text stringlengths 181 608k | id stringlengths 47 47 | dump stringclasses 3 values | url stringlengths 13 2.97k | file_path stringlengths 125 140 | language stringclasses 1 value | language_score float64 0.65 1 | token_count int64 50 138k | score float64 1.5 5 | int_score int64 2 5 |
|---|---|---|---|---|---|---|---|---|---|
WHATEVER YOU DID UNTO ONE OF THE LEAST, YOU DID UNTO ME
|An address at the National Prayer Breakfast
(Sponsored by the
U.S. Senate and House of Representatives) February 3, 1994
On the last day, Jesus will say to those on His right hand, "Come, enter the Kingdom. For I was hungry and you gave me food, I was thirsty and you gave me drink, I was sick and you visited me." Then Jesus will turn to those on His left hand and say, "Depart from me because I was hungry and you did not feed me, I was thirsty and you did not give me to drink, I was sick and you did not visit me." These will ask Him, "When did we see You hungry, or thirsty or sick and did not come to Your help?" And Jesus will answer them, "Whatever you neglected to do unto one of these least of these, you neglected to do unto Me!"
As we have gathered here to pray together, I think it will be beautiful if we begin with a prayer that expresses very well what Jesus wants us to do for the least. St. Francis of Assisi understood very well these words of Jesus and His life is very well expressed by a prayer. And this prayer, which we say every day after Holy Communion, always surprises me very much, because it is very fitting for each one of us. And I always wonder whether 800 years ago when St. Francis lived, they had the same difficulties that we have today. I think that some of you already have this prayer of peace - so we will pray it together.
Let us thank God for the opportunity He has given us today to have come here to pray together. We have come here especially to pray for peace, joy and love. We are reminded that Jesus came to bring the good news to the poor. He had told us what is that good news when He said: "My peace I leave with you, My peace I give unto you." He came not to give the peace of the world which is only that we don't bother each other. He came to give the peace of heart which comes from loving - from doing good to others.
And God loved the world so much that He gave His son - it was a giving. God gave His son to the Virgin Mary, and what did she do with Him? As soon as Jesus came into Mary's life, immediately she went in haste to give that good news. And as she came into the house of her cousin, Elizabeth, Scripture tells us that the unborn child - the child in the womb of Elizabeth - leapt with joy. While still in the womb of Mary - Jesus brought peace to John the Baptist who leapt for joy in the womb of Elizabeth. The unborn was the first one to proclaim the coming of Christ.
And as if that were not enough, as if it were not enough that God the Son should become one of us and bring peace and joy while still in the womb of Mary, Jesus also died on the Cross to show that greater love. He died for you and for me, and for the leper and for that man dying of hunger and that naked person lying in the street, no only of Calcutta, but of Africa, and everywhere. Our Sisters serve these poor people in 105 countries throughout the world. Jesus insisted that we love one another as He loves each one of us. Jesus gave His life to love us and He tells us that we also have to give whatever it takes to do good to one another. And in the Gospel Jesus says very clearly: "Love as I have loved you."
Jesus died on the Cross because that is what it took for Him to do good to us - to save us from our selfishness in sin. He gave up everything to do the Father's will - to show us that we too must be willing to give up everything to do God's will - to love one another as He loves each of us. If we are not willing to give whatever it takes to do good to one another, sin is still in us. That is why we too must give to each other until it hurts.
It is not enough for us to say: "I love God," but I also have to love my neighbor. St. John says that you are a liar if you say you love God and you don't love your neighbor. How can you love God whom you do not see, if you do not love your neighbor whom you see, whom you touch, with whom you live? And so it is very important for us to realize that love, to be true, has to hurt. I must be willing to give whatever it takes not to harm other people and, in fact, to do good to them. This requires that I be willing to give until it hurts. Otherwise, there is not true love in me and I bring injustice, not peace, to those around me.
