials for your kindling. Fuels like gasoline and lighter fluid are an explosion hazard – avoid using, or at least proceed with extreme caution. 6. Steer clear of smoke. Breathe in as little as possible, produce as little as possible, and make sure it goes straight up. You shouldn’t be having any backdraft from your chimney; if you do, you have a problem that needs fixed. 7. Use the doors and screens right. Shut the metal screen on your fireplace to protect the surrounding area from sparks. While burning, keep the glass doors on the fireplace open to ensure flow of air (combustion requires oxygen) to the fire. Shut the glass doors when the fire is out. Keep the door shut on wood burning stoves to keep carbon monoxide from leaking into your home. 8. Don’t let the fire smolder. Don’t let a fire smolder overnight – it will produce little heat and a whole lot of smoke. Furthermore, you should know to never leave a fire unattended, even if it is simply smoldering. Always put the fire out before going to bed or retiring for the night. 9. Dispose of your ashes properly. Not cleaning ashes in wood-burning appliances can clog the air vents. Excessive buildup of ashes can become dangerous. Ashes can stay flammable for days. Always place ashes into a metal container and soak in water. Fairfax County, VA has a good informational on ashes called Can Your Ashes. 10. Follow the Rules. Many areas have restrictions on burning fires. For example, there are restrictions on outdoor fires in Virginia and in Maryland. Many states have requirements on wood stoves and pellet stoves in addition to EPA standards. Some areas such as many counties in the state of Washington often implement temporary burn bans of all fires during adverse weather conditions such as stagnant weather. Please stay informed and make sure you follow the rules. There you have it. Follow these 10 tips to ensure you burn safer and more environmentally responsibly. Learn about the environmental impact of different types of wood burning stoves and appliances in Part 4. For some tips on keeping your fireplace, chimney, or wood-burning appliance burning clean, see Part 5.
<urn:uuid:f65fed40-5563-46ff-a002-c21a6f595418>
CC-MAIN-2022-33
https://www.highschimney.com/burning-responsible-fire/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00667.warc.gz
en
0.926291
1,063
3.609375
4
5:1 Keep in mind, O Lord, what has come to us: take note and see our shame. 5:2 Our heritage is given up to men of strange lands, our houses to those who are not our countrymen. 5:3 We are children without fathers, our mothers are like widows. 5:4 We give money for a drink of water, we get our wood for a price. 5:5 Our attackers are on our necks: overcome with weariness, we have no rest. 5:6 We have given our hands to the Egyptians and to the Assyrians so that we might have enough bread. 5:7 Our fathers were sinners and are dead; and the weight of their evil-doing is on us. 5:8 Servants are ruling over us, and there is no one to make us free from their hands. 5:9 We put our lives in danger to get our bread, because of the sword of the waste land. 5:10 Our skin is heated like an oven because of our burning heat from need of food. 5:11 They took by force the women in Zion, the virgins in the towns of Judah. 5:12 Their hands put princes to death by hanging: the faces of old men were not honoured. 5:13 The young men were crushing the grain, and the boys were falling under the wood. 5:14 The old men are no longer seated in the doorway, and the music of the young men has come to an end. 5:15 The joy of our hearts is ended; our dancing is changed into sorrow. 5:16 The crown has been taken from our head: sorrow is ours, for we are sinners. 5:17 Because of this our hearts are feeble; for these things our eyes are dark; 5:18 Because of the mountain of Zion which is a waste; jackals go over it. 5:19 You, O Lord, are seated as King for ever; the seat of your power is eternal. 5:20 Why have we gone from your memory for ever? why have you been turned away from us for so long? 5:21 Make us come back to you, O Lord, and let us be turned; make our days new again as in the past. 5:22 But you have quite given us up; you are full of wrath against us.
<urn:uuid:99fd1632-1182-4f30-a022-6715be4fe37d>
CC-MAIN-2016-44
http://www.spiritcommunity.com/bibles/basicenglish/25_005.php
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719908.93/warc/CC-MAIN-20161020183839-00158-ip-10-171-6-4.ec2.internal.warc.gz
en
0.975665
501
1.90625
2
Bangladesh’s foreign minister has said that Shamima Begum could face the death penalty for involvement in terrorism if she goes to the country. However, her family’s lawyer Tasnime Akunjee said the possibilities of her being sent to Bangladesh were “vanishingly remote”. The UK home secretary, Sajid Javid, stripped Ms Begum’s British citizenship in February after she was located at a refugee camp in Syria. She left Britain for Syria to live under ISIS in 2015. Under international law, it is illegal to revoke someone’s citizenship if it renders them without a state and nationality. It was wrongly believed that Ms Begum was eligible for Bangladeshi citizenship through her parents, but Bangladeshi officials have rejected this, leaving her currently stateless. Speaking to ITV, Bangladeshi foreign minister, Abdul Momen, said: “We have nothing to do with Shamima Begum. She is not a Bangladeshi citizen. She never applied for Bangladeshi citizenship. She was born in England and her mother is British. “If anyone is found to be involved with terrorism, we have a simple rule: there will be capital punishment. And nothing else. She would be put in prison and immediately the rule is she should be hanged.” The family’s lawyer, Mr Akunjee said Mr Momen had confirmed “what is obvious to all” in that Ms Begum was born and raised in Britain and was “in no way Bangladesh’s problem”. Mr Akunjee told The Guardian: “What Sajid Javid did in stripping Shamima Begum of her citizenship is human flytipping – taking our problems and illegally dumping them on our innocent neighbours. “The home secretary is open at any time to change his mind and reverse his decision regarding stripping Shamima’s citizenship. This would have the added benefit of saving the British taxpayer all the costs of having a long trial, especially where it is fairly clear what the outcome is going to be. “Sajid Javid would have been advised about Bangladeshi law and the existence of the death penalty there, but what can we expect from him when he was happy to allow a baby to die as a direct consequence of his actions.” Ms Begum’s baby son Jarrah died from pneumonia in a Syrian refugee camp less than three weeks after birth. The east London teen claimed she was brainwashed by ISIS and said she did not agree with everything the group had done. Ms Begum has not admitted t committing any acts of terrorism. Mr Javid defended his decision to revoke Ms Begum’s British citizenship and said the government could not help UK nationals in Syria as there was no consular presence there. Ms Begum’s family have started legal proceedings to challenge the home secretary’s decision. The UK government said it will not comment on individual cases and that decisions to strip individuals of their citizenship are based on “all available evidence” and are “not taken lightly”. A person’s citizenship can be revoked under the 1981 British Nationality Act if the home secretary is satisfied it would be “conducive to the public good” and that the individual would not be made stateless.
<urn:uuid:0574baf6-d66b-41a3-9056-b978ddfdc5aa>
CC-MAIN-2022-33
https://5pillarsuk.com/2019/05/07/shamima-begum-would-face-capital-punishment-in-bangladesh-says-foreign-minister/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00466.warc.gz
en
0.982632
701
1.742188
2
For many years, the use of omega 3 fatty acids has been hailed as a great way of enhancing health while protecting users from cardiovascular diseases. (OPENPRESS) Speaking during the release of the latest information, A.W Rifat pointed out that people who eat 2 servings of fish on a weekly basis have shown signs of improved health not only in the prevention of the cardiovascular diseases but also in the management of a host of other health conditions including arthritis and hypertension. While releasing the report, Rifat also noted that the introduction of healthy and pure omega 3 fish oil supplements have been helpful and especially among people who cannot afford the required amount of fish in their meals thus ensuring that they too benefit from the precious minerals derived from fish. He however cautioned against using supplements that have not been prepared using high standards as this could deprive the users of the necessary minerals while at the same time putting their lives at risk. He also pointed out that supplement capsules have a higher concentration of DHA and EPA which makes it easier for users to benefit more unlike it is the case when relying on fish meat. During the launch of the report, several health benefits associated with omega 3 fish oils were also highlighted including the following: Promotion of mental health Although this has been an obvious benefit associated with the consumption of omega 3 fish oil fatty acids, research has shown that there are more benefits than previously thought. According to the report, the use of supplement during the early months of pregnancy can help in the development of baby's brain thus giving the baby a superior mental frame after birth. This conclusion was arrived at after monitoring children whose mothers consumed omega 3 fish oils during pregnancy and those who did not and the results were amazing. it was also discovered that children whose mothers used fish oil supplement capsules and servings had developed a healthy nervous system as compared to those whose mothers did not. Reduction of hypertension Contained in the report also was the research evidence showing that the use of omega 3 fatty acids is highly helpful for lowering hypertension. Rifat noted that medical studies had revealed that people who use fish oils have an enhanced blood circulation and also are unlikely to suffer from blood pressure and related conditions. This is due to the lowering of effects experienced on both cholesterol serum and triglyceride levels. He further said that the use of omega 3 fatty acids has been found to be helpful in the prevention of cancer of the breast, colon and prostate. Quoting from the report, Rifat said that "numerous studies have shown that not only does omega 3 fatty acids help in the prevention of the aforementioned cancers but also goes a long way in reducing the effects associated with these conditions". He added that fish oils are a reliable way of preventing the escalation of the tumours. For more information about Latest Omega 3 Fish Oil News visit http://fish-oil-update.com/
<urn:uuid:7e2a3734-1ee7-4ea9-bf5d-0dc7c2a5b719>
CC-MAIN-2017-04
http://www.theopenpress.com/Latest-Omega-3-Fish-Oil-News-Released/2013194999.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00064-ip-10-171-10-70.ec2.internal.warc.gz
en
0.976837
576
2.265625
2
What Is An Authentic Neapolitan Pizza? As a pizza lover,many times I have come across different terms like Neapolitan-style, Chicago-style, NY-style pizza and so on. I have never really thought about these names because to me a pizza is a pizza is a pizza, right? It all changed when I decided to read and research about the various pizza styles. Wow, what a fascinating world of pizza and it’s rich history opened up to me. The most famous and well-known pizza is probably the Neapolitan Pizza or Pizza Napoletana. Let’s join me in my journey about the history and origins of an authentic Neapolitan pizza and find the answers to what you need to make a real Pizza Napoletana. Naples in Italy is the proud birthplace of the modern pizza. It all started back in ancient times with a flatbread that was baked in wood-fired ovens and was part of a staple diet for most people back then. No one knows exactly when the flatbread was topped with tomato and later on with cheese and olive oil. The tomato plant was introduced in the 16th century, but at first, people believed it was a poisonous fruit. It was not until the late 18th century that the poor people of Naples added tomato to their yeast-based flat bread. We do know, that the first pizzeria ‘Antica Pizzeria Port’Alba’ opened its door in 1830 in Naples. In 1889, the famous Pizza Margherita was created by Rafaelle Esposito. Legend says that he invented this pizza in honor of Italy’s Queen Margherita, who was visiting Naples and was very interested in the flatbreads which Naples peasants were eating. The Pizza Margherita represents the Italian flag with its red (tomato), white (mozzarella cheese) and green (basil leaves) colors. Ingredients For An Authentic Pizza Napoletana In 1984, the Associazione Verace Pizza Napoletana (VPN) was founded to keep the traditions of making a true pizza Napoletana alive. Throughout Naples, you will find pizzerias that have received a certificate by VPN for using traditional methods of making an authentic Neapolitan pizza. The guidelines are quite strict. First and most important, the pizza dough: you will need wheat flour 00, sea salt, water and natural Neapolitan yeast or brewer’s yeast. Note: there is no olive oil in the dough! The dough is kneaded by hand and shaped into a round form by hand as well (no rolling pin!) The dough has to be no thicker than 0.12″. The pizza has to be cooked in a wood-fired dome-shaped oven at around 905 F (485 Celcius) in 60 – 90 seconds, preferably with oak wood. So you can see, the rules are pretty precise. A True Pizza Margherita Some strict guidelines also apply to making a traditional Pizza Margherita. As you can see, I have listed the ingredients above, and they are available on Amazon. For the toppings you need: - San Marzano tomatoes; these are Plum tomatoes which are growing in the volcanic soil of San Marzano/Italy. The flesh is juicy, and they are low in sugar, perfect for pizza sauce - Extra virgin olive oil from Italy - Buffalo mozzarella from Campania - Fresh basil leaves There you have it, just a few, but only the best quality ingredients make an authentic Pizza Margherita. Watch this video of Tony Gemignani, 12-time World Pizza Champigon, how he makes an auhentic Neapolitan pizza in 90 seconds. Another Variant Of A Neapolitan Pizza Purists consider only two variants as authentic Pizza Napoletana: of course, the well-known Pizza Margherita and the second one is Pizza Marinara, which is even older than her famous counterpart. Pizza Marinara is topped with tomato, oregano, garlic and extra virgin olive oil. Legends hold that ‘la Marinara’ the seaman’s wife prepared this dish while she was waiting for her husband’s return. What a lovely little story. Summing It All Up Well, the rest is history. It all started in Naples/ Italy and from there Pizza has become one of the most popular, much-loved dishes in Europe and North America. People are passionate about making the best possible pizza, searching for new and inventive toppings or pizza dough recipes. There is also a big trend in baking and cooking with a traditional wood-fired oven. The Italians have shown us that you only need a few simple but quality ingredients to produce the most delicious pizza. I think I have to travel to Naples soon and discover the authentic Pizza Napoletana at its birthplace. How about you? Founder of woodfiredpizzaoven.org Note: This post contains affiliate links. If you decide to purchase one of these products I will earn a small commission fee. I always recommend products I have used or would recommend to friends and family.
<urn:uuid:42a5b734-f215-4324-8477-a4cad2d1b7b2>
CC-MAIN-2022-33
https://woodfiredpizzaoven.org/what-is-a-neapolitan-pizza
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00078.warc.gz
en
0.954016
1,085
1.929688
2
Asia’s big 3 to dominate Solar Over the next five-years, India, China, and Japan are forecast to see the highest growth rates, with China alone projected to pass the 100 GW cumulative installation mark in 2018. The US will see somewhat slower growth than these Asian markets, but will still be the third-largest cumulative market globally on account of its historic strength in the PV industry and its continuous growth over the past decades. The biggest threats to these demand and growth forecasts come mainly in the form of policy and regulatory risks. The Chinese end-market has been built largely as an extension of the government’s upstream manufacturing push and is supplied almost exclusively by domestic suppliers through the PV chain. China is now the only major solar market in the world that can service its own end-market purely through domestic supply. The rise of this Chinese manufacturing base has also created backlash in other markets, and import restrictions and duties continued to be applied on many solar PV products. The risk of further supply disruption stemming from trade investigations is real, as is the threat of market collapse in single-policy driven countries. Only by reducing costs and making PV more competitive against other energy sources will new areas open, thus reducing the risk of market collapse or trade barriers.
<urn:uuid:d59771c7-4705-4409-a240-88af0ba28006>
CC-MAIN-2022-33
https://www.pimagazine-asia.com/asias-big-3-dominate-solar/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00076.warc.gz
en
0.963541
255
1.5625
2
DROP INDEX Clause You can delete an index defined for a column by using the DROP INDEX clause. ALTER [ TABLE | CLASS ] table_name DROP [ REVERSE ] [ UNIQUE ] INDEX index_name - REVERSE: Specifies that the index to be dropped is a reverse index. - UNIQUE: Specifies that the index to be dropped is a unique index. The unique index can be dropped by using the DROP CONSTRAINT statement. - table_name: Specifies the name of a table of which constraints will be deleted. - index_name: Specifies the name of an index to be deleted. ALTER TABLE a_tbl DROP INDEX i_a_tbl_age;
<urn:uuid:ce417bf5-e5f3-483f-a6b0-eb987b89c436>
CC-MAIN-2016-44
http://www.cubrid.org/manual/90/en/DROP%20INDEX%20Clause
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720941.32/warc/CC-MAIN-20161020183840-00518-ip-10-171-6-4.ec2.internal.warc.gz
en
0.704701
165
2.0625
2
Olive Oil Investigations Launched With Public Hearing on Quality & Market Conditions California Grown Olives Olives are on the pressing block. Earlier this week, the U.S. International Trade Commission held a public hearing to launch an investigation into the olive oil industry that was largely fueled by a UC Davis study two years ago. The study reported many of the imported olive oils on our supermarket shelves are not the extra virgins they claim to be. (Shocker.) As reported in The Seattle Times, domestic producers in attendance were rallying for tighter regulation in the industry. "We just want a level playing field so we can compete," said Fresno olive oil producer Pat Ricchiuti, president of Enzo Olive Oil Co. Up for review is whether some importers are making false claims, bottling lesser quality and blended oils as extra-virgin, thus giving them a significant competitive advantage over more expensive domestic oils. (Domestic extra virgin oils fared well in the UC Davis quality study.) Imported olive oils make up the vast majority of the U.S. market. As Curtis Cord, executive editor of The Olive Oil Times, reports from Wednesday's hearing, UC Davis Chemist Slina and Australian scientist Rodney Mailer from Charles Sturt University discussed new alternatives to olive oil quality testing. "The existing restrictive standards discriminate against good quality olive oil but do nothing to prevent unacceptable products being sold in our supermarkets," said Mailer. The six-member trade commission heard from olive oil producers throughout the U.S., including the largest domestic olive oil producer, California Olive Ranch (California is the largest producer of olive oil in the U.S.). Representatives from the Madrid-based International Olive Oil Council (IOC) did not attend the hearing, a puzzling absence even to the commissioners, reports Cord. He continues: "Testifying on behalf of major importers were the chairman of the North American Olive Oil Association (NAOOA) John Sessler, and Executive Vice President Eryn Balch, who called for enforcement of existing international standards for olive oil grades. Balch blamed "subjective sensory testing" for the highly publicized results of a 2010 University of California, Davis study [results] ..." As the yearlong investigation continues, some domestic importers are already taking the initiative to regulate to their quality control operations voluntarily. Earlier this year, Maryland-based importer Pompeian, enrolled in the USDA's Quality Monitoring Program, a voluntary fee-based government program that monitors the quality of the fruit and vegetable ingredients used by companies (olive oil was recently added to the list of produce covered under the Quality Monitoring Program). The regulation process involves operations audits, regulation of a company's quality control procedures, and blind product sampling/analysis. For more information on olive oil regulations, visit The Olive Oil Times. Want more Squid Ink? Follow us on Twitter or like us on Facebook. Find more from Jenn Garbee @eathistory + eathistory.com Get the Food & Drink Newsletter Our weekly guide to Los Angeles dining includes food news and reviews, as well as dining events and interviews with chefs and restaurant owners.
<urn:uuid:74509a38-71f7-464d-bdc9-52a3d321c26d>
CC-MAIN-2017-04
http://www.laweekly.com/restaurants/olive-oil-investigations-launched-with-public-hearing-on-quality-and-market-conditions-2381217
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284411.66/warc/CC-MAIN-20170116095124-00457-ip-10-171-10-70.ec2.internal.warc.gz
en
0.943168
639
1.6875
2
CLEVELAND — A Coast Guard boatcrew from Station Buffalo, N.Y., rescued a boater Sunday afternoon after the man’s vessel began taking on water in the Niagara River near North Tonawanda, N.Y. The boater called 911 emergency dispatchers when he noticed his boat was flooding. The emergency dispatchers passed the boater’s information to Coast Guard Sector Buffalo at 12:13 p.m., and watchstanders there directed a boatcrew to launch from Station Buffalo. The boatcrew, aboard a 25-foot Response Boat-Small, arrived on scene in the Niagara River near Niawanda Park in North Tonawanda, N.Y., shortly after and saw that the vessel’s de-watering pumps were keeping up with the flooding, and the man was not injured. The mariner stated he forgot to put the boat’s plug in before getting underway, which caused the flooding. The Coast Guard boatcrew towed the man’s vessel to Isle View Park in Tonawanda. The Coast Guard recommends mariners ensure all the equipment on their vessels works properly before getting underway. The Coast Guard recommends boaters use a VHF-FM marine radio as a primary means of communication while underway since radios are more reliable than cell phones in a marine environment. When a mayday is sent out via VHF-FM radio it is a broadcast, not just a one-to-one communication as when made via phone. When mariners ask for help on a marine radio, any nearby boaters can hear the distress call and offer immediate assistance. Channel 16 is the international distress frequency and should be used for emergencies only.
<urn:uuid:d5ab2a6e-13b2-47a4-8fbc-dba597ae031d>
CC-MAIN-2017-04
http://coastguardnews.com/coast-guard-rescues-man-after-vessel-begins-flooding-in-niagara-river/2012/05/20/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00046-ip-10-171-10-70.ec2.internal.warc.gz
en
0.954013
350
1.6875
2
15°39'47.0" N 96°33'29.4" W By Isidoro Michan-Guindi Punta Cometa, Mazunte, Oaxaca, Mexico. Raimund Abraham’s house in a subtropical jungle. On a small peninsula jutting out from the Pacific shoreline off an unpaved road, a T-shaped wooden gate leads to a stone path guarded by a weathering steel sculpture. The site appears to have been carved. Fundamentally abstract forms collide with the topography. The path slips between precisely displaced cubic volumes and terraces. The enclosed volumes arranged like islands are anchored in the landscape. The jungle permeates the plan, which at the same time has stark boundaries that reject the exterior. These volumes contain the program of the house: the kitchen, the studio/master room, the visitors’ room, the bathroom, and the utilities tower. The plan is based on the model of standard bricks (none of which are cut). Furniture, floors, columns, and walls are made of brick, becoming a continuous surface that you use, that you walk on and that surrounds you. The natural bricks are laid and mixed in different types of bonds. Flemish bond, cross bond, running bond, stack bond stretchers, and stack bond soldiers become a singular syntax interrupted by slits. The brick fabric far from having a nostalgic effect of various patterns, is a subtle organic whole. Like the surrounding jungle, if you take a closer look, it is full of specificity. Over the house, a hovering farmstead-like roof provides shade to the in-between volumes. The massive slanted roof is supported by an over structured system of wooden beams with complex joints. This aesthetic excess seems to be meant to withstand the heavy subtropical winds, a breathing ribcage with ceaselessly flowing air. There is no ambiguity between the elements that make up the house. Perhaps the most important elements of the house are the fixed tables of varying dimensions located on the terraces. In his final lecture, The Profanation of Solitude, Abraham stated that he “needed a place to cook, which is not the beginning of the house, but is the house,” highlighting the pervasive relationship between architecture and food. The long wooden table on the central terrace (seating twelve) and everything that unfolds around it would seem to afford corporeal and incorporeal events: rituals, conflicts, confrontations, eating, drinking, which eventually lead to elimination processes commonly regarded as repulsive and secretive. In his house, however, Abraham claims that the toilet is a chapel, a place of spiritual repose. A low and dark passage leads to the bathroom, where there is a shift of material from brick to concrete. The elimination and cleansing processes are left exposed by a cut in the roof, the only room in the house with a view to the sky—a monument to ritualized functions of the body. The house thus parallels the digestive system where the human body is intrinsically active and its cycle is in synchronization with its space. Far from being an “edible beauty” as Salvador Dalí would say about Art Nouveau, the house is a raw ritual of dwelling.
<urn:uuid:d19664c3-fb89-4f67-9afd-f8141d735e46>
CC-MAIN-2022-33
https://isidoro.mx/en/rumor/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00475.warc.gz
en
0.949126
699
2.234375
2
There is a warming cooling pulse in Earth’s life exemplified by tracks left from ancient glaciers to deserts once flush with flora and fauna. When did all this occur and why? Here’s what I think: Moon orbits Earth, Earth orbits Sun, Sun orbits Milky Way, Milky Way orbits ??? Each event takes longer to complete. For the Sun to orbit the Milky Way it takes roughly 28 million Earth years. In fact, I don’t believe the Sun has made more than 20 orbits since Earth was created. The problem arises when trying to determine what occurs with other stellar objects in our Galaxy during the Sun’s orbit. For example, to blame global warming on puny little humans is most likely a fine case of naiveté. I would like to look with geologists at our sedimentary layers at 28 million year intervals to see possible repeat activity. Unfortunately, finding something caused during one of the 20 Sun’s Galaxy orbits among the millions of Earth’s Sun orbits and determining which was which is near impossible. However, to rule out the Sun and it’s travel may remove a signature from the portrait. As our Galaxy nears another, when they pass does ours bounce away? Did the shock start Continental drift? Do all stars in our galaxy orbit in the same direction? Is one star orbiting faster than another? Hubble should be able to answer these questions and help put new light on our Solar System’s future. To set some idea of what vast fluctuation can occur look at Earth’s annual weather. Predict what will happen six months from now! Impossible! However, afterwards we know what happened and why it happened. So when scientists analyze space what questions are they asking. More importantly, what questions are they able to answer.
<urn:uuid:e6264f79-fb5d-4fce-a99f-be0e78e68cd1>
CC-MAIN-2016-44
https://www.physicsforums.com/threads/orbits-global-warming.102439/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718957.31/warc/CC-MAIN-20161020183838-00435-ip-10-171-6-4.ec2.internal.warc.gz
en
0.946305
364
3.734375
4
Nebraska Extension in Cass County The University of Nebraska offers many and various newsletters, workshops, trainings, websites, networking opportunities, etc. Check here often for all the latest news. Visit this website often to see what new things have been posted. If you have any questions, please feel free to stop in or call the Extension Office.NRD "Insight" Newsletter .... September 2016 Click here for the newsletter. The 2016 Cass County Achievement Party will be held on Sunday, November 6th from 3:00 to 5:00 p.m. It will be held at the Expo building on the Cass County Fairgrounds. There will be recognitions, awards, certificates, trophies and pins to hand out. New members of the 2017 4-H Council will be announced. The movie, Zootopia, will be shown. Everyone, bring a blanket and/or pillow to lay on during the movie, and a coolor filled with pop or koolaid. Yummy flavors of popcorn and water will be provided. Questions, contact the Extension Office at 402-267-2205. Help promote 4-H! For those of us who know how great 4-H is for the development of life skills for our youth, it is our job to tell others about it! National 4-H Week offers the platform for us to do just that. Spread the word about 4–H, and do your part to recruit new members, volunteers, leaders and engaging 4-H alumni. LINCOLN, Neb. — The Nebraska Department of Agriculture announced Wednesday June 8, 2016 that the emerald ash borer (EAB) was found earlier this week in Pulaski Park in southeast Omaha. This is the first confirmation of the insect in Nebraska. EAB has killed hundreds of millions of ash trees in 26 states. It is projected that Nebraska’s taxpayers and homeowners will spend over $961 million on ash tree removal, disposal and replacement. Read more about it by clicking here. The Nebraska Extension Cass County office hours are 8:00 a.m. to 4:30 p.m. Monday through Friday. We are located on the north side of the fairgrounds at 8400 144th Street, Suite 100, Weeping Water, NE 68463 Oct 10 – Katie Krause, Extension Educator of Douglas-Sarpy Counties, was honored recently at the National Extension Association for Family and Consumer Sciences 2016 annual session. Read more Oct 10 – The success of a new tractor is decided long before it sees soil at the long, oval test-track on East Campus that faculty, staff, students and visitors pass by every day. Read more
<urn:uuid:3b8d519b-91e1-4e4b-a969-7ff4425ab3f5>
CC-MAIN-2016-44
http://extension.unl.edu/statewide/cass/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719468.5/warc/CC-MAIN-20161020183839-00529-ip-10-171-6-4.ec2.internal.warc.gz
en
0.948268
548
1.523438
2
The University of North Carolina -- at Malawi Earlier this month, I spent several days in southern Africa. Why? I needed to see the vital work that Carolina is doing there for myself. We often talk about Carolina's global reach, but the point really comes home when you visit a place like Malawi, where we've been working since 1990. The university's presence in this small, sub-Saharan nation is significant. At least 32 faculty members from eight different disciplines have ongoing projects and travel to Malawi once a year or more. Six faculty members live there full time. About 25 students work in Malawi each year. They include short-term visits by undergraduates in service or research projects; pre-doctoral students doing research or patient care; residents and fellows on senior clinical rotations; along with other scholars and fellows there for longer stints. There is much to do in Malawi. The country only has two physicians per 100,000 people, and the average life expectancy is 39 years. High rates of HIV, malaria, tuberculosis and other infectious diseases strain the country's limited health-care infrastructure. We have humanitarian reasons for helping the people of Malawi, who face so many challenges. And that has rightly been a passion driving progress for people like Mike Cohen, Charlie van der Horst and Irving Hoffman. But our work in Malawi is not just a mission of mercy; it also is an integral part of our own mission of research, education and public service. For example, while UNC Project-Malawi provides free clinical care to more than 1,700 patients per week at its headquarters in Lilongwe, about 20 research studies also are being conducted there at any given time. The results of one recent ground-breaking study on an HIV-fighting syrup for babies may turn the tide on the transmission of HIV from mothers to their children. This study and others give our faculty and students valuable information about HIV, sexually transmitted diseases, malaria and tuberculosis, as well as nutrition, water, cancer, family planning, surgery and trauma. What they learn not only helps the people of Malawi, but also advances disease prevention and care back home in North Carolina. We're educating not only our students to be the doctors, nurses, pharmacists, dentists and health-care workers of the future, but we're also bolstering the education and training of the health work force in Malawi. Part of the reason for the long-term success of UNC Project-Malawi is that Carolina has ensured that many people have been trained in Malawi to lead the clinics on the ground. The education extends all the way to the patients themselves, who are taught by their fellow Malawians in ways that are culturally familiar and effective. I got chills listening to the nurses in the Bwaila antenatal clinic lead the women and children there in teaching songs set to the tunes of well-known Malawian folk songs. The lyrics say things like "get the father tested" and "fight the virus to make our nation strong." For anyone still not convinced that UNC's work in Malawi is not only vital in that faraway country but also here at home, let's crunch some numbers. We were awarded about $10.6 million in grants for our research in Malawi this year, which comes to us here in Chapel Hill. These grants support the salaries of faculty who provide care to North Carolinians and teach our students in Chapel Hill. For me, seeing is believing. I knew UNC-Project Malawi was worthwhile before I set foot in Lilongwe, but the passion the Tar Heels there have for the work that Carolina is doing inspired and moved me. That kind of dedication is a benefit you can't put a price on. The feeling that I got from meeting these amazing people kept me as warm as the African sun for a long time after I returned to the snow and ice on the Hill. Holden Thorp is chancellor of the University of North Carolina at Chapel Hill. Readers can contact him at firstname.lastname@example.org.
<urn:uuid:175f3302-792c-4e80-83e2-1f3ab3e3e6ce>
CC-MAIN-2017-04
http://www.unc.edu/community/chancellors_column_12_10.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283301.73/warc/CC-MAIN-20170116095123-00501-ip-10-171-10-70.ec2.internal.warc.gz
en
0.964616
834
1.570313
2
Remember when everyone went through that phase of being hesitant to eat foods with naturally occurring fat? Eating egg whites and ditching egg yolks was just one component of food that was shamed into oblivion. Full-fat yogurt and cow’s milk also got pushed to the sidelines in favor of low-fat and fat-free options. Thankfully, society has grown since that moment, with many health experts now encouraging people to consume foods that are rich in healthy fats, as that usually also means they’re rich in various nutrients. These foods include salmon, nuts, avocado, and yes, even egg yolk. All of these
<urn:uuid:324e8689-baf6-4f1b-85ad-1a9e9c8d2cf7>
CC-MAIN-2022-33
https://navelrestaurant.com/tag/effect
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00075.warc.gz
en
0.985531
131
1.914063
2
On Tuesday, the New York Times reported that the Atlanta-baed law firm King & Spalding renounced its commission to defend the Defense of Marriage Act on Congress’ behalf. According to the Times, this isn’t unusual. For opponents of same-sex marriage, it’s hard to find good help these days: The firm’s abrupt reversal highlights the continuing potency of same-sex marriage as a complicated issue that has scrambled traditional political calculations in Washington. President Obama has often called the marriage act “abhorrent,” but his Justice Department defended it for more than a year before declaring it unconstitutional. Attorney General Eric H. Holder Jr. announced in February that the administration would no longer defend the act in court. Theodore B. Olson, a solicitor general under President George W. Bush, has joined gay rights groups and Democrats as a leading advocate for same-sex marriage. And several high-profile Republicans, including Mr. Bush’s wife and his daughter Barbara, have said publicly that they support gay people’s right to marry. But House Republicans, led by Speaker John A. Boehner, have vowed to defend the law in court. The Times makes it clear that the firm withdrew “amid pressure from gay rights groups,” but what strikes me is the form that pressure took. Gay rights groups warned that staying on the case “would hurt its ability to recruit and retain lawyers.” In an op-ed piece published today, Dale Carpenter argues that the firm’s decision “cannot be dismissed simply as a matter of political correctness or bullying by gays.” Gay rights supporters have come to dominate the legal profession. Any doubt left about where most lawyers stood was eliminated in 2003 in Lawrence v. Texas, which involved another sodomy law. Lambda Legal led the challenge, helped by Jenner & Block, a firm with extensive Supreme Court experience. Other big firms, groups like the American Bar Association and scholars filed supporting briefs. The cumulative effect of decades of work by gay-rights advocates was that the best firms and many of the best lawyers were unwilling to defend sodomy laws on constitutional, let alone policy, grounds. The court agreed, holding in Lawrence that such laws demeaned the very existence of gay people. There is, I think, a lesson here for the Church, or at least a challenge. Back in the days when most people felt a visceral revulsion to same-sex relations or same-sex partnerships — a revulsion that extended to gay people themselves — asserting her teaching authority on the subject of homosexuality was easy. She would have had a harder time telling people to brush after every meal. But now the Church has found herself with no popular prejudices to take advantage of. From what I can tell, this realization has brought no insight. If anything, it’s caused her to regress, to adopt tactics guaranteed to alienate even further the people who need conversion. Consider the Manhattan Declaration: A Call to Christian Conscience. This statement of purpose signed by 150 religious leaders, including Timothy Dolan, archbishop of New York and the president of the Bishops’ Conference, makes a point of listing homosexuality and “polyamorous relationships” side-by-side, not only as threats to traditional marriage, but also as conduct for which people are “disposed.” This rhetorical gambit looks awfully underhanded — or rather, it would, if it weren’t so easy to pick apart. Now that society no longer attaches a stigma to same-sex relations, Christian authorities are doing their best to slap that stigma back on. First they equate homosexuality, which no longer seems exotic, with polyamory, which does. Then, for good measure, they equate the case for an inborn inclination toward homosexuality, which is widely accepted (if unproven) and that for an inborn inclination toward polyamory, which, to the best of my knowledge, has never been made. It’s a little slicker than warning people they’ll soon be forced to marry their cocker spaniels, but not much. National Catholic Reporter’s John Allen, Jr. defined Pope Benedict’s vision as “affirmative orthodoxy.” In his view, Benedict wants to present the Christian message “in terms of what it’s for, rather than what it’s against.” Where gays and lesbians are concerned, this would mean selling a life of continence, telling them not so much why they shouldn’t have sex, but telling them what they might gain from having none. It may be that some gay and lesbian outreach ministries do exactly this, but the positive approach seems not to have taken hold in the Church at large. As my readers should have guessed a long time ago, I am the furthest thing in the world from a PR whiz. On so sensitive a matter, the Church deserves far shrewder consultants than I. Still, I do have three tips that, at worst, can’t hurt much. 1. Get used to saying “gay” (and not just in the sense of “retarded”) and “lesbian.” Those are the terms gays and lesbians themselves prefer; substituting either for “homosexual” looks like exactly what it is, an attempt to deflate. Any Catholic who wants to minister to gays is going to have to overcome the same ingrained suspicions facing a Republican who canvasses an African-American neighborhood. You can be dadgum sure no such candidate would address his would-be constituents as “You coloreds.” 2. Try not to speak of gays and lesbians as though they make up a separate species. Like the Supreme Court justice said of pornography, this is a tonal thing — hard to define in the abstract, but easy to spot. To cite one very benign example, National Catholic Register’s Pat Archbold recently published an article in which he names the six “most unexpected converts.” Number one on the list is Oscar Wilde. Here’s what he says: Wilde is known today for his wit and celebrated for a homosexual lifestyle. In fact, I’d bet he’s more well known for his flamboyancy than he is for his literary achievements which often had a strong moral lesson. The fact that Wilde was a deathbed convert to Catholicism is just about completely ignored. It doesn’t really fit into the caricature of Wilde. Now, granted, Mr. Archbold — from whom I once stole an idea — is writing for a readership he may judge unfamiliar with Wilde’s life and work, and uninterested in learning. But the fact remains, that caricature of Wilde was exploded even before his death. It’s not arcane knowledge that he developed an interest in Catholicism while a student at Trinity, or even that he spent one of his Oxford term breaks making a pilgrimage to Rome. Pope Leo XIII received him in a private audience. Wilde wrote some (pretty awful) poems about the experience. Back in London, Fr. Sebastian Bowden of the Brompton Oratory coaxed him to the very point of conversion before Wilde chickened out. There was nothing unlikely about Wilde’s conversion. If anything, it was even money — unless you’re one of those people for whom sexuality is the number-one defining characteristic. In that case, once you know a person is gay or a lesbian, that’s all you need to know; anything that falls outside the mold looks miraculous. For any Catholic looking to win converts and influence people, that’s an impression to avoid giving. 3. Use the celibacy-as-jewel argument. It’s dignifying and ennobling. Besides, everybody likes to feel like a pearl before swine.