It hurt Jesus to love us. We have been created in His image for greater things, to love and to be loved. We must "put on Christ" as Scripture tells us. And so, we have been created to love as He loves us. Jesus makes Himself the hungry one, the naked one, the homeless one, the unwanted one, and He says, "You did it to Me." On the last day He will say to those on His right, "whatever you did to the least of these, you did to Me, and He will also say to those on His left, whatever you neglected to do for the least of these, you neglected to do it for Me."
When He was dying on the Cross, Jesus said, "I thirst." Jesus is thirsting for our love, and this is the thirst of everyone, poor and rich alike. We all thirst for the love of others, that they go out of their way to avoid harming us and to do good to us. This is the meaning of true love, to give
until it hurts.
I can never forget the experience I had in visiting a home where they kept all these old parents of sons and daughters who had just put them into an institution and forgotten them - maybe. I saw that in that home these old people had everything - good food, comfortable place, television, everything, but everyone was looking toward the door. And I did not see a single one with a smile on the face. I turned to Sister and I asked: "Why do these people who have every comfort here, why are they all looking toward the door? Why are they not smiling?"
I am so used to seeing the smiles on our people, even the dying ones smile. And Sister said: "This is the way it is nearly everyday. They are expecting, they are hoping that a son or daughter will come to visit them. They are hurt because they are forgotten." And see, this neglect to love brings spiritual poverty. Maybe in our own family we have somebody who is feeling lonely, who is feeling sick, who is feeling worried. Are we there? Are we willing to give until it hurts in order to be with our families, or do we put our own interests first? These are the questions we must ask ourselves, especially as we begin this year of the family. We must remember that love begins at home and we must also remember that 'the future of humanity passes through the family.'
I was surprised in the West to see so many young boys and girls given to drugs. And I tried to find out why. Why is it like that, when those in the West have so many more things than those in the East? And the answer was: 'Because there is no one in the family to receive them.' Our children depend on us for everything - their health, their nutrition, their security, their coming to know and love God. For all of this, they look to us with trust, hope and expectation. But often father and mother are so busy they have no time for their children, or perhaps they are not even married or have given up on their marriage. So their children go to the streets and get involved in drugs or other things. We are talking of love of the child, which is were love and peace must begin. These are the things that break peace.
But I feel that the greatest destroyer of peace today is abortion, because it is a war against the child, a direct killing of the innocent child, murder by the mother herself. And if we accept that a mother can kill even her own child, how can we tell other people not to kill one another? How do we persuade a woman not to have an abortion? As always, we must persuade her with love and we remind ourselves that love means to be willing to give until it hurts. Jesus gave even His life to love us. So, the mother who is thinking of abortion, should be helped to love, that is, to give until it hurts her plans, or her free time, to respect the life of her
child. The father of that child, whoever he is, must also give until it hurts.
By abortion, the mother does not learn to love, but kills even her own child to solve her problems. And, by abortion, that father is told that he does not have to take any responsibility at all for the child he has brought into the world. The father is likely to put other women into the same trouble. So abortion just leads to more abortion. Any country that accepts abortion is not teaching its people to love, but to use any violence to get what they want. This is why the greatest destroyer of love and peace is abortion.
Many people are very, very concerned with the children of India, with the children of Africa where quite a few die of hunger, and so on. Many people are also concerned about all the violence in this great country of the United States. These concerns are very good. But often these same people are not concerned with the millions who are being killed by the deliberate decision of their own mothers. And this is what is the greatest destroyer of peace today - abortion which brings people to such blindness.
And for this I appeal in India and I appeal everywhere - "Let us bring the child back." The child is God's gift to the family. Each child is created in the special image and likeness of God for greater things - to love and to be loved. In this year of the family we must bring the child back to the center of our care and concern. This is the only way that our world can survive because our children are the only hope for the future. As older people are called to God, only their children can take their places.
But what does God say to us? He says: "Even if a mother could forget her child, I will not forget you. I have carved you in the palm of my hand." We are carved in the palm of His hand; that unborn child has been carved in the hand of God from conception and is called by God to love and loved, not only now in this life, but forever. God can never forget us.
The beautiful gift God has given our congregation is to fight abortion by adoption. We have already, from our house in Calcutta, over 3,000 children adoption. And I can't tell you what joy, what love, what peace those children have brought into those families. It has been a real gift of God for them and for us. I remember one of the little ones was very sick, so I sent for the father and the mother and I asked them: "Please give me back the sick child. I will give you a healthy one." And the father looked at me and said, "Mother Teresa, take my life first than take the child." So beautiful to see it--so much love, so much joy that little one has brought
into that family. So pray for us that we continue this beautiful gift. And also I offer you--our Sisters are here--anybody who doesn't want the child, please give it to me. I want the child.
I will tell you something beautiful. We are fighting abortion by adoption - by care of the mother and adoption for her baby. We have saved thousands of lives. We have sent word to the clinics, to the hospitals and police stations: "Please don't destroy the child; we will take the child." So we always have someone tell the mothers in trouble: "Come, we will take care of you, we will get a home for your child." And we have a tremendous demand from couples who cannot have a child - but I never give a child to a couple who have done something not to have a child. Jesus said, "Anyone who receives a child in my name, receives me." By adopting a child, these couples receive Jesus but, by aborting a child, a couple refuses to receive Jesus.
Please don't kill the child. I want the child. Please give me the child. I am willing to accept any child who would be aborted and to give that child to a married couple who will love the child and be loved by the child. From our children's home in Calcutta alone, we have saved over 3000 children from abortion. These children have brought such love and joy to their adopting parents and have grown up so full of love and joy.
I know that couples have to plan their family and for that there is natural family planning. The way to plan the family is natural family planning, not contraception. In destroying the power of giving life, through contraception, a husband or wife is doing something to self. This turns the attention to self and so it destroys the gifts of love in him or her.In loving, the husband and wife must turn the attention to each other as happens in natural family planning, and not to self, as happens in contraception. Once that living love is destroyed by contraception, abortion follows very easily.
I also know that there are great problems in the world - that many spouses do not love each other enough to practice natural family planning. We cannot solve all the problems in the world, but let us never bring in the worst problem of all, and that is to destroy love. And this is whathappens when we tell people to practice contraception and abortion.
The poor are very great people. They can teach us so many beautiful things. Once one of them came to thank us for teaching her natural family planning and said: "You people who have practiced chastity, you are the best people to teach us natural family planning because it is nothing more than self-control out of love for each other." And what this poor person said is very true. These poor people maybe have nothing to eat, maybe they have not a home to live in, but they can still be great people when they are spiritually rich.
When I pick up a person from the street, hungry, I give him a plate of rice, a piece of bread. But a person who is shut out, who feels unwanted, unloved, terrified, the person who has been thrown out of society - that spiritual poverty is much harder to overcome. And abortion, which often follows from contraception, brings a people to be spiritually poor, andthat is the worst poverty and the most difficult to overcome.
Those who are materially poor can be very wonderful people. One evening we went out and we picked up four people from the street. And one of them was in a most terrible condition. I told the Sisters: "You take care of the other three; I will take care of the one who looks worse." So I did for her all that my love can do. I put her in bed, and there was such a beautiful smile on her face. She took hold of my hand, as she said one word only: "thank you" - and she died.
I could not help but examine my conscience before her. And I asked: "What would I say if I were in her place?" And my answer was very simple. I would have tried to draw a little attention to myself. I would have said: "I am hungry, I am dying, I am cold, I am in pain," or something. But she gave me much more - she gave me her grateful love. And she died with a smile on her face. Then there was the man we picked up from the drain, half eaten by worms and, after we had brought him to the home, he only said, "I have lived like an animal in the street, but I am going to die as an angel, loved and cared for." Then, after we had removed all the worms from his body, all he said, with a big smile, was: "Sister, I am going home to God" - and he died. It was so wonderful to see the greatness of that man who could speak like that without blaming anybody, without comparing anything. Like an angel - this is the greatness of people who are spiritually rich even when they are materially poor.