<urn:uuid:3661f334-4da7-4dfa-8180-bf304dce9349>
CC-MAIN-2016-44
http://www.patheos.com/blogs/theanchoress/2011/04/29/gays-and-lesbians-affirmative-orthodoxy-a-changing-world/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720468.71/warc/CC-MAIN-20161020183840-00487-ip-10-171-6-4.ec2.internal.warc.gz
en
0.968933
1,640
1.6875
2
Tax fear over £10bn local council debts Published: 5 October 2003 SCOTLAND’S local authorities are in debt to the tune of £10 billion, the equivalent of £2,000 for every person in the country, raising fears that further big increases in council tax are on the way. Figures compiled by the Scottish executive show that the accumulated debt of Scotland’s 32 councils rose by £100m last year, while the amount they receive from the taxpayer to service the debt has topped £900m a year. Opposition parties have warned of a crisis in local government finance, adding that future generations would face a heavy financial burden. The official figures for 2001-02 show a total debt of £9.98 billion, equivalent to £1,970 per head. In 2001 the executive paid out £825m in loan charges to help service the debt, but the annual cost has now risen to £926m. Glasgow city council has the biggest debt, at about £2.1 billion, or £3,606 per head. Edinburgh
<urn:uuid:c3038f82-88f9-4dfa-90c8-08471d7a219a>
CC-MAIN-2017-04
http://www.thesundaytimes.co.uk/sto/news/uk_news/article54410.ece
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00143-ip-10-171-10-70.ec2.internal.warc.gz
en
0.957902
223
1.640625
2
In May Telstra rolled out its SMS Over Wi-Fi system. It was a long time coming and allowed Australians in mobile black spots to send and receive texts via Wi-Fi. But as it turns out, the service is limited to texts only – it can’t send any kind of MMS. Multimedia Messaging Services, or MMS, is a blanket term used to describe messages that include more than just text. If you text an image or video to someone, that’s MMS. Many phones will also convert texts longer than 160 characters to MMS before sending. Currently, Telstra does not support the sending of images, videos or long texts through its SMS Over Wi-Fi service. If you try to send an MMS on a Wi-Fi connection it will not send until your device can access mobile coverage again. A source recently brought this to Gizmodo Australia’s attention. After testing this ourselves and reaching out to Telstra, the telco has now confirmed MMS is not currently compatible with SMS Over Wi-Fi. “MMS is a separate service and works differently to SMS,” a Telstra spokesperson said in an email to Gizmodo Australia. “We are currently working with device vendors to enable it, however the activation date is still to be finalised.” Telstra’s website also discloses its intentions to add the service in the future. Why MMS Over Wi-Fi Matters This lack of functionality may not seem like a big deal; some might argue that sending images or videos isn’t that important. But it could be problematic when it comes to emergency situations. While speaking to impacted rural Australians in May, we discovered how important SMS Over Wi-Fi is not only for convenience, but also for safety. Before Telstra rolled out SMS Over Wi-Fi, some Australians missed out on evacuation texts during the recent catastrophic bushfires. Others were not able to install the COVIDSafe app due to the mandatory two-factor-authentication text. The lack of MMS functionality on this service could prevent people from sending important images or maps during an emergency situation. It could also prevent vital texts from being sent if they exceed the character limit and convert to MMS. While shorter texts could be a solution to this latter issue, this would also be dependent on users being aware of the conversion of longer texts from SMS to MMS. While Telstra has confirmed that MMS Over Wi-Fi is in the works, we don’t know when the service will be available.
<urn:uuid:c18d1a8d-b98b-48a2-b6af-ca21132322c5>
CC-MAIN-2022-33
https://www.gizmodo.com.au/2020/07/telstras-sms-over-wi-fi-mms-cant-handle-your-photos-videos-or-long-texts/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571911.5/warc/CC-MAIN-20220813081639-20220813111639-00475.warc.gz
en
0.938771
544
1.835938
2
Independent front suspension was developed in the 1930s to improve automobile performance by allowing each wheel to respond independently to bumps, ruts and road surface inconsistencies, rather than mounting a chassis on rigid axles. Rigid, or solid beam axles, work well for large vehicles at lower speeds, when responsive handling is not a primary concern, but smaller, faster cars built for performance or passenger use required a more flexible suspension. Independent front suspension has advantages over fixed suspension when it comes to handling and passenger comfort. Other People Are Reading Improved Steering, Handling and Braking In a rigid suspension, if one wheel jogs or bounces, the entire axle tilts, causing the opposing wheel to tip in or out at the top, no longer rolling straight ahead, an effect called "bump steer". Rigid axles are also less responsive on turns and vehicles carrying heavy loads are subject to instability called "shimmy", caused by forces translated across the axle from wheel to wheel. During hard braking, solid beam suspension can cause the front of the vehicle to nose dive and twist. Independent front suspension (IFS) corrects or vastly improves all of these effects by allowing wheels on the same axle to respond independently to driving conditions. Ride quality is a concern that has evolved with our culture's increasing dependency on automobiles for recreational and commuter travel. Overall ride quality, or how comfortable a car feels to ride in or drive, is measured by a combination of factors, including noise and vibration, the translation of bumpy road surface to passengers, the smoothness of the car's steering and how well a car handles and corners. Independent front suspension solves some of these problems by decoupling the front wheels, improving overall stability and creating isolation between the suspension and the vehicle chassis. Size and Fuel Efficiency It is difficult to beat a solid axle for strength and simplicity, but the price of that strength is size and mass. For heavy duty vehicles and the solid steel cruisers of the 1940s and 1950s, a rigid axle made good design sense. As passenger vehicles have got smaller and more performance-oriented, heavy, bulky, rigid axles are no longer practical, particularly because heavier vehicles burn more fuel. Independent front suspensions have evolved with modern car materials, creating lighter, more flexible and responsive vehicles. - 20 of the funniest online reviews ever - 14 Biggest lies people tell in online dating sites - Hilarious things Google thinks you're trying to search for
<urn:uuid:0230cc6d-9611-40e2-bb9f-8a6526154db3>
CC-MAIN-2017-04
http://www.ehow.co.uk/list_6947405_advantages-independent-front-suspension.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00187-ip-10-171-10-70.ec2.internal.warc.gz
en
0.943823
502
3.15625
3
One afternoon in 1975, a prominent social scientist and a future Secretary of State met for lunch. Both were frustrated that the issues the public cared the most about were being ignored in the current presidential campaign. The two men, Dan Yankelovich and Cyrus Vance Sr., decided to form an organization that would work to shrink the gap between leaders and the public. From that fateful lunch, Public Agenda was born. Public Agenda's briefing books were used by the 1976 presidential candidates during their debates. Fostering Progress for 40 Years For our first project, we created a briefing book that alerted Presidential candidates Jimmy Carter and Gerald Ford to the developing crisis of public confidence in government and the deep concerns of ordinary citizens about the economy. Since then, we have supported progress on dozens of issues in hundreds of settings and situations: - In the 80s we brought solid, timely research to the Reagan Administration signaling the American public’s openness to a different relationship with the Soviet Union, and we helped educators better understand the needs of employers. - In the 90s, we published groundbreaking studies of the public’s concerns about K-12 education, and created innovative tools that helped parents, educators, public officials and community partners across the nation work together to improve their local schools and better educate their children. - In the 2000’s, we began an ongoing commitment to the nation’s community colleges, the prime avenue of opportunity for many low-income Americans that has included making vital contributions to the two most ambitious initiatives the nation has ever seen aimed at improving student success: Achieving the Dream and Completion by Design. - Most recently, we’ve worked in half the nation’s states to help colleges better serve America’s students, and unveiled new insights from research into the thorny challenge of how best to engage the public on decisions about containing health care costs. Envisioning the Future To mark our 40th year, we recently announced the launch of two new major initiatives: - Reinventing Opportunity is a ten-year commitment by Public Agenda to help communities and the nation address stagnating opportunity, which we consider to be one of the greatest challenges of our day. In order to meet this challenge, we will attack three critical questions: - How to ensure high-quality educational opportunities for all - How to create more good jobs and economic security - How to engage citizens more meaningfully in politics and public life - The Yankelovich Center: Advancing Civic Engagement will develop, disseminate and apply our co-founder’s seminal ideas about democracy, ideas that have profoundly influenced our own work. The Center will ensure that these ideas continue to sharpen and evolve to meet the changing challenges of the day. Because you’re reading this page, we know you’re a fan and supporter of Public Agenda. We thank you for that, and we hope you continue to support us. Here are a few ways you can help us build a democracy that works for everyone: Thanks again for your support! President and staff of Public Agenda join co-founder, Daniel Yankelovich (center front), to celebrate our 40th anniversary. New York City, 2015
<urn:uuid:b520339d-f774-4598-b6dd-74ed53dff2f5>
CC-MAIN-2017-04
http://publicagenda.org/pages/our-story
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280410.21/warc/CC-MAIN-20170116095120-00448-ip-10-171-10-70.ec2.internal.warc.gz
en
0.949169
662
2.515625
3
As much as we enjoy sci-fi and gaming entertainment, we also recognize the importance of STEM (science, technology, engineering, math) education. After all, STEM not only advances civilization, but it also provides great sci-fi story lines and awesome games! So Nayah supports STEM initiatives that encourage those from all ages and backgrounds to learn and excel. Enjoy our sci-fi and gaming content, and check out our STEM projects. The future belongs to us all.
<urn:uuid:5a6b5f55-8b3b-47ca-95b1-e3a6a9658481>
CC-MAIN-2017-04
http://nayahsolutions.org/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00171-ip-10-171-10-70.ec2.internal.warc.gz
en
0.923982
97
1.773438
2
FUR IS NATURAL AND ENVIRONMENTALLY SOUND By: Mark Schumacher Date: 09/26/1991 Category: | Animal Rights Extremism | This letter was written to a sixth grade student by Mark Schumacher, an NAIA board member and furrier, and was first published in an early NAIA Newsletter. Dear Ms. Norte: Your Animal Rights club is an interesting idea, as I support freedom of thoughts and association. However, freedom of thoughts and the expression of those thoughts should be founded on solid facts, not emotion. The concept of Animal Rights states that we should not use animals for any human purposes, including food, clothing, entertainment, or medical research. If you want to be consistent in your thoughts, you may not eat or drink anything which is made from an animal life form: meat, poultry, eggs, fish, milk, cheese, honey, bakery products using butter and eggs, marshmallows, and on and on. You may not have leather shoes, belts, purses, furs, wool, circuses, rodeos, or keep pets. Furthermore, you should not use any medicines or cosmetics which have been tested for safety using animals. Now then, if you are concerned about animal welfare, that is a different issue. Some people abuse animals, pets, livestock, etc., and they should not. However, most farmers take excellent care of their animals because it is in their best economic interest to do so. Sick or abused animals do not produce a salable product. If the planet Earth is going to be saved from destruction, we cannot rely on synthetic clothing for our future existence. The extraction of oil is killing the environment by the spilling of oil and the taking of the animals' habitat or home. The processing plants used to make artificial fibers pollute the air (acid rain and the depletion of ozone), streams and rivers and create toxic waste. The clothing (fake furs, nylons, rayons, and polyester) made from these synthetic products fill up our landfills and are not biodegradable. As to the extinction of animals, the fur industry does not use any endangered or threatened species and will not in the future. Ninety-five percent of the mink used by the fur industry are farm-raised. They eat fresh byproducts from the agricultural industry which are not desired by humans but are loved by the mink. If it were not for the mink, these byproducts would fill up our landfills, rivers, or be burned, none of which is environmentally sound. The animals are not tortured or otherwise abused during their lives, as this would not produce a desirable pelt. The mink are killed by cool carbon monoxide. It is painless. The manure produced by the mink is spread on the mink rancher's farm and is a natural fertilizer, not oil-based and not polluting. The tanning of the mink uses salt and alum, which is put into the sewer system and welcomed by sewage treatment plants because they help to break down the sewage. There are no harmful or polluting chemicals used by our industry. To make a fur coat requires only cotton thread, electricity for our sewing machines and silk for the lining - no large polluting factories or large amounts of energy. The fur coat will last 40 years or more, thus requiring only one purchase in a lifetime. Thus fur can be restyled and reused from generation to generation. Finally, when it has finished its useful life, it biodegrades (rots) in six months, back to the earth from where it originally came. In Genesis 1:28 and Genesis 3:21, God gave man use of animals for his benefit and put skins of animals on Adam and Eve. I think that using natural fibers is the way God intended us to live. They are renewable, sustainable, reusable, biodegradable, and environmentally compatible. The use of animals has been Mother Nature's choice for one million years. I think it's the natural choice for one million more years. You are correct: there is only one world. I ask that you think about whether or not synthetics are the way of the future for this world rather than the agricultural products managed and used by man in a well thought-out, scientific manner. I took the time to answer your letter because I feel you are smart enough to think through these long-term environmental questions. One day maybe you will be part of a Natural Fibers Club." It will definitely be the only way of the future for the Planet Earth. I invite the Animal Rights Club to come to Schumacher Fur Company so I may show you our natural product and talk about our planet and what we can do for its future. Thank you for your concern, Mark Schumacher, vice president Schumacher Fur Company About The Author All Authors Of This Article: | Mark Schumacher |
<urn:uuid:2ddab5f1-6af0-4ea7-800b-d6663041443d>
CC-MAIN-2017-04
http://www.naiaonline.org/articles/article/fur-is-natural-and-environmentally-sound1
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00323-ip-10-171-10-70.ec2.internal.warc.gz
en
0.947489
1,021
2.453125
2
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Subject Index][Author Index] RE: Perching, climbing, roosting was Re: 11th specimen of Archaeopteryx > Date: Sat, 12 Nov 2011 15:44:51 +1100 > From: firstname.lastname@example.org > To: email@example.com > Subject: Re: Perching, climbing, roosting was Re: 11th specimen of > Anthony Docimo <firstname.lastname@example.org> wrote: > > Really? What part of a goat is adapted for gripping branches? > It's not "adapted for gripping branches". It's adapted for climbing > challenging substrates, specifically rocks and narrow ledges. There's > a reason why we say "as nimble as a goat". I've seen some pretty...*...ninja images of the non-avian raptors. Some of those images were by our own Greg Paul. * = looking for a word..."acrobatic"? "yoga-ish"?... > >> Mammals aren't reptiles. Never have been. > > as long as the word exists, people will use it. best you get used to it. > > (and I know you know what I meant by "reptiles" in the first > > place) > Nup, I'm not getting used to it. I've nothing against the word > "reptile" - turtles, lizards, snakes, tuataras and crocodiles are all I forget which publication or book I read it in, but I recall reading that the Tuataras are as closely related to snakes+lizards (and-or) to turtles (and-or) to crocodiles+birds...as they are to mammals. > But the amniote line that lead to mammals split off from > the line that led to reptiles, and the mammal ancestor was never a > reptile itself. The ancestors of mammals never had scaly skin - they > had glandular skin, like us humans. I'm not being pedantic here Glad to hear it...so could you tell me which publication has the write-up of the discovered skin of those mammal ancestors? I'd like to read it. > the cause of "phylogenetic correctness". But the claim that mammals > evolved from reptiles is incorrect, > and needs to be jettisoned - along > with the term "mammal-like reptile". Good luck with that. seriously. > > So in other words, "no theropod could ever be in a tree. ever. full stop." > I never said that. word for word, no you didn't, true. I was trying to summarize your position. > > heck, I'm sure the mammals (Mammalia) have overcome constraints of their > > own - constraints that surely separate them from their > > ancestral clades. > Mammals overcame these constraints by evolving new adaptations. These > adaptations are usually clearly evident in their skeletons. After the fact, yes. In the descendant clades, yes. But in the radiations which include the ancestral line working to overcome the limitation? That seems to be what we have with the protobirds.
<urn:uuid:54360b10-5546-43fb-99d9-1b26f91f8f90>
CC-MAIN-2017-04
http://dml.cmnh.org/2011Nov/msg00268.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00047-ip-10-171-10-70.ec2.internal.warc.gz
en
0.948981
718
1.578125
2
Premier Robert Ghiz says the Supreme Court of Canada’s ruling that Ottawa cannot unilaterally reform the country’s Senate is good news for Prince Edward Island. Ghiz says P.E.I.’s submission to the court argued the federal government cannot make changes without the consent of the provinces. Canada’s top court agreed. “This is not only good for this decision, but for other decisions… it shows that a provinces still do have a say, regardless of their size and that was an important component when we look back to the forming of our nation,” Ghiz said. In a historic, unanimous decision, the Supreme Court advised that the prime minister’s proposals to impose term limits on senators and create a “consultative election” process to choose nominees cannot be done by the federal government alone. Rather, the court said such reforms would require constitutional amendments, approved by at least seven provinces representing 50 per cent of the population — a route fraught with political landmines that Harper had hoped to avoid. Moreover, the court set the bar even higher for abolishing the Senate, something Harper has threatened to do if his reform agenda is stymied. Getting rid of the chamber altogether would require the unanimous consent of all 10 provinces, the eight justices said. Harper sought the top court’s advice after a number of provinces, including P.E.I., strenuously objected to the federal government’s plans to proceed unilaterally with its reform proposals. Ghiz said Friday he realizes the Senate is not perfect, but that’s not the issue. Ottawa simply cannot make sweeping changes like reforming or abolishing the Senate without working with the provinces - even the smallest one, he said. “It was a good decision from Prince Edward Island’s perspective that we can’t be steamrolled. Yes, we may be small, but we still do have a say on important constitutional matters in our country.” Ghiz did not want to get into the details of the reforms that have been proposed by the Harper government, saying the Red Chamber and its goings on are not one of his priority concerns. But he also doesn’t believe Senate reform was really one of Harper priorities either. “The Senate wasn’t really at the top of his agenda, I think it goes back to the old Reform agenda, where Reformers wanted to get rid of the Senate,” the P.E.I. premier said. “I think it was just something that was more of a distraction than anything else.” Ghiz said he hopes the feds will now turn their attention to more important issues facing Canadians, like funding for health care and support for post-secondary education. “Let’s forget about the Senate,” Ghiz said. “Let’s allow it to do their job and for those Canadians who are upset with the Senate, perhaps pay a little more attention to it and watch who prime ministers are appointing.” With files from The Canadian Press.
<urn:uuid:11c7670f-d273-4b2e-81cb-f2ad03c99c68>
CC-MAIN-2017-04
http://www.theguardian.pe.ca/news/local/2014/4/25/senate-ruling-good-news-for-p-e-i-says-3702254.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00046-ip-10-171-10-70.ec2.internal.warc.gz
en
0.961606
650
1.570313
2
Lappans in Washington County, Maryland — The American Northeast (Mid-Atlantic) Erected by Maryland State Historical Trust / Maryland State Highway Administration. Location. 39° 33.218′ N, 77° 44.204′ W. Marker is in Lappans, Maryland, in Washington County. Marker is at the intersection of Lappans Road (Maryland Route 68) and Sharpsburg Pike (Maryland Route 65), on the right when traveling west on Lappans Road. Click for map. Marker is in this post office area: Boonsboro MD 21713, United States of America. Other nearby markers. At least 8 other markers are within 4 miles of this marker, measured as the crow flies. Jones’s Crossroads (about 300 feet away, measured in a direct line); Council of War (approx. 1.8 miles away); Booth’s Mill Bridge (approx. 1.8 miles away); Roxbury Mills Bridge (approx. 1.9 miles away); Rose's Mill Bridge (approx. 2.9 miles away); Claggett’s Millrace Bridge (approx. 3.2 miles away); Claggett's Mill Bridge (approx. 3.2 miles away); Battle of Funkstown (approx. 3.7 miles away). Categories. • War, US Civil • Credits. This page originally submitted on , by Craig Swain of Leesburg, Virginia. This page has been viewed 1,471 times since then and 33 times this year. Photos: 1, 2. submitted on , by Craig Swain of Leesburg, Virginia. 3, 4, 5. submitted on , by Christopher Busta-Peck of Shaker Heights, Ohio. • J. J. Prats was the editor who published this page. This page was last revised on June 16, 2016.
<urn:uuid:fdbb2d12-5519-42d2-b541-2c1cbe0fa8db>
CC-MAIN-2017-04
http://www.hmdb.org/marker.asp?marker=1989
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284352.26/warc/CC-MAIN-20170116095124-00195-ip-10-171-10-70.ec2.internal.warc.gz
en
0.908889
396
2.3125
2
NYC Mayor opens East River Waterfront Park New York City Mayor, Michael R. Bloomberg and other city officials were on hand last week to open the first section of the new East River Waterfront Park. Part of a larger $165m project that will eventually revitalize a two mile stretch of the city’s waterfront from the tip of Manhattan to just north of the Manhattan Bridge, the new park will transform the Lower Manhattan and East River waterfronts into a pedestrian-friendly and vibrant public open space destination with sweeping views across the East River and New York Harbour. Designed by SHoP Architects with Ken Smith Landscape Architect, the new esplanade - open to the public from 6:00am to midnight - provides much-needed outdoor public space for residents, office workers and visitors. Along with new plantings and trees comprised of native coastal species, the park incorporates seating elements evocative of the area’s maritime past and elevated bar stool seating that offers visitors an opportunity to sit next to the railing and look out over the water toward Brooklyn. The railing also doubles as a tabletop on which users can eat, use a laptop or read. The esplanade also features chaise lounges, game tables, planter walls and waterside benches. The so-called ‘Look-Out’ area, a series of stadium-like steps leading to the water at the foot of Wall Street, will enable visitors to sit and observe the water with unobstructed views. For dogs, there is a dog park featuring a climbing bridge, sand pit, splash pad and doghouse. The entire esplanade is unified by a newly installed purple girder underneath the FDR Drive that will be illuminated at night and visible over the esplanade and across the river. “The new East River Waterfront Esplanade is the newest jewel on New York’s magnificent Harbour”, said Mayor Bloomberg. “One of the goals of the waterfront plan we unveiled earlier this year is to reconnect New Yorkers to New York City’s more than 500 miles of waterfront and make it part of their everyday lives, and the new esplanade will do that for Lower Manhattan’s tens of thousands of residents, 300,000 plus workers and millions of visitors." Conceived in 2002, completion of the larger project is slated for 2013.
<urn:uuid:6fcee44f-c723-413a-89a7-454c9718e44b>
CC-MAIN-2017-04
http://www.worldarchitecturenews.com/project/2011/17184/shop-architects-pc/east-river-waterfront-park-in-new-york.html?region=1
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00546-ip-10-171-10-70.ec2.internal.warc.gz
en
0.915011
482
1.617188
2
One of Google Drive’s much-anticipated features launched on September 16, 2020 – shared folders in shared drives. While it may seem like a simple feature, up until last year, it was impossible to share individual folders within shared drives. This additional feature uses granular shared permissions within a shared drive, to allow exclusive access to particular folders and files, and creating security when sharing folder structures with internal and external organisations. Damson Cloud had beta access to this Google feature but didn’t have the opportunity to demo it for their customers. Fintan Murphy guides us through the power of granular shared permissions and how they can revolutionise how you do collaborative sharing in the future. What Can Granular Folder Permissions Do? Up until now, organisations could only add people to an entire shared drive, so if you added someone, they would have access to every single file or folder within the shared drive. As an administrator, you can give individuals or external organisations different permissions to influence how they interact with a file. This can be either a viewer, editor, commenter, contributor, content manager, or a manager which allows full administrative access. Users could be added to a file but not a folder, and through granular permissions, access has become more advanced. Now, organisations can go into an online folder and add a user into them. This gives a user access to files or folders within the shared drive that you have given them permissions for. Granular folder permissions also allow you to manage the access of the user within a folder. If you want to allow a user to access particular folders and not the full shared drive, then you are able to do this while assigning them a specific role in the permissions like a contributor. The only limitation for a user who has specific permissions is that they are unable to be ‘managers’. This is due to administrative access only being given to users if they are part of the whole shared drive. Sharing Permissions: Who Has Access? Now, you’ve shared a folder with a user, the sharing permissions can be broken down into three categories: All, Guests, and Members. There was some speculation on how Google would reflect permissions to end-users when they added someone to a subfolder. As an end-user, you are able to see everyone on the shared drive and those users who have had specific folders shared with them. If you have added someone solely to a folder then they can be viewed as a ‘guest’ because they have limited access to the shared drive. Members are those who are added to the shared drive rather than a specific folder or file. If we view an individual file and view the permissions you will notice that they are exactly the same as folders. You will be able to see the members or the guests of the file. If you add a user to a specific file, they become a ‘Guest Editor’ of that particular file, but not to the whole folder as their actions are only limited to that particular document. How Can Granular Shared Permissions Help Me? A challenge for many customers when operating within collaborative documents is offering access to individuals or external organisations. Companies may want to share a folder or document without giving permissions for an entire shared drive. This could be external or internal. Perhaps, the HR department has a set of files that they want to share with different departments but they don’t want to give them permissions for all of the documents in that folder as they may be of a sensitive nature. Sharing individual files or folders within that folder structure allows for the necessary permissions to be shared without compromising confidentiality. This also applies to external parties where a company may wish to share a folder or document with a client without giving them permissions for documents that are irrelevant to them. Having more complex folder permissions also means taking more care around how you set up the folder structures. This includes thinking about how documents are shared internally and externally. Understanding how to share work restrictively, especially externally, is crucial for protecting company assets. As a longstanding member of the Google Cloud Partner Program, Damson Cloud specialises in bringing people and ideas together through new ways of working. We champion change management and digital transformation using some of the internet’s most trusted solutions, including Google Workspace, Happeo and Jamboard. To find out more about our services, check out our library of tutorial videos or our blog.
<urn:uuid:cc5b1aa1-e32d-4690-b9a1-087e3867c3f4>
CC-MAIN-2022-33
https://damsoncloud.com/folder-sharing-in-shared-drives/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00271.warc.gz
en
0.951329
906
2.09375
2
|Location||Northern Pacific Ocean| |Area||1,571.41 sq mi (4,069.9 km2)| |Length||95 km (59 mi)| |Width||116 km (72.1 mi)| |Highest elevation||9,373 ft (2856.9 m)| |Highest point||Mount Shishaldin| |Pop. density||0.02/km2 (0.05/sq mi)| It is the easternmost island in the Aleutians and, with an area of 1,571.41 square miles (4,069.93 square kilometers), the ninth largest island in the United States and the 134th largest island in the world. It is home to Mount Shishaldin, one of the ten most active volcanoes in the world. According to the United States Census Bureau, there were 64 people living on Unimak as of the 2000 census, all of them in the city of False Pass at the eastern end of the island. Cape Lutke is a headland on the island. Cape Pankof is located at the extreme southwest of the island. The Fisher Caldera is a volcanic crater in the west-central part of Unimak. Some characteristics include many volcanic cones and undrained lakes. It is named for Bernard Fisher, a U.S. Geological Survey geologist who was killed in Umnak Pass. When the Alaska National Interest Lands Conservation Act was passed on 2 December 1980, 910,000 acres (370,000 ha) of the island was designated as wilderness. This area is managed by the United States Fish and Wildlife Service as part of the Alaska Maritime National Wildlife Refuge. As a faunal extension of the Alaska Peninsula, Unimak has a relatively diverse assemblage of terrestrial mammals, including Alaska Peninsula brown bears and porcupine caribou. West of Unimak Island, the largest native mammal in the Aleutians is the red fox. Scotch Cap Lighthouse was built in 1903 and was staffed by the US Coast Guard. On April 1, 1946, during the 1946 Aleutian Islands earthquake, the lighthouse was struck by a tsunami. Even though the lighthouse was 98 feet (30 m) above the sea, the lighthouse slid into the sea, killing five Coast Guard personnel. - Bergsland, K. (1994). Aleut Dictionary. Fairbanks: Alaska Native Language Center. - "Unimak Wilderness". Retrieved 2014-11-17. - Prints of Poetry - A Gratitude Company (1946-04-01). "Ak - Scotch Cap Lighthouse". Titanic-nautical.com. Archived from the original on 2010-06-27. Retrieved 2017-12-16. - DrGeorgePC website with photos
<urn:uuid:4ab07676-73d2-4510-afe0-0e8fd4ae7a4c>
CC-MAIN-2022-33
https://en.m.wikipedia.org/wiki/Unimak_Island
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00070.warc.gz
en
0.895851
667
2.828125
3
Dictator, the third instalment in Robert Harris’s trilogy of novels following the rise and fall of the Roman statesman and orator Cicero, marks the culmination of 12 years of work and a remarkable literary achievement in the marshalling and distillation of the source material alone. Those turbulent years of the first century BC that saw the collapse of the Roman republic and the transition to empire remain one of the best-documented periods of classical history, and so many of Cicero’s writings have survived that Harris is able to blend his hero’s own words seamlessly with invented conversations to create a full-blooded and authentic portrait of this extraordinary politician and philosopher. Unlike the previous book, Lustrum (2009), which began with the discovery of a murder, Dictator opens less obviously in the thriller mode, though its pace is no less relentless, as Harris takes us at a clip through the 15 years between Cicero’s exile in 58BC, as a result of the Cataline conspiracy detailed in Lustrum, and his eventual death in 43BC. Those years, Harris explains in his author’s note, are “arguably – at least until the convulsions of 1933-45 – the most tumultuous era in human history”, as the Roman republic governed by the triumvirate of Pompey, Caesar and Crassus fragments into civil war under the pressure of Caesar’s ambition. Like its two predecessors, Dictator is narrated by Cicero’s slave and amanuensis, Tiro, who outlived his master, invented a form of shorthand and really did write a multi-volume biography of Cicero. This lost work lends authenticity to the familiar literary device of presenting the hero through the eyes of the lower-status companion who knows him best. But Harris makes his Tiro an engaging character in his own right; shadowing Cicero through the corridors of power, he offers a wry commentary on the machinations of great men and is not above questioning his master’s judgments, though he notes early on: “How easy it is for those who play no part in public affairs to sneer at the compromises of those who do.” For much of this period, Cicero is obliged to compromise just to stay alive. As the balance of power shifts in Rome, he often finds himself at one remove from the heart of the action, either in exile or effective exile, sent to govern a distant province or made to give assurance that he will take no further part in political life – a promise he finds impossible to keep for long, though these forced retreats afford him time to write and allow his family relationships to come to the fore. Of these, the most engaging is with his daughter, Tullia, to whom he is devoted; she is the most fully realised female character in what is perhaps inevitably an almost entirely male book, but these glimpses of Cicero’s home life humanise and ground his character. Throughout the trilogy, Harris has presented Cicero as an honourable man who thrives on the danger and adrenaline of public life, but whose motivation is always, ultimately, a belief in the republic and its values. Nowhere is this duty, courage and honour more evident than in the novel’s final section, as Cicero bursts back on to the political stage after the assassination of Caesar and briefly regains his former glory as he makes one last bid to shore up the republic against the threat of Mark Antony. Harris ratchets up the pace here so that, even though we know Cicero’s fate, there is a compulsive tension in watching him hurtle unstoppably towards it. Harris’s style is a curious blend of contemporary idiom (Pompey and Crassus are said to stand for election “on a joint ticket”) with Latin vocabulary so precise it requires a separate glossary; while the modern language may jar with historical purists, the research underpinning it is so meticulous that the reader feels wholly absorbed into Cicero’s world, and this is Harris’s real achievement. Dictator is a fitting finale to a trilogy that is likely to stand alongside the works of Robert Graves and Mary Renault as an enduring imaginative vision of the ancient world.
<urn:uuid:140d7de3-b1ae-48a1-9204-69dfc6c9e02e>
CC-MAIN-2017-04
https://www.theguardian.com/books/2015/oct/18/dictator-robert-harris-review-cicero-remarkable
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00327-ip-10-171-10-70.ec2.internal.warc.gz
en
0.962069
888
2.328125
2
The positivity of your mind breeds inspiration in the right perspective of life and this will definitely result into wealth creation. Let it be known to you that life will definitely give back to you what you give to it. The kind of life you want to live will be determined by your ability to work on yourself especially on your mind. The mind is the cradle of your existence; it is the battle field of life where you have so many issues fighting for or against your achievements and success in life. It is my candid opinion that the world can be a better place if we have people who are ready to take the right step at the right time, why because it does not take a century to make a change it only takes the right choice in a right place at the right time. The mind is very spectacular in its operating process; it is very active in the fulfillment of your destiny because if you fail in your mind you definitely fail in your destiny. Every change of your life begins in your mind so the focus of your mind should be towards change, because the only constant thing in life is change. Even if as at now you are a millionaire, I am sure your thought will tend towards increasing your asset, property and making sure that it is properly protected. This is part of the work of the mind to make sure that things are put in the right perspective. Also a man who has nothing, I mean in terms of assets and properties will definitely either put his mind towards being rich or staying where he is presently, however change in a man’s life is inevitable. Like I said in my last post, the mind is a battle field and so many issues raises head to be solved, but a man who has nothing will accept or refuse to be at the same position. The position of a new man is very clear and straightforward, it is that which stands and take position in the battle of life which starts in the mind. He determines to conquer and stay at the top of it, he never relinquishes that position rather he holds on to it. You can be that man that you desire to be in life that man that has control over the mind in all issues of life it only takes discipline and the desire for a change. The controlling power lies in you and if you effectively take charge you will be termed as a new man.
<urn:uuid:d9006eb5-2437-4a55-bd89-c03896c64c4b>
CC-MAIN-2022-33
https://creditandfinance.net/wealth-building/a-new-man.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00679.warc.gz
en
0.967081
473
1.726563
2
Secure code is software that doesn't create security vulnerabilities on your computer. Previous versions of IIS, for example, included a number of vulnerabilities that attackers could use to gain unauthorized access to your servers, and so could be considered insecure code. So how can you tell if code is secure? There's no easy way, because modern software is very complex, and you as an administrator don't have much input into how it's created. In fact, you can make the point that no code can ever be considered completely secure. However, you can decide which software authors?both individuals and companies?you trust to do a good job of writing secure code. As long as you can guarantee that your software comes from them with no alterations, you can trust the code to be as secure as possible. Windows Server 2003 includes the ability to run signed code, which is software that carries a digital signature. The signature gives you two guarantees: The software definitely comes from that particular author or manufacturer. The software has not been altered since it was signed. Code signing uses public key encryption to produce a digital signature (see Chapter 9 for more details on this process). The software author uses code signing software, along with a private encryption key issued for the purpose of signing code. The signing software examines the author's software code and produces a checksum. The checksum is a reasonably unique number produced by a mathematical algorithm, and any given software code will always produce the same checksum. If so much as a single byte of the code is altered, the checksum will be significantly different. The signing software encrypts the checksum using the author's private encryption key. The encrypted checksum, known as a digital signature, is attached as part of the software code file, making it available to anyone who receives the software. The signing software also attaches the digital certificate that contains the software publisher's public key. When a user installs or downloads the software, Windows automatically retrieves the author's public encryption key from the certificate that is distributed in the file. This certificate is first validated to ensure that it is authentic and can chain to a trusted public root. Windows next uses the public key to decrypt the checksum. The computer then runs the exact same checksum algorithm on the files that are digitally signed and verifies that the resulting checksum matches the now-unencrypted checksum. If it does, the computer knows two facts: The software hasn't changed since it was signed by the author. If the software has changed, the computer would have generated a different checksum than the one contained in the software's digital signature. The software was, in fact, provided by that specific author. If it was signed by someone else, the author's public key would have been unable to decrypt the digital signature in the first place. So how dangerous is unsigned code? Examining the protections that signed code provides, you can imagine the dangers that unsigned code can represent: Software could be sent to you by attackers, yet made to seem as if it came from a reputable author. For example, an attacker could send malicious code and make it seem as if that code had come from Microsoft or another trusted software publisher. This is a common tactic used by attackers. Internal file shares can be populated with malicious applications such as trojans and backdoors, or existing business application share points can be replaced with such undesired programs. Users may unknowingly install these applications and expose their computers to attack. Legitimate software could be modified to include additional, malicious code. Without the verification provided by a digital signature, virus code could be added to software, compromising your network's security. Internal software file shares could be compromised, and normally trusted code could be replaced with malicious code. In this type of attack, a single compromised file could affect many users throughout an organization. Many applications have their own application language, such as macros that run within Microsoft Office. These macros can be dangerous and have caused considerable damage in the past. They can now be signed just like any other code to ensure their unaltered state and help provide some assurance against attack. While not all unsigned software is inherently evil, unsigned software always presents a risk. Even if the software's author is trustworthy, unsigned code provides no assurance that the software wasn't modified after it left the author's hands or even that the software really did come from that author. For example, a software vendor could email you a perfectly innocent update to one of your applications. Without a digital signature, though, you have no way of knowing if someone intercepted the email and modified the software update for her own nefarious purposes. This is referred to as a man in the middle attack, because someone between you and your trusted software vendor modified the code.You can assume that most malicious code is unsigned, but that's not an absolute, as many spyware and malware applications are signed by well-known root CAs. As an extension of these principles, any software produced by your company's own software developers, if you have any, should be signed. Signatures will ensure that the code is never modified to include a virus and that the software really did come from your company's internal software developers. As you'll learn in Chapter 9, you can even issue your own digital certificates for internal use, reducing the cost of signing software. Medical Office Update Attack An attack occurred in 2002 that could have been prevented by signed software and ensuring the client computers verified the signature before execution. The names in this example have been omitted to prevent embarrassment. A well-known software manufacturer has a large installed base for its medical office software. This software is expensive and requires frequent updates because of changing insurance regulations, privacy laws, and the like. Until recently, this manufacturer distributed software updates to customers who paid for maintenance by sending a CD in the mail. However, the rising cost of manufacturing and postage inspired a cost-cutting effort. The manufacturer moved to distribution of its software updates via email. It informed its customers via email and letter that they would be receiving their updates monthly in email. They simply needed to read their email on the computer running the medical office software and double-click the attachment to update their system. For protection, they should ensure that the From: field in email was from the software company. This worked well, until a group of attackers decided to propagate a virus to the medical offices. The attack was almost too simple. They obtained a list of doctors' offices and their email addresses through a series of social engineering attacks against both the software company and the offices themselves. They then constructed an email body similar to the legitimate body. The attachment contained the virus and some simple code that created a dialog box, informing the user that the update was successful. To distribute the virus, the attacker spoofed the email so that it appeared to be sent from the software manufacturer's technical support center. Because of the large number of insecure email servers available on the Internet, the attack was launched from several servers to help disguise the true source of the attack. This attack was quite successful; many doctors' offices lost all their records since their last backup, and in more than one case, there was no backup at all. The flaw that allowed this exploit to occur is the assumption by all parties that email attachments from sources you trust are always safe. This assumption has been exploited in the past but usually not to this extent. To counter this exploit, the software manufacturer could require all computers running its software to enforce software restriction policies. It could then distribute its code and updates, digitally signed, with confidence that the systems would remain secure. Although this might impact other applications running on the medical office computers until those applications were available with digital signatures, it is almost certainly worth the inconvenience to ensure the security and confidentiality of this information. Reputable authors have no reason not to sign their code to provide you with those assurances. Signing code requires a software utility, which Microsoft and other vendors provide for free. A code signing encryption key pair costs between $300 and $1000 per year, depending on the certificate vendor the key pair is purchased from. Once purchased, the key pair can be used to sign an unlimited number of software packages. Code signing is not an expensive proposition, and reputable authors can easily justify the expense. Companies can even sign their code with a self-produced key and provide you with the public portion of the key. This technique requires a bit more effort on your part, since you have to download the key, but it allows publishers to sign their code for practically no cost whatsoever. Code signing applies to two types of software: device drivers and regular software applications. Device drivers are pieces of software that interface with hardware, such as a mouse or removable storage device. Signed device drivers are especially important, because device drivers execute with special and powerful permissions under Windows in kernel mode. A maliciously written (or modified) device driver can cause an incredible amount of damage to a computer or network. Regular software applications are the ones you and your users run on a day-to-day basis. These can do a great deal of damage, too, especially if executed by an administrator, since administrators have such wide-ranging capabilities on the network. In fact, the potential for a malicious application to use your administrator credentials to wreak havoc is a primary reason behind POLA, the principle of least access, as discussed in Chapter 2. If you use your administrator user account only when you actually need to perform administrative tasks, you'll reduce the likelihood that a malicious piece of software can use your credentials.