We are not social workers. We may be doing social work in the eyes of some people, but we must be contemplatives in the heart of the world. For we must bring that presence of God into your family, for the family that prays together, stays together. There is so much hatred, so much misery, and we with our prayer, with our sacrifice, are beginning at home. Love begins at home, and it is not how much we do, but how much love we put into what we do.
If we are contemplatives in the heart of the world with all its problems, these problems can never discourage us. We must always remember what God ells us in Scripture: "Even if a mother could forget the child in her womb" - something impossible, but even if she could forget - "I will never forget you."
And so here I am talking with you. I want you to find the poor here, right in your own home first. And begin love there. Be that good news to your own people first. And find out about your next-door neighbors. Do you know who they are?
I had the most extraordinary experience of love of neighbor with a Hindu family. A gentleman came to our house and said: "Mother Teresa, there is a family who have not eaten for so long. Do something." So I took some rice and went there immediately. And I saw the children - their eyes shining with hunger. I don't know if you have ever seen hunger. But I have seen it very often. And the mother of the family took the rice I gave her and went out. When she came back, I asked her: "Where did you go? What did you do?" And she gave me a very simple answer: "They are hungry also." What struck me was that she knew - and who are they? A Muslim family - and she knew. I didn't bring any more rice that evening because I wanted them, Hindus and Muslims, to enjoy the joy of sharing.
But there were those children, radiating joy, sharing the joy and peace with their mother because she had the love to give until it hurts. And you see this is where love begins - at home in the family.
So, as the example of this family shows, God will never forget us and there is something you and I can always do. We can keep the joy of loving Jesus in our hearts, and share that joy with all we come in contact with. Let us make that one point - that no child will be unwanted, unloved, uncared for, or killed and thrown away. And give until it hurts - with a smile.
As you know, we have a number of homes here in the United States, where people need tender love and care. This is the joy of sharing. Come and share. We have the young people suffering with AIDS. They need that tender love and care. But such beautiful--I've never yet seen a young man or anybody displeased or angy or frightened, really going home to God. Such a beautiful smile, always. So let us pray that we have the gift of sharing the joy with others and giving until it hurts.
Because I talk so much of giving with a smile, once a professor from the United States asked me: "Are you married?" And I said: "Yes, and I find it sometimes very difficult to smile at my spouse, Jesus, because He can be very demanding - sometimes." This is really something true. And this is where love comes in - when it is demanding, and yet we can give it with joy.
One of the most demanding things for me is travelling everywhere - and withnpublicity. I have said to Jesus that if I don't go to heaven for anything else, I will be going to heaven for all the travelling with all the publicity, because it has purified me and sacrificed me and made me really ready to go home to God.
If we remember that God loves us, and that we can love others as He loves us, then America can become a sign of peace for the world. From here, a sign of care for the weakest of the weak - the unborn child - must go out to the world. If you become a burning light of justice and peace in the world, then really you will be true to what the founders of this country stood for.
Let us love one another as God loves each one of us. And where does this love begin? In our own home. How does it begin? By praying together Prayer for us that we continue God's work with great love. The sisters, the brothers, and the fathers and the lay missionaries of Charity and co-workers: we are all one heart full of love, that we may bring that joy of love everywhere we go. And my prayer for you is that through this love for one another, for this peace and joy in the family, that you may grow in holiness. Holiness is not the luxury of the few; it is a simply duty, for you and for me, because Jesus has very clearly stated, "Be ye holy as my father in heaven is holy." So let us pray for each other that we grow in love for each other, and through this love become holy as Jesus wants us to be for he died out of love for us.