<urn:uuid:85212a76-1775-45f9-89f4-f4071869d670>
CC-MAIN-2016-44
http://etutorials.org/Server+Administration/securing+windows+server+2003/Chapter+6.+Running+Secure+Code/6.1+Identifying+Secure+Code/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721027.15/warc/CC-MAIN-20161020183841-00550-ip-10-171-6-4.ec2.internal.warc.gz
en
0.960774
1,947
3.796875
4
Emperor angelfish is probably one of the most prominent angelfish in the aquarium trade. It is both vibrantly colored and graceful and is often referred to as the ‘Crowning jewel’ of the aquarium. Because of its bright coloration, mostly aquarists shortlist this fish for their aquariums. It is a favorite among nature photographers as well. Although emperor angelfish is fairly hardy, it should only be kept under the supervision of experienced fish keepers due to their strict water parameters and tank size requirements. Whilst this fish is well recognized and very popular, it comes with a comparatively high price tag as well. Moreover, caring for emperor angelfish requires a good understanding of the basic needs of this fish. This post has the basics of Emperor Angelfish care to make you ready to own one Emperor Angelfish – Overview The common name of this fish is emperor angelfish and also called Imperator Angelfish. The scientific name of emperor angelfish is Pomacanthus imperator. Habitat or Origin The emperor angelfish is a reef-associated species that is native to the Pacific and Indian Oceans. It lives in the areas of the Red Sea to Hawaii and the Austral Islands. This fish lives in either rocky habitat or outer coral reef at depths of around 5–60 m. In the wildlife, Emperor angelfish can easily reach a length of up to 15 inches. However, it is unusual for the fish in an aquarium to grow this long due to space issues. Most of the fish in the aquarium will grow to a maximum length of 12 inches. Emperor angelfish transforms its appearance through different phases of its life (juvenile, sub-adult, and adult). In all of these phases, it undergoes drastic changes in its appearance. Juveniles have a black-colored body covered with C-shaped bands. They usually have three thick white bands. Sapphire blue bands separate these white ones. In the sub-adult phase of life, their appearance starts transforming into that of a fully matured adult. Adults have yellow and blue horizontal stripes on their bodies. The fins of both juveniles and adults are rounded and well blended within the fish body to create a uniform shape. Because of their unique appearance, Emperor angelfish is a vivid addition to your aquarium. The average life span of this fish is more than 20 years (yes you heard it right). Emperor angelfish is very sensitive to water parameters and is prone to getting different diseases if tank conditions are not up to the mark. To avoid this and give them a longer than expected lifespan, you have to diligently work to meet their needs. Emperor angelfish is omnivorous in nature. It, sometimes, eats plant-based foods. But most of the time, it hunts for prey like crustaceans, larvae, insects, and the rest of the meaty foods. If you want your emperor anglerfish to truly thrive, make sure that you recreate a protein-rich diet as much as possible in the tank. When it comes to protein intake, chopped scallop, shrimp, and little pieces of squid are emperor fish’s favorite. For plant-based foods, you can go for either marine algae or spinach. You can also feed your emperor angelfish with vegetables like blanched peas, zucchini, small portions of shredded lettuce, and cucumber. It is very difficult to identify the gender; only when we have 2 Adults we can attempt, as Males are a bit larger and the coloration behind the eye is much darker in males. Emperor angelfish has a semi-aggressive nature. So, you have to be extra careful in the selection of their tank mates. Tang fish species are also one of the favorite tank mates. You can choose to keep a bonded pair of Emperor angelfish in a tank. Even a trio of one male and two females is also fine. But avoid placing two males together in a tank Ideal Tank Conditions If you are keeping juveniles in your aquarium, the recommended tank size is at least 125 gallons. If you plan on keeping an adult or a pair of them, increase that size up to at least 180 gallons. Adult fish will need even more space. Fully-grown fish are supposed to live in tanks with no less than 220 gallons. As usual, if you provide them with an even larger space, this fish will be even happier. Ideal pH should be 8.1-8.4 and remember they are very sensitive to fluctuations in water parameters. Breeding emperor angelfish is pretty difficult when they are kept in a tank. They require a large space to breed successfully. Most of the aquarists do not have an aquarium with a space large enough to encourage spawning with this fish. Their breeding is quite easy in massive environments like open oceans but almost impossible in a tank environment. They have a spawning mode of reproduction. When they get ready to spawn, both females and Male rise closer to the water surface. The female distributes her eggs which drift to safety. A much larger space is required for this process which is rarely available in an aquarium. Unfortunately, they are prone to developing several diseases. The Emperor angelfish are at high risk of experiencing these common diseases: Marine Velvet, Ich, and Head and Lateral Line Erosion Disease. Depending on the size, you would be able to own one of them between 125$ to 225$ in the USA. What to look at when buying Look for any white spots, torn fins, wounds near the mouth stay away from buying them. Buy the one which is active in the store. Species in the Market Queen angelfish, Semicircle angelfish, Regal angelfish.
<urn:uuid:de7494f6-ab8f-4ead-832f-3c8d1615b3c3>
CC-MAIN-2022-33
https://fishkeeping.info/every-information-about-emperor-angelfish/?amp
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00075.warc.gz
en
0.951414
1,243
2.328125
2
By MARK SIMON The following essay is an excerpt from The Bill James Handbook 2022, available now from ACTA Sports. Sometimes in baseball, things happen early in the season that set a tone for the entire In Shohei Ohtani’s case, his first series of the season foreshadowed much of what followed. He lived up to the hype. The Home Run Ohtani homered in the ninth inning of his second game of the season. I’d categorize it as impressive since it came off White Sox closer Liam Hendriks, but it wasn’t His second home run of the season—hit 451 feet off a 97-MPH eye-approaching fastball from Dylan Cease—that one was something else. You know how sometimes you’ll hear a baseball analyst say a player’s home runs sound different than everyone else’s? This one did. “A POWWWW with an echo to it,” said Angels broadcaster José Mota, who worked most games at home from field level and got to see and hear much of Ohtani’s work Ohtani’s 46 home runs were one shy of his total in 254 games from 2018 to 2020. They were one shy of Troy Glaus’ Angels franchise record set in 2000. One thing that may have slipped under your Ohtani radar this year is that he led the American League and tied for the major league lead in triples. His first one of the season came in the Angels’ second game. It was a rocket ground ball that took its first bounce about halfway to José Abreu and then zipped past his glove at about 108 MPH. Abreu had no chance to get in front of the ball. By the time he put his glove down, it was well past him. “Thank god that ball didn’t find José Abreu’s chest,” Mota said “Oh my gosh, oh my goodness. There’s no human being that could have stopped that ball.” A little baseball history lesson: In 1902, a pitcher/utility player, Harry Howell, hit 11 triples for the Baltimore Orioles (not the current ones, the predecessor to the Yankees franchise). In 1918, pitcher/outfielder Babe Ruth did the same for the Red Sox. Two Negro League players—Harry Kenyon and Bullet Rogan—hit eight in 1921. Rogan did it for the Kansas City Monarchs and Kenyon for the Indianapolis ABCs. Rogan did it again for the Monarchs in 1925. It took 96 years for another player to come along who pitched 20 games in a season and hit at least eight triples. Ohtani was that player. The Stolen Base In the fifth inning of the third game of the Angels–White Sox season-opening four-game series, Ohtani stole second base against pitcher Lance Lynn and catcher Zack Collins. It was his first stolen base of the season. Ohtani’s 46-home run, 26-stolen base combination has been matched by only four other players—Barry Bonds (1993 Giants), Hall-of-Famer Larry Walker (1997 Rockies), Jose Canseco (1998 Blue Jays), and Alfonso Soriano (2006 Nationals). The Splitter and the Slider So that first start of the season had foreshadowing, but that requires some specificity not contained within his pitching line. In 4 2/3 innings he allowed three runs and walked five. But there was something in that start that foretold the future—Ohtani’s unhittable splitter and nasty slider. Ohtani got five outs with his splitter that day, all strikeouts. The .233 OPS against the pitch was second-best among the 30 pitchers who threw at least 100 splitters last season. Only Aroldis Chapman, who threw one-third as many splitters as Ohtani, was better. After allowing seven runs and four walks in 2/3 of an inning against the Yankees on June 30, Ohtani’s wildness abated. Ohtani had started throwing his slider more often a few weeks prior to that game, and after that start it really became a difference maker when it was paired with It gave him better options to throw off a fastball that sometimes reached 100 MPH. He walked 35 batters in his first 60 innings, but only nine in his last 70 1/3 Opponents hit .171 against the slider from July 6 to the end of the season. The Total Package Ohtani was a top-25 hitter AND a top-25 pitcher, but perhaps the best thing about his season was that his best ability was availability. Yes, the best foreshadowing to come from Ohtani’s season-opening series against the White Sox was that he played all four games. He played in 155 out of a possible 162, which meant that we got to see him at his best just about every day of the It was quite a treat.
<urn:uuid:c79890bd-27ff-4056-9986-aaeb902d0d9f>
CC-MAIN-2022-33
https://www.sportsinfosolutions.com/2021/11/18/bill-james-handbook-excerpt-shohei-ohtani/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00666.warc.gz
en
0.977892
1,136
1.71875
2
You will find the resources you need for this week's lessons on this page. A Powerpoint and support sheet is attached for each lesson. On Tuesday, you are being asked to re-tell the story of the boy Jesus in the temple aged 12. There is a picture to colour and label, or you could dress-up or re-tell the story to a member of your family or your cuddly toys. The choice is yours! You can read this story in Luke's Gospel from verse 41 to 52 in chapter 2. You can watch an animated version of the story using this link: https://www.youtube.com/watch?v=j2vH6h8JR4k
<urn:uuid:cd7c6999-fb7b-4a49-889d-f9de319d4106>
CC-MAIN-2022-33
https://www.bostonstmarys.co.uk/page/?title=RE&pid=499
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00469.warc.gz
en
0.947366
147
3.5
4
After more than 40 years on Tower Hill, we have now moved to a new home in Narragansett. Nothing else has changed. You will still see the same caring providers and staff! We have kept the same phone and fax numbers. We have even brought the school bus table and the phone booth. Some things are new though, and we hope you will be pleasantly surprised when you come in to visit! Our new address is 360 Kingstown Rd., Suite 101 in Narragansett. When you enter the main entrance, take the hallway to the left. The picture is from our last sunset on Tower Hill Rd. Fifth disease, also known as slapped cheek disease, is an infection caused by a virus. It is so named because Fifth disease was the fifth pink-red rash in childhood to be described by doctors. It usually occurs in the winter and spring, but a child can become ill with the disease any time of the year. What are the possible symptoms? Your child may not feel ill, but may have one or more of the following symptoms: Low grade fever Tiredness, runny nose, sore throat Flushed cheeks (looks like the face has been slapped) Rash on the arms, legs, and body that may last up to 3-6 weeks. Sometimes the rash can come and go for weeks. It can happen more if your child is in the sun, or becomes warm. Pediatric Nurse Practitioners (PNPs) are independently licensed health care providers who are dedicated to improving children’s health. PNPs are registered nurses with advanced graduate level education in pediatric nursing and health care and they serve children and families in an extensive range of practice settings. Working with pediatricians and other health care providers, PNPs have been enhancing the health care of children for over forty years. Continue reading What is a Pediatric Nurse Practitioner?→ Head lice only live on human beings. They can be spread quickly by using the hat, comb, or brush of an infected person. The nits (eggs) normally hatch into lice within one week. Your child probably has lice if: The nits (white eggs) are firmly attached to hairs. Unlike dandruff, nits can’t be shaken off. There are gray bugs (lice) in the hair approximately 1/16 inch long. They move quickly, and are difficult to see. Lyme is the most common disease spread by a tick bite. The bacteria are transmitted by deer ticks. Lyme disease is not carried by the more common wood tick, which is bigger. In the New England states, Wisconsin, and Minnesota, up to 50% of deer ticks are infected with Lyme disease. But, even in these high-risk areas, only 1% of children bitten by a deer tick get Lyme disease. The longer a tick is attached to a person, the greater chance of being infected by the tick. For Lyme disease to be transmitted, the tick needs to be attached for at least 24 hours. You are more likely to get the infection if the tick remains attached for more than 48 hours.
<urn:uuid:23dd44d0-65da-4656-b8df-af7ad03989ac>
CC-MAIN-2022-33
https://southcountypediatrics.org/good-to-know/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00676.warc.gz
en
0.968415
652
1.984375
2
A couple of months ago, Mark Eichorn posted a quietly significant post on the Federal Trade Commission’s blog. In it, Eichorn gives an overview of how the FTC approaches breach and data security investigations. In the post, Eichorn advises: In other words, when deciding on punitive measures in data security cases, the Federal Trade Commission is often more lenient with businesses that report breaches to the proper authorities promptly. Or, conversely, if you try to hide a data breach from authorities, and the FTC discovers your deception, the commissioners may – and are legally allowed to – dole out a larger fine. Three Data Privacy Best Practices For SMBs - Have a “privacy officer” on speed dial. Privacy officers are usually attorneys; they’re the people businesses can call in the wake of a data breach to determine their legal responsibilities based on the nature of the data attack or hack. Your privacy officer, depending on the information you provide, will let you know what you need to do to satisfy local, state, federal and international data breach regulations. On occasion, contingent on the circumstances, you may not have to report the incident. - Don’t ignore security issues. Digital hacking is a serious reality. Laboring under the assumption that “it will never happen to you” or “only the big guys get hit” is erroneous. Implement certain data security measures at your office. Also, establish data security rules amongst your employees – the most fundamental being that they’re forbidden from accessing files remotely without authorization and instruction. - Have data security, maintenance and breach procedures in place. Moreover, companies should make a habit of corporate-wide password changes on regular intervals. Additionally, like a fire drill, businesses should establish a data breach drill. Not only will it be helpful in the event of an attack, but being able to prove to officials that you did take precautions may mitigate eventual punishments handed down by the FTC or other government agencies. Consult A Data Breach Lawyer Lawyers at Internet law firm Kelly Warner act as the privacy officers for several startups and businesses. We’d be happy to help you establish a data security and / or data breach program or procedure that satisfies all state, federal and international regulations. If you’re not yet ready for a consultation, you may want to read through these blog posts [will be linked to online privacy blog]. They will give a better idea of the types of online privacy and data security laws that businesses must follow. When you’re ready to move forward with an online privacy and data security plan, contact Kelly Warner’s online privacy lawyers.
<urn:uuid:e167a031-6bf2-46af-84e1-813ce9b5fc33>
CC-MAIN-2017-04
http://kellywarnerlaw.com/tag/data-breach/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00345-ip-10-171-10-70.ec2.internal.warc.gz
en
0.916351
549
1.960938
2
There are signs that the Ebola outbreak in the Democratic Republic of Congo may not be as big as was once feared, World Health Organization officials indicated Thursday. Fourteen suspected cases have tested negative for the deadly virus, Alison Clements-Hunt, a WHO spokeswoman currently in Likati, the epicenter of the response, told STAT in an interview. So far there have been two confirmed cases, four probable cases, and four deaths. Another 40 people are currently listed as suspected cases, said Clements-Hunt. Roughly 300 people who are contacts of known or suspected cases are being monitored to see if they develop symptoms. Clements-Hunt cautioned, though, that in an outbreak the net is cast wide to try to find anyone who might have Ebola, so that they can be isolated and tested. People who are sick with Ebola but are missed by surveillance can infect family members; if they die and are buried in traditional burial rites, those attending funerals can also be infected. In the early stages of Ebola, symptoms are vague and could be misattributed to other conditions. In an outbreak, it is not uncommon for some suspect cases to later test positive for malaria, say, and negative for Ebola. A mobile laboratory is now operating in Likati, Clements-Hunt said. That will speed up the process of determining the actual scale of the outbreak. A response team of about 50 people from the DRC ministry of health, WHO, UNICEF, and Doctors Without Borders are in Likati, she said. Among those who tested negative are five people who were being cared for in the Ebola treatment unit that was set up in Likati, Clements-Hunt said. Four have been released; one is still sick with something else and needs medical care. Given what appears to be the limited scope of the outbreak, the use of an experimental Ebola vaccine may not be required. “For the time, there doesn’t seem that there was really a necessity to do so. I hope it remains the case,” Dr. Marie-Paule Kieny, a WHO assistant director-general, told STAT. That said, Kieny confirmed planning continues to allow for deployment of vaccine, if the government of DRC asks for it. But it may not, she acknowledged. “The logistics, all the preparations are moving forward, but you can imagine that without indication that this is spreading, that the government may decide that maybe it’s not reasonable to start a big vaccination operation. And actually, you don’t know who you would vaccinate,” Kieny said from Geneva. The logistics of getting the vaccine to this remote part of DRC would be substantial. Clements-Hunt said getting from one village to another in this part of the country is incredibly difficult; there are no roads and response workers are being ferried along jungle paths on motorbikes. “This is in the middle of nowhere,” said Kieny. ‘’It’s not a routine operation, so in order to go for it, they must be really sure that this is worth it.” Some observers have questioned why the experimental Ebola vaccine, which was tested in Guinea in 2015, hasn’t been immediately sent to the DRC. There have been reports the government was hesitant about using an unlicensed product. Kieny said this outbreak has galvanized awareness among the organizations that respond to Ebola outbreaks that the groundwork for use of the vaccine must be laid in advance in at-risk countries — places where Ebola outbreaks have happened in the past. Regulatory agencies need to be asked to pre-approve vaccine use in emergencies; ethics committees that greenlight emergency use authorizations have to be asked to do this work in advance. “This will move ahead as soon as this event is closed,” Kieny said. “After that we are having discussions about finalizing the preparations, making sure the protocol has been submitted in all the countries.” An earlier version of this story incorrectly stated the surname of WHO spokeswoman Alison Clements-Hunt.
<urn:uuid:a631d6ea-82da-4616-9316-7a7b97dbc14a>
CC-MAIN-2022-33
https://www.statnews.com/2017/05/25/ebola-congo-update/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00478.warc.gz
en
0.969285
863
2.375
2
Full profile →'"> The author is a Forbes contributor. The opinions expressed are those of the writer. In December, New York became the 2nd state after Vermont to prohibit hydraulic fracturing ("fracking") statewide. Although a few others have joined in, New York is the only state with significant shale gas potential to ban fracking, “the most important, and the biggest, energy innovation of this century." This controversial decision by Governor Cuomo has even fueled secession talk by the southern part of the state that has sat idly by and watched neighbor Pennsylvania enjoy the huge economic benefits of shale development (as such, states like Texas and Oklahoma are banning fracking bans!). Fracking technology, after all, is a proven commodity that has been safely deployed for over 60 years in over a million wells - across the country to great success. New Yorkers should realize what's at stake. New York sits atop the mighty Marcellus Shale, a huge source of oil and gas that also lies beneath much of Ohio, West Virginia, and Pennsylvania. The play covers some 18,750 square miles in New York and has transformed Pennsylvania into a natural gas powerhouse, surging state state output from 200 Billion Cubic Feet (Bcf) in 2008 to 3,800 Bcf in 2014. New York today isn't a material gas producer, yielding just 22 Bcf a year, halved since 2009. Thus, New York now produces enough gas to cover its consumption needs for just 6 days. Nationally, New York consumes 5% of U.S. gas but produces 0% of U.S. gas. This is becoming increasingly awkward: New York, the 4th largest state with 19.8 million people, is increasingly turning to natural gas to fuel its economy, ranked 3rd at $1.5 trillion. Natural gas is easily New York's most critical source of energy, supplying about 1,300 Trillion Btu a year, versus 615 Trillion Btu for 2nd place oil-based gasoline. By comparison, wind and solar renewables offer just 40 Trillion Btu. This heavily weighted oil and gas energy portfolio makes obvious New York's necessity to develop its own shale resources, which are significant. Upper estimates have the Marcellus formation in New York containing 75-100 Trillion Cubic Feet of recoverable gas, but shale energy continues to prove previous assessments greatly understated as the resources get developed. It's New York's electricity sector where natural gas is gaining the most market share. Since 2008, gas has increased its total share of New York generation capacity from 44% to 60%, at a time when state gas production (which was already insignificant) has been cut in half. Thus, gas imports from Pennsylvania have skyrocketed. Since 2008, interstate gas receipts from Pennsylvania have increased from 226 Bcf to about 1,200 Bcf. So, it appears that many New Yorkers enjoy using fracked gas...as long as it's produced somewhere else. Shale- and fracking-based Pennsylvania accounts for about half of New York's total international and interstate gas receipts, which are up about a quarter since 2008. Overall, New York imports virtually all of its gas. A story to watch? If Pennsylvania Governor Tom Wolf's misguided (e.g., the proposal ignores the low prices the industry has been saddled with) new tax on Pennsylvania gas drillers hampers production, New York will be under even greater pressure to develop its Marcellus and produce more natural gas, the state's most important fuel. A recent U.S. Environmental Protection Agency report that once again validated the safety of fracking (water pollution fears are completely overblown) has The Wall Street Journal claiming that Governor Cuomo’s ban has been "exposed as a fraud." In the Shale Era since 2009, New York's Gas Use Has Surged, Amid Dwindling New York Gas Production Sources: EIA; JTC New York's Natural Gas Electricity Capacity Build-Out Sources: EIA; JTC; LA Times
<urn:uuid:16cdc77b-e31b-403a-9529-f96abdd62eb6>
CC-MAIN-2017-04
http://www.forbes.com/sites/judeclemente/2015/06/07/why-new-yorks-fracking-ban-for-natural-gas-is-unsustainable/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280929.91/warc/CC-MAIN-20170116095120-00431-ip-10-171-10-70.ec2.internal.warc.gz
en
0.95
818
2.078125
2
POMANA — Three workers at a pharmaceutical laboratory have been hospitalized after being exposed to a potentially lethal chemical compound. It happened at 4:50 p.m. Tuesday in Pomona. Officials say a chemist under contract with Barr Laboratories was pouring 50 milligrams of powdered potassium cyanide into a liquid solution when the mixture boiled over and splashed on his face. Rockland County Deputy Fire coordinator Chris Kear told the Journal News the man was decontaminated and his face flushed with water for about 15 minutes. He was taken to a hospital for further decontamination and evaluation. Two other scientists working in the room also were exposed and were treated. All three were expected to recover. A hazmat team and police and fire officials had the incident under control by 6:45 p.m.
<urn:uuid:b320ed01-0e84-488c-9aa2-4f8a741d108d>
CC-MAIN-2017-04
http://www.oneidadispatch.com/general-news/20140710/3-hurt-in-chemical-spill-at-new-york-laboratory
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00431-ip-10-171-10-70.ec2.internal.warc.gz
en
0.981803
168
1.539063
2
What is Debian/NSLU2? Debian/NSLU2 is the name given to the official Debian distribution for ARM that runs on the NSLU2, thanks to the efforts of the nslu2-linux developers to get the necessary kernel patches and utilities accepted upstream by the kernel maintainers and by the Debian Project. The goal is to add full support for the NSLU2 and similar devices into the official Linux kernel and the Debian GNU/Linux distribution, so users can benefit from the full Debian package repository and also have slug-specific packages and patches for hardware devices such as the built-in Ethernet port, LEDs, etc. ( And it really run fine on my Slug after a long, long installation ! ) Standard caveats about backup apply. Per Martin Michlmayr, you can safely ignore this message: Hmm. The package shipped with a symbolic link /lib/modules/2.6.18-6-ixp4xx/source However, I can not read the target: No such file or directory Therefore, I am deleting /lib/modules/2.6.18-6-ixp4xx/source State of the project Debian fully supports the NSLU2 using the Debian Installer (this is the setup known as Debian/NSLU2). Please visit http://www.cyrius.com/debian/nslu2/ for the recommended way to install Debian on a NSLU2. Please note that a lot of information on this wiki is out of date. Refer to http://www.cyrius.com/debian/nslu2/ for up-to-date information about Debian on the NSLU2. You may still use debian installer. After connecting to the installer via SSH do the following: Solution from Rainer Hlawaty. Instructions to set up Debian/NSLU2 are available at Debian on NSLU2, using the latest Debian Lenny release (5.0.4). There is also a manual method described at http://www.cyrius.com/debian/nslu2/unpack.html, but everything should work using the automatic install. If your device (i.e. an IXP4xx device other than the NSLU2) is not supported by the Debian Installer, then you can use the Bootstrap procedure instead. Another option is to create and format the ext3 partition on a normal PC as described in the FAQ. Upgrade from previous versions Upgrade from debian-installer beta2 If you are already running Debian/NSLU2 as installed by debian-installer beta2, you can upgrade to the latest version following the guide for Upgrading Debian on the NSLU2. Please note that this manual procedure is necessary due to changes in the way the kernel is loaded at boot time. Upgrade from manual bootstrap to testing ("etch") If you have previously installed SlugOS/LE (formerly know as DebianSlug) using the manual bootstrap procedure with Debian testing ("etch") and your root partition is do_symlinks = yes relative_links = yes do_bootloader = no do_bootfloppy = no do_initrd = yes link_in_boot = yes Ethernet driver issue: If your auto eth0 iface eth0 inet static pre-up modprobe -f ixp400 pre-up modprobe -f ixp400_eth address 10.0.0.201 netmask 255.255.255.0 gateway 10.0.0.138 If this is the case try this: allow-hotplug eth0 iface eth0 inet static address 10.0.0.201 netmask 255.255.255.0 gateway 10.0.0.138 After that, follow the guide to Upgrading Debian on the Linksys NSLU2. When you get to the step, "You need to obtain Intel's proprietary NPE-B microcode so built-in Ethernet will work.", follow the procedure documented below in the next few paragraphs. Obtaining the NPE-B microcode The following details a method for obtaining the NPE-B microcode, which is needed for the ethernet driver in 2.6.18. The procedure is not tested yet, so please provide feedback or update the Wiki if you find errors. Note that, apart from building the microcode from the source, this procedure is currently the only documented legal way to obtain the microcode. Download the debian-installer image from slug-firmware.net and unpack the image using (For Ubuntu users, fiesty is not up to date as of 09/09/07 and slugimage should be downloaded from the debian unstable repository and installed using dpkg. Frank: Ubuntu users can extend the software source for the installation to gutsy and will have the recent version sudo gedit /etc/apt/sources.list add an additional line with deb http://at.archive.ubuntu.com/ubuntu/ gutsy universe update your package list and install the newest version. remove the line afterwards again.). apt-get install slugimage slugimage -u -i di-nslu2.bin # di-nslu2.bin is the debian-installer Endian swap the initramfs ( apt-get install devio devio '<< ramdisk.gz; xp $ 4' > ramdisk-swap.gz Unpack the initramfs into a directory e.g. mkdir initrd; cd initrd zcat ../ramdisk-swap.gz | cpio -i The NPE microcode firmware will be in the [s]cp NPE-B.01000201 [user@hostname:][/mnt]/lib/firmware/ [ssh user@hostname] cd [/mnt]/lib/firmware; sudo ln -s NPE-B.01000201 NPE-B Upgrade from manual bootstrap to unstable ("sid") If you have previously bootstrapped your NSLU2 to Debian unstable ("sid"), you will have to adjust your deb http://ftp.XX.debian.org/debian testing main non-free contrib Now follow the same steps mentioned above for etch: create the apt-get -t testing install linux-image-2.6-ixp4xx Links to more Debian/NSLU2 documentation The Debian/NSLU2 FAQ. To learn how to build a Debian/NSLU2 image, see BuildImage. See ChangeKernelCommandLine for how to change the command line passed to the kernel by the second-stage bootloader, APEX, in a Debian/NSLU2 system. If you want to free up some space in your internal flash, see NoInitramfs. To use the Debian Installer with a FatSlug, follow the instructions here. To use a Hauppauge WinTV PVR USB2, see InstallWinTVPVRUSB2 For information on installing rtorrent, go here InstallRtorrentOnDebian Section moved to the Debian/NSLU2 Troubleshooting page. The Debian build-essential package should install without problems, however if you try to compile more than a few dozen lines you might see problems that don't appear to make sense. The first thing to check is that you have enough memory: on a system with 32Mb physical RAM Debian might only install another 90Mb swapspace. I believe that in order to fix this you will have to reinstall, deleting/recreating partitions to get sensible sizes. Based on the fact that I've seen building the Lazarus GUI taking 200Mb I suggest 256Mb swap as a minimum, 512Mb is probably adequate. The old solution to run Debian packages in the NSLU2 is SlugOS/LE, previously known as DebianSlug. This solution uses the SlugOS kernel in little-endian mode, in a way that is compatible with the Debian arm distribution. This setup requires a manual bootstrap procedure and is no longer the recommended solution to run Debian in the slug. Also available is Big Endian DebianSlug (known as OpenDebianSlug, because it uses the big-endian OpenSlug binary image). Since Debian does not provide big endian ARM as a supported Debian architecture, OpenDebianSlug makes use of the unofficial armeb port of Debian. Currently, only parts of debian sarge and sid are available. I have added some guidelines in french to install Debian on the Slug, with an associated support forum. Everything is located here and in the forum section of the site. view · edit · print · history · Last edited by Kees Moerman. Based on work by tbm, Maisondouf, rwhitby, vtetri, Vernicht, Ruiqiang Huang, Frank Banzhoff, gencier, fcarolo, dumfrac, blue, cyboreal, marceln, celyade, fabroce, Lars, oo, Chris Salinardi, Christopher Salinardi, joederygmailcom, Zword, emm_is, ptan, Andy O'Neill, vatachino, Stein, age, lesterc, condor2k, Anguel Stankov, Phil Endecott, Dean Jackson, mururoa, hs, JLM, Reedy Boy, Tim Froidcoeur, dunfrac, TBBle, Ahmad Khayyat, and molli123. Originally by rwhitby. Page last modified on May 10, 2010, at 04:28 AM
<urn:uuid:2312e384-8d9f-4ebe-8201-29f9db7de9b6>
CC-MAIN-2017-04
http://www.nslu2-linux.org/wiki/pmwiki.php?pagename=Debian/HomePage
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00240-ip-10-171-10-70.ec2.internal.warc.gz
en
0.815723
2,057
1.828125
2
Ouachita - LeFore Wildlife Management Area By: Jeff Ford, Biologist, Ouachita WMA. Phone: (918)653-2012 Spring 2016 - The gates going into the Homer Johnston portion of the Ouachita WMA along Holson Valley rd will remain closed during the Spring Turkey season due to the roads being washed out from recent flooding. Foot access is still allowed and encouraged. Spring 2016 - The gates going into the Homer Johnston portion of the Ouachita WMA along Holson Valley rd will remain closed during the Spring Turkey season due to the roads being washed out from recent flooding. Foot access is still allowed and encouraged.Ouachita WMA covers 225,000 acres of the Ouachita National Forest Lands in southeastern Oklahoma. The area is managed cooperatively between the Oklahoma Department of Wildlife Conservation and the United States Forest Service. The area is located in southern Leflore county approximately 10 miles south of Heavener, Ok. on Highway 59. Located in the scenic, mountainous, oak-pine forest, the area’s primary species is deer and turkey, more than 400 acres of food plots are planted annually for these species. The Talimena Scenic Drive cuts the area in half running along the top of Winding Stair Mountain from Highway 271 to the Arkansas line. This drive offers many scenic vistas to pull off and enjoy the view. Some camping is available along the drive and at the Cedar Lake Camp ground. WMA Driving Directions: WMA Headquarters – From Heavener: 7 miles south on U.S. Hwy 59, 0.1 mile east on Fish Hatchery Rd, first building on right side of road. U.S. Forest Service Visitor Center – From Heavener: 10 miles south on U.S. Hwy 59. (3 miles south of WMA Headquarters.) U.S. Forest Service Visitor Center – From Talihina: 3 miles north on U.S. Hwy 271. U.S. Forest Service Visitor Center (open seasonally) – From Talihina: 8 miles north on U.S. Hwy 271, turn east on Talimena Dr (State Hwy 1). From Broken Bow: 40 miles north on U.S. Hwy 259, look for USFS/Ouachita WMA boundary signs. From Mena, AR: 15 miles west on AR State Hwy 8, turns into OK State Hwy 63, look for USFS/Ouachita WMA boundary sign. From Acorn, AR: 13 miles west on U.S. Hwy 270 to OK state line, look for USFS/Ouachita WMA From Queen Wilhelmina State Park, AR: 4 miles west on AR State Hwy 88, turns into OK State Hwy 1, look for USFS/Ouachita WMA boundary sign. Game Species of Interest: Deer: White-tailed deer are present in good population, but are highly sought after. Turkey: Eastern wild turkeys are present in good numbers but are highly sought after. Squirrel: Fox and gray squirrels are present in good numbers. Furbearers: Coyote, bobcat and raccoon are available. River-Otter: Otter’s are present in the Black Fork Creek and Holson Creek drainages. Black Bears: Good population of Bears. Nongame Species of Interest: Bald Eagle: Generally have a large population of eagles that winter on or around the WMA. Description of Fish and Wildlife Management Practices: Approximately 400 acres of food plots are planted annually, 20,000 acres prescribed burned, and about 800, 1/4 to ½ acres ponds on the area , to help all wildlife species with food and water. There are three larger bodies of water, (Cedar Lake, Crooked Branch, Boney Ridge) that are managed for fishing. Camping and Facilities: There are many primitive camping sites on the area, and two sites at Cedar Lake and Winding Stair Vista that have modern facilities. The area also has two shooting ranges, one on the south side, off Hwy. 63, and one on the north, off Hwy. 59 Fishing opportunities for bass, catfish and sunfish exist at Cedar Lake, Crooked Branch, and Boney Ridge. Ouachita WMA LeFlore and Cucumber Creek Unit - best general purpose map, pdf format (8.5x11) Cedar Lake, Billy Creek and Winding Stair Mountain Recreation Areas are closed to hunting. additional information and area attractions: Kiamichi Country Tourism Heavener Chamber of Commerce 501 West First St, Heavener 74937 Oklahoma Tourism and Recreation Department Post Office Box 52002 Oklahoma City, OK 73152-2002 (800) 652-6552 or (405) 521-2409 Poteau Chamber of Commerce 200 South Broadway, Poteau 74953
<urn:uuid:895d6fd8-989c-4b10-a8c3-8576491d452f>
CC-MAIN-2017-04
http://wildlifedepartment.com/facts_maps/wma/ouachitaleflore.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00379-ip-10-171-10-70.ec2.internal.warc.gz
en
0.902036
1,064
1.710938
2
- ¶ AND Jacob also went on his journey, and the angels of God met him. - And when Jacob saw them, he said, This is God’s host; so he called the name of that place Mahanaim. - ¶ And Jacob sent messengers before him to Esau his brother to the land of Seir, the country of Edom. - And he commanded them, saying, Thus shall you speak to my lord Esau; Thus says your servant Jacob, I have sojourned with Laban, and stayed there until now; - I have oxen, asses, flocks, menservants, and maidservants; and I have sent to tell my lord, that I may find mercy in your sight. - And the messengers returned to Jacob, saying, We came to your brother Esau, and behold he also is coming to meet you, and four hundred men with him. - Then Jacob was afraid and greatly distressed; and he divided the people that were with him, and the flocks and herds and camels, into two groups; - And Jacob said, If my brother Esau should come against one group and destroy it, then the group which is left shall escape. - ¶ And Jacob prayed, and said. O God of my father Abraham, and God of my father Isaac, the LORD who didst say to me, Return to the land of your fathers and to your kindred, and I will deal well with you; - I am not worthy of the least of all thy favors, and of all the truth that thou hast shown to thy servant; for alone with my staff I crossed over this Jordan; and now I have become two companies. - Deliver me, I pray thee, from the hands of my brother Esau; for I am afraid of him, lest he will come to smite me, and the mothers with their children. - And thou didst say, I will surely do you good, and make your descendants numerous as the sand of the sea which cannot be numbered for multitude. - ¶ And he spent that night there; and took of that which he had with him as a present for his brother Esau; - Two hundred she goats, and twenty he goats, two hundred ewes, and twenty rams, - Thirty milch camels with their colts, forty cows, and ten bulls, twenty she asses, and ten foals. - And he entrusted them to his servants, every drove by itself; and said to his servants, Pass over before me, and keep a distance between drove and drove. - And he commanded the leader of the first drove, and said to him, When Esau my brother meets you, and asks you, saying, Who are you? and where are you going? and whose are these that are before you? - Then you shall say to him, They belong to your servant Jacob; they are a present which he has sent to my lord Esau; and, behold, also he is coming behind us. - And so he commanded the second and the third and all who followed with the droves, saying. In this manner you shall speak to Esau, when you find him. - And you shall say to him, moreover, Behold, your servant Jacob also is behind us. For he said, I may appease him with the present that goes before me, and afterward I will see his face; and perhaps he will accept me. - So the present went over before him; and he himself lodged that night in the encampment. - And he rose up in the night, and took his two wives and his two maidservants and his eleven sons, and led them to the desert of Jabbok. - And he took them, and brought them over the brook, and then he brought across everything that he had. - ¶ And Jacob was left alone; and there a man wrestled with him until daybreak. - And when the man saw that he did not prevail against him, he touched the hollow of his thigh; and the hollow of Jacob’s thigh was out of joint, as he wrestled with him. - And the man said to him, Let me go, for day is breaking. And he said, I will not let you go unless you bless me. - And he said to him, What is your name? And he said, Jacob. - And he said to him. Your name shall no more be called Jacob, but Israel (the Prince of God); for you have proved your strength wrestling with an angel and with man, and have prevailed. - And Jacob asked him, and said, Tell me your name. And he said, Why is it that you ask my name? And the angel blessed him there. - And Jacob called the name of that place Peniel; for be said, I have seen an angel face to face, and my life is preserved. - The sun rose upon him just as he left Peniel, and he limped because of his thigh. - That is why the children of Israel do not eat of the sinew of the hip, which is on the hollow of the thigh, to this day; because the angel touched the hollow of Jacob’s thigh on the sinew of the thigh.
<urn:uuid:51d2324e-6c55-477c-973a-daa5a59008da>
CC-MAIN-2017-04
http://superbook.org/LAMSA/GEN/gen32.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279489.14/warc/CC-MAIN-20170116095119-00010-ip-10-171-10-70.ec2.internal.warc.gz
en
0.980025
1,140
2.15625
2
Thursday, March 29, 2012 Encryption remains a core technology of the Internet With the use of Cloud services, we mustn't skip the all-important securing of sensitive data. Many web services and the apps build from them process sensitive information -- we have the need to securely store and retrieve that data. One easy way to accomplish this (at least when using Amazon's cloud services) is to use a client-side Java app that automatically encypts data when it is uploaded to the cloud. In the case of AWS, your data is stored encrypted in Amazon S3 in such a manner that no one can decrypt it without your private encryption key. The developer controls the private encryption keys used for the enciphering, and those keys are never exposed outside the client-side application. Of course, it is up to you to protect your encryption keys just like any other security credentials. The AWS client is a handy way to easily protect information residing on the cloud. Implemented properly, a developer may call the encryption/decrypt routine without other code having to be aware that the encryption and decryption is happening automatically in the client. This approach is very different from ones based on historical models -- such as ones based on the operations of the infamous Enigma machines. The technology, patented in 1919, has been utilized for almost 100 years. On a typical Enigma machine, letters are scrambled by a set of rotatable cogs each with 26 contacts on either side. Each contact on one side is wired to a contact on the other side in some random fashion. Some models have 3 such rotating wheels, but later models in the war, have 4 wheels. This type was used exclusively on German U-Boats. Each time a key is pressed, the right most wheel is rotated by one step, resulting in a different mapping of the internal wires. As a result, each new letter is encoded differently. Check out this fellow's work on a spreadsheet version of a well-known WWII encryption technology. This solution was used for many years after the war (and after it was compromised) by other parties. You can read more about the Enigma machine. If you want to implement your own encryption approach based on the Enigma, this online course will get you started.
<urn:uuid:f47f230f-1aaf-406a-81d2-27d5b8a818da>
CC-MAIN-2022-33
https://intellectualcapitalist.blogspot.com/2012/03/encryption-remains-core-technology-of.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00471.warc.gz
en
0.946566
463
2.640625
3
Learning Spark : Lightning-Fast Big Data Analysis Üye Girişi yapın, temin süresi ve fiyatını size bildirelim. Üye Girişi yapın, sizi bu ürün stoklarımıza girdiğinde bilgilendirelim. Temin süremiz 28 - 42 iş günü Yayıncı OReilly ( 02 / 2015 ) ISBN 9781449358624 | 17,78x23,11x1,52 cm. | İngilizce | 276 Sayfa | Türler Bilgisayar / Programlama The Web is getting faster, and the data it delivers is getting bigger. How can you handle everything efficiently? This book introduces Spark, an open source cluster computing system that makes data analytics fast to run and fast to write. You'll learn how to run programs faster, using primitives for in-memory cluster computing. With Spark, your job can load data into memory and query it repeatedly much quicker than with disk-based systems like Hadoop MapReduce. Written by the developers of Spark, this book will have you up and running in no time. You'll learn how to express MapReduce jobs with just a few simple lines of Spark code, instead of spending extra time and effort working with Hadoop's raw Java API. Quickly dive into Spark capabilities such as collect, count, reduce, and save Use one programming paradigm instead of mixing and matching tools such as Hive, Hadoop, Mahout, and S4/Storm Learn how to run interactive, iterative, and incremental analyses Integrate with Scala to manipulate distributed datasets like local collections Tackle partitioning issues, data locality, default hash partitioning, user-defined partitioners, and custom serialization Use other languages by means of pipe() to achieve the equivalent of Hadoop streaming
<urn:uuid:62c0c920-82f9-43e7-82f5-2b15d08f46e2>
CC-MAIN-2017-04
http://www.pandora.com.tr/urun/learning-spark-lightning-fast-big-data-analysis/512022
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00274-ip-10-171-10-70.ec2.internal.warc.gz
en
0.783393
412
2.109375
2
The 7 Challenger Astronauts When the Space Shuttle Challenger disintegrated 73 seconds after liftoff on January 28, 1986, there were seven astronauts on board whose lives were tragically cut short. 1. DICK SCOBEE // COMMANDER Lt. Col. Francis Richard Scobee enlisted in the U.S. Air Force after graduating from high school in 1957. He served as an engine mechanic and took college classes in his spare time, earning a degree in aerospace engineering from the University of Arizona in 1965, as well as an officer’s commission. He became a pilot the next year and served in Vietnam as a combat aviator. Scobee then became a test pilot and logged 6500 hours flying 45 different types of aircraft. After joining NASA’s astronaut program in 1978, he not only flew the space shuttle, but also instructed pilots on flying the Boeing 747 that carried shuttles to Florida. Scobee piloted the shuttle Challenger into space on its fifth mission in April 1984; his next assignment was as commander of the Challenger mission in January 1986. Scobee told his family that his second shuttle mission might be his last. An aunt remembered, ''He said he had acquired everything he wanted in life.’’ Scobee achieved the rank of Lieutenant Colonel. He was survived by his wife and two children. His son, Major General Richard W. Scobee, is now the 10th Air Force commander of the Naval Air Station Fort Worth Joint Reserve Base. 2. MICHAEL J. SMITH // PILOT Captain Michael John Smith grew up near an airstrip in Morehead, North Carolina, and never wanted to do anything but fly. (Once, when he was the quarterback of a junior varsity football team, he called a timeout just so he could watch a military airplane pass overhead.) He graduated from the U.S. Naval Academy in 1967 and achieved a master’s degree in aeronautical engineering in 1968. Smith became a pilot in 1969 and served as a flight instructor until he was sent to Vietnam. There, Smith earned numerous medals and citations for two years of combat duty. He then became an instructor. Smith logged 4867 hours of flight time in 28 types of aircraft before becoming part of NASA’s astronaut program in 1980. Smith was assigned as pilot for two shuttle missions in 1986, the first scheduled for January aboard the Challenger. Smith was survived by his wife and three children. 3. RONALD MCNAIR // MISSION SPECIALIST Dr. Ronald Ervin McNair was a high achiever from an early age. He could read before starting school, and in elementary school was inspired by the Soviet Sputnik launch to pursue an education in science. In 1959, when he was 9 years old, McNair challenged the segregated public library in his hometown of Lake City, South Carolina. His brother Carl told the tale to StoryCorps. McNair’s educational career was littered with honors, and he achieved a Ph.D. in physics from MIT in 1976. His specialties were lasers and molecular spectroscopy, knowledge he put to use at Hughes Research Laboratories. When NASA began accepting scientists and test pilots into its astronaut program in the ‘70s, McNair applied and made the 1978 class of astronaut candidates. He flew on the Challenger in 1984, spending seven days in orbit and becoming the second African American (after Guy Bluford) to fly in space. The Challenger launch in 1986 was to be his second as a mission specialist. McNair was an accomplished saxophone player and held a 5th degree black belt in karate. He was survived by his wife and two children. In addition to several schools, streets, and parks named in his honor, the old public library building in Lake City became the Ronald E. McNair Life History Center in 2011. 4. ELLISON ONIZUKA // MISSION SPECIALIST Colonel Ellison Shoji Onizuka grew up in Kealakekua, Kona, Hawaii. He earned a bachelor’s degree in aerospace engineering in June 1969 from the University of Colorado, and then a master’s degree in December that year. Onizuka immediately joined the Air Force and became an aerospace flight test engineer and then a test pilot. Selected as an astronaut candidate in 1978, Onizuka flew on Discovery—the first Department of Defense shuttle mission—in 1985, becoming the first Asian American astronaut to fly in space. In his career, Onizuka logged 1700 hours of flying time and 74 hours in space. The Challenger mission was to be his second space flight. Onizuka, a Lieutenant Colonel in the Air Force, was posthumously promoted to Colonel. He was survived by his wife and two daughters. Among other honors and memorials, the University of Hawaii has held the Astronaut Ellison Onizuka Science Day every year for the past 16 years to promote science education among students in grades four through 12. This year’s Science Day is Saturday, January 30. 5. JUDITH RESNIK // MISSION SPECIALIST Dr. Judith Arlene Resnik, a math whiz who also played classical piano, was valedictorian of the Firestone High School Class of 1966 in Akron, Ohio. After earning a perfect SAT score, Resnik went on to get a degree in electrical engineering from Carnegie-Mellon in 1970 and a Ph.D. from the University of Maryland. She helped to develop radar systems for RCA, worked as a biomedical engineer for the National Institutes of Health, and did product development for Xerox, all before being selected for the astronaut program in 1978. She was recruited by Nichelle Nichols of Star Trek fame, who was working for NASA as a recruiter at the time. Resnik flew on the space shuttle Discovery in August 1984 and became the second American woman in space (after Sally Ride) as well as the first Jewish American in space. The images from that mission were particularly striking because of Resnik’s long hair floating in microgravity. The Challenger mission was to be her second space flight. Among other memorials, the lunar crater Borman X on the far side of the moon was renamed Resnik in 1988. Resnik’s family sued the maker of the defective O-rings that caused the Challenger failure, and used the settlement funds to endow scholarships at Firestone High School and three universities. 6. GREGORY JARVIS // PAYLOAD SPECIALIST Gregory Bruce Jarvis was an engineer who became an Air Force captain and an astronaut specifically because of his engineering talent. He earned a bachelor’s degree in electrical engineering in 1967 and a master’s in 1969. Jarvis worked at Raytheon on the SAM-D missile project while completing his studies. He then joined the Air Force and was assigned to research on communications satellites. After an honorable discharge in 1973, Jarvis designed communications satellites for Hughes Aircraft. As an expert in satellite communications, he was selected over 600 other applicants among Hughes employees to be one of two Hughes payload specialists for NASA’s shuttle program in 1984. Jarvis was scheduled for shuttle missions and was bumped twice to make room for celebrity passengers: Utah Senator Jake Garn in March 1985 and Florida Congressman Bill Nelson on January 12, 1986. Jarvis would finally get his chance on the Challenger on January 28. Jarvis was survived by his wife. In addition to his engineering career, he was an avid outdoorsman and played classical guitar. 7. CHRISTA MCAULIFFE // PAYLOAD SPECIALIST In 1984, President Ronald Reagan challenged NASA to make the shuttle’s first “citizen passenger” a teacher. The Teacher in Space Project was born, and more than 11,000 teachers applied for the position. Ultimately, Christa McAuliffe was selected. Sharon Christa Corrigan McAuliffe held a master’s in education and a job as a social studies teacher at Concord High School in New Hampshire. She had also taught American history, English, and various other subjects at the junior high and high school levels over her 15-year teaching career. McAuliffe arranged for a year away from her job and trained with NASA in anticipation of her shuttle mission. She was supposed to deliver two live lessons broadcast to schools across the country, as well as six more lessons that would be distributed around the country after the shuttle landed. The fact that a teacher was going to space prompted an unprecedented number of schools to watch the Challenger launch on the morning of January 28, 1986. McAuliffe was survived by her husband and two children. The backup teacher selected for the Teacher in Space project, Barbara Morgan, lobbied NASA to reinstate the Teacher in Space program. In 1998, she was named the first Educator Astronaut under a new program. Morgan finally got to go into space in 2007 on the shuttle Endeavour on a mission to the International Space Station. All images from NASA // Public Domain
<urn:uuid:be33e2e1-da74-40db-96f9-4478f210eab8>
CC-MAIN-2017-04
http://mentalfloss.com/article/74452/7-challenger-astronauts
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00289-ip-10-171-10-70.ec2.internal.warc.gz
en
0.977787
1,851
2.328125
2
[This article was written by Nir Cohen.] A new open source Python module to help you with your performance testing, load testing, configurations, data structure, metrics...you name it. We've all (well.. not ALL…) been in that situation where we need to generate random data for any number of reasons. For instance, something I kept running into was testing our Elasticsearch node clusters (mappings, config integrity and load) and logstash filters (inputs, filters, outputs…) . To do so I needed to actually get some logs in there...which is apparently easier said than done. A good example would be sending logs from your Apache instances across your environment. When you want to test your Apache log filters in logstash, and your Elasticsearch/logstash cluster's susceptibility to high load you might decide to go through the whole process of installing Apache on your multiple instances and start sending Apache logs. Reconfiguring the logger, managing multiple instances to send from different IPs and creating high load, will eventually be tedious to handle. This is where feeder comes in. Feeder is a Python module that basically generates random data in different formats and allows you to send it via your transport of choice (for a list of available transports see the transports section.) This enables you to test load, performance, configuration, and data structure regularly. Nifty. Cloudify 3.0 - deploy thousands of node instances without losing control. Go From Up to Destroy What feeder means for Cloudify, is that we're now able to test our Elasticsearch nodes and logstash agents to understand how our system behaves. We can easily create a Vagrant file which automatically loads up some instances with Feeder already running and send our randomly generated, formatted data to our Cloudify manager. Then, when we're done testing them we can just do a vagrant destroy, and we're done. Feeder has a CLI called "mouth", in which you can define a number of different runtime parameters. The two main parameters are transports and formatters. Transports are very simple Python classes that define how the data is sent, and formatters are classes which describe how the data is formatted. In the CLI you can specify: which transport, formatter and config file to use. the number of messages you want to send. the time gap between batches. the batch size (i.e. the number of messages to send simultaneously). To define your own format and data that you want to use, and the transport's configuration, you use a Python dict based configuration file. Two basic formatters are supplied alongside some additional, application-specific formatters (and more are in the planning). The Custom formatter lets you define the exact format for your data and supplies two methods for defining the data itself - use the special $RAND variable that will tell feeder to randomize the data for a specific field in your format, or define your own, static data set. The JSON formatter requires setting the data only. A set of fields and their corresponding data objects. For transports, configuration depends on the transport type. Using the UDP transport, for instance, will require you to define the host and the port you want to send to. Feeder in Cloudify With Cloudify, this will now be our primary tool to test our monitoring and logging architecture, which before required a lot more manual labor and time investment. I'm also hoping that it will be used to test our REST API load and ability to withstand problematic requests. Feeder is not only about testing logging pipelines...in the docs you'll be able to find an excellent use case on how to use Feeder to feed metrics. Feeder can actually be used to send any type of data via any type of transport by writing very little code. I'll just set the scene and then let you read the rest. Let's say you're leading a monitoring project, where you need to build your first Graphite cluster, and transport your metrics via AMQP. You have your RabbitMQ cluster installed and Graphite is ready to pull metrics, but it's important that you feed multiple metrics with multiple values and multiple namespaces to test the integrity of your cluster's configuration and performance. But you want to do all this without having to install StatsD or Diamond on all of your instances and configure them to send metrics... and then find out that your configuration is incorrect and iterate over it 11 times… This is the sort of scenario Feeder comes to solve - complex testing scenarios - where you want to send metrics from two availability zones, three types of middleware servers, where each have three base metric types, each with average and max measurements. Now you can - read the full use case and see the code. If you're interested in contributing formatters and transports to the project you can fork the repo, and have fun.
<urn:uuid:1c6fd1b3-f6fb-4008-896a-3444cfc38949>
CC-MAIN-2017-04
https://dzone.com/articles/feeder-feeder-data-eater
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280266.9/warc/CC-MAIN-20170116095120-00502-ip-10-171-10-70.ec2.internal.warc.gz
en
0.891962
1,024
1.953125
2
France invades Uqbar / Kush French ground forces intervened Friday to help the sagging Malian army as it battles advancing Islamist fighters, opening a new and unexpectedly direct front in the confrontation between the West and al-Qaeda-allied guerrillas. … “We have chased the army out of the town of Konna,” Sanda Abou Mohamed, a spokesman for the Ansar Dine militia, told the Associated Press by telephone from the Islamist-held city of Timbuktu. But others reported late Friday that Mali’s forces had retaken the city. Konna lies about 45 miles north of Mopti, the northernmost headquarters for Malian government military operations. French officials expressed fear that the Islamist forces, if they continue their advance, could capture Mopti and from there push forward to Bamako, the capital, more than 300 miles to the southwest. We read the article with some care. The passage recalled by Bioy was perhaps the only surprising one. The rest of it seemed very plausible, quite in keeping with the general tone of the work and (as is natural) a bit boring. Reading it over again, we discovered beneath its rigorous prose a fundamental vagueness. Of the fourteen names which figured in the geographical part, we only recognized three – Khorasan, Armenia, Erzerum – interpolated in the text in an ambiguous way. Of the historical names, only one: the impostor magician Smerdis, invoked more as a metaphor. The note seemed to fix the boundaries of Uqbar, but its nebulous reference points were rivers and craters and mountain ranges of that same region. We read, for example, that the lowlands of Tsai Khaldun and the Axa Delta marked the southern frontier and that on the islands of the delta wild horses procreate. All this, on the first part of page 918. In the historical section (page 920) we learned that as a result of the religious persecutions of the thirteenth century, the orthodox believers sought refuge on these islands, where to this day their obelisks remain and where it is not uncommon to unearth their stone mirrors. You can read here John Updike`s bravura description of the fictional country of Kush in his 1978 novel The Coup. He modeled it on a number of Sahelian countries much like Mali. Kush is probably most like Niger, which is sort of the New Hampshire to Mali`s Vermont.
<urn:uuid:7d4ff5c1-4910-44d5-b011-6f0e098c4f7d>
CC-MAIN-2017-04
http://www.vdare.com/posts/france-invades-uqbar-kush
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00546-ip-10-171-10-70.ec2.internal.warc.gz
en
0.950416
514
1.609375
2
The European Medicines Agency, which is responsible for evaluating medical products across Europe, expects to cut millions of Euros from its software development costs after rolling out software to automatically identify programming errors in computer code. By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers. Early trials show that the Agency, which spends 20 million euros a year on IT and supports 21,000 users across Europe, has been able to bring in more projects on time and to budget since it deployed the software from CAST Research Labs. The EMA expects the project to pay for itself in less than a year by reducing project over-runs which can cost up to 200,000 euros a month for large projects. Hans-Georg Wagner (pictured), CIO at the EMA, said CAST would help the agency's programmer's identify code errors before software went live, significantly cutting the cost of remedial work. "I made a fairly strong statement to the CEO and the CFO that I was confident that once in regular use, we would have a return on investment within a year, given our total development spend," he said. The EMA is responsible for running 110 information systems, which cover medical product regulations, register clinical trials, inspections on drug manufacturers and clinical trails. It has nearly 70 projects under development, ranging from creating new information systems to making major enhancements to its existing information systems. "About two years ago it became clear that in spite of following all the best methodologies, including Prince II, we started delivering software that had significant quality issues. We know that any quality issue costs seven times as much to fix in production code than at the design stage. I decided as CIO that we needed to do something about software quality," he said. At around the same time, Wagner said he received an approach from CAST UK, with a proposal to test CAST's analytical software. "I remembered having tried out cast in my previous job working for the European Commission in Luxembourg. I decided to run a proof of concept with one of our most difficult systems," he said. The EMA tested the programme on its EudarVigilance database, a European-wide system to record adverse reactions to drugs. The system uses a variety of different programming languages, including Visual Basic, SQL and PL SQL. "We drilled down into detailed issues and confirmed what we knew from anecdotal experience. And we found that even in areas we had not looked at, it was providing us with useful information on which areas were weak, such as documentation," he said. The real benefits of CAST, however will come when EMA rolls out the software to systematically analyse the source code of projects as they are under development. "What matters to me more than the absolute measure of software quality is the trend. As CIO I would like to see the trend in the number of errors going down rather than up," he said. EMA is using CAST to actively identify poor programming practices in 12 applications, and on another 6 applications in a more reactive way. Although it is early days, Wagner said he can see a clear difference between the projects that make use of CAST and those that don't. "What I can say is that in systems where we have not used CAST, there can be problems. In one case we were one year late rolling out a new version which was eagerly awaited by the users. The cost of that one case along is one million euros. That alone exceeds the cost of CAST," he said. Ultimately the project will also help the EMA to ensure that critical medical databases do not suffer from unnecessary downtime - a problem that in extreme cases could be a matter of life or death. "Some of the functioning at the extreme end is essential to protect life. The earlier you can investigate adverse alerts, the better. You don't want to be surprised by learning there is a problem with public health in the press," he said. "If the information systems are not available, people can't run signal analysis and trend analysis. Its essential that the data is good quality and the analysis is correct. So there are a lot of constraints on software quality." The biggest challenges in rolling out CAST is not technical, but in persuading developers that CAST will help them develop better code, rather than show-up their failings, Wagner revealed. "There is a certain amount of resistance from development teams and project managers who feel this is a tool to measuring their performance. I had to do quite some work dispelling this fear. It was the usual change management challenge," he said. EMA plans to expand its use of CAST in 2011. One plan is to use the package to document legacy code, where the documentation is poor or non-existent, to provide better estimates of the cost of change requests. "We frequently get requests from users following changes in legislation to change our data model. The CEO wants to know how much this is going to cost us. We know all the standard methods for estimating costs, but I would feel much more comfortable using CAST to find out how many lines of code would be affected." IT directors from other European agencies, who meet twice a year to exchange ideas, are showing interested in using CAST, said Wagner. At least one agency has begun trials. "We believe that CAST does what is printed on the box and does it well. We are very happy with the software and very happy with the support," he said.
<urn:uuid:2916134b-4cc6-4552-9c97-2de0114bd250>
CC-MAIN-2017-04
http://www.computerweekly.com/news/1280094655/Case-study-European-Medicines-Agency-and-CAST
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00329-ip-10-171-10-70.ec2.internal.warc.gz
en
0.9724
1,139
1.890625
2
The Rental Housing Revolving Fund (RHRF) provides “Equity Gap” low-interest loans or grants to qualified owners and developers constructing affordable housing units. Funds may be used to provide a loan or a grant for the development, pre-development, construction, acquisition, preservation, and substantial rehabilitation of rental housing units. (NOTE: RHRF was formerly known as the Rental Housing Trust Fund pursuant to Act 237, SLH 2015, effective July 15, 2015.) Eligible applicants include qualified nonprofit and for-profit corporations, limited liability companies, partnerships, and government agencies. All awards are made competitively and are subject to the availability of funds. Each program has its own application deadlines and requirements. Please contact program staff more details. The RHRF is authorized by Chapter 201H, Subpart III.J., Hawaii Revised Statues. Project Award Program The Rental Housing Revolving Fund provides equity-gap low-interest loans and grants to qualified owners and developers for the construction of new and acquisition and or rehabilitation of existing affordable rental housing. Capacity Building Grant Program The use of Rental Housing Trust Funds for capacity building of nonprofit housing developers is codified in Section 201H-202, Hawaii Revised Statutes (HRS). Capacity building, as defined in Chapter 15-311, Hawaii Administrative Rules, means the process of increasing an organization’s ability to achieve specific goals. The purpose of the Program is to develop the general organizational capacity of a nonprofit housing developer. Capacity building grant funds cannot be used to pay for costs associated with a specific rental housing project. Predevelopment Loan Program The Predevelopment Loan program provides loans for predevelopment activities, which means those housing-related activities which are attributable to a specific rental housing project. (Eligible uses of funds are discussed below.) The goals are to: - Fund rental projects which address the housing needs of lower income families and individuals, including homeless and special need groups, - Foster projects which will have a lasting impact on current and future housing needs, and - Support projects which are focused on achieving quantifiable results. Emphasis is placed on projects that directly relate to the implementation of the State’s strategies and plans in meeting the housing needs of a community. Moneys available in the fund shall be used for the purpose of providing, in whole or in part, loans or grants for rental housing projects in the following order of priority: 1. Projects or units in projects that are allocated low-income housing credits pursuant to the state housing credit ceiling under section 42(h) of the Internal Revenue Code of 1986, as amended, or projects or units in projects that are funded by programs of the United States Department of Housing and Urban Development and United States Department of Agriculture Rural Development wherein: At least fifty per cent of the available units are for persons and families with incomes at or below eighty per cent of the median family income of which at least five per cent of the available units are for persons and families with incomes at or below thirty per cent of the median family income; and the remaining units are for persons and families with incomes at or below one hundred per cent of the median family income; provided that the administration may establish rules to ensure full occupancy of fund projects; and 2. Mixed-income rental projects or units in a mixed-income rental project wherein all of the available units are for persons and families with incomes at or below one hundred forty per cent of the median family income. How do I apply for Rental Housing Revolving Fund? Contact HHFDC at (808) 587-0567 for an application package. HHFDC provides staff assistance for the RHRF program and reviews developers’ applications. Awards of RHRF are subject to approval of the HHFDC Board of Directors and the Governor of the State of Hawaii. HHFDC Memorandum on Compliance Monitoring Services Contract For more information, you can go to
<urn:uuid:92695c9d-57c1-4f52-bfe0-62e283b553ea>
CC-MAIN-2017-04
http://dbedt.hawaii.gov/hhfdc/developers/rhtf_html/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00339-ip-10-171-10-70.ec2.internal.warc.gz
en
0.929223
822
1.523438
2
CHAPTER XX. A CHAPTER OF ACCIDENTS. In the same month an attempt to reach a record height was made by MM. Jovis and Mallet at Paris, with the net result that an elevation of 23,000 feet was reached. It will have been noted that the difficulty through physical exhaustion of inhaling oxygen from either a bag or cylinder is a serious matter not easily overcome, and it has been suggested that the helmet invented by M. Fleuss might prove of value. This contrivance, which has scarcely attracted the attention it has merited, provides a receptacle for respiration, containing oxygen and certain purifying media, by means of which the inventor was able to remain for hours under water without any communication with the outward air. About the period at which we have now arrived two fatal accidents befel English aeronauts. We have related how Maldon, in Essex, was associated with one of the more adventurous exploits in Mr. Simmons's career. It was fated also to be associated with the voyage with which his career closed. On August 27th, 1888, he ascended from Olympia in company with Mr. Field, of West Brighton, and Mr. Myers, of the Natural History Museum, with the intention, if practicable, of crossing to Flanders; and the voyage proceeded happily until the neighbourhood of Maldon was reached, when, as the sea coast was in sight, and it was already past five o'clock, it appeared prudent to Mr. Simmons to descend and moor the balloon for the night. Some labourers some three miles from Maldon sighted the balloon coming up at speed, and at the same time descending until its grapnel commenced tearing through a field of barley, when ballast was thrown out, causing the balloon to rise again towards and over some tall elms, which became the cause of the disaster which followed. The grapnel, catching in the upper boughs of one of these trees, held fast, while the balloon, borne by the force of a strong wind, was repeatedly blown down to earth with violence, rebounding each time to a considerable height, only to be flung down again on the same spot. After three or four impacts the balloon is reported to have burst with a loud noise, when high in the air, the silk being blown about over the field, and the car and its occupants dashed to the ground. Help was unavailing till this final catastrophe, and when, at length, the labourers were able to extricate the party, Mr. Simmons was found with a fractured skull and both companions badly injured. Four summers later, June 30th, 1892, Captain Dale, the aeronaut to the Crystal Palace, was announced to make an ascent from the usual balloon grounds, weather permitting. Through the night and morning a violent storm prevailed, and it was contemplated that the exhibition would be withdrawn; but the wind abating in the afternoon, the inflation was proceeded with, and the ascent took place shortly before 6 p.m., not, however, before a large rent had been discovered and repaired as far as possible by Mrs. Dale. As passengers, there ascended the Captain's son William, aged nineteen, Mr. J. Macintosh, and Mr. Cecil Shadbolt. When the balloon had reached an altitude estimated at 600 feet the onlookers were horrified to see it suddenly collapse, a large rent having developed near the top part of the silk, from which the gas "rushed out in a dense mass, allowing the balloon to fall like a rag." The occupants of the car were seen to be throwing out everything madly, even wrenching the buttons from their clothing. All, however, with little avail, for the balloon fell "with a sickening thud," midway between the Maze and lower lake. All were found alive; but Captain Dale, who had alighted on his back, died in a few minutes; Mr. Shadbolt succumbed later, and both remaining passengers sustained terrible injuries. Few balloon mishaps, unattended with fatal results, have proved more exciting than the following. A large party had ascended from Belfast, in a monster balloon, under the guidance of Mr. Coxwell, on a day which was very unfit for the purpose by reason of stormy weather. A more serious trouble than the wind, however, lay in several of the passengers themselves, who seem to have been highly excitable Irishmen, incapable at the critical moment of quietly obeying orders The principal hero of the story, a German. Mr. Runge, in writing afterwards to the Ulster Observer, entirely exonerates Mr. Coxwell from any blame, attributing his mischances solely to the reprehensible conduct of his companions. On approaching the ground, Mr. Coxwell gave clear instructions. The passengers were to sit down in an unconstrained position facing each other, and be prepared for some heavy shocks. Above all things they were to be careful to get out one by one, and on no account to leave hold of the car. Many of the passengers, however, refused to sit down, and, according to Mr. Runge, "behaved in the wildest manner, losing completely their self-control. Seizing the valve rope themselves, they tore it away from its attachment, the stronger pushing back the weaker, and refusing to lend help when they had got out. In consequence of this the car, relieved of their weight, tore away from the grasp of Mr. Coxwell and those who still clung to it, and rose above the trees, with Mr. Runge and one other passenger, Mr. Halferty, alone within. As the balloon came earthwards again, they shouted to the countrymen for succour, but without the slightest avail, and presently, the anchor catching, the car struck the earth with a shock which threw Mr. Halferty out on the ground, leaving Mr. Runge to rise again into the air, this time alone." He thus continues the story: -
<urn:uuid:1166887a-5071-41ba-ae83-cab01d12cd1d>
CC-MAIN-2017-04
http://encyclopaedic.net/dominion-air-story-aerial-navigation/chapter-xx-chapter-accidents?page=3&quicktabs_1=1
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280761.39/warc/CC-MAIN-20170116095120-00097-ip-10-171-10-70.ec2.internal.warc.gz
en
0.980231
1,227
2.46875
2
ENFIELD, Conn. -- Feb. 12, 2003 -- Known for its products that spur imagination and creativity, LEGO Company today introduces CLIKITS(TM), a new fashion design system that provides girls endless opportunities to create stylish accessories to express their personality. The CLIKITS line, available in the U.S. and Canada this June, marks the company's debut in the arts & crafts category, and is comprised of 16 compatible, collectible kits that encourage girls ages 6 and up to piece together jewelry, room decor, picture frames, and hair and fashion accessories. "The CLIKITS line beautifully translates the LEGO values of creativity, imagination and fun into a new way to experience the LEGO brand for arts & crafts fans," says Andrew Black, president, LEGO Americas. "The ability to easily create and re-create designs and fashions is innovative for the arts & crafts category. We're confident this unique product, combined with the exciting marketing programs we have planned, will generate excitement among today's fashion-forward girls." As part of the introduction, LEGO Americas has signed a marketing partnership with Limited Too, a division of Too, Inc., the leading specialty retailer for active, fashion-aware 'tween (ages 7 to 14) girls. With more than 500 stores throughout the U.S., the retailer is considered the preeminent fashion brand by 'tween girls. The multi-faceted deal designates CLIKITS the "preferred fashion design system" of Limited Too, and provides access to Limited Too's consumer contact points. "Partnering with Limited Too offers a fantastic opportunity to 'click' with our target consumer to introduce the CLIKITS brand," says Black. "As the source for the latest fashions for today's savvy, fashion-forward girls, Limited Too! speaks to a large portion of today's tween girls, making them an ideal partner for this introduction." The Limited Too alliance is part of the larger marketing campaign for the CLIKITS line. Other marketing vehicles to communicate the brand positioning will include television advertising, a designated web site at www.CLIKITS.com, online promotion, in-store visibility, sampling, consumer sweepstakes promotion, presence at LEGOLAND® California and all LEGO® retail stores. Other vehicles currently are in development. The launch of an arts and crafts assortment is a natural extension of the LEGO brand, according to Black. "CLIKITS takes the LEGO values and translates them into a new play pattern. As with LEGO building toys, girls still will be tapping into their imagination to design and create something, except that with CLIKITS, the result will be a fashionable crafts masterpiece," he says. Four years of in-depth research preceded the introduction of CLIKITS. According to a study conducted by market research firm, Copernicus, for the LEGO Company, out of 16 different toy categories, mothers ranked both arts and crafts and construction as the most preferred for their inherent values - which this study shows are: fun, stimulates imagination and creativity, and fosters pride in achievement. The move into the arts and crafts category is part of LEGO Company's long-term growth strategy. Not only does the move broaden the LEGO consumer base to arts and crafts girls, it provides a greater retail opportunity. Traditional LEGO retailers will carry the CLIKITS product in their craft aisles, while new customer groups also will begin carrying LEGO product. "We now have a product that major national and regional craft and hobby store chains want to carry, and we're excited to expand our distribution to these outlets," Black says. CLIKITS items, recommended for ages 6 and up, range in price from $3.99 to $29.99 (USD) and can be categorized in three distinct "mindstyles" - or shape and color palettes: earth tones of oranges and yellows with flower icons; pinks with heart icons; or turquoise and purple with star icons. Most products include a 16-page inspiration booklet and select items also include an organizer tray that stacks with other kit trays for easy storage, a feature that arts and crafts research shows has real mom-appeal. LEGO Systems, Inc. (LSI) is the Americas (North America and Latin America) division of the LEGO Company, a privately-held firm based in Billund, Denmark. The LEGO Company employs nearly 1,300 people in the Americas - more than three-quarters of whom work at LSI's 203-acre headquarters in Enfield, Connecticut. The LEGO Company is committed to the development of children's creative and imaginative abilities, and its employees are guided by the motto adopted in the 1930s by founder Ole Kirk Christiansen: "Only the best is good enough." For more information, visit www.LEGO.com. Limited Too is the leading specialty retailer focusing on active, fashion-aware 'tween girls. The company sells apparel, swimwear, sleepwear, underwear, footwear, lifestyle and personal care products. Limited Too currently operates 511 stores in 46 states and Puerto Rico and publishes a catalog coinciding with key 'tween shopping times throughout the year. Limited Too also conducts e-commerce on its Web site, www.limitedtoo.com. Limited Too is owned and operated by Too, Inc.