One day I met a lady who was dying of cancer in a most terrible condition. And I told her, I say, "You know, this terrible pain is only the kiss of Jesus--a sign that you have come so close to Jesus on the cross that he can kiss you." And she joined her hands together and said, "Mother Teresa, please tell Jesus to stop kissing me."
So pray for us that we continue God's work with great love and I will pray for you, for all your families. And also I want to thank the families who have been so generous in giving their daughters to us to consecrate their life to Jesus by the vow of poverty, chastity, obedience, and by giving wholehearted free service to the poorest of the poor. This is our fourth vow in our congregation. And we have a novitiate in San Francisco where we have many beautiful vocations who are wanting to give their whole life to Jesus in the service of the poorest of the poor.
So once more I thank you for giving you children to God. And pray for us that we continue God's work with great love.
God bless you all!
NEWS - FAITH - TELEVISION - RADIO - LIBRARY - GALLERY - GENERAL- ESPAŅOL | <urn:uuid:87bd2e5b-01ef-4240-9af1-e094ce443964> | CC-MAIN-2016-44 | http://ewtn.com/New_library/breakfast.htm | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720737.84/warc/CC-MAIN-20161020183840-00219-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.984204 | 4,842 | 2.03125 | 2 |
MSPs have supported increased penalties for the worst animal cruelty cases.
And Finn’s Law will also give new legal protections for service animals such as police dogs and horses, removing a legal defence of self-defence for attacks on service animals in the course of their duties.
The Animals and Wildlife (Scotland) Bill will increase the maximum penalty for the worst animal cruelty crimes to five years imprisonment and an unlimited fine.
Emergency Services Day: 999 crews take over Falkirk High Street
Rosebank: 31 Year Old Lowland single malt from original Falkirk distillery casks on sale for £1800
Falkirk 80s rockers reform to play first gig in 36 years
Bosses confirm Falkirk shoe shop closure
Resurfacing work leads to road closures in Grangemouth
Animal welfare enforcement agencies will also be given innovative new powers, allowing animals taken into their care to be quickly rehomed – without the need for a court order.
Mairi Gougeon, Rural Affairs Minister, said: “This Bill is an important milestone in Scotland’s long tradition of protecting our animals and wildlife.
“The increased maximum available penalties reflect the seriousness of some of the very cruel crimes seen against domestic and wild animals, although these cases are, thankfully, rare.
“Finn’s Law, named after a police dog brutally injured in the course of its duties, recognises the important role service animals play in protecting us in sometimes very difficult circumstances.
“The Bill also provides new powers, described as ‘transformative’ by the SSPCA, that will allow animal welfare enforcement agencies to quickly rehome animals in their care.”
The Scottish Society for the Prevention of Cruelty to Animals welcomed the government’s decision.
Scotland’s animal welfare charity, which is reponsible for investigating animal cruelty and rehoming animals seized on welfare grounds, said the law will be game-changing for both animals and the organisation.
The Bill will increase the maximum sentence for the worst animal cruelty or wildlife crime offences from one year to five and/or an unlimited fine.
Kirsteen Campbell, SSPCA chief executive, said: “It is a momentous day for animal welfare in Scotland.
“The proposals, which will be enshrined in law, will deliver wholesale, transformational change for animals nationwide.
“Every day the SSPCA experiences first hand how existing legislation can fail animals and we’ve long campaigned for many of the reforms in this Bill.
“The inconsistency of sentences handed out to those guilty of animal cruelty has long been a frustration.
“We are hopeful increased sentencing and unlimited fines will act as a greater deterrent to people in mistreating animals and ensure the punishments befit the crime for the worst offences, such as animal fighting and puppy farming.”
The Bill will also remove the need for the SSPCA to obtain a court order to rehome an animal involved in legal proceedings which has not been signed over in to its care.
In 2019, the society spent more than £650,000 providing refuge to animals caught up in such situations.
On average, these animals spent 203 days in the charity’s care. Under the new law, these animals could be rehomed after three weeks, subject to veterinary advice