<urn:uuid:61f6dee7-970d-42c6-8aed-e60222ea9ef7>
CC-MAIN-2022-33
http://www.toymania.com/news/messages/3035.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00470.warc.gz
en
0.927661
1,087
1.601563
2
A new service lets engineers and orthopedic surgeons design and 3D print highly accurate, patient-specific, orthopedic medical implants made of metal -- without owning a 3D printer. Using free, downloadable software, users can import ASCII and binary .STL files, design the implant, and send an encrypted design file to a third-party manufacturer. The implant is then printed using EOS's direct metal laser sintering 3D printing process, and shipped to the customer. The Within Medical service combines EOS's technology with London-based Within Technologies' Within Medical software and the expertise of contract manufacturer C&A Tool, which acts as a service provider, EOS field marketing manager Jessica Nehro told Design News, in an interview. C&A Tool is the only manufacturer licensed to use the Within software in North America, Siavash Mahdavi, director of Within Technologies, told us. "We have three manufacturers in Europe, and we're looking to expand in Asia as well," he said. Click on the image below to start the slideshow. Finger implants can be made out of cobalt chrome or titanium using EOS direct metal laser sintering (DMLS) 3D printers. Using free Within Medical software, these implants can be designed to allow varying levels of porosity, which encourage bone ingrowth into the implant's structure. (Source: Within Technologies) The idea for the service starts with the fact that 3D printing is ideal for creating customized orthopedic implants with porous metallic structures, instead of the lengthy process required to create different surface textures with traditional medical manufacturing, and the limitation of standard sizes. Last January at the MD&M West show, EOS of North America's director Andrew Snow told us that 30 percent of the 3D printing business is in medical applications, and one of the biggest is titanium implants. These make use of optimized lattice structures and rough surfaces that speed bone growth integration. As we reported then, Snow told us that costs were diving. As an example, in 20 hours, 18 titanium acetabular cups made by Within Technologies using EOS systems can be printed for only $70 each, including capital equipment depreciation. But generating those optimized lattice structures is not a simple operation. "One advantage of additive manufacturing [AM] is it allows you to create a porous coating and solid substrate in one piece," Mahdavi told us. "The software can simplify this; it allows you to coat surfaces with porous coatings." This metallic foam is made of a series of struts, each only about 200 microns in diameter, with thousands of separate struts in a typical hip implant. There is software that generates lattice structures, but Within's is the first that's built from the ground up for designing orthopedic implants that will be created with AM. The software also allows the design engineer or surgeon to control the amount of surface roughness, as well as pore size distribution, thickness, and densities, said Mahdavi. It's also possible to optimize the structure to the loading conditions of implants, varying the stiffness of some areas versus others. The Within Medical software is already in use at 300 companies, from boutique orthopedic companies to larger OEMs. (Watch a tutorial video showing a trabecular cup being designed with the software here.) For those without direct access to a high-end EOS printer and machining facilities, C&A Tool acts not only as a printing service but also provides tooling and engineering services. The company has six EOS DMLS systems, including both the EOSINT M 270 and the M 280. These print biocompatible materials, such as stainless-steel alloys, cobalt-chrome, and medical-grade titanium, John Halverson, C&A's medical business unit manager, told us. "We also have six years of experience in 3D printing with metals, and are a subtractive manufacturing facility," he said. "We combine AM from EOS with the porous structures created by Within software and secondary processes to make a complete implant going out the door. That includes machining for tolerances or finishes on non-Within surfaces." The software's file encryption format allows the OEM manufacturer to have more security over the IP they are generating, said Mahdavi. The file's metadata is trackable regarding where parts are being built and how many. This gives OEMs more control over the digital part before it's manufactured, which aids them in navigating the FDA approval process. Although C&A Tool has been licensed to view the file, its employees can't see the formulas used to build the structure, such as strut and pore size.
<urn:uuid:b8d907ca-dc52-45e1-87a2-fcc3973572c1>
CC-MAIN-2016-44
http://www.designnews.com/author.asp?section_id=1392&doc_id=270238
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719784.62/warc/CC-MAIN-20161020183839-00426-ip-10-171-6-4.ec2.internal.warc.gz
en
0.943132
962
2.34375
2
To enable processing of investigators’ genomic data, we maintain numerous high-performance Linux-based compute resources, both locally in HCI and at CHPC. HCI maintains a number of Linux-based servers within our data center for use in processing bioinformatics data. For information on how to gain access to these compute resources, please contact us. These servers include the following: - Uinta, an interactive server with 48 cores and 440 GB memory - Alta, an interactive server with 32 cores and 512 GB memory - Moab, an interactive server with 24 cores and 64 GB memory - A dedicated 20-core server for Illumina sequence processing and de-multiplexing - A high performance 28 TB network file server for temporary, working storage - A 128 TB archival network storage to support the GNomEx LIMS database In addition to local resources, we own a number of compute nodes on clusters at the University of Utah Center for High Performance Computing (CHPC). Users of our local computing servers can submit jobs to our nodes on these clusters by using our pysano service, or by arranging guest accounts to access the nodes directly through CHPC; please contact us for more information. The nodes we own include the following: - Fourteen nodes (32-48 cores, 64-128 GB RAM each) on the Kingspeak cluster - Thirty-eight nodes (56 core, 128-256 GB RAM each) in the HIPAA/PHI-compliant protected environment Redwood cluster at CHPC. These are the nodes used for working with human-derived data. Application and Data Resources For the interactive HCI Linux servers, all machines mount the same network resources. Some common paths to remember include the following. Some directories are mirrored on our CHPC nodes for use with our pysano service. /scratchis for fast, temporary file storage without storage quotas. Make your own directory and use it when launching pysano jobs. /tomato/dev/jobis a historical location for launching pysano jobs. Make your own directory to use when launching pysano jobs. /home/BioAppsis a repository of bioinformatic applications not shared with CHPC nodes. /tomato/dev/appis a repository of bioinformatic applications shared with CHPC. /tomato/dev/datais a repository of genomic reference data shared with CHPC. - Some application packages are installed under Modules. Use module loadto list available modules and load a specific module, respectively. - A RStudio server is available for running R scripts and software. Contact the core for instructions on how to access it.
<urn:uuid:eedba0b2-b3d7-40ce-b204-1aba1158d9c6>
CC-MAIN-2022-33
https://uofuhealth.utah.edu/huntsman/shared-resources/gba/bioinformatics/infrastructure/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00672.warc.gz
en
0.810757
572
1.757813
2
Just a few of the ways the crooks are trying to fool you during the 2012 Olympic Games. By Constantine von Hoffman, CIO Bad Apps – Anyone watching the 2012 Olympic Games in London via smartphone or tablet should be aware that there are many third-party applications not authorized by the Olympic Games. Consumer devices can be attacked when malicious applications are downloaded, as seen by by recent news about spam-distributing iPhone applications. Drive-by Attack – Malware can automatically begin downloading to your device during a visit to an infected website, email or pop-up ad. Cybercriminals link this software to seemingly authentic Olympic Games websites, for example the Flashback Trojan for Mac. Going Phishing – Fake Olympic Games links are littering Facebook and Twitter in order to get you to malware infected sites. Twitter links, for instance, are always shortened (e.g. bit.ly/…) and so you can’t tell where these links will lead – unless clicked upon, which in turn could instantly infect your machines. Also be aware that not all Twitter accounts are legit: Is @CNNInternatDesk really part of CNN? Search Engine Poisoning – Cybercriminals can fake you out when you are doing searches for information or images about the games. They will redirect you to malicious websites and rather than seeing an image of the unbelievably ugly mascot of the Olympic Games, you can get an unbelievably ugly picture that is filled with malware. Ticket Scams – Hey you, over there in the UK: I know that Olympic Games organizers are rightfully getting a lot of heat because they gave so many tickets to corporate sponsors and so few to you fine Brits who actually paid for 9/10th of the games. That doesn’t mean every place offering tickets is legit. Do your homework. On another note: Glad to see the UK cops have their security priorities in order: They are doing a major crack down on graffiti artists. The police have painted over Olympic-themed murals and arrested several artists who are now barred from owning spray paint or being “within one mile of any Olympic venue in London or elsewhere in England.” The authorities say the crackdown “was to prevent the commission of offenses and to protect the integrity of the Olympic Games.” Fortunately it doesn’t seem to be working. The great Banksy (below) and others continue to offer some wonderful editorial comments.
<urn:uuid:21b7b55c-b549-46b1-9c85-26f7ffe2002f>
CC-MAIN-2022-33
https://www.cio.com/article/296369/security0-5-olympic-cyber-risks-to-watch-out-for.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00068.warc.gz
en
0.937141
500
2.21875
2
We Help Children Qualify for Supplemental Security Income (SSI) Supplemental Security Income provides financial assistance for basic needs (food, clothing, and shelter). Children who are blind or disabled may be eligible for SSI benefits if their families lack the resources to provide for their special needs. The eligibility rules for SSI for children are very technical and confusing. At Spector and Lenz, PC, our experienced and compassionate attorneys help Illinois families obtain these needed benefits. SSI Eligibility for Blind and Disabled Children Children under the age of 18 can receive SSI benefits if they meet the financial and medical criteria. Some conditions are considered automatically eligible: - Visual impairment (blindness) under the Social Security Disability definition - Certain listed impairments such as autism, mental retardation, childhood cancer, cystic fibrosis, asthma, or sickle cell disease Children with other physical and mental conditions may still qualify if their condition impairs two or more areas of life function. The skilled lawyers of Spector and Lenz can help document that your child meets SSA’s disability definition. The Social Security Administration uses a complex formula that considers the income and resources of the parents, stepparents, and child. Our attorneys can counsel you on how your child may meet the financial criteria. Our Experience Can Make a Difference for Your Child Our lead attorney, Deborah Spector, has 40-plus years of experience with Social Security Disability claims, including SSI for children.
<urn:uuid:85066fea-5365-4a84-9518-5cde1695c27a>
CC-MAIN-2022-33
https://www.spectorandlenz.com/social-security-disability/ssi-for-children/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00471.warc.gz
en
0.917862
305
2.125
2
Estonia: latest working life developments Q2 2018 The ending of Estonia’s longest ever strike, the re-establishment of tripartite social dialogue, and changes in legislation to tackle the gender pay gap are the topics of interest in this article. This country update reports on the latest developments in working life in Estonia in the second quarter of 2018. Estonia’s longest ever strike ends During the second quarter of 2018, the longest strike in Estonia since the beginning of the 1990s ended after months of negotiations. The dispute began in October 2017, when workers at meat production company HKScan Estonia AS demanded a pay rise, created a trade union and turned to the National Conciliator. When their demands were not met, the workers continued to demonstrate and launched an official strike at the beginning of February 2018. HKScan Estonia AS claimed that it needed time to reorganise its remuneration system, while the workers believed their employer was being uncooperative. The strike lasted for three months and ended on 16 April 2018 with the requested pay rise. However, further discussions are on the cards as the workers are demanding that HKScan Estonia AS recognises and accepts their trade union as a partner on paper, so that the future negotiations can proceed more smoothly. Tripartite social dialogue resumes after 16 years In May 2018, the Estonian government and social partners re-established tripartite social dialogue by meeting to discuss topics related to labour and social policy. The last time such a meeting took place was more than a decade ago in 2002. The Estonian Trade Union Confederation (EAKL), the Estonian Employers’ Confederation (ETTK), the Prime Minister, the Minister of Health and Labour, and the Minister of the Interior participated in the event. The purpose of the meeting was to discuss topics of particular importance to each side, such as the development of workplace democracy and issues related to social tax and a foreign workforce. It was agreed that these meetings should take place several times a year, with the next meeting scheduled for September 2018. Government plans to reduce the gender pay gap Estonia has the highest gender pay gap among the EU Member States, standing at 25.3% in 2016. In order to reduce this gap, a number of changes have been proposed to the Gender Equality Act. These changes were sent to the government for approval in April 2018 and are expected to enter into force on 1 July 2020. They include the following: - All employers will be obliged to collect gender-based data so that it will be possible to assess gender differences in the remuneration system. - The Labour Inspectorate will be authorised to monitor the remuneration and benefits paid by employers to men and women for equal work. - A digital tool called the ‘Pay Gap Speedometer’ will be created for use in the public sector. This tool will allow the Labour Inspectorate to conduct an initial inspection based on data that organisations have already provided through the employment register (on occupations, gender, etc.). If the Inspectorate discovers potential discrimination cases, it will be allowed to ask the organisations involved to conduct an equal pay audit and develop an action plan to address the gender pay gap. Initially, the Labour Inspectorate's supervision and the Pay Gap Speedometer were going to be introduced in the private sector as well. However, employers claimed that this would cause an undue administrative burden and so their use will only be obligatory within the public sector. Private sector companies will be allowed to use the digital tool, but no supervision based on the results will be carried out. Foreseen developments in the second half of 2018 include approval of a pension reform that aims to provide a more sustainable and flexible pensions system in the future. The second phase of the parental leave reform is also expected to take place, aimed at improving the flexibility of the system and increasing the participation of fathers in family life. Finally, national-level social partners have commenced negotiations over the 2019 national minimum wage and an agreement is anticipated in September 2018.
<urn:uuid:e5dc8e7b-47a4-46fd-9c79-314d4576f0d3>
CC-MAIN-2022-33
https://www.eurofound.europa.eu/nl/publications/article/2018/estonia-latest-working-life-developments-q2-2018
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00678.warc.gz
en
0.959528
824
1.5625
2
Posted 4 years ago on Jan. 31, 2012, 3:18 p.m. EST by 99PercentFriendly This content is user submitted and not an official statement It used to be that politicians and corporations had some self-restraints when it came to how much they squeezed an average family for profits, because they were smart enough to realize that if they put too much pressure on people they would kill the golden goose that had made them so rich and powerful to begin with. Back then somehow it was commonly accepted that an average family could only pay a certain percentage of their income for each of the necessities of life, such as food, housing, healthcare, transportation, education, and entertainment, and so it was possible for someone with an average income to start a family and enjoy having a semi comfortable life. But then the one percent got too greedy, corporations started to maximize their profits by squeezing every last dollar out of the 99 percent. The average family that at one time was able to make their mortgage, insurance, and car payment and still manage to put their kids through college and even take a family vacation found themselves increasingly under pressure to the point that now they have to choose between putting food on the table or paying their mortgage payment. To make it even worse the one percent started punishing the 99 percent by laying them off their jobs, foreclosing on their homes, and by canceling their health benefits. Once the one percent realized that they couldn’t squeeze any more dollars out of the 99 percent they decided to bypass the whole capitalist economy and go after the money directly by bailing themselves out with the help of their politician friends. No matter how you look at it the 99 percent has gotten a raw deal in this game because the one percent has been allowed to tear apart the fabric of the society and economy just to feed their never ending greed. The social and economic inequality that is now allowing the one percent to get even richer as the 99 percent get pushed further down in to poverty has to end. We need peaceful and constructive reforms to make sure that everyone can live and function with dignity and have a certain standard of living and quality of life without being at the mercy of the greed and agendas of the one percent.
<urn:uuid:4f9c9ef5-e5f2-4c6a-b782-fb3d3af2dfb5>
CC-MAIN-2017-04
http://www.occupywallst.org/forum/ending-the-social-and-economic-inequality-requires/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00536-ip-10-171-10-70.ec2.internal.warc.gz
en
0.982501
453
1.851563
2
“From the Classroom” is a series that features some of the great work and research from students who visit our collections. Below is a blog by Breanna Himschoot from Dr. Jennifer Burek Pierce’s class “History of Readers and Reading” (SLIS:5600:0001) Cookbooks, Citation, and Community By Breanna Himschoot Under its bright lavender marbled binding, this handwritten American cookbook (American cookbook, ca. 1850, US32 in the Szathmary Culinary Manuscripts Collection at the University of Iowa) holds a world of community and relationships, even though the two writers of the book are unknown to us. Given the context of its recipes and handwriting, we believe this book to have been written by two women in America, in the years following 1851. Though the first page contains penned illustrations fit for a cover page, this book has no self-prescribed title or mention of the names of the women who wrote it. Yet, we can learn about these women through their interactions with the book itself. In the hand of the first writer, the text is formatted consistently throughout, with numbered pages that leave extra room to fill in before a roughly alphabetic index relating page number to recipe. This neat and practical formatting, paired with her recipe for Harvey’s Fish Sauce (page 17) copied from Miss Leslie’s Directions for Cookery (1851), suggests that the first writer has at least some familiarity with printed books, and cookbooks especially. She also uses the pages of this cookbook to comment on her own recipes, noting her preference of one pea soup over another and adding tips based on her experience using the recipes she records. Our second writer is much less neat and is unafraid to scribble through, and write over her own writing. She begins filling in her new recipes in any space she can find before she reaches the previously unfilled pages (page 50). Though our first writer did occasionally attribute her recipes to others (Mrs. Downe’s raisin wine on page 35 and Mr. Pendrill’s rec’t when a barrel of beer turns sour on page 46 for example), our second writer is much more likely to attribute her recipes to named people. Over the course of her writing, she names the sources of at least 59 of her recipes, with a Mrs. Saward (often abbreviated to Mrs. S) having a notable number of contributions. Mrs. Saward is the citation for almost every recipe from pages 98-104, 23 in total. Could our unnamed writer have been visiting her and consulting her favorite recipes together, perhaps copying them from Mrs. S’s own cookbook? Was she a friend, mentor, or relative? These names, especially when looking at how they appear in the text, give us a sense of the community that this unnamed second writer lived in, and allow us to speculate on her interactions in this community. Though we cannot be sure of the second writer’s relationship to the first, we can see in these pages an engagement with the recipes that the first writer recorded. From correcting her spelling of “spinach” (page 43), striking through recipes in the index, and pasting over the recipe for Hunter’s pudding with a recipe for Plum pudding instead (6), we see this text being used, updated, and commented on. Beyond its written engagements, the staining on certain pages point to this book having an active life the kitchen rather than remaining a pristine set of records. Though we may never know these women’s names, perhaps by spending time among their notes and the pages they stained, we can learn more about the community they lived in and the recipes they valued. Theophano, Janet. 2002. Eat My Words: Reading Women’s Lives through the Cookbooks They Wrote. New York: Palgrave.
<urn:uuid:ab03f2fb-d7d2-4812-b1d2-c3761b1148fc>
CC-MAIN-2022-33
https://blog.lib.uiowa.edu/speccoll/tag/american-cookbook/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00679.warc.gz
en
0.961218
816
2.265625
2
Selig has worked closely with German company coffee machine manufacturer K-fee System GmbH to supply it with a pioneering demanding lidding solution for its coffee capsules. The highly-engineered lid foil developed by Selig is made from a special compound designed to work in capsule machines with high brew temperature and high water pressure. It has a special barrier to ensure the coffee contained in the capsules remains fresh. Markus Wilden, Selig sales manager for Benelux and Germany, explained: “The lidding solution is a compound with three layers and a special barrier layer. After printing one layer, there are two lamination processes and then the material is slit, and delivered to the customer.” “It is a very difficult technical application. In a nutshell, you have this capsule which you pump water through. You do that with very high pressure – up to 16 or 18 bars. So the capsule needs to withstand considerable pressure. Then you pump water through it at a temperature of around 95° C. That places additional strain on the system.”“We also need to use adhesives which comply with food regulations. On top of all this, the capsule lid must be both pierce-able and tear resistant so we need to balance the strength required to deal with the pressure and temperatures with a ‘weakness’ that will allow piercing.” An efficient gas barrier in the capsule lid protects the contents by preventing the entry of oxygen and moisture. The sealing also ensures that no external odours enter the capsule, the aromatic compounds do not escape and the rich coffee flavour is preserved. Printing of the capsule lidding is also challenging because Selig must deliver relatively small quantities of lidding to K-fee (a maximum of 10,000 m² a year compared with typical runs of 100,000 m²for candy bars) with different labels for each K-fee customer. This calls for an ability to print very fine designs and a flexible printing operation.Mr Wilden again: “Selig’s core business is the sealing membranes that are on bottles, coffee jars, and so on. We have this kind of material in our DNA… We specialise in the short run market where we have the right printing technologies. The technical intricacies of printing the material are challenging because we have had to develop dedicated ink and dedicated adhesives in a specialized lab.” Indeed, Selig Flexibles’ superbly equipped laboratory at its location in Switzerland contains state-of-the-art scientific equipment to accurately measure pressure, temperature and other critical aspects of the lidding design. Mr Wilden added: “Before we deliver material to a customer, we conduct a series of tests. We can, for example, assess the precise force needed to pierce a lid.” The company is able to conduct tests with different types of lid foils and capsules using conduction and induction sealing, and sealing with ultrasonics. It also measures brewing and pressure behaviour on different types of capsule machines. It even looks for worn-out coffee machines on the Internet to ensure it has an appropriate range for the testing lab. Mr Wilden again: “So you can see we do far more than simply print and cut laminate material; we test it thoroughly too. And, if the customer has new ideas, we are able to experiment with them because we have the appropriate facilities.” But Selig’s experience is not confined simply to manufacturing, printing and testing K-fee’s coffee capsule lids; the two companies have also developed a strong working relationship. Mr Wilden explained: “K-fee know what they need now and what they will require in the future, and we have expertise in the technology. There is a high level of trust between their people and ours. They treat us as equal partners by sharing all of the pertinent information. “So, if there is a problem or an idea they wish to develop, we are able to join forces and search for a solution together; there is close co-operation between the two of us. We also co-operate in terms of supply so that we are able to deliver the appropriate amount of material which means planning for the future because K-fee has very challenging short lead times.” He concluded: “The customer has confidence that we know what we are doing. It’s easy to make a few hundred capsules that work; it’s not so easy to make a few hundred million capsules that work.”
<urn:uuid:d318c554-db70-4ef2-b559-666089f9dc65>
CC-MAIN-2022-33
https://packagingeurope.com/selig-group-supplies-k-fee-with-tough-coffee-capsule-lidding/6388.article
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00278.warc.gz
en
0.949799
943
1.6875
2
"Sir Buzz." by Flora Annie Steel (1847-1929) NCE upon a time a soldier died, leaving a widow and one son. They were dreadfully poor, and at last matters became so bad that they had nothing 1eft in the house to eat. 'Mother,' said the son, 'give me four shillings, and I will go and seek my fortune in the wide world.' 'Alas!' answered the mother, 'and where am I, who haven't a farthing wherewith to buy bread, to find four shillings?' 'There is that old coat of my father's,' returned the lad; 'look in the pocket–perchance there is something there.' So she looked, and behold! there were six shillings hidden away at the very bottom of the pocket! 'More than I bargained for,' quoth the lad, laughing. 'See, mother, these two shillings are for you; you can live on that till I return, the rest will pay my way until I find my fortune.' So he set off to find his fortune, and on the way he saw a tigress, licking her paw, and moaning mournfully. He was just about to run away from the terrible creature, when she called to him faintly, saying, 'Good lad, if you will take out this thorn for me, I shall be for ever grateful.' 'Not I!' answered the lad. 'Why, if I begin to pull it out, and it pains you, you will kill me with a pat of your paw.' 'No, no!' cried the tigress, 'I will turn my face to this tree, and when the pain comes I will pat it.' To this the soldier's son agreed; so he pulled out the thorn, and when the pain came the tigress gave the tree such a blow that the trunk split all to pieces. Then she turned towards the soldier's son, and said gratefully, 'Take this box as a reward, my son, but do not open it until you have travelled nine miles.' So the soldier's son thanked the tigress, and set off with the box to find his fortune. Now when he had gone five miles, he felt certain that the box weighed more than it had at first, and every step he took it seemed to grow heavier and heavier. He tried to struggle on–though it was all he could do to carry the box–until he had gone about eight miles and a quarter, when his patience gave way. 'I believe that tigress was a witch, and is playing off her tricks upon me,' he cried, 'but I will stand this nonsense no longer. Lie there, you wretched old box! –heaven knows what is in you, and I don't care.' So saying, he flung the box down on the ground: it burst open with the shock, and out stepped a little old man. He was only one span high, but his beard was a span and a quarter long, and trailed upon the ground. The little mannikin immediately began to stamp about and scold the lad roundly for letting the box down so violently. 'Upon my word!' quoth the soldier's son, scarcely able to restrain a smile at the ridiculous little figure, 'but you are weighty for your size, old gentleman! And what may your name be?' 'Sir Buzz!' snapped the one-span mannikin, still stamping about in a great rage. 'Upon my word!' quoth the soldier's son once more, 'if you are all the box contained, I am glad I didn't trouble to carry it farther.' 'That's not polite,' snarled the mannikin; 'perhaps if you had carried it the full nine miles you might have found something better; but that's neither here nor there. I'm good enough for you, at any rate, and will serve you faithfully according to my mistress's orders.' 'Serve me!–then I wish to goodness you'd serve me with some dinner, for I am mighty hungry! Here are four shillings to pay for it.' No sooner had the soldier's son said this and given the money, than with a whiz! boom! bing! like a big bee, Sir Buzz flew through the air to a confectioner's shop in the nearest town. There he stood, the one-span mannikin, with the span and a quarter beard trailing on the ground, just by the big preserving pan, and cried in ever so loud a voice, 'Ho! ho! Sir Confectioner, bring me sweets!' The confectioner looked round the shop, and out of the door, and down the street, but could see no one, for tiny Sir Buzz was quite hidden by the preserving pan. Then the mannikin called out louder still, 'Ho! ho! Sir Confectioner, bring me sweets!' And when the confectioner looked in vain for his customer, Sir Buzz grew angry, and ran and pinched him on the legs, and kicked him on the foot, saying, 'Impudent knave! do you mean to say you can't see me? Why, I was standing by the preserving pan all the time!' The confectioner apologised humbly, and hurried away to bring out his best sweets for his irritable little customer. Then Sir Buzz chose about a hundredweight of them, and said, 'Quick, tie them up in something and give them into my hand; I'll carry them home.' 'They will be a good weight, sir,' smiled the confectioner. 'What business is that of yours, I should like to know?' snapped Sir Buzz. 'Just you do as you're told, and here is your money.' So saying he jingled the four shillings in his pocket. 'As you please, sir,' replied the man cheerfully, as he tied up the sweets into a huge bundle and placed it on the little mannikin's outstretched hand, fully expecting him to sink under the weight; when lo! with a boom! bing! he whizzed off with the money still in his pocket. He alighted at a corn-chandler's shop, and, standing behind a basket of flour, called out at the top of his voice, 'Ho! ho! Sir Chandler, bring me flour!' And when the corn-chandler looked round the shop, and out of the window, and down the street, without seeing anybody, the one-span mannikin, with his beard trailing on the ground, cried again louder than before, 'Ho! ho! Sir Chandler, bring me flour!' Then on receiving no answer, he flew into a violent rage, and ran and bit the unfortunate corn-chandler on the leg, pinched him, and kicked him, saying, 'Impudent varlet! don't pretend you couldn't see me! Why, I was standing close beside you behind that basket!' So the corn-chandler apologised humbly for his mistake, and asked Sir Buzz how much flour he wanted. 'Two hundredweight,' replied the mannikin, 'two hundredweight, neither more nor less. Tie it up in a bundle, and I'll take it with me.' 'Your honour has a cart or beast of burden with you, doubtless?' said the chandler, 'for two hundredweight is a heavy load.' 'What's that to you?' shrieked Sir Buzz, stamping his foot, 'isn't it enough if I pay for it?' And then he jingled the money in his pocket again. So the corn-chandler tied up the flour in a bundle, and placed it in the mannikin's outstretched hand, fully expecting it would crush him, when, with a whiz! Sir Buzz flew off, with the shillings still in his pocket. Boom! bing! boom! The soldier's son was just wondering what had become of his one-span servant, when, with a whir! the little fellow alighted beside him, and wiping his face with his handkerchief, as if he were dreadfully hot and tired, said thoughtfully, 'Now I do hope I've brought enough, but you men have such terrible appetites!' 'More than enough, I should say,' laughed the lad, looking at the huge bundles. Then Sir Buzz cooked the girdle-cakes, and the soldier's son ate three of them and a handful of sweets; but the one-span mannikin gobbled up all the rest, saying at each mouthful, 'You men have such terrible appetites–such terrible appetites!' After that, the soldier's son and his servant Sir Buzz travelled ever so far, until they came to thc King's city. Now the King had a daughter called Princess Blossom, who was so lovely, and tender, and slim, and fair, that she only weighed five flowers. Every morning she was weighed in golden scales, and the scale always turned when the fifth flower was put in, neither less nor more. Now it so happened that the soldier's son by chance caught a glimpse of the lovely, tender, slim, and fair Princess Blossom, and, of course, he fell desperately in love with her. He would neither sleep nor eat his dinner, and did nothing all day long but say to his faithful mannikin, 'Oh, dearest Sir Buzz! oh, kind Sir Buzz!–carry me to the Princess Blossom, that I may see and speak to her.' 'Carry you!' snapped the little fellow scornfully, 'that's a likely story! Why, you're ten times as big as I am. You should carry me! ' Nevertheless, when the soldier's son begged and prayed, growing pale and pining away with thinking of the Princess Blossom, Sir Buzz, who had a kind heart, was moved, and bade the lad sit on his hand. Then with a tremendous boom! bing! boom! they whizzed away and were in the palace in a second. Being night-time, the Princess was asleep; nevertheless the booming wakened her and she was quite frightened to see a handsome young man kneeling beside her. She began of course to scream, but stopped at once when the soldier's son with the greatest politeness, and in the most elegant of language, begged her not to be alarmed. And after that they talked together about everything delightful, while Sir Buzz stood at the door and did sentry; but he stood a brick up on end first, so that he might not seem to pry upon the young people. Now when the dawn was just breaking, the soldier's son and Princess Blossom, wearied of talking, fell asleep; whereupon Sir Buzz, being a faithful servant, said to himself, 'Now what is to be done? If my master remains here asleep, some one will discover him, and he will be killed as sure as my name is Buzz, but if I wake him, ten to one he will refuse to go.' So without more ado he put his hand under the bed, and bing! boom! carried it into a large garden outside the town. There he set it down in the shade of the biggest tree, and pulling up the next biggest one by the roots, threw it over his shoulder, and marched up and down keeping guard. Before long the whole town was in a commotion, because the Princess Blossom had been carried off, and all the world and his wife turned out to look for her. By and by the one-eyed Chief Constable came to the garden gate. 'What do you want here?' cried valiant Sir Buzz, making passes at him with the tree. The Chief Constable with his one eye could see nothing save the branches, but he replied sturdily, 'I want the Princess Blossom!' 'I'll blossom you! Get out of my garden, will you?' shrieked the one-span mannikin, with his one and quarter span beard trailing on the ground; and with that he belaboured the Constable's pony so hard with the tree that it bolted away, nearly throwing its rider. The poor man went straight to the King, saying, 'Your Majesty! I am convinced your Majesty's daughter, the Princess Blossom, is in your Majesty's garden, just outside the town, as there is a tree there which fights terribly.' Upon this the King summoned all his horses and men, and going to the garden tried to get in; but Sir Buzz behind the tree routed them all, for half were killed, and the rest ran away. The noise of the battle, however, awoke the young couple, and as they were now convinced they could no longer exist apart, they determined to fly together. So when the fight was over, the soldier's son, the Princess Blossom, and Sir Buzz set out to see the world. Now the soldier's son was so enchanted with his good luck in winning the Princess, that he said to Sir Buzz, 'My fortune is made already; so I shan't want you any more, and you can go back to your mistress.' 'Pooh!' said Sir Buzz. 'Young people always think so; however, have it your own way, only take this hair out of my beard, and if you should get into trouble, just burn it in the fire. I'll come to your aid.' So Sir Buzz boomed off, and the soldier's son and the Princess Blossom lived and travelled together very happily, until at last they lost their way in a forest, and wandered about for some time without any food. When they were nearly starving, a Brahman found them, and hearing their story said, 'Alas! you poor children!–come home with me, and I will give you something to eat.' Now had he said 'I will eat you,' it would have been much nearer the mark, for he was no Brahman, but a dreadful vampire, who loved to devour handsome young men and slender girls. But, knowing nothing of all this, the couple went home with him quite cheerfully. He was most polite, and when they arrived at his house, said, 'Please get ready whatever you want to eat, for I have no cook. Here are my keys; open all my cupboards save the one with the golden key. Meanwhile I will go and gather firewood.' Then the Princess Blossom began to prepare the food, while the soldier's son opened all the cupboards. In them he saw lovely jewels, and dresses, and cups and platters, such bags of gold and silver, that his curiosity got the better of his discretion, and, regardless of the Brahman's warning, he said, 'I will see what wonderful thing is hidden in the cupboard with the golden key.' So he opened it, and lo! it was full of human skulls, picked quite clean, and beautifully polished. At this dreadful sight the soldier's son flew back to the Princess Blossom, and said, 'We are lost! we are lost!–this is no Brahman, but a horrid vampire!' At that moment they heard him at the door, and the Princess, who was very brave and kept her wits about her, had barely time to thrust the magic hair into the fire, before the vampire, with sharp teeth and fierce eyes, appeared. But at the selfsame moment a boom! boom! binging noise was heard in the air, coming nearer and nearer. Whereupon the vampire, who knew very well who his enemy was, changed into a heavy rain pouring down in torrents, hoping thus to drown Sir Buzz, but he changed into the storm wind beating back the rain. Then the vampire changed to a dove, but Sir Buzz, pursuing it as a hawk, pressed it so hard that it had barely time to change into a rose, and drop into King Indra's lap as he sat in his celestial court listening to the singing of some dancing girls. Then Sir Buzz, quick as thought, changed into an old musician, and standing beside the bard who was thrumming the guitar, said, 'Brother, you are tired; let me play.' And he played so wonderfully, and sang with such piercing sweetness, that King Indra said, 'What shall I give you as a reward? Name what you please, and it shall be yours.' Then Sir Buzz said, 'I only ask the rose that is in your Majesty's lap.' 'I had rather you asked more, or less,' replied King Indra; 'it is but a rose, yet it fell from heaven; nevertheless it is yours.' So saying, he threw the rose towards the musician, and lo! the petals fell in a shower on the ground. Sir Buzz went down on his knees and instantly gathered them up; but one petal escaping, changed into a mouse. Whereupon Sir Buzz, with the speed of lightning, turned into a cat, which caught and gobbled up the mouse. Now all this time the Princess Blossom and the soldier's son, shivering and shaking, were awaiting the issue of the combat in the vampire's hut; when suddenly, with a bing! boom! Sir Buzz arrived victorious, shook his head, and said, 'You two had better go home, for you are not fit to take care of yourselves.' Then he gathered together all the jewels and gold in one hand, placed the Princess and the soldier's son in the other, and whizzed away home, to where the poor mother–who all this time had been living on the two shillings–was delighted to see them. Then with a louder boom! bing! boom! than usual, Sir Buzz, without even waiting for thanks, whizzed out of sight, and was never seen or heard of again. But the soldier's son and the Princess Blossom lived happily ever after. This chapter has been put on-line as part of the BUILD-A-BOOK Initiative at the Celebration of Women Writers. Initial text entry and proof-reading of this chapter were the work of volunteers Gail Chesler and Mary Mark Ockerbloom.
<urn:uuid:1e194281-33f1-43e4-94a3-8744636a3178>
CC-MAIN-2016-44
http://digital.library.upenn.edu/women/steel/punjab/punjab-1.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718957.31/warc/CC-MAIN-20161020183838-00435-ip-10-171-6-4.ec2.internal.warc.gz
en
0.979362
3,817
2.296875
2
Let us make an in-depth study of the subject matter, advantages and limitations of budgetary control. Meaning of Budgetary Control: It is not possible to translate the plans into reality simply by preparing budgets. That is why it is necessary to exercise some control over those matters which are directly related to the implementation of the plans. For this purpose, there should be a predetermined standard about the performance of each individual as well as each department. In other words, yearly budgets should be subdivided into monthly or fortnightly, or weekly or daily budgets. Thereafter, the actual performances are to be compared with the Standard in order to measure the variance. Adequate steps should be taken for amendments after scrutinising and analysing the reasons thereof. The following steps are very important in this respect: (a) To set up the ‘Standards’; (b) To measure the actual performances; (c) To measure the variances between the actual and the budget; and (d) To analyse the reasons thereof. Budgetary Control System, practically, is a system of controlling and planning costs. It has been defined by The Institute of Cost and Management Accountants, England, as the establishment of the budgets relating to responsibilities of executives to the requirement of a policy and the continuous comparison of actual with budgeted results either to secure by individual action the objectives of the policy or to provide a firm basis for its revision. Advantages of Budgetary Control: The Budgetary Control System has got some advantages of its own. Some of them are: (a) It acts as a yardstick with which actuals are compared and necessary corrections can be made so that it promotes efficiency and thereby helps the management for taking future courses of action. (b) Co-ordination is established among the different departments and individuals through planning policy and control. (c) Limiting factors can be utilised properly by the application of this system. Otherwise, less important factors can play the most significant role without, however, utilising the scarce factors which should have been used in view of their importance. As a result, there may be loss instead of profit. (d) It provides valuable aids to the management by several managerial functions and, thus, helps the management to adopt the future courses of action in a scientific way. (e) The top management can exercise control over the various activities of the business since each and every aspect of the business is reviewed. (f) Management is compelled for budgets to fix up its target before-hand in order to achieve its major objectives, viz., profit-maximisation. (g) Budgets help to mobilise resources to the right plan and at the right time. (h) Budgets ensure optimum utilisation of resources. Limitations of Budgetary Control: The Budgetary Control System is, however, not free from shortcomings which are: (a) This system proves useless in those firms where policies, processes, techniques etc. are frequently changing since it does not take into account such changes. (b) It is very costly in case of small firms and serves no purpose in the event of abnormal situations, such as strikes, lock-outs etc. (c) There are many factors over which the management has no control but the Budgetary Control System depends on them. In that case, if it is prepared, it may be inaccurate and fail to serve the purposes for which it is meant.
<urn:uuid:fe303a15-1869-44a0-98a6-2d07a647180d>
CC-MAIN-2016-44
http://www.yourarticlelibrary.com/accounting/budgetary-control-accounting/budgetary-control-meaning-advantages-and-limitations/66078/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718957.31/warc/CC-MAIN-20161020183838-00435-ip-10-171-6-4.ec2.internal.warc.gz
en
0.941124
720
2.953125
3
The Shack-Hartmann Phasing Sensor (SHAPS) has been integrated in the Active Phasing Experiment (APE) at ESO. It is currently under test in the laboratory. The tests on sky are foreseen for the end of 2008, when APE will be mounted at the Nasmyth focus of one of the VLT unit telescopes. SHAPS is based on the Shack-Hartmann principle: the lenslet array is located in a plane which is optically conjugated to the Active Segmented Mirror (ASM) of APE and is composed of two types of microlenses, circular and cylindrical, which give information about the wavefront slope and the piston steps, respectively. This proceeding contains a description of SHAPS and of the algorithms implemented for the wavefront reconstruction and for the phasing. The preliminary results obtained during the laboratory tests are discussed and compared with the theoretical predictions. The performances of SHAPS at the VLT and at the European Extremely Large Telescope (E-ELT) are estimated.© (2008) COPYRIGHT SPIE--The International Society for Optical Engineering. Downloading of the abstract is permitted for personal use only.
<urn:uuid:c1abdc72-021e-4cd5-b4b7-c38d845f4c98>
CC-MAIN-2017-04
http://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=788546
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280730.27/warc/CC-MAIN-20170116095120-00250-ip-10-171-10-70.ec2.internal.warc.gz
en
0.912255
249
2.5
2
Cuban connection Nixon, Castro, and the mob |Staat van het boek:||Licht beschadigd| In April 1959, Fidel Castro toured the United States at the invitation of the American Society of Newspaper Editors. Though he was wary, Castro entertained some hope of establishing a rapprochement with Washington. But after being snubbed by President Eisenhower and receiving a less-than-cordial reception from Vice President Richard Nixon, Castro got the strong impression that US intentions toward his new Cuban government were hostile. In The Cuban Connection, former FBI agent and investigative journalist William Turner examines the fateful meeting between Castro and Nixon and the murky connections that existed between official Washington, the CIA, and organized crime in Cuba. Based on firsthand interviews with many of the key players involved in Cuban-American relations of that era, plus thorough background research, Turner raises a host of disturbing questions: Before the ouster of the Cuban dictator Fulgencio Batista by Castro, why did Vice President Nixon often socialize at Havana casinos with his Cuban friend Bebe Rebozo? How was the rabid anticommunism of the Eisenhower administration, especially its instant dislike of Castro, connected to its cozy relationship with the former mob-controlled dictatorship? How did all of this set the stage for the Bay of Pigs fiasco and ultimately the Cuban Missile Crisis and the JFK assassination? In a vivid narrative The Cuban Connection provides insider information that rarely reaches the public and that many in power never wanted the public to know.
<urn:uuid:29707a5c-58e9-4aef-995c-8ba10bf341cb>
CC-MAIN-2022-33
https://www.boekenkraam.nl/boek/9781616147570/cuban-connection-nixon-castro-and-the-mob
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00678.warc.gz
en
0.920156
375
2.09375
2
Teacher resources and professional development across the curriculum Teacher professional development and classroom resources across the curriculum Teaching Foreign Languages K–12 A Library of Classroom Practices Japanese: Daily Routines Photo panel images used in the class are from "Deai: The Lives of Seven Japanese High School Students" maintained by The Japan Forum Photo Data Bank. California Department of Education Foreign Language Curriculum Frameworks Japanese Bilingual Bicultural Program Japanese Bilingual Bicultural Program: Scope and Sequence (PDF, 14 K) Margaret Dyer's Additional Resources An active global community of Third Culture Kid (TCK) adults and youth across geographical boundaries. Journey to Japan: A Day in the Life of a Japanese Child A project plan for writing a story about Japanese life, including worksheets and reference links Library of Congress Federal Research Division: Country Studies Comprehensive information on the history, culture, politics, economy, and geography of over 100 countries, including Japan Hirate, Susan H., and Noriko Kawaura. Nihongo Daisuki: Japanese for Children Through Games and Songs. Honolulu, HI: Bess Press, 1990. Texts by Japanese publishers
<urn:uuid:f98194a9-9361-4859-abfc-5f285d22bd1e>
CC-MAIN-2017-04
http://learner.org/libraries/tfl/japanese/dyer/resources.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00119-ip-10-171-10-70.ec2.internal.warc.gz
en
0.82347
249
3
3
Being included the square, bazar, mosque, school, water storage and mint, Ganjali Khan Complex was established at Ganjali Khan’s command, the ruler of Kerman during Shah Abbas Safavid’s period; a complex that has been the host of tourists for many centuries, in the heart of Kerman historic city. One of the most beautiful parts of the complex is the historical bath related to 11th century AH. It embraces unique and picturesque tile decorations including floral and animal motifs in some parts. “nobody has never referred to such a bath in the world” is a verse that is seen on the façade of the bath indicating the date of building in Abjad letters. After entering the bath you face a corridor which avoids the direct view of the outside through a bend. It ends in Sarbineh which is served as the main dressing room of the bath. Being transformed into the Ethnography Museum, the main part of Ganjali Khan Bath is today the exhibition of items such as different types of loincloths, henna, cedar, tray, comb, mirror and pumice along with some sculptures taking a bath and washing themselves. Another interesting sector in the complex is Ganjali Khan Square being restricted by bazar from three sides. The square become the economic center of the city in the early years and there was formed the public communities. In addition to the entrances of bazar, the square includes a school with a small mosque for religious scholars established inside. The mint located in the north side, has been today transformed into the Coin Museum and is recognized by its pavilion above the roof. There also exists a water storage in the square which is referred to as Alimardan Khan, the name of Ganjali Khan’s son. The bazar here is highly flourished and noisy similar to the other metropolitans’ bazars in Iran. Being located in the south side of the square, this bazar ends in a goldsmith market named Kaiser Bazar. Since caravanserais are one of the main structures related to travel in Iran, we can follow the history of travelling in Kerman using the Ganjali Khan complex’s caravanserai. It makes, along with other parts of Ganjali Khan Complex, an interesting destination for travelers to this historic city.
<urn:uuid:41da3c93-e5d3-4d2a-9247-f9ff8dcd843b>
CC-MAIN-2022-33
https://www.visitiran.ir/attraction/ganjali-khan-complex
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00264.warc.gz
en
0.959065
497
2.5
2
Winter is my favorite time to pursue many of my home-based hobbies. The pace of life usually slows down and one has more time at home. Starting a new hobby is a great way to perk up the winter days and add excitement to life. I can already hear the words, "I don't have time for a hobby, let alone a new hobby!" That's what you think, but it may not be true. If you have little extra free time, you need to take hobby thinking out of the box. Find a way to make something you have to do into something you want to do. If you have to cook everyday, turn it into a hobby. If you like coffee, make a goal to try 20 different kinds. If you have to lay on the couch everyday due to illness, become a window-watcher or a bird watcher. If you have a long commute to work, make a hobby out of studying the cars you pass, the architecture you go by, or how many different routes you can find. If you do have time for more traditional hobbies, make the most of that! Check out this list of hobby ideas. I'm sure you've never even heard of some of them! This week I had fun showing two friends how to felt sweaters and make flowers. We had a most delightful afternoon together making beautiful things. If you enjoy a hobby, share it with someone else!!! Think of all the children around who would love to have an adult outside their family take an interest in them and show them how to do something. I have very fond memories of a lady who invited me to her home each week to cook and bake. Another woman taught me how to make lace.
<urn:uuid:e16a2e36-3a6f-4993-9815-e524e1470d22>
CC-MAIN-2017-04
http://blackberryrambles.blogspot.com/2012/02/embracing-winter-find-hobby.html?showComment=1330176495392
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280266.9/warc/CC-MAIN-20170116095120-00494-ip-10-171-10-70.ec2.internal.warc.gz
en
0.971757
351
1.726563
2
Audience: Executive Leadership, Shelter/Rescue Staff & Volunteers, Veterinary Team - Why Minutes Matter: One Shelter's Experience - If Only We Had a Time Machine - How Soon is Immune - For More Information Can infectious disease outbreaks in shelters be halted with just a small change in when animals are being vaccinated? The Association of Shelter Veterinarians' Guidelines for Standards of Care in Animal Shelters is unambiguous: "Because risk of disease exposure is often high in shelters, animals must be vaccinated at or prior to intake with core vaccines."1 And yet, even facilities that describe themselves as "vaccinating on intake" often don't give the vaccines until the pets have been in the shelter for several hours up to two days. Others only vaccinate animals they believe will be easily adopted, while still others don't vaccinate at all. During that time, the animals, many not be protected by immunity from previous vaccination, may have been moved to a number of locations, encountered other pets, and been handled by multiple caregivers, all creating opportunity for disease transmission. Why the delay? According to Dr. Ronald D. Schultz of the University of Wisconsin-Madison School of Veterinary Medicine, in many shelters there's a lack of understanding of just how fast protection from certain vaccines develops in dogs and cats, and without that awareness, a delay of a few hours or days may not seem critical. For example, however, within as little as a few hours, dogs can often be protected from serious consequences of canine distemper virus (CDV). Within 3 to 4 days, the dog may be fully protected from CDV and canine parvovirus (CPV), and the cat from feline panleukopenia virus (FPV). Other facilities simply haven't yet analyzed their current intake procedures in terms of disease prevention, letting other issues such as paperwork and building design or even just habit take precedence. They may intend to give immediate vaccinations, but it doesn't always, or even usually, work out that way. And in those organizations that have not committed to a high rate of lifesaving, it's often not a priority to prevent disease in animals that staff members don't think will make it to the adoption floor in the first place. But utilizing what we now know about vaccines for the common preventable canine and feline diseases in shelter populations is possibly the single most powerful weapon we possess for stopping significant disease outbreaks in their tracks. For example, during an outbreak of canine distemper virus in a shelter in 2006, Dr. Schultz recommended vaccination of all dogs at the time of pick up by animal control or, at the latest, immediately upon arrival at the facility, before the dogs entered the shelter. However, that recommendation was not implemented, with many dogs not being vaccinated until days or weeks after their arrival. The outbreaks continued, with approximately 35% of the dogs dying. When the shelter finally adopted the practice of vaccinating prior to, or immediately upon, entry, the outbreaks were successfully controlled. "This demonstrates that it was critically important to vaccinate the incoming dogs immediately on intake because greater than 65% were found to be susceptible to CDV," said Dr. Schultz. "If the changes had been put into place earlier, many of the dogs that developed disease, including those that died, would have likely been saved." PAWS Chicago, a private shelter whose intake is mostly from the city's animal control facility, found that radically redefining "vaccination on intake" allowed them to reduce the spread of infectious disease in their population dramatically. In 2009, PAWS had their shelter procedures and facilities assessed by the University of Florida and Purdue University, a process that enlightened them to just how at-risk their animals were. "We understood that we are at high risk for disease based on the sheer number of animals that come to us from animal control, and who pass through our Rescue and Recovery Center and our spay/neuter clinic," said PAWS director Rochelle Michalek2. "Last year, over 26,000 animals passed through this facility. For a vast majority, this is the first time they are receiving medical treatment and care." Rochelle said they identified eleven "touch-points" where animals were potentially exposed to disease during the intake process: - The cage at the animal control facility - Removed from the cage and taken to the assessment area at animal control (walked for dogs, carriers for cats) - In the assessment area - Taken back to their cage - From the cage to PAWS transport van - In the transport van - From the transport van to the cage/suite at PAWS - In the cage/suite - From the cage/suite to the medical exam room - In the exam room - From the exam room back to their cage/suite Rochelle and her shelter medicine team completely revamped how they were handling their intake, both to minimize disease "touch-points" and to vaccinate the animals as soon as possible. In their case, it wasn't at intake; it was before intake. They started vaccinating the pets at animal control, meaning that by the time the pets arrived at PAWS, they already had at least some immunity to infectious diseases. "We changed a number of things at the same time, so it's not possible for us to quantify what was the result of the changes in timing of vaccination," said Rochelle. "But we have seen a dramatic improvement of the health of our animals." While the majority of PAWS' pets come from animal control, they also take owner surrenders. Even though they were owned pets, many of them had never received vaccinations. "I kept thinking, 'If only we had a time machine,''' said Rochelle. So they began experimenting with different intake strategies for surrendered pets. PAWS always saves space for pets whose owners are in a crisis situation, but most of the time, Rochelle said, that isn't an issue. They are able to explain to the owner that they'd like to admit the pet after they've received vaccines, which will help make sure the dog or cat stays healthy in the shelter. Most owners, she said, have no problem with agreeing to a simple "foster to surrender" program. "We currently ask the owner to assist us in getting the animal's immunity established prior to intake," she said. "If the cat or dog is not vaccinated, they will come in for the first vaccination and then go back with the owner. The owner fosters them for the next two weeks, after which they'll return to be officially admitted to our program and receive their second vaccination, spay/neuter, etc., and go up for adoption." PAWS follows this same procedure if the animal being surrendered is currently ill. They provide veterinary care and any necessary medication, send them home with their owners, and then re-admit them in one to two weeks. "If the owner is in a situation where this isn't possible, we will work with them," Rochelle said. "We'll take the animal in and utilize our foster network to care for them. But if it is possible, it allows you to utilize the owner's home to make sure the animals are healthy and properly vaccinated. As a result, these pets are fast tracked through our facility and into their new homes. This has been particularly valuable with kittens." Rochelle said that keeping things flexible and responding to the owner's needs is the key to the success of the program. "The most important thing I tell other shelters that ask about this protocol is, you have to ask! People are willing to help you, if they know they have options." Although delays in vaccinating are common in shelters and animal control facilities all over the country, expert veterinary opinion is overwhelmingly in favor of defining "at intake" as proactively as PAWS Chicago is now doing. In his recent Maddie's InstituteSM webcast3, Dr. Ronald D. Schultz of Maddie's® Laboratory for Diagnosis and Prevention of Shelter Diseases at the University of Wisconsin-Madison stressed his long-standing advice that shelters must vaccinate every single animal being admitted immediately upon entry into the facility, if not before. In The First 60 Minutes: Animal Sheltering's Critical Hour, Dr. Brian DiGangi of the University of Florida College of Veterinary Medicine agreed, saying, "You want to be sure you vaccinate every animal regardless of its health status or regardless of its source, every one. Because you don't know who's protected and who's not. You also want to vaccinate all animals before (intake) if at all possible, if you can schedule intake... if not, as soon after intake as possible; we're talking about between minutes or hours after they come in, not days." In Infectious Disease Management in Animal Shelters (Wiley-Blackwell, 2009), Drs. Laurie J. Larson, Sandra Newbury, and Ronald D. Schultz wrote: The timing of the vaccinations is critically important. Ideally, all animals would be vaccinated at least 1 week prior to entry to the shelter. Since this is usually not possible, vaccination immediately prior to or upon entry is the next best practice and can provide dramatic protection for the majority of cats and dogs admitted to shelters... A delay of even a day or two will significantly compromise the vaccine's ability to provide timely protection. Shelters that only vaccinate some animals, or none, or that fail to vaccinate prior to or at the instant of intake are not just increasing the risk of infectious disease outbreaks, they're guaranteeing them. On the other hand, shelters that do follow the advice of the experts and the example of shelters like PAWS Chicago will find that vaccination provides immunity to common viruses of the cat and dog much more quickly than many shelter professionals and even veterinarians realize. Immunity is not typically an "all or nothing" condition. For some diseases of concern in shelter settings, particularly respiratory illness, vaccination serves to protect from serious symptoms rather than infection. Additionally, animals will begin to be protected from the worst effects of other diseases, such as canine distemper in a very short time. At the 2011 Shelter Medicine Conference at the University of Florida, Dr. Annette Litster, Director of Maddie's® Shelter Medicine Program at the Purdue University School of Veterinary Medicine, told the audience, "With canine distemper virus, challenge studies have shown a really incredibly fast response to a modified live vaccine, or a recombinant vaccine. Within four hours of an effective vaccine, those dogs are protected - provided there's not a problem with maternal immunity - from the really severe neurological effects of challenge with canine distemper. There's complete protection within 7 days after vaccination from the challenge studies that have been published." 5 For dogs and cats who have ever been immune to CPV, CDV, and FPV, there is no period of time when they are susceptible. However, the time frame for at least some immunity to those diseases in animals who have never been previously immunized is not as long as is often believed. In a Maddie's Institute webcast on the use of antibody titers in animal shelters, leading vaccine and immunology researcher Dr. Ronald D. Schultz told attendees, "For parvovirus, 72 hours - that would be three days - from now, and that would be parvovirus of both the dog and of the cat, panleukopenia, you have immunity in three days. Now, obviously the immunity is going to be a little bit better by a week of age, but you will get some protection, and that's important to understand."3 A number of other researchers have reached the same conclusions. In studies conducted at the University of Florida, Dr. Brian DiGangi reports researchers found it takes adult animals who have never been vaccinated between 1 and 8 days to develop solid immunity, but if they have ever had a vaccination in their life before, that drops to between 1 and 3 days.4 (Note: This is true only of animals not previously immune to those diseases; for those animals, there is no period of susceptibility.) Other studies shared by Dr. DiGangi demonstrated similar results for modified live virus (MLV) or recombinant vaccines: - Feline panleukopenia MLV: 3 days6 - Canine parvovirus MLV: 5 days7 - Canine distemper recombinant: 4 hours5 - Feline herpesvirus intranasal MLV: 2 days8 - Feline calicivirus MLV: 7 days4 - Bordetella intranasal MLV: 2 days9 In a 2012 study10, Dr. Annette Litster used antibody titer tests to test the length of time it took shelter dogs to develop antibodies to two of the most common and deadly infectious diseases, canine parvovirus and canine distemper virus. Dogs from two different shelters were vaccinated with MLV vaccines, and their antibody titer levels monitored over the next two weeks. During that time period, the dogs developed immunity from their vaccines at different rates, with almost all dogs CPV antibody-positive (97.9% in one shelter, 100% in the other) and CDV antibody-positive (93.8% and 97.8%, respectively) by the 15th day. As Dr. Schultz noted11, this data does not suggest the animals were not immune prior to the 15th day. "It always takes much longer for antibody to be detected in blood than for it to be present in tissues and provide protection," he said. "It does not take two weeks for immunity." Even for the respiratory diseases, vaccines for which typically do not protect against infection but only serious illness, that protection can follow rapidly after vaccination. Said Dr. Schultz, "When you use an intranasal vaccine to prevent kennel cough, just minutes or hours after that vaccine is given... you'll have things like interferon develop (that) will be able to help that animal resist some viral infections. Cellular immunity will develop in days or weeks, so it's not just the antibody that develops to certain vaccines; it can be non-specific or innate immunity, as well as cell-mediated or cellular immunity."3 Dr. DiGangi also recommends the use of intranasal vaccines to get rapid immunity to respiratory pathogens, because they stimulate immunity at the site where infection occurs, are not interfered with by maternal antibodies, and may provide faster, stronger immunity than injectable vaccines. (Note: Dr. DiGangi cautions that intranasal vaccine for FPV should not be used in a shelter environment, as the immunity it provides develops too slowly.)7 "Canine and Feline Vaccines and Immunology," Infectious Disease Management in Animal Shelters; Lila Miller, Kate Hurley (Editors); Paperback; 400 pages. July 2009, Wiley-Blackwell; Chapter 5, pp 61-82. Chapter on "Vaccines and Immunity" contains an excellent discussion of how to determine what specific vaccinations your animal population needs, as well as a thorough overview of vaccination issues for puppies, kittens, pregnant animals and those with special needs. 2011 AAHA Canine Vaccination Guidelines, the American Animal Hospital Association's 2011 canine vaccination guidelines for both companion and shelter dogs. 2013 AAFP Feline Vaccination Guidelines, the American Association of Feline Practitioners' Feline Vaccine Advisory Panel Report, including recommendations for both companion and shelter cats. Association of Shelter Veterinarians' Guidelines for Standards of Care in Animal Shelters (Video). Dr. Annette Litster, Director of Maddie's® Shelter Medicine Program at the Purdue University College of Veterinary Medicine, presents a review of the Association of Shelter Veterinarians' newly published Shelter Standards Document. Vaccination Protocols for Shelter Dogs: What's the Latest Evidence? Is your organization up to snuff with the latest regarding vaccination protocols for your dogs? If not, listen to Dr. Annette Litster, Director of the Maddie's® Shelter Medicine Program at the Purdue College of Veterinary Medicine, present the latest evidence at the University of Florida's Maddie's® Shelter Medicine Conference 2011. 1. Newbury, S., Blinn, M.K., Bushby, P.A., Cox, C.B., Dinnage, J.D., Griffin, B., Hurley, K.F., Isaza, N., Jones, W., Miller, L., O'Quin, J., Patronek, G.J., Smith-Blackmore, M., Spindel, M., 2010. Guidelines for Standards of Care in Animal Shelters. 4. DiGangi, Brian, DVM, MS, DABVP; Clinical Assistant Professor of Shelter Medicine at the University of Florida College of Veterinary Medicine; The First 60 Minutes: Animal Sheltering's Critical Hour 5. Larson LJ, Schultz RD.; Vet Ther. 2006 Summer;7(2):113-8; Effect of Vaccination with Recombinant Canine Distemper Vaccine Immediately Before Exposure Under Shelter-Like Conditions 7. Carmichael LE, Joubert JC, Pollock RV.; Cornell Vet. 1983 Jan;73(1):13-29. A Modified Live Canine Parvovirus Vaccine 8. Cocker FM, Newby TJ, Gaskell RM, Evans PA, Gaskell CJ, Stokes CR, Harbour DA, Bourne JF; Res Vet Sci. 1986 Nov;41(3):323-30; Responses of Cats to Nasal Vaccination with a Live, Modified Feline Herpesvirus Type 1. 10. Litster, A., et al., Prevalence of positive antibody test results for canine parvovirus (CPV) and canine distemper virus (CDV) and response to modified live vaccination against CPV and CDV in dogs entering animal shelters. Vet. Microbiol. (2012), doi:10.1016/j.vetmic.2011.12.030
<urn:uuid:e822e726-76ef-4f13-aa64-aad43dd8d4f2>
CC-MAIN-2017-04
http://www.maddiesfund.org/redefining-vaccination-on-intake.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279224.13/warc/CC-MAIN-20170116095119-00482-ip-10-171-10-70.ec2.internal.warc.gz
en
0.95137
3,766
3.03125
3
Red Alert: “24” is going green! The show’s plan is to reduce and offset the carbon emissions from production throughout all of Season Seven, capping off with an entirely carbon-neutral season finale, The Washington Post reports. “24” is the first series to take part in Fox’s “Cool Change” program, a company-wide initiative to reduce the network’s impact on global warming. It’s time to get real for the show aired in “real time.“Fox spokesman Chris Anderson wants it known that this is not meant to be a publicity stunt or a ratings booster. “We are publicizing ‘24’s’ commitment to climate change for two reasons and two reasons only: to inspire the public to take global warming seriously and hopefully to motivate other studios to make changes to their production practices as well,” he told The Washington Post. Kiefer Sutherland and the rest of “24’s” cast and crew will now work on soundstages powered by electricity, rather than diesel fuel. Production vehicles and generators will run on a planet-friendly biodiesel blend, and location scouts are even getting hybrid Toyota Prius cars to get around with. Also gone are car-delivered paper scripts, schedules and memos — they will now be sent via e-mail. Sutherland’s Jack Bauer has saved people from terrorists and weapons of mass destruction in past seasons, and he may do so again this time around — but with climate change reportedly worked into the season’s plot. While that may not sound like the makings of an action-packed thrill ride to some, the report notes that the plotline “just might scare some viewers into taking action.” A previous plotline with a setting in Africa was reportedly scrapped last month due to rising costs, and started over from scratch. To further the Cool Change cause, Fox’s Web site now offers energy conservation tips and a public service announcement about global warming featuring Sutherland. Season seven of “24” debuts in January 2008, with the addition of actress Cherry Jones as the new U.S. President.
<urn:uuid:464004d1-e8e7-45d9-af5a-e7758bc310ba>
CC-MAIN-2016-44
https://www.accesshollywood.com/articles/24-goes-green-for-season-seven-60422/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719453.9/warc/CC-MAIN-20161020183839-00229-ip-10-171-6-4.ec2.internal.warc.gz
en
0.940049
462
1.796875
2
5-a-day for a healthy body, 5 more for a healthy mind 19th February, 20110 Comments The 5-a-day campaign is based on advice from the World Health Organization which recommends eating a minimum of 5 portions of fruit and vegetables per day to lower the risk of serious health problems. 5-a-day caters to the hectic lifestyles of modern Brits encouraging simple easy measures, making change accessible to all. With a similar aim in mind, in 2008 the Government commissioned a review of the work of over 400 scientists from across the world to create a set of five simple actions which can improve psychological well-being in everyday life. Following are the 5-a-day ways to wellbeing created by The New Economics Foundation: Take notice… Be curious. Catch sight of the beautiful and remark on the unusual. Notice the changing seasons. Reflecting on your experiences will help you appreciate what matters to you. Connect…. With the people around you - at home, at work and in the local community. Building these connections or ‘cornerstones’ of your life will support and enrich you. Be active… Go for a walk or run. Step outside, cycle, play a game, garden, dance. Exercise makes you feel good. Keep learning… Try something new. Sign up for that course. Set a challenge you will enjoy achieving. Learning new things will make you more confident as well as being fun. Give.. Do something nice for a friend, or a stranger. Smile or volunteer your time. Look out as well as in. Seeing yourself linked to the wider community can be incredibly rewarding and creates connections with the people around you. Related articles from our experts Catherine Mc Clafferty (Experienced BABCP Accredited CBT Therapist)January 15th, 2017 SUSAN STUBBINGS Counsellor, Supervisor, Group facilitator Registered MBACPJanuary 15th, 2017 Graeme Orr MBACP(Accred), UKRCP Reg. Ind. CounsellorJanuary 12th, 2017 Andrea Harrn Psychotherapist and Author of The Mood CardsMay 13th, 2011 Imi Lo: Psychotherapist, Art Therapist, Supervisor (MMH,UKCP,HCPC,MBPsS)March 29th, 2015 Keeley Townsend BA (Hons), Ad.Dip.CP with Distinction, MNCS (Acc)December 14th, 2009 Counselling Directory is not responsible for the articles published by members. The views expressed are those of the member who wrote the article.
<urn:uuid:1f3fcd76-a9f2-42ee-b248-743d4d25a299>
CC-MAIN-2017-04
http://www.counselling-directory.org.uk/counsellor-articles/5-a-day-for-a-healthy-body-5-more-for-a-healthy-mind
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00025-ip-10-171-10-70.ec2.internal.warc.gz
en
0.930561
536
2.09375
2
If you like to skip on sleep, we have some bad news: a new study reports that people whose sleeping patterns go against their natural body clock are more likely to be depressed, and experience lower levels of wellbeing. Early bird gets the worm and all that, but we now have evidence to show that some people really are naturally early risers. Even worse, going against this, or being a night owl by nature, seems to promote issues such as depression and lower perceived quality of life. But you can rest easy, there’s nothing wrong with you. Most likely, these effects are caused by the way our societies are ordered, as they are generally tailored more for early risers, through the standard 9-5 working pattern. The right time for sleep The research was built on previous work that mapped 351 genes linked to being either an early riser or a night owl. A statistical process known as Mendelian Randomisation was employed to see whether these genes had a causal association with seven mental health and wellbeing outcomes (major depression was one of these seven). Data for the study was supplied from the UK Biobank’s biomedical database and research resource and pertained to over 450,000 UK adults. Apart from genetic information, participants also supplied information regarding their sleeping habits (i.e. whether they were a morning or evening person) through a questionnaire. Alongside this data, the authors also developed a new indicator of “social jetlag”, a measurement of the variations in sleeping patterns one experiences between workdays and free days. This was measured in around 85,000 UK Biobank participants (for whom sleep data was available) via wrist-worn activity monitors. The first important finding of the study was that participants whose natural and actual sleeping patterns were more misaligned were more likely to report depression, anxiety, and lower wellbeing. “We found that people who were misaligned from their natural body clock were more likely to report depression, anxiety, and have lower wellbeing. We also found the most robust evidence yet that being a morning person is protective of depression and improves wellbeing,” says lead author Jessica O’Loughlin, of the University of Exeter. “We think this could be explained by the fact that the demands of society mean night owls are more likely to defy their natural body clocks, by having to wake up early for work.” Morning people had the highest likelihood of their sleeping patterns being aligned with their natural body clock. When looking at shift workers alone, the team found that being a morning person doesn’t seem to protect them from depression. This is likely indicative that morning people who work shifts don’t get any benefits from their natural sleeping patterns, but this remained inconclusive overall. “The COVID-19 pandemic has introduced a new flexibility in working patterns for many people. Our research indicates that aligning working schedules to an individual’s natural body clock may improve mental health and wellbeing in night owls,” said senior author Dr Jessica Tyrrell, of the University of Exeter. The paper “Using Mendelian Randomization methods to understand whether diurnal preference is causally related to mental health” has been published in the journal Molecular Psychiatry.
<urn:uuid:865e4e43-72c3-4d99-bd1a-280b8f112436>
CC-MAIN-2022-33
https://dev.zmescience.com/tag/circadian-rhythm/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00466.warc.gz
en
0.972853
672
3.234375
3
Indian cultural show 'Krishna' at Stamford Palace Published 3:16 pm, Tuesday, April 23, 2013 The ceremonies that take place at Parthasarathy Temple, the famed eighth-century Hindu temple dedicated to the god Krishna in Chennai, India, are a sight to behold. And now, Shijith Nambiar and Parvathy Menon are sharing them with the world -- albeit with a dazzlingly theatrical twist. The couple is bringing "Krishna" -- a tapestry of Indian music, choreography and dramatic performance -- to the United States, including an appearance at Stamford's Palace Theatre on Saturday, April 27 at 8 p.m. "We're really thrilled to be here," said Nambiar, who hails from Chennai. "We are so happy and excited to spread our traditions and culture outside of India." Flanked by a half-dozen dancers and blanketed in kaleidoscopic lights, Nambiar and Menon dance their way through the life of Krishna, the blue-skinned, flute-wielding eighth avatar of the Vedic Supreme God Vishnu. The couple is heavily inspired by bharatanatyam -- a classical Indian dance form native to Tamil Nadu, their home state -- as well as traditional Indian songs. Indian people in Stamford -- a robust community that has ballooned to more than 3,000 -- will no doubt appreciate the performance, Nambiar said. However, he believes American audiences will be wowed as well. "The dances are not only for Indians," he said in a phone interview prior to a performance in Omaha, Neb., last week. "I don't just want Indian people to see the performance. The colors, technicality, lighting, costumes, the visual image -- American audiences can relate to that as well." Graduates of Kalakshetra, an elite arts academy in Chennai, Nambiar and Menon come with stellar pedigrees. They're also one of those adventurous couples. Having performed "Krishna" in all the major cities of India beginning in 2007, Nambiar and Menon decided it was time to travel overseas -- first to Europe and this year to North America. "We wanted to have a change," Nambiar said. Thus far, the couple has performed to a lot of "mixed crowds," Nambiar said. The feedback -- both from Indians and Americans -- has been positive. That is a sign, Nambiar said, that the willingness to open to new traditions -- even those taking place in a Hindu temple on the other side of the world -- is strong in the United States. "We want to share our divine thoughts, energy and experience to all the people, all the art lovers," Nambiar said. "We have only done five performances, but already we feel very welcomed." Scott.firstname.lastname@example.org; 203-964-2238; http://twitter.com/scottgarg Palace Theatre, 61 Atlantic St., Stamford. Saturday, April 27, 8 p.m. $58-$30. 203-325-4466, www.scalive.org.
<urn:uuid:151b3c47-2579-4ae4-b719-70bc1b53d734>
CC-MAIN-2017-04
http://www.newstimes.com/entertainment/article/Indian-cultural-show-Krishna-at-Stamford-Palace-4457007.php
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00280-ip-10-171-10-70.ec2.internal.warc.gz
en
0.950096
664
1.5625
2
Omnimap.com - Syria A collection of maps of different sizes and types for Syria. UT Library Online - Maps of Syria Offers collection of current and historical maps of Syria from the University of Texas. Wikimapia - Syria Online Syrian map that combines Google Maps with a wiki system, allowing everyone to add information to any location on the globe. World Atlas - Syria Detailed information about Syria: Facts, flags, maps and more.
<urn:uuid:5cce345c-204e-44c0-beca-98b69680cdbf>
CC-MAIN-2022-33
http://www.araboo.com/dir/syria-maps
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00068.warc.gz
en
0.667725
125
1.703125
2
Who can sell alcohol and where. The debate dates back to liquor laws hashed out at the end of prohibition. Expanding wine sales to supermarkets and corner stores has been the controversy of late. Consumers favor the convenience by big margins, and this year’s proposal looked more promising, until it didn’t. Tennessee Capitol Reporter Blake Farmer talks about the politics of wine in Tennessee with Nashville Public Radio's Bradley George. Motorcycle enthusiasts in Tennessee could soon ride helmet-free, so long as they have enough insurance. Several bills have been proposed this year, and one has now begun moving forward in the legislature. Much of the debate is about cost, not safety. Representatives from TennCare point to accident victims with million-dollar medical bills. Tennessee’s liquor laws could become even more complex as a compromise emerges to allow grocery stores to sell wine. Liquor stores see the writing on the wall and are now at the bargaining table. They want permission to have more than one location and sell more than just wine and liquor. A Republican-led push to use college IDs to vote was held up on the floor of the Tennessee Senate today. Another GOP senator says there’s no need to expand the state’s voter ID law. This legislation comes from a Rutherford County lawmaker, home to the largest undergraduate student body in the state. And while Senator Bill Ketron refused to accept student IDs when the law was passed two years ago, he’s now had a change of heart. Senator Stacy Campfield of Knoxville has not. “You know, I hate to say it, but possibly in my younger days I may have known a person or two who had a falsified college ID,” she said. Previous naysayers are coming around to the idea of expanding Tennessee’s Medicaid Program. Even while criticizing the Affordable Care Act, they say pulling more poor people into TennCare could have some upsides. Students in the state’s counseling programs could refuse to see patients on the basis of their religious beliefs. The proposal passed its first test last night with little resistance, except from professional counselors. House Speaker Beth Harwell single-handedly kept an effort alive that would allow grocery stores to begin selling wine. In a rare move, today she broke a tie in a legislative subcommittee. The speaker can vote on any of the committees. And for the first time this year, Harwell chose to do so. She says it’s time to find a compromise that would still be agreeable to the state’s 600 liquor stores, which are the only places wine can be sold now. “We don’t want to hurt those liquor stores, and we want to do everything we can to make this as palatable to them as possible," she said. "This brings everyone to the table to discuss it.” In the Senate, Speaker Ron Ramsey has played a critical role in moving the wine-in-supermarkets legislation, admitting he structured one committee with the bill in mind. State lawmakers are threatening to pull the rug out from under Vanderbilt University’s police force of 90 sworn officers. It’s a roundabout way to overturn a controversial non-discrimination policy on campus.
<urn:uuid:2db70532-2a50-4c57-9d9a-d84cb932fc45>
CC-MAIN-2017-04
http://wkms.org/people/blake-farmer-nashville-public-radio?page=3
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00178-ip-10-171-10-70.ec2.internal.warc.gz
en
0.959424
672
2.0625
2
As we prepare for the new semester, we asked two Brittain Fellows to reflect on their teaching experiences during the last semester. Teaching Modernism at Tech Modernism lends itself really well to teaching multimodal communication at Tech because much of modernist art is heavily influenced by technological advancements at the turn of the 20th century. In teaching my class, “Modernism and Technology” this past semester (Spring 2011), my purpose was not so much to teach students about modernism but about how technology has cultural impacts beyond its immediate functions. I introduced the topic by assigning chapters from Stephen Kern’s The Culture of Time and Space, 1880-1918, a scholarly text that looks at how technological advancements like wireless communication, film, and the automobile as well as scientific theories like Einstein’s Theory of Relativity and Heisenberg’s Uncertainty Principle created new ways of experiencing and time and space, which become apparent in modernist art and literature. Thus, students first considered the historical nature of space and time. Different cultures and different historical periods experience space and time differently. We further investigated this problem by reading Jane Austen’s Emma and Virginia Woolf’s Mrs. Dalloway simultaneously and considering how the dramatically different forms of those novels represent space and time differently and how that might be influenced by different technologies available during the two periods. Because the purpose of the class was not to teach students modernism per se but to get them to think about the relationship between technology and cultural experience and production, I framed the focus on modernism as a springboard for thinking about how current technology has created new experiences of space and time and how that might be manifested in contemporary art and literature. For this reason, I gave students a choice for their final multimodal project, which consisted of an annotated bibliography, an oral presentation, and a visual argument: students could choose a modernist art movement and investigate its relationship to turn-of-the-twentieth-century technologies, or they could choose a recently developed technology—social networking, smartphones, MMORPGs, etc—and investigate its relationship to art and literature. In the end, by studying modernism through the lens of technology, students gained a broad historical perspective on the cultural impacts of technology. “A New Way to Look at English Class”: Creating a Special Section for Architecture and Civil Engineering Majors Having the option to create a special section for a particular major, it was an easy decision for me to design a course about “Mapping London: Britain’s Capital in Literature, Art, and Film” aimed at architecture and civil engineering majors for my ENGL 1102 this spring. It was my goal to incorporate my research interests such as twentieth-century British fiction, art and architecture, as well as theories of space and place, while at the same time creating a second-semester writing course that would be interesting and challenging for architecture majors and that would draw upon their special skills. Students in my special section soon started making connections between our class and their first year studio class in Architecture. I was pleased to find my students not only interested in the subject matter, but more importantly, aware of the goals of this special section. In reflection documents throughout the semester and in their final portfolio, students voiced their understanding of the importance of the skills they learned for their major and the applicability of those skills in their future work places. Indeed, the class blog became a forum for students to discuss more than the literary representations of London the course focused on. Several posts reflected on the multi-modal assignments students worked on throughout the semester. One student in the special section for Architecture and Civil Engineering majors commented: Although English at Georgia Tech has been different from my past English classes, I actually feel that they are more career-oriented. Instead of just reading a book or writing a paper, I am able to apply my talents and skills to a variety of subject areas. The concept of WOVEN… is an important idea to focus on since all of us will [have] to present our architectural designs to clients. Links to selected blog posts: In designing the assignments for the semester, including elements from Georgia Tech’s W.O.V.E.N. spectrum was my most important goal, and thus maps of London, as a visual representation of the space we were about to enter, seemed the obvious place for us to get us started. Working in small groups, students first created a “digital poster” using Prezi or Power Point in which they analyzed a historical or contemporary map of London that they had chosen according to their interests. One group analyzed the “London View Management Framework” which depicts where in the city building height restrictions are strictly enforced to retain the sightlines of historically significant buildings from scenic areas of London For the second assignment, I modified Dr. Roger Whitson’s map assignment to fit our class topic. Students used google maps to create an analysis of a character in Alan Moore and Eddie Campbell’s graphic novel From Hell or Virginia Woolf’s Mrs. Dalloway. Guido Moretti’s Maps, Graphs, Trees became an important tool for the to understand that [maps] are a good way to prepare a text for analysis” (Maps, Graphs, Trees 53). Once again, many of my architecture students excelled at incorporating their understanding of space in their analysis. Juxtaposing the daily routines of inhabitants of London’s east and west end in From Hell, or taking into account the importance of Elizabeth Dalloway’s bus ride to the City, they came to understand how place can be an important factor in characterization. My students were easily able to see the graphic representations of characters such as Queen Victoria as a way to represent emotions and create a particular atmosphere. (See link for an example: http://www.lmc.gatech.edu/~dbremm3/wordpress/wp-content/uploads/2011/04/MapVictoria.jpg) In their final group projects, students were asked to take a less literal approach to mapping in their analyses of Zadie Smith’s novel White Teeth. They created posters, websites, podcasts, videos, etc. to present the multi-cultural world of the novel to an audience of their peers and professors at the library’s performance space. One group used Google SketchUp to include architectural renditions of typical living spaces in Bangladesh, Jamaica, and London to illustrate the characters’ world: http://wtcultureandhistory.weebly.com/influences-in-architecture.html Creating this special section for Architecture and Civil Engineering Majors allowed me to pursue my own research interests in my teaching. I was continuously impressed with the ideas my students were able to incorporate into their assignments, and even more so, with their ability to reflect on the skills they honed in this class that they will draw upon throughout their college career and in their future jobs.
<urn:uuid:80e82217-19b2-46f0-8525-68385eff9b78>
CC-MAIN-2022-33
https://techstyle.lmc.gatech.edu/looking-forward/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00668.warc.gz
en
0.953133
1,592
2.25
2
Ohio State reveals the 12 potential secondary violations Ohio State has released the list of the 12 potential secondary NCAA violations. They are minor infractions involving six sports, with four related to football. OSU has said that the school is not facing any major NCAA violations. Here's the list of potential violations: - Football – The compliance office approved the use of mini basketballs during a football winter conditioning workout. - Men’s Gymnastics – The practice activities of a gymnastics alum were publicized. - Institutional – Two baseball prospective student-athletes arrived on campus for official visits before being placed on the request list. - Institutional – Athletics financial aid agreements were issued to three prospective student-athletes without being signed by the financial aid director. - Football – A former assistant football coach had an inadvertent contact or “bump” with a prospective student-athlete. - Field Hockey – A former assistant coach sent an email to a prospective student-athlete believing that she was a 2013 high school graduate. - Men’s Tennis – A high school football coach and friend of the tennis program’s head coach stopped by the tennis training facility unannounced with an assistant coach and four prospective student-athletes during a dead period. - Baseball – A prospective student-athlete in grade 12 registered and showed up for an Ohio State camp for participants in grades 9-11 even though he was told he was not eligible to compete at the camp. A t-shirt was given to the individual to defuse the situation when he got upset that he couldn’t compete. - Baseball – A prospective student-athlete received a complimentary admission to a home baseball game during a dead period. - Women’s Hockey – A former assistant coach inadvertently sent an email to a 2014 prospective student-athlete when the prospect was mistakenly entered into the recruiting data base by the previous coaching staff as a 2013 graduate. - Football – The program understood the aunt of a prospective student-athlete was his legal guardian and provided food and lodging expenses to her for the official visit. - Football – An assistant coach inadvertently posted on the Facebook wall of a 2013 prospective student-athlete, believing at the time he was using the email inbox function of Facebook.
<urn:uuid:d7d7c10e-27db-4fda-8fec-a56120ca4ddc>
CC-MAIN-2017-04
http://buckeyextra.dispatch.com/content/blogs/blogging-the-buckeyes/2012/05/secondary-ncaa-violations-revealed.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280483.83/warc/CC-MAIN-20170116095120-00301-ip-10-171-10-70.ec2.internal.warc.gz
en
0.969453
471
1.5
2
Online Geometry theorems, problems, solutions, and related topics. Geometry ProblemClick the figure below to see the complete problem 597. Complete the rectangle ABDF.Join BF to intersect AD at O.AC = BD = AFCB = CD and OB = OD imply CO is the perpendicular bisector of BD and hence of AF as well.Follows AC = FC and triangle ACF is equilateral.So x = supplement of angle CAF = 120 degrees. Drop perpendiculars CG and CF to AB and BD. Then BGCF is a rectangle and FC= BG=1/2BD=AC. So Tr. FAC is 30-60-90.Hence x = 120Sumith PeirisMoratuwaSri Lanka
<urn:uuid:1d1895da-bad1-4e06-9cf3-ec6de549bf26>
CC-MAIN-2017-04
http://gogeometry.blogspot.com/2011/04/geometry-problem-597-quadrilateral.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00300-ip-10-171-10-70.ec2.internal.warc.gz
en
0.783265
156
2.96875
3
Aphids as Crop Pests Aphids are among the major global pest groups, causing serious economic damage to many food and commodity crops in most parts of the world. This revision and update of the well-received first edition published ten years ago reflects the expansion of research in genomics, endosymbionts and semiochemicals, as well as the shift from control of aphids with insecticides to a more integrated approach imposed by increasing resistance in the aphids and government restrictions on pesticides. The book remains a comprehensive and up-to-date reference work on the biology of aphids, the various methods of controlling them and the progress of integrated pest management as illustrated by ten case histories. Helmut van Emden is Emeritus Professor of Horticulture at the University of Reading, UK. He has researched on aphids for over 50 years and has wide international experience, including in the tropics. Richard Harrington retired in 2015 as Head of the Rothamsted Insect Survey, with which he worked for 36 years on aphid monitoring and forecasting. He led the EU project "EXAMINE" (Exploitation of Aphid Monitoring In Europe) which brought together colleagues involved in aphid monitoring throughout Europe and beyond. - 2017 CAB International Choosing a Book Format EPUB is the standard publishing format used by many e-book readers including iBooks, Easy Reader, VoiceDream Reader, etc. This is the most popular and widely used format. DAISY format is used by GoRead, Read2Go and most Kurzweil devices. Audio (MP3) format is used by audio only devices, such as iPod. Braille format is used by Braille output devices. DAISY Audio format works on DAISY compatible players such as Victor Reader Stream. Accessible Word format can be unzipped and opened in any tool that supports .docx files.
<urn:uuid:dada5e47-2397-4095-a352-0b2ac3717112>
CC-MAIN-2022-33
https://india.bookshare.org/en/bookshare/book/2842306
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00068.warc.gz
en
0.915977
402
2.75
3
Amazon Web Services (AWS) provides re-sizable compute capacity in the Cloud. It is designed to make web-scale computing easier. AWS Achieves PCI DSS Level 1 Compliance and ISO 27001 Certification Just recently, Amazon Web Services (AWS) has achieved Level 1 PCI compliance and ISO 27001 certification on its infrastructure, data centers, and services. Basically, AWS is now a validated PCI Service Provider which means that merchants and other service providers can become Payment Card Industry (PCI) certified while storing, processing, and transmitting credit card information using AWS. For more information on PCI compliance as well as ISO 27001 certification, please read the Amazon Newsletter. Benefiting from Predictive Analytics on the Cloud ADAPA (Adaptive Decision And Predictive Analytics) is a predictive decisioning platform. It combines the power of predictive analytics and business rules to facilitate the tasks of managing and designing automated decisions systems. As a scoring engine, ADAPA supports the PMML standard. In this way, different data mining models can be uploaded into the engine and executed in real-time or batch mode. ADAPA on the Amazon Cloud ADAPA is the first standards-based, real-time scoring engine available on the market and the first scoring engine accessible on the Amazon Cloud as a service. ADAPA on the Cloud combines the benefits of Software as a Service (SaaS), the scalability of cloud computing and the extensive feature set of ADAPA on Site. By utilizing the ADAPA Control Center, you can launch and terminate a new ADAPA instance on the Amazon Cloud in minutes which allows you to quickly scale capacity, both up and down, as your computing requirements change. Finally, by offering ADAPA on the Amazon Cloud as a service changes the economics of predictive analytics by allowing you to pay only for computing that you actually use. What a concept ... huh?
<urn:uuid:4e1da213-8d14-4a89-91fb-8b51178efd4a>
CC-MAIN-2017-04
http://adapasupport.zementis.com/2010/12/adapa-on-amazon-cloud-pci-compliant.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00174-ip-10-171-10-70.ec2.internal.warc.gz
en
0.910603
396
1.742188
2
Kirk Douglas, iconic movie star who reconnected with Judaism later in life, dies at 103 LOS ANGELES (JTA) – Kirk Douglas, the legendary actor who portrayed legions of tough guys and embraced his Jewish heritage later in life, died at his home in Beverly Hills on Wednesday. He was 103. Over a career that spanned 87 films — including 73 big screen features and 14 television films — the blond, blue-eyed Douglas, dimpled chin thrust forward, was often cast as the toughest guy around, vanquishing hordes of Romans, Vikings and assorted bad guys. Thrice nominated for an Academy Award and a recipient of an Oscar for lifetime achievement and a Presidential Medal of Freedom, Douglas evolved from an egocentric and promiscuous young man into a multi-talented actor, director, author, philanthropist and student of Torah who left a deep imprint on both Hollywood and the Jewish people. Douglas was also the author of 11 books, ranging from personal memoirs and a Holocaust-themed novel for young readers to a collection of poetry dedicated to his wife. “Most stars of his stature are shaped out of mythic clay,” the director Steven Spielberg said in presenting Douglas with the lifetime achievement Oscar in 1996. “Kirk Douglas never chose that. He doesn’t have a single character that makes him unique. Instead he has a singular honesty, a drive to be inimitable.” Douglas was born Issur Danielovitch in 1916 in the upstate New York town of Amsterdam, the son of an illiterate Russian-Jewish immigrant who supported his six daughters and one son as a rag picker and junk man. A chance to escape came shortly after his bar mitzvah, when the Sons of Israel Synagogue offered to underwrite his rabbinical studies. Douglas firmly declined, declaring that he would become an actor. He held fast to that ambition while attending Saint Lawrence University on a wrestling scholarship and during World War II service in the U.S. Navy. His first movie role came in 1946, when he played Barbara Stanwyck’s husband in “The Strange Love of Martha Ivers.” Douglas received favorable reviews, but his career wouldn’t really take off until three years (and six films) later, when he portrayed Midge Kelly, a ferocious and amoral boxer in “Champion.” The performance earned him an Academy Award nomination for Best Actor. During the 1950s and 60s, Douglas ranked consistently as one of Hollywood’s top male stars for his single-minded focus on his craft, while also squeezing in Broadway and television appearances. He was also known for egocentricity in a town with no shortage of oversized egos and for bedding an endless string of women, from movie queens to casual pick-ups. In the 1950s, he starred in 23 movies. He earned Oscar nominations for Best Actor for “The Bad and the Beautiful and “Lust for Life.” And in 1953, he starred as a Holocaust survivor in “The Juggler,” the first Hollywood feature to be filmed in Israel. He opened the decade of the 1960s with “Spartacus,” perhaps his most enduring movie, in which he played the leader of a slave rebellion in ancient Rome. The film won four Oscars, though none for Douglas. But Douglas did distinguish himself for insisting that writer Dalton Trumbo, who had been blacklisted as a Communist for a decade but continued to write under a pseudonym, be credited onscreen despite dire warnings that such a provocation would end his own Hollywood career. Douglas was honored for that stance in 2011 by the San Francisco Jewish Film Festival. With increasing fame and fortune, Douglas showed little interest in Jewish practice, though there were exceptions. “I always fasted on Yom Kippur,” he told a reporter. “I still worked on the movie set, but I fasted. And let me tell you, it’s not easy making love to Lana Turner on an empty stomach.” In his later years, Douglas would come to embrace his Jewishness, a shift he dates to a near-fatal collision in 1991 between his helicopter and a stunt plane in which two younger men died. The crash compressed his spine by three inches. While lying in a hospital bed with excruciating back pain, he started pondering the meaning of his life. “I came to believe that I was spared because I had never come to grips with what it means to be Jewish,” he said. Douglas embarked on an intensive regime of Torah study with a number of young rabbis and celebrated a second bar mitzvah at age 83, telling the Hollywood luminaries crammed into the 200-seat chapel at Sinai Temple for the occasion: “Today, I am a man.” Neither of his two wives — the late actress Diana Dill and Anne Buydens, whom he married in 1954 — were Jewish, and none of his children were raised in the faith. But his oldest son, the actor Michael Douglas, has reconnected with Judaism and won the 2015 Genesis Prize, a $1 million award recognizing Jews of great accomplishment who exhibit Jewish values. In 20014, at Douglas’ 50th wedding anniversary, Buydens startled the guests by announcing that she had converted to Judaism. “Kirk has been married to two shiksas and it’s about time he married a nice Jewish girl,” she proclaimed. In 1996, Douglas suffered a stroke which left him speechless. He fell into a deep depression that nearly led him to take his own life. A few months later, he made his first public appearance to accept the lifetime achievement. “Whether he’s dealing with a character on screen, or with the all-too-real effect of a recent stroke, courage remains Kirk Douglas’ personal and professional hallmark,” Spielberg said in presenting the award. Through rigorous speech therapy, Douglas taught himself to speak again – slowly, with a slight slur. He later published a book about the experience, titled “My Stroke of Luck.” Among his other books are “Let’s Face It,” which proclaimed that romance begins at 80, “I am Spartacus,” focusing on making the film and breaking the blacklist. And “Climbing the Mountain,” with traced his search for spirituality and Jewish identity. In 2014, at 98, he published his first book of poetry, “Life Could Be Verse,” in which he expressed his enduring love for his wife as well as his heartbreak at the death of his youngest son Eric, who died of a self-induced drug overdose. Along with his wife, Douglas has given over $100 million to charitable causes in the United United States and Israel. The couple have established close to 400 playgrounds in poorer sections of Los Angeles and Jerusalem, an Alzheimer’s hospital unit, and a theater facing the Western Wall featuring films on the history of Judaism and Jerusalem. In 1981, Douglas received the Presidential Medal of Freedom, America’s highest civilian award, from President Jimmy Carter. Kirk Douglas is survived by his wife Anne, sons Michael, Peter and Joel Douglas, seven grandchildren – Cameron, Dylan, Carys Zeta, Kelsey, Jason, Tyler and Ryan – and a sister, Ida Sahr of Schenectady, NY. The post Kirk Douglas, iconic movie star who reconnected to Judaism later in life, dies at 103 appeared first on Jewish Telegraphic Agency.
<urn:uuid:7b23b97f-dbec-4acc-a5b3-114f18c7f59f>
CC-MAIN-2022-33
https://forward.com/fast-forward/439516/kirk-douglas-iconic-movie-star-who-reconnected-to-judaism-later-in-life/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00671.warc.gz
en
0.979957
1,585
1.921875
2
小编摘要:2011年10月11日,诺贝尔和平奖得主Ellen Johnson Sirleaf在利比里亚伯米县一投票站投票,她也是利比里亚的总统和团结党的总统候选人。 Incumbent Liberian President Leading in Early Returns Nobel Peace Prize Laureate Ellen Johnson Sirleaf, who is also Liberia's president and presidential candidate of the Unity Party, votes at a polling station in Feefee in Bomi County, Liberia, October 11, 2011. First results from Liberia's presidential election show incumbent President Ellen Johnson Sirleaf leading her 15 rivals. Reporting results from just over 16 percent of more than 4,000 polling stations, Liberia's National Electoral Commission says President Sirleaf has more than 44 percent of the vote. Former justice minister Winston Tubman has more than 26 percent, while former rebel leader and current Senator Prince Johnson is running third with about 13 percent. Vote counting is expected to continue through the weekend, and complete results may not be known for some time as the electoral commission has until October 26 to make a final count. If none of the candidates wins an outright majority, there will be a run-off election between the top two finishers November 8. This is Liberia's second post-civil war election but the first that has been run entirely by Liberians after the United Nations supervised the 2005 contest. U.N. peacekeepers remain in place for this vote, but U.N. mission spokesperson Yasmina Bouziane says the election itself is up to Liberians to decide. "The National Electoral Commission is the one that is responsible for the conduct of these elections, implementation and all," said Bouziane. "And they are the ones who will verify and certify. Nobody else has the mandate to verify or certify. And the United Nations does not either, neither do the observers." Election observers from the Economic Community of West African States say the vote was largely free, fair and devoid of violence. In its preliminary report, the ECOWAS observer mission says "on the whole, the elections were conducted under acceptable conditions of freedom of voters and transparency of the process." The regional alliance noted high voter turnout, a timely start to polling, and the professional conduct of electoral officials. Its preliminary report also highlighted a smooth process of vote counting and the "effective and unobtrusive presence of law enforcement" at most polling stations. Electoral shortcomings identified by ECOWAS observers include insufficient voter education and the slow pace of voting at some polling stations with a large number of registered voters. Election observers from the Carter Center say the vote was "peaceful, orderly, and remarkably transparent" calling it "a positive sign of Liberians' commitment to democratic development." "Poll workers performed very well, conducting themselves in a tireless, impartial and professional manner. The credibility and transparency of the voting and counting processes was greatly enhanced by the presence of party agents, in particular the widespread presence of agents from the two main parties in all counties," noted former Nigerian ruler Yakubu Gowon who headed The Carter Center mission to Liberia. Electoral irregularities noted by the Carter Center include polling places where the secrecy of the ballot was not strictly maintained and where some ballot papers were folded improperly. But the group says none of those procedural miscues were significant enough to affect the overall integrity of the vote.
<urn:uuid:06fb167f-ace5-42f1-8f69-b766e9c9fbb4>
CC-MAIN-2017-04
http://en.dict.cn/news/view/17247
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00033-ip-10-171-10-70.ec2.internal.warc.gz
en
0.951017
771
2.59375
3
A movie ranch is a ranch that is at least partially dedicated for the creation and production of motion pictures and television productions. Originally, they were all within the 30-mile (48 km) studio zone, often in the foothills of the San Fernando Valley, Santa Clarita Valley and Simi Valley. Movie ranches first came into use for location shooting in Southern California during the 1920s with the rising popularity of westerns. Hollywood-based studios found it difficult to recreate the topography of the Old West on sound stages and studio backlots, so they looked to the rustic valleys, canyons and foothills of Southern California for filming locations. Other large-scale productions also needed large, undeveloped settings for outdoor scenes, such as war films for their battle scenes. To achieve greater scope, productions would conduct location shooting in yonder parts of California, Arizona, and Nevada, but travel expenses for production staff created a dispute between workers and the studios. The studios agreed to pay union workers extra if they worked out of town. The definition of out of town specifically referred to a distance of greater than 30 miles (48 km) from the studio, or beyond the studio zone. To solve this problem, many movie studios invested in large tracts of undeveloped rural land, in many cases existing ranches, located closer to Hollywood. In most cases, the ranches were located just within the 30-mile (48 km) perimeter, specifically in the Simi Hills in the western San Fernando Valley, the Santa Monica Mountains, and the Santa Clarita area of the Greater Los Angeles Area. The natural California landscape proved to be suitable for western locations and other settings. As a result of the post-war (WWII) era suburban development raising property values, rising taxes, and the resulting urban sprawl of Los Angeles, most of these movie ranches have since been sold and subdivided. A few of these have survived as regional parks, and are still used for filming. Movie ranches have gradually moved to other regions such as New Mexico, Arizona, and Texas. Below is a partial listing of some of these movie ranches. J.W. Eaves Movie Ranch Located in Santa Fe, New Mexico, the J.W. Eaves Movie Ranch was opened in the early 1960s with their first production being the CBS television series Empire in 1962. Over 250 other productions have filmed here over the years including The Cheyenne Social Club, Chisum, Easy Rider and Young Guns II. In 1998, a tornado touched down one mile from the film crew of Wishbone's Dog Days of the West as they were shooting the western scenes. It dissipated as it headed toward the set. The Eaves Ranch is open to the public and has been home to the Thirsty Ear roots music festival. The Skywalker Ranch is not a movie ranch in the conventional sense, but rather is the location of the production facilities for film and television producer George Lucas in Marin County, California. Based in secluded but open land near Nicasio in Northern California, the property encompasses over 4,700 acres (19 km2), of which all but 15 acres (61,000 m2) remain undeveloped. Southfork Ranch is a working ranch in Parker, Texas, a northern suburb of Dallas, that is used for some location filming. It was the backdrop for the 1980s prime time soap opera Dallas and its 2010s continuation. Circle M City Circle M City, in Sanford, North Carolina, is the set for the Christian movie Cowboy Trail. Backing up to 50 acres (200,000 m2) of land, this town features a church that seats 50 people, a mercantile, bank, saloon, livery, jail, costumes, and horses. Sable Ranch was a 400-acre (1.6 km2) ranch in Santa Clarita, featuring lakes, a western town, a hacienda, barn, fields, and a train. The large field enables the construction of large sets and has been used by numerous film and television series including The A-Team and more recently 24 and Wipeout. The ranch was destroyed in the Sand Fire wildfire on July 24, 2016 - From the Outside, In: Six Ways to Make Your Farm Shine in the Real Estate Market - The evolution of the horse: part 4 - Modern horses, Genome sequencing, Pleistocene extinctions and Return to the Americas - The evolution of the horse: part 3 - The forest-suited form was Kalobatippus whose second and fourth front toes were long, well-suited travel [...] - The evolution of the horse: part 2 - Eocene and Oligocene: early equids - Eohippus, Orohippus, Epihippus, Mesohippus and Miohippus - The evolution of the horse, a mammal of the family Equidae, occurred over a geologic time scale of 50 million years, transforming the small [...] - Equine coronavirus is NOT the same as the strain of coronavirus referred to as COVID-19, and cannot be transmitted to humans. - Hippodrama, horse drama, or equestrian drama is a genre of theatrical show blending circus horsemanship display with popular [...] - Since it's Valentine's Day we thought we'd share the love with five fun (and interesting) Valentine's Day related facts about your horse [...] - For centuries, humans have shared a special bond with horses, so it makes sense that there is no shortage of books about them. - Barns and stables, filled with highly flammable hay, bedding, and feed, are a big fire risk. Add the presence of panicked animals and you have [...] - Compared to other horses, ponies often exhibit thicker manes, tails and overall coat, as well as proportionally shorter [...] - The history of the modern circus is deeply rooted in horsemanship. The first modern circuses, which took place during the 18th century [...] - Arabian horses are the topic of many myths and legends. One origin story tells how Muhammad chose his foundation mares by a test of their [...] - If our horses could share their New Year's Resolutions, we bet they'd go something like this [...] - The trick to winning the race, advises a wise Paddy Payne to daughter Michelle, is to go a steady pace until finding [...] - A pantomime horse is a theatrical representation of a horse or other quadruped by two actors in a single costume who cooperate and [...] - Orbaks are the space horses in "Star Wars: The Rise of Skywalker" directed by J.J. Abrams - The Nokk is a character in Disney’s 2019 animated feature Frozen II. It is the horse-shaped elemental spirit of [...] - New Year's Day is an American Thoroughbred racehorse. Racing only as a two-year-old he won two of his three races including the Breeders' Cup Juvenile. - Thanksgiving is a time of reflection. While your horse can't speak, we'll bet that he's thankful for a whole lot this Thanksgiving. - The wild horse (Equus ferus) is a species of the genus Equus, which includes as subspecies the modern domesticated horse [...] - Virtual horse games sound like something for small children, but plenty of adults play them. Sometimes they are horse lovers [...] - The Banker horse is a breed of feral horse (Equus ferus caballus) living on barrier islands in North Carolina's Outer Banks. - Classical dressage evolved from cavalry movements and training for the battlefield, and has since developed into the competitive dressage seen today. - White horses are born white and stay white throughout their lives. White horses may have brown, blue, or hazel eyes. - Young Albert enlists to serve in World War I after his beloved horse is sold to the cavalry. Albert's hopeful journey takes him out of England and [...] - White horses have a special significance in the mythologies of cultures around the world. They are often associated with the sun chariot [...] - In 1872, Col. Meriwether Lewis Clark, Jr. traveled to England, visiting Epsom in Surrey where The Derby had been running annually since 1780. - Pegasus is a mythical winged divine horse, and one of the most recognized creatures in Greek mythology. - The current Olympic equestrian disciplines are Dressage, Eventing, and Jumping. In each discipline, both individual and team medals are awarded. - When you are looking to buy or sell property you are sure to have certain things in mind. This is a possibility especially if you have a specific need for it. - If you are thinking of buying or selling horse property, register with a leading website that focuses on equine properties for sale. - Unlike buying a home or a property, when it comes to buying an equestrian property to raise horses, the whole concept is something entirely different. - You can sell equestrian real estate without much difficulty because there are unique websites that cater to buyers & sellers from around the world. - There are several equestrian properties for sale but it is necessary to consider some basic points before you invest in a property. - When you are planning your horse property for listing, do it through a popular and reliable website for equine real estate. - Perhaps the most famous warhorse remains disputed; nonetheless, according to legend The TROJAN HORSE - Horse racing in the United States dates back to 1665, which saw the establishment of the Newmarket course in Salisbury, New York. - The American Quarter Horse, the official State Horse of Texas, is an American breed of horse that excels at sprinting short distances. - Horse racing is a sport that translates well to board games. These are our picks for the best horse-racing board games. - Between adhering to building codes and choosing the best equipment, there are many details to bear in mind when planning your dream stall barn. - A movie ranch is a ranch that is at least partially dedicated for the creation and production of motion pictures and television productions. - Everyone adores horses, so it shouldn't come as a surprise that there are tons of movies starring these beautiful creatures. - Horses have captured the imagination and emotion of mankind for centuries – perhaps, in a way that no other species of animal ever has. - Horse farms are often considered one of the most “green” businesses in agriculture. We don’t spread undue amounts of chemical fertilizer. - Do you dream of owning your own stable, or perhaps just owning a place where you can keep your horses in the backyard? - Anne Kusian, Arabian horse breeder and riding instructor are giving you a flavor of what are the advantages of owning a horse ranch.
<urn:uuid:fe9d8327-dcca-45bb-b34b-8eb067314516>
CC-MAIN-2022-33
https://www.horsepropertiesinternational.com/movie-ranch
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.953799
2,278
2.65625
3
JUSTICE DEPARTMENT STUDY DISPELS MYTHS ABOUT GIRLS’ DELINQUENCY, PREVENTION PROGRAMS NEEDED WASHINGTON – The Justice Department’s Office of Justice Programs’ (OJP) Office of Juvenile Justice and Delinquency Prevention (OJJDP) today released a research bulletin, Charting the Way to Delinquency Prevention for Girls, which reports that despite the rise in female juvenile crime, violence among female youth has not increased. Following a sharp increase in arrests among female juveniles in the 1990s, OJJDP convened the Girls Study Group (GSG) to gain a better understanding of girls’ delinquency and guide policy toward female juvenile offenders. While the majority of delinquent offenders are boys, little research exists on female juvenile delinquency. This first bulletin, part of a forthcoming series, summarizes findings from a comprehensive research project into girls’ delinquent behavior. “The Office of Justice Programs created the Girls’ Study Group to fully understand why an increasing number of girls are entering the juvenile justice system and to better understand how to prevent and intervene in girls’ delinquency,” said Jeffrey L. Sedgwick, Assistant Attorney General for OJP. Key findings of the OJJDP-sponsored Girls Study Group: “By convening the Girls’ Study Group, we made understanding girls involvement in delinquency a priority,” said J. Robert Flores, Administrator of OJJDP. “We will use the data collected from this study to assist government and community leaders in responding to the needs of girls.” Over the next several months, a series of bulletins will be released highlighting the Girls Study Group findings, each one focusing on specific questions from the study group’s research. The questions answered by the bulletins will include: For more information on OJJDP’s programs for delinquent girls, please visit: ojjdp.ncjrs.gov/programs/girlsdelinquency.html. The Office of Justice Programs, headed by Assistant Attorney General Jeffrey L. Sedgwick, provides federal leadership in developing the nation's capacity to prevent and control crime, administer justice, and assist victims. OJP has five component bureaus: the Bureau of Justice Assistance; the Bureau of Justice Statistics; the National Institute of Justice; the Office of Juvenile Justice and Delinquency Prevention; and the Office for Victims of Crime. Additionally, OJP has two program offices: the Community Capacity Development Office, which incorporates the Weed and Seed strategy, and the Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering, and Tracking (SMART). More information can be found at http://www.ojp.gov.
<urn:uuid:885c2b06-9de6-4ba1-9b24-331c1e5e90bf>
CC-MAIN-2017-04
https://ojp.gov/newsroom/pressreleases/2008/ojjdp09007.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00550-ip-10-171-10-70.ec2.internal.warc.gz
en
0.883111
571
2.4375
2
The Company of Pikemen and Musketeers are veteran members of the Honourable Artillery Company, the oldest regiment in the British Army. The HAC can trace its history as far back as 1296, and received a Royal Charter from Henry VIII on 25 August 1537. The Company of Pikemen and Musketeers welcomed the monarch and Duke of Edinburgh to their headquarters today. The Queen reviewed her pikemen and musketeers at Armoury House, London, 12 May 2010. The pikemen and musketeers wear the uniform of the period of Charles I and can be seen at state and civic occasions and serve as the Lord Mayor of London's bodyguard. The company is made up of military veterans (many of which are of flag rank) who have served with the Honourable Artillery Company, a Territorial Army unit, that has the Queen as its Captain-General. © Press Association
<urn:uuid:a4e98978-4d1c-4f13-94fe-fffdab362b20>
CC-MAIN-2017-04
http://themonarchist.blogspot.com/2010/05/pikemen-and-musketeers.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280483.83/warc/CC-MAIN-20170116095120-00291-ip-10-171-10-70.ec2.internal.warc.gz
en
0.976559
187
1.65625
2
A ULI National Policy & Practice Forum The New Transparency in Real Estate: Sustainability Metrics, Asset Performance, and Public Disclosure June 27-28, 2011 Real estate companies of all sizes and types are increasingly reporting their environmental and social performance as a supplement to financial performance reporting. Whether mandatory or voluntary; value-creating or risk-containing, the drivers behind this trend are varied and diverse. But the recent transformation of the marketplace and the advance of new regulatory requirements is undeniable. Ever wonder what this means for the real estate industry on a moving-forward basis? How are the new practices of public disclosure changing the marketplace? Are lenders and investors utilizing the same metrics? How are corporate sustainability goals impacting commercial leasing? What metrics are owners and tenants tracking as “must have”, as opposed to “nice to have”? As public disclosure requirements are introduced in federal and local regulations, what impacts will these have on markets? Are existing practices of voluntary disclosure still relevant? Are new regulatory requirements going to be effective as public policy instruments? This forum will convene private, non-profit and public sector stakeholders from the real estate and investment community. Representative topics to be explored: - Trends in mandatory municipal and state-based energy benchmarking disclosure; - GSA carbon and energy reporting requirements; - SEC guidance on climate change reporting; - GRI reporting guidelines for the real estate sector; - Greenprint Foundation’s industry-based data initiative; - Evolution of USGBC’s rating systems; - Trends in institutional investment sustainability criteria. Click here for details from ULI
<urn:uuid:4ae5ca8c-c351-45ac-9a69-dc78552d5066>
CC-MAIN-2017-04
http://www.creopoint.com/forum/topics/uli-transparency-event-in-june
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00323-ip-10-171-10-70.ec2.internal.warc.gz
en
0.910554
340
1.585938
2
Lev Goukassian, owner of the Nirvana Pharmacy, a medical marijuana shop in Los Angeles, California, works on his products.; Credit: GABRIEL BOUYS/AFP/Getty Images California’s Supreme Court has unanimously ruled to allow local governments to ban medical marijuana dispensaries within their borders. The ruling will allow cities and counties to restrict access to medical marijuana by shutting down pot shops within city limits. Medical marijuana is legalized in California, and the drug is decriminalized throughout the state, but this most recent ruling from the California Supreme Court could result in the closure and criminalization of medical marijuana dispensaries. Should local governments be able to restrict access to dispensaries? What will happen to the shut down shops? What does the ruling mean for California citizens who smoke legal medical marijuana? Frank Stoltze, KPCC reporter Read the Full Story at KPCC Blogs
<urn:uuid:30487a88-9607-4c5e-9e46-919a59f14134>
CC-MAIN-2017-04
http://hometown-pasadena.com/kpcc-blogs/californias-supreme-court-rules-to-allow-cities-to-ban-medicinal-marijuana-dispensaries/62575
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00558-ip-10-171-10-70.ec2.internal.warc.gz
en
0.941832
181
1.875
2
Piano, Viola (VIOLA WITH PIANO ACCOMPANIMENT) Viola and Piano. Composed by Johannes Brahms (1833-1897). Edited by Monica Steegmann. Viola. Henle Music Folios. Urtext edition-paper bound. Classical Period. Solo part and piano accompaniment. With introductory text and performance notes. 71 pages. G. Henle #HN231. Published by G. Henle (HL.51480231). Item Number: HL.51480231
<urn:uuid:e9545287-52c6-434a-9f44-b20e58aa7788>
CC-MAIN-2017-04
http://www.sheetmusicplus.com/look_inside?R=3764835
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280900.71/warc/CC-MAIN-20170116095120-00008-ip-10-171-10-70.ec2.internal.warc.gz
en
0.693966
114
1.742188
2
The LGBT Sports Coalition -- a group of organizations (including GLAAD), athletes, sports professionals, and advocates working to end anti-LGBT bias in sports -- debuted the first in its 'Move Forward' video series this week. The series, produced in collaboration with Nike, will showcase the movement to bring full equality to all levels of sport. GLAAD was on the ground in Portland last week at the 3rd annual LGBT Sports Coalition summit, where more than 100 attendees built strategy to move equality forward in sports. The summit was hosted by Nike, which donated $200k to the LGBT Sports Coalition in 2013 to end anti-LGBT bias in sports. This year, Nike is expected to more than double its donation for a total contribution of $500k. One hundered percent of proceeds from Nike's LGBT-affirming #BETRUE line goes to the LGBT Sports Coalition. Check out the 2014 line here.
<urn:uuid:6308ee5c-aae1-4c14-bc6b-203f68c1e465>
CC-MAIN-2017-04
http://www.glaad.org/blog/watch-lgbt-sports-coalition-debuts-first-move-forward-series
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00180-ip-10-171-10-70.ec2.internal.warc.gz
en
0.964794
189
1.546875
2
Technology in education, technology-related educational groups A list to create a model for localised low cost computing in West Bengal Teachers and school people share out information and ideas about new Common Core curriculum and other updates in the public school requirements. The purpose of the freelist is to bring together teachers from secondaire schools for sharing idee's for better didactic techniques in teaching. Discusses the accessible mahjong game software This is the E-Group of STC, Salt Lake City, Kolkata. We are sending various articles, write-ups, circular extracts, hand-outs and information to our e-group members. The topics include various updates on Banking, Finance and Banking-Technology. The list will be used to distribute information about event to the advisory board of the Centre for Geoinformation Science. Mailinglist for the translators of the free dynamic mathematics software GeoGebra Discussion list for all members of the PWHS Web Team, a school organization. This Discussion group is for all civitas academica University of Tirtayasa Banten Indonesia. Most of the topics are related to Information technology, Electrical, Mechanical, Metallurgy, Chemical, Industrial Engineering, Economy, Law, Social Culture and etc... The major discussion will be conduct using Bahasa Indonesia (Indonesia Language). A group of academic librarians from Southeast Asia discussing about issues related to academic content development, network connectivity and taxonomies. The discussions will focus on various IT protocols and applications related to connecting academic databases across the region. This includes ZNG, Z39.50,etc. The purpose of the discussion group is to provide a single point of access to academic content online for end users. The discussants are primarily IT technologists from the ASEAN region working in academic libraries A place for students of Technologic course of Liceo Moro (Italy) where to ask for help or support topic about chemistry, mathematic and so on... We are a group of italian mathematics theachers. We want to communicate our learning experiences and our work commitments. For students of A Level ICT at Landau Forte College to receive messages from their tutors and to discuss computer based coursework projects. Mailing list used for announcements relative to ISEL's PDM course (LI61N) List of misogyny students of graduate student administration in marketing. List for educational purposes. MST Albert-Ludwigs-Universität Freiburg i. Breisgau/IMTEK Germany, for students of microsystems engineering, for exchange of informations, for exchange of ideas, solutions, graphics of worksheets, for help at worksheets, issues, practicals, records, etc. Nur für Studenten der Beuth FH Berlin Note: to watchers. This is a selfhelpgroup of Students of Computer Engineering and/or Science of the Beuth University Berlin. We will discuss problems of all forms here. Ranging from understanding of computational theories to syntax problems in C, C++ to even general Unix/BSD/Linux chitchatting. Discussion of Education for OLA group in Southern Oregon Email discussion list for members of CEDE Homeschoolers Mailing list for members of the University of Aberdeen's CS society. Members only. Unofficial University of Auckland, New Zealand INFOSYS 340 Mailing List. IS340 is a university project paper in collaboration with various IT industry sponsors. The purpose of this list is to 1) Bring together the community of IS340 students (past and present) 2) Members of this group will be able to discuss technologies, problems and share ideas of events in their IT workplace and educational institution. 3) Organise reunions. 4) Discuss other topics related to the information systems project paper. The idea is knowledge sharing, industry networking and forming a tight-knit community. This list discusses any intellectual field that intersects with law, and also seeks to understand law from not only a multi-disciplinary framework, but from an "all-frameworks framework," if this is possible. In fact, this is precisely the point of the list -- investigating this very possibility. Mailing List for students of "Studia Magisterskie Uzupełniające - Elektrotechnika" at Politechnika Radomska SWACUHO has a plethora of professionals from all over the housing spectrum. From time to time, you may need to pose a question to all at once. This is the avenue to do that! Formerly the "mid-level listerv", this group serves to connect all of those involved in SWACUHO. From chief housing officers to new professionals, we all have unique knowledge to share with each other. This list is to facilitate the sharing of educational materials amongst the blind mentors, teachers, and students throughout the world. All blind people involved in education, welcome aboard! The Western Pennsylvania American Regions Math League Team is a weekly program for high and middle school students. Emulating famous Eastern European models, the program aims at drawing kids to mathematics, preparing them for mathematical contests, introducing them to the wonders of beautiful mathematical theories, and encouraging them to undertake future careers linked to mathematics, whether as mathematicians, computer or data scientists, engineers, economists, or business entrepreneurs. A discussion list for regional youth workers exchanging ideas and tools for the integration of Web 2.0 elements in our work. This mailing is to provide a platform for discussing various free software projects that can be done by undergraduate students Tai-Chi Group in Erlangen Lista para compartir opiniones e información pedagógica y tecnológica entre especialistas regionales DIGETE del ministerio de educación del Perú. Mailing list for students of IBA belonging to Batch BBA-I/I 2009. Primary use of mailing list is for receiving course work as well news about section 1 classes and schedule changes. This list is used by the Undergrad Oficce at IQ Unicamp to communicate by e-mail with the undergraduate students. Group communication for the Scranton Reads Community reading program. This list is for the members of the University of South Alabama School of Computer and Information Sciences steganography senior project group, and their mentor(s). This List is to bring more juggler, hooper and slackliner together in LE. Feel free to post.. if you like or do a meeting or a workshop.. juggling partys .. and so on BUT please dont post about 4 World War, Spam or Alien`s.. :O) Diese Liste gruesst euch, fuehlt euch eingeladen hier zu posten wenn ihr ein Jonglier-, Hoop- oder Slackline treffen macht oder ein workshop.. juggling partys. Aber bitte keine Spam posten. LE we are coming :O) A place to discuss the technical and tactical aspects of armor BOLC. Discussion for middle school science in Hall County. This group will help teachers integrate technology such as webquests, streaming video and powerpoint lessons into middle school science. This discussion group, USSWPV, is dedicated to collaborative efforts by US individuals and institutions to build social work infrastructure in Vietnam. Within this context of social service provision, training, and education, it is additionally focused on improving relations with and learning from our Vietnamese hosts. Membership is limited to those actively involved in or considering joining such efforts. School librarians will communicate and collaborate with each other concerning technology and school issues in the library. For the purpose of peaceful, harmonious, and productive interdepartmental relations for the MDUSD Assistive Technology team. The mailing list of the MAPP students and alumni association at Melbourne Uni Used to send announcements and other information to Urbana High School Show Choir participants and supporters. This list will be used for AAST MBA marketing class of 2012 This is a list for a committee that provides curriculum and programs to teach youth in the fields of Science, Engineering, and Technology(SET) An e-mail discussion group and mailing list for those involved with, or interested in, the happenings of the UNM Art and Ecology program. For more information, see http://ae.unm.edu This is a list of staff members and coaches that have opted to receive inclement weather alerts via email. A technology-based forum to discuss online study issues for disability students from SCU Lismore and externals from SCU. This list is a forum for Bookport users to discuss topics related to the use of Bookport and accessories, share ideas and assist other users. Kindergarten parents from McGilvra Elementary school, room #6 (Mr. S), school year 2016/2017 List of members of the D2L Ontario colleges community. We are 11 colleges that uses the D2L system as our LMS. The list will permit us to share resources throughout the network of Ontario colleges.
<urn:uuid:97a2ccb1-71d5-4efb-836e-924d6a3b8f52>
CC-MAIN-2017-04
http://www.freelists.org/cat/Education/20
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280410.21/warc/CC-MAIN-20170116095120-00450-ip-10-171-10-70.ec2.internal.warc.gz
en
0.876563
1,901
2.484375
2
Dedicated community website. We have a number of items of interest to the safety researcher. Check the sections below for more detailed information. The Adelard Safety Case Development (ASCAD) Manual. The manual covers constructing a safety case for a new system and retrospective development of a safety case for an existing system. The use of COTS (commercial off-the-shelf software) in a safety related system is also covered. The approach defined in the manual is generic and applicable across a wide range of technologies. Important reports co-authored by Adelard. Published research papers concerning systems and software dependability.
<urn:uuid:d23f5a82-02ac-4e8c-8ecc-25e1efb1b3e5>
CC-MAIN-2022-33
https://www.adelard.com/resources-parent/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00067.warc.gz
en
0.894406
135
1.515625
2
A small study out of Concordia and Mount Allison universities suggests children in structured home school programs do better academically than students in the public school system. The study looked at the academic performance of 74 students, aged five to 10, in New Brunswick and Nova Scotia: half were home schooled and half went to public schools. It showed home school children in a structured program scored half a grade higher in math and about two grades higher in reading. "The parents know their children very well," said study co-author Sandra Martin-Chang. "They have a very accurate sense of how their children were doing at home." The public school students tested did not do poorly, performing at or above grade level, but the home-schooled students did that much better. The study included a set of children educated in an unstructured home environment. These children showed the worst academic progress of the three groups. Pleased with home school decision Hilary Sowa of P.E.I. has been schooling her children at home for three years. The Sowa family wasn't happy with their local public school. Aiden, now 12, wanted to learn more, faster. "I thought that we were moving a little bit too slow in math," he said. "In spelling, the words weren't getting much harder." Grace, now eight, said her experience supports the study findings. She's advanced beyond the grade she would be in if she was in public school. "One of them I actually think is fifth grade," said Grace of the subjects she is studying. "Most of them are fourth grade. I don't think anything I have anything third grade." The study was published in the Canadian Journal of Behavioural Science.
<urn:uuid:eed9bd12-bd42-48a0-8c95-a2643805cd12>
CC-MAIN-2016-44
http://www.huffingtonpost.ca/2011/09/19/home-schools-outperform-p_n_969560.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719416.57/warc/CC-MAIN-20161020183839-00363-ip-10-171-6-4.ec2.internal.warc.gz
en
0.990876
365
2.625
3
The number of schools, hospitals and provincial buildings considered to be in good condition was dropping even before the provincial government had to face a major rebuilding task in the wake of massive southern Alberta flooding, according to a government report. But Tory Infrastructure Minister Wayne Drysdale said Friday that the replacement and renovation of public facilities across the province won’t take a back seat to flood reconstruction, which has a price tag estimated in the multiple billions of dollars over the next decade. “As far as I’m concerned, we’re going ahead . . . with everything we’ve committed to and the capital work that we’re doing,” said Drysdale in an interview. “We’re not going to put work on hold that we were going to do all around the province because of the flood. The flood is going to be extra.” The Infrastructure department’s recently released 2012-13 annual report shows the percentage of schools classified as good under the province’s facility condition index (FCI) fell to 58 per cent from 61 per cent the year before. Schools in fair condition increased from 37 to 43 per cent, while those classified as poor declined from two per cent to one per cent. Post-secondary institutions were classified as good in 71 per cent of cases, down from 72 per cent. Five per cent were rated as poor. Health facilities in the good category declined from 77 to 72 per cent. Those considered fair increased to 24 per cent while health facilities in poor condition went from three to four per cent. The percentage of government-owned facilities in good condition dropped from 73 to 70 per cent while one per cent were considered poor. Under the index, facilities are scored in a variety of areas. A rating of good means the facility is adequate for intended use and expected to provide continued service with average maintenance. Fair means the building has aging components and requires additional spending while poor condition means upgrading is required to comply with current codes or standards and deterioration has reached the point that major repairs or replacement is required. Drysdale said that even when a building is categorized as poor there should be no cause for alarm among the public about the rating. “The facilities are safe and there’s no health worries there whatsoever,” said the Grande Prairie-Wapiti MLA. Among the government’s existing construction commitments is a plan to build new schools and refurbish existing schools across the province over four years, Drysdale noted. “Just before we do that, you can see the condition might be lower. But by the time we do 70 modernizations and build 50 new ones, that would come up. The poorer ones are the ones that will be getting the modernization or being replaced,” he said. Darwin Durnie, a Red Deer engineer who is president of the Canadian Public Works Association, said that in general public assets are well-managed in the province. “I don’t think there is a crisis,” he said. But Wildrose MLA Drew Barnes said the rankings should raise concern. The Progressive Conservative government has misspent on projects such as the $350-million renovation of Edmonton’s federal building — which includes offices for MLAs and staff — rather than upgrading public infrastructure, he said. Barnes believes the government can handle both its original capital plan and the work necessitated by the June disaster, but it is important to rank its projects publicly. “They should have a public, prioritized list of what they’re going to do,” said Barnes. “I think it is important to prioritize the flood-damaged infrastructure, huge elements of that are important, and it’s important to get things back the way they were.” The government has not yet put a tab on the impact on public infrastructure but two schools in Calgary and two schools in High River suffered significant damage from the flood. Damages to government buildings have been preliminarily estimated at $11 million so far, mostly related to the provincial building in High River. The Tory government — which has run six straight deficits — has pledged $1 billion for flood recovery efforts, with more dollars almost certain to flow as it pledges to cover replacement costs for homeowners’ uninsured losses. The federal government will recoup part of the expenditures under its disaster assistance program. Drysdale, who is also a member of the Treasury Board, said it’s too soon to say whether the province will boost its borrowing plans to pay for the infrastructure tab. The government currently intends to borrow $12.7 billion for capital by the end of 2015-16. Scott Matheson, senior vice-chair of the Alberta Construction Association, said the sector has the ability to take on flood reconstruction as well as the government’s regular capital plan. But he noted the industry and the province have already been talking about how to avoid a repeat of the cost inflation seen in the past due to an overheated construction climate. “We’re at the table with Alberta Infrastructure regularly, trying to deal with what is always the question, do we have the resources to handle the work that’s on the books?” said Matheson. “The capacity is there,” he added.
<urn:uuid:c44aab11-9118-4423-9e6c-28dc60fa042a>
CC-MAIN-2017-04
http://www.calgaryherald.com/news/alberta/Flood+repairs+delay+plan+refurbish+growing+list+deteriorating+infrastructure+province/8654111/story.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00341-ip-10-171-10-70.ec2.internal.warc.gz
en
0.966127
1,107
1.53125
2
ANN ARBOR — In some states around the country, legislators have responded to the declining revenues from gas taxes by calling for a special tax on electric vehicles, an approach that a new study from Ann Arbor’s Ecology Center says isn’t justified. Charles Griffith of the Ecology Center says the extra tax is supposed to make up for the “free ride” electric vehicles get because they don’t contribute to the highway maintenance funds generated by the gas tax. “But the fact of the matter is that electric vehicles contribute more to states’ bottom lines via their registration fees and sales taxes than conventional vehicles do,” according to Griffith, climate and energy program director at the Ecology Center. The Ecology Center is one of the founding members of the Built by Michigan campaign, a coalition of manufacturers, unions, local communities, utilities, environmental groups and others working to promote the manufacturing and sales of electric vehicles in Michigan. The organization has completed an analysis (www.builtbymichigan.org/docs/EVsPayTheirWay.pdf) and generated a fact sheet to document the tax revenues generated by electric vehicles. “While it is true that electric vehicles do not burn gasoline and so do not contribute to the gas tax, electric vehicles generate more in registration fees and sales taxes because of their relatively higher sales prices,” Griffith says. “Compared to their non-electric counterparts, electric vehicles contribute more gross revenue and more revenue per mile driven to the state coffers, so saying that electric vehicles get a ‘free ride’ on our highways is simply not true.” Imposing an additional tax on electric vehicles could end up costing states like Michigan in the long run, dampening sales of a product that has a lot of potential to generate jobs for workers and new economic opportunities for auto and advanced-battery manufacturers. And in reality, while electric vehicle sales have been rising, they are still a very small part of the market, so imposing a new tax on them wouldn’t raise nearly enough money to overcome the shortfall states are facing from declining gas-tax revenues. Those revenues have been declining for a number of reasons including greater fuel economy in traditional vehicles and changing driving habits leading to fewer miles driven overall. “Instead of trying to strangle this new opportunity in its cradle, state and local governments should be doing all they can to support it,” Griffith says. “Imposing a special tax on electric vehicles could have terrible effects on Michigan’s opportunity to put the world on electric-powered wheels.” What should states be doing instead? “Adding electric vehicles to state and municipal fleets is one idea,” Griffith says. “Financial incentives for more EV charging stations would be another. Instead of looking for ways to tax them, we should be making it easier for people to buy and drive them.” Built by Michigan is gathering signatures on a petition to present to Michigan policymakers advocating some of those ideas. More at www.ecocenter.org.
<urn:uuid:37cd95fe-de50-4848-a310-aec2f8c3d959>
CC-MAIN-2016-44
http://detroit.cbslocal.com/2012/05/28/evs-pay-taxes-in-their-own-way-study-finds/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719677.59/warc/CC-MAIN-20161020183839-00559-ip-10-171-6-4.ec2.internal.warc.gz
en
0.949326
629
2.40625
2
As an international school, many community members at Lausanne have personal immigration experiences. "We all share in the immigrant history," said fourth-grade teacher Nancy Garriga. "Millions of people have made their way to America, and hundreds of thousands still come each year. We wanted to give immigrant families at Lausanne the opportunity to share their voices." Lausanne Fourth-graders have spent the last few weeks studying the causes and effects of immigration as a part of their PYP unit of inquiry. Students invited families to share their immigration stories to help build a more profound, shared understanding of their journeys and newfound lives in America. One of the guest speakers In Mrs. Garriga's fourth-grade class, Muhammad Afzal, addressed his father's journey from Pakistan to America. As the visitor spoke over a Zoom call about his background, he included a visual presentation that showcased family pictures, various heirlooms, and a map pinpointing the location of his father's home city. The students asked many questions, giving them the chance to learn more about their peers and sparking an interest in learning more about their personal family history. "We've had a lot of great speakers over the past week," said Mrs. Garriga. "This is one of my favorite yearly projects because I love how much students get to learn about each other while honoring their family's immigration journey."
<urn:uuid:1c4b8411-e201-4707-8aef-9d0bfe86bcf7>
CC-MAIN-2022-33
https://www.lausanneschool.com/news/posts/immigrant-families-speak-to-fourth-graders-about-their-personal-experiences
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00268.warc.gz
en
0.98108
292
2.359375
2
Individual differences | Methods | Statistics | Clinical | Educational | Industrial | Professional items | World psychology | In Freudian psychology, Eros, also referred to in terms of libido , libidinal energy or love, is the life instinct innate in all humans. It is the desire to create life and favours productivity and construction. Eros battles against the destructive death instinct of Thanatos (death instinct or death drive).
<urn:uuid:6768ef9d-12c8-4712-9934-0b98c6108501>
CC-MAIN-2022-33
https://psychology.fandom.com/wiki/Eros_(Freud)
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00066.warc.gz
en
0.798374
123
1.898438
2
Asthma is a disorder that is caused by inflammation and narrowing of the airways. This results from the tightening of the muscles lining them and causes breathing problems especially in breathing out. What to look for Inflammation in the chest. Sneezing and irritation in the nose, this may also cause hay fever. A sudden shortness of breath and occasionally coughing and also wheezing of the chest. A tight feeling in the chest. It can also cause insomnia or restlessness The above symptoms are not always present in a attack . It is not quite Recognized why some people get asthma, although, it is known that asthma is made worse by certain aggravations called trigger factors. Swelling of the airways is the body’s response to these triggers and this arises in an asthma attack. There are some people who only undergo a very mild attacks and for others the condition is serious enough to have specialised medical care. You should be monitored regularly by a Health Professional if you have asthma, and you must seek immediate medical intervention for a serious episode. By Recognizing your triggers early, you can learn to ease the intensity and occurrence of asthma attacks and perhaps even avoid them totally. With asthma the problem is not with breathing in, but when you breath out. During an asthma episode, the muscle spasms and swelling in the bronchial tissues narrow the lungs' tiny airways, which then becomes clogged with excess mucus. Musty air gets trapped in the bottom of the lungs, forcing you to use the top part to inhale for air. In Mild and controlled episodes consist of short episodes of panting and wheezing. In Serious cases, the lungs' airways become so narrow and clogged that breathing is impossible. Asthma is somewhat common. Up to one in every 10 adults and about one in every 5 children and young people are affected by asthma. If you suffer from asthma it means that your airways are sensitive to certain trigger factors. The most common substances to cause the attacks or at least asthma type symptoms are dust mites, cigarette smoke, pollen, animal fur, grass, mould, animal dander and certain foods and food additives. If one of these substances are inhaled it can trigger the release of histamine and other body chemicals, then this causes an allergic reaction and asthma episodes. An allergic reaction is an over reaction to something, by the body’s natural defence system. The changes in the environment can also bring on an attack and these are also known as trigger Factors - coughing, strong smells, exercise, laughing, changes in air temperature and certain medications and breathing deeply. There are certain chemicals that can trigger asthma - paint fumes, grain and flour dusts, perfumes, and sawdust from timber. The symptoms may only occur several hours after you were exposed to the chemical. The other triggers are medications such as aspirin and anti-inflammatory drugs, and beta-blockers. Viral respiratory infections are also common triggers. So try to avoid people with these infections. When to seek further professional advice If you or a person with you suffers from any of the signs above for the first time or if they are suffering from a particularly serious episodes. If the prescribed asthma medicine does not work for you in the time it is supposed to… You need a new prescription And if you or the person with asthma feels as if they are suffocating, making it difficult to talk; Get immediate emergency treatment. There are many people who have had success with alternative asthma treatments, but even advocates recommend these methods only as complements to regular therapy. Remember: Once you’ve been diagnosed with asthma you should be monitored by a doctor. Aromatherapy - Frankincense, thyme, clary sage, cypress. These herbs are not to be inhaled, they can be used in a vapouriser or put in a carrier oil and used for massaging purposes only. Herbal Therapies - Elecampane (Inula helenium), acts as a soothing expectorant, may help clear the body of excess mucus. Yoga - Yoga can help you learn how to breathe deeply and to relax, Homoeopathy - To help calm insomnia and anxiety, take Arsenicum album. For symptoms that Regress at night or during cold weather, or that occur very suddenly, take Aconite. For symptoms Worsened by dampness, take Natrum sulphuricum. For more relieves and acquired dosages, you will need professional help. Chinese Herbs - use expectorant and anti-asthmatic herbs that clear the body of reserved fluid. Ephedra (Ephedra sinica) is a powerful bronchodilator. Only use this herb under the supervision of a qualified Chinese medical practitioner as it can cause serious side effects. Try to use Soy milk as alternative to milk and try to identify your triggers Also try to avoid foods and drinks that contains artificial flavorings, colorings and preservatives and dairy products (as they are mucus forming) By gentle aerobic exercise can help strengthen the heart and lung areas. To discover if you have asthma, your doctor will likely administer a pulmonary function test, which measures the strength of your exhalation. Certain medications may be prescribed for this condition. If you suffer from asthma, you should see your doctor regularly… For serious episodes, conventional medical treatment is always required. Nevertheless, a number of alternative treatments can be helpful when used in Combination with conventional therapy. Following a study of asthma, your first step must be to work with your doctor to develop a treatment or management plan. Part of this plan is, that the physician might ask you to keep a daily diary, entering environmental and unstable factors that bring on asthma episodes. This will not only help the doctor to monitor the disease but will help you recognise and avoid your asthma triggers. The information contained in this Site/Service is not intended nor is it implied to be a substitute for professional medical advice or taken for medical diagnosis or treatment.
<urn:uuid:7c10b1a2-6ded-41da-9276-e94d076916d9>
CC-MAIN-2017-04
http://www.bodyandmind.co.za/info_pages.php?action=info_page&id=566&page=Asthma
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00373-ip-10-171-10-70.ec2.internal.warc.gz
en
0.95043
1,236
3.359375
3
Obama says messaging, not policy, was his biggest mistake. Is that true? In a TV interview Obama says the presidency is not just about setting the right policy, but explaining it to the American people. What critics and supporters say about his record. President Obama stirred up a fresh round of political crossfire this week, when he responded to an interviewer's question by saying his biggest mistake has been in the arena of messaging, not policy. "The mistake of my first term – couple of years – was thinking that this job was just about getting the policy right. And that's important. But the nature of this office is also to tell a story to the American people that gives them a sense of unity and purpose and optimism, especially during tough times," Mr. Obama told Charlie Rose of CBS. The president said he wants to do better at "explaining, but also inspiring." That prompted a quick response from his Republican opponent, Mitt Romney. “Being president is not about telling stories. Being president is about leading, and President Obama has failed to lead," Mr. Romney said, with his campaign citing millions of Americans who have lost homes or jobs in the weak economy. Whether Romney is right or wrong, the exchange puts new focus on Obama's track record at a time when media coverage of the campaign had shifted in other directions, notably to questions about Romney and his years in private equity at the firm Bain Capital. Central to Romney's pitch is the idea that he, as a former business leader, understands how the economy works. And that Obama does not. Romney's statement Thursday was accompanied by less-than-inspiring statistics on unemployment, the national debt, consumer confidence, and health-care costs under Obama. In the CBS interview, Obama called Romney's own leadership credentials into question, arguing that seeking profitable corporate investments is different from crafting policies to maximize job growth. "That doesn't necessarily make you qualified to think about the economy as a whole, because as president, my job is to think about the workers. My job is to think about communities, where jobs have been outsourced." "When you look at the record [of Bain Capital on job creation], there are questions there that have to be asked," Obama said. (News organizations and fact-check groups have been asking those questions.) How about Obama's record? A summary of pro and con views: The negative view of conservative critics is that, although Obama inherited a bad economy, he has made things worse by failing to focus squarely on job-friendly policies. His stimulus programs pursued a range of liberal objectives, from aiding labor unions to expanding green energy to aiding municipal governments. His effort to expand health coverage to more Americans imposes new taxes on individuals and businesses, while lacking effective cost controls for the health-care system. At a time of high gasoline prices, he has regulated domestic energy production rather than encourage it. The critics agree there's a "messaging" problem, but not in the way Obama means. They complain that instead of making moves to inspire business confidence (such as tackling the federal debt problem or streamlining regulations) Obama demonizes private sector job creators as "fat cats" and as wealthy people who aren't paying their fair share in taxes. Some also blast Obama for diluting the rule of law (a foundation for free-market enterprise) with bureaucratic whim, as when bond investors were pushed aside in government-assisted restructuring of Detroit automakers. Although these harsh views emerge most loudly from Republicans, they are echoed by some voices on the left as well. Blogger Mickey Kaus compiled a list of "Top 10 Things Obama Could Have Done Differently" last year, including some moves conservatives would agree with. Obama's defenders argue that his policies have helped to steer a crisis-wracked economy out of recession, and that policy shortcomings are more about Republicans' failure to compromise than about any lack of vision on Obama's part. On the national debt, for example, they say Obama has shown readiness to strike a "grand bargain" that includes major long-term spending cuts. The president's only stipulation is that the plan be a "balanced" one that also includes higher tax rates on the rich, as were in place during the 1990s. On health care, they argue that the new taxes (and penalties for large firms that don't offer insurance) will not be job killers. Even some conservatives agree with Mr. Kaus in arguing that a push toward a universal health-care system, far from stifling business, would encourage risk-taking and job-hopping, because people wouldn't be afraid of losing access to medical care if they lose a job or see a business venture fail. Although the effectiveness of Obama's Recovery Act is much debated, a large majority of economists in one survey said the extra spending and tax cuts helped keep America's unemployment rate lower in 2010, as the nation emerged from recession. A plurality in this IGM Economic Experts Panel also said they believed that "the benefits of the stimulus will end up exceeding its costs." Those are just some of the prominent lines of argument on both sides. Expect to hear more of these between now and when voters get to render their own official judgment in November.
<urn:uuid:fc477752-7a3e-4f35-9796-67d5eed255f1>
CC-MAIN-2017-04
http://www.csmonitor.com/USA/Elections/President/2012/0713/Obama-says-messaging-not-policy-was-his-biggest-mistake.-Is-that-true
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280718.7/warc/CC-MAIN-20170116095120-00403-ip-10-171-10-70.ec2.internal.warc.gz
en
0.975754
1,070
1.570313
2
According to the IPCC, CO2-induced global warming will be net harmful to the world's marine species. This summary examines this hypothesis for various fish species, presenting evidence in opposition to the IPCC's point of view. Noting "effects of climate-driven production change on marine ecosystems and fisheries can be explored using food web models that incorporate ecological interactions such as predation and competition," citing the work of Cury et al. (2008), Brown et al. (2010)1 used the output of an ocean general circulation model driven by a "plausible" greenhouse gas emissions scenario (IPCC 2007 scenario A2) to calculate changes in climate over a 50-year time horizon, the results of which were then fed into a suite of models for calculating primary production of lower trophic levels (phytoplankton, macroalgae, seagrass and benthic icroalgae), after which the results of the latter set of calculations were used as input to "twelve existing Ecopath with Ecosim (EwE) dynamic marine food web models to describe different Australian marine ecosystems," which protocol ultimately predicted "changes in fishery catch, fishery value, biomass of animals of conservation interest, and indicators of community composition." In discussing their findings, the seventeen scientists state under the IPCC's "plausible climate change scenario, primary production will increase around Australia" with "overall positive linear responses of functional groups to primary production change," and "generally this benefits fisheries catch and value and leads to increased biomass of threatened marine animals such as turtles and sharks," adding that the calculated responses "are robust to the ecosystem type and the complexity of the model used." Given these findings, in the concluding sentence of their paper, Brown et al. state the primary production increases suggested by their work to result from future IPCC-envisioned greenhouse gas emissions and their calculated impacts on climate "will provide opportunities to recover overfished fisheries, increase profitability of fisheries and conserve threatened biodiversity," which most would characterize as an important set of temperature-induced benefits.
<urn:uuid:347aa7c5-a0c8-41f2-b96a-81ea8864aecd>
CC-MAIN-2022-33
https://news.findit.com/news/1741944/response-of-fish-to-ocean-warming
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00479.warc.gz
en
0.938817
420
3.0625
3
Everyone has something in their life that they consider a "passion." For some, it's what they do for a living, for others, it's an activity such as cooking or writing. For many, that passion is sport. Sport taps into the basic human instinct of competitiveness, of being better than others and bettering yourself. Whether it's being part of a football team or running a marathon, sport challenges all of us in various ways. There are good times. There are bad times. Marathon runners strive to better their own personal bests. Football teams aim to play better, win more and be the most successful they can be. For the most part, the bad times are limited to losing games or failing to reach certain goals. But for some, the losses are more than just statistical. For the unfortunate few, sport can make their daily life change forever. I'm talking about those who suffer life-changing injuries while pursuing their passion. These moments, when and wherever they happen, never seem to be horrific the instant they happen. However, the impact they leave on those closest to the victim is impossible to miss. Take the story of American high school hockey starlet Jack Jablonski. Jack (or "Jabs" as he was known to friends and family) had everything going for him. He was popular, smart and a stellar hockey player for the Benilde-St. Margaret Red Knights. It all looked perfect. It took just one moment to turn Jack's life upside down. Checked from behind by two players from Wayzata, Jack was left with a severed spinal cord and two fractured vertebrae. He was told by doctors he would never walk—or skate—again. Upon hearing this story, the local community went into a state of shock. Tributes and support rallies were held around Benilde-St. Margaret school with students wearing all white in various events planned to show support for Jack's family. When I read his story last week, I'm not ashamed to say I felt emotional. It is so difficult for me to imagine the massive impact this had on the Jablonski family and the local community, but it really got me to understand how quickly things can be taken away from you. How would you react if you or someone close to you lost the ability to walk? Lost the ability to complete basic actions like getting out of bed or dressing yourself? Realizing that this is the reality the Jablonski family faced, made me think about all of this and really impacted my view of the world. People often take for granted their ability to go out for a run or go and play pick-up basketball down on the black tops. For those who have this ripped from their lives, it is difficult to comprehend. Jack Jablonski's story is but the latest in a long history of life-changing injuries. They have happened to high-profile athletes—Eric LeGrand of Rutgers University to name one—but they are all too often suffered by young, up-and-coming players who are far from reaching their true potential and far from living out lifelong dreams of playing for their favorite teams or alongside their idols. Everyone has that calling, the dream that they want to chase. Can you comprehend not being able to do that ever again? The outpouring of support from the Benilde-St. Margaret community and the wider North American sports family is nothing short of heart warming. Already a fund has been set up by Jack's family to help them cope with the financial side of adjusting to Jack's life in a wheelchair. Many NHL figures have signed the visitor's book on the Jablonski fund website, sending their condolences and best wishes to the family. Hockey has had more than its fair share of these injuries. Whether it is a byproduct of a physical, contact-filled sport or something that could be addressed via the rule book, it does not matter—these accidents happen. Take Travis Roy as an example. Travis was an exceptional talent on the ice, his talents earned him a dream athletic scholarship to Boston University. Disaster struck just 11 seconds into his BU debut. He went to check University of North Dakota's Mitch Vig, who swerved to avoid, and Roy slid headlong into the boards. The awkward impact cracked two vertebrae, leaving Roy in a wheelchair for life, paralyzed from the neck down. No amount of rule change or protective gear can ever completely rule out these types of freak accidents. That is part of sport and is why humans find sport so intense. The outpouring of grief was immense, as it was for Jack Jablonski. Thousands of letters of support were received by the family including one from then President Bill Clinton. Local people held benefits and auctions, even a phone-a-thon, to raise money to help his family cope with their now altogether different future. Despite all of the hardship and suffering of the victims and their families, they all show incredible belief that their situation will improve. For me, they show the most amazing determination and will to not let their lives become sad and dark places and to keep looking at the positive side of their horrible situation and come out smiling. Travis and his family have not let themselves be defined by his injury, instead he and his family set up the Travis Roy Foundation to help spinal cord injury survivors and to provide funding for treatment research. To date, the foundation has distributed more than $2.5 million in grants and to various research projects and institutions. Roy now makes a living as a public speaker, giving talks on disability in sport and on living with a disability. In a recent appearance, he talked about how his injury taught him the true value of various things in his life. "I can still laugh," Roy said. "I can still cry. I can still enjoy the people around me. And you tell me what's more important than that." As people, we should not have to suffer such horrendous setbacks in life to realize what is most important to us. Reading about Jack and Travis has been enough to challenge my priorities and cherish what I have rather than complain about what I don't. I am starting to hold little things like enjoying a walk in the sunshine or a trip to the beach in higher regard than before, realizing that they can be taken away from you in just 11 seconds. Jack Jablonski's family have set up a foundation in his name to help generate funds for his future medical care. Click here to visit the website. Travis Roy set up a foundation in his name to help spinal cord injury survivors. Click here to visit the website. And finally, here is the website of the Foundation for Spinal Cord Injury, Prevention, Care & Cure. They do a fantastic job in helping to produce new breakthroughs in spinal cord-related medicine. Like the new article format? Send us feedback!
<urn:uuid:67ddac26-46dc-401d-8397-1095db4dd8f8>
CC-MAIN-2017-04
http://bleacherreport.com/articles/1013587-life-changing-injuries-dealing-with-life-without-your-passion
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00161-ip-10-171-10-70.ec2.internal.warc.gz
en
0.979101
1,427
1.96875
2
FOCUS ON ALUMNI Manchester's James Gaier ’74 rockets to NASA acclaim, takes students along “Shoot for the moon. Even if you miss, you’ll land among the stars.” Dr. James R. Gaier ’74 didn’t miss. The former professor and chair of the Manchester College Chemistry Department has spent nearly half his life studying the moon – especially how the lunar and Martian dust affects spacesuits, spaceships and lunar equipment. This fall, the National Aeronautics and Space Administration (NASA) honored Dr. Gaier with its Exceptional Achievement Medal for his work at its Glenn Research Center in Cleveland. His research also has garnered him accolade as a NASA Space Flight Awareness Honoree for his contribution to astronaut safety. Very simply, Dr. Gaier studies how lunar dust affects astronaut suits, spacecraft and other power equipment NASA uses on the moon. Imagine billions of very tiny, very sharp meteorites crashing into things, breaking things, without any atmosphere like we have on Earth to slow them down. The dust also has microscopic “hooks” that grab fabric with enormous strength. “Lunar dust is more cohesive and adhesive than similar-sized dust on Earth. It’s very hard to clean off,” reports Dr. Gaier, who has more than 130 publications and five patents. His research demonstrates that NASA must find new ways to make its equipment and fabric more durable, and must develop ways to repel and clean off the dust. Dr. Gaier shares his fascination with moon dust, with Manchester College student research interns and with long-time friend colleague, Dr. Greg Clark, chair of the Physics Department. Recently, Dr. Clark, physics major Kerry Rogers ’09 of North Manchester and engineering science major Tsega Mengistu ’10 of Ethiopia helped Dr. Gaier analyze the effects of lunar dust on astronaut fabrics – including the spacesuit worn on the moon by Astronaut Alan Bean during an Apollo mission! They even did some of the nanoscience on campus, using the College’s new atomic force microscope. Kerry Rogers also joined Dr. Gaier at the NASA laboratories last summer to use scanning electron microscopy and other techniques to simulate moon dust on the fabrics. This story gets even better: Some of the space suit fabric they experimented on will travel on the next Discovery Space Shuttle to be mounted on the outside of the International Space Station! (The launch is scheduled for Feb. 12.) After a couple of years, the fabric will return to Earth, and probably to Manchester College, for post-analysis. It all began at Manchester College, with a proposed research project synthesizing liquid crystals. Professor Wilson Lutz ’50, lit the spark as he mentored young Mr. Gaier: “Here’s something that’s never been done before. Why don’t you try to do that?” While today, the process is commonplace, the student instantly was hooked. Jim Gaier continued on his College career path to teach high school science, but research kept its hold. As he was completing his prestigious Upjohn Graduate Fellowship in protein crystallography research at Michigan State University, a NASA recruiter discovered the Ph.D. candidate, and he was off to Cleveland. In 1992, while still employed at NASA, Dr. Gaier returned to Manchester College to teach chemistry, and to share his research with students. He led January Session classes to the Glenn Research Center for several years and initiated Manchester’s biochemistry laboratory classes. Gifts from the Gaiers continue to support research equipment and materials for those classes. Dr. Gaier keeps the NASA connection with Manchester College strong by mentoring student research interns at his Cleveland laboratory – 15 to 20 students from his alma mater over the years. He says he feels at home at Manchester College and in North Manchester, where he and spouse Kay Domer ’73 Gaier, pastor of the Wabash Church of the Brethren, are active in the congregation, the community … and Manchester College. Dec. 5 , 2008
<urn:uuid:abbb95e6-a5cc-4564-b7bf-3219f5236db4>
CC-MAIN-2017-04
https://www.manchester.edu/News/Archives/JimGaier1208.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284352.26/warc/CC-MAIN-20170116095124-00188-ip-10-171-10-70.ec2.internal.warc.gz
en
0.938901
861
2.609375
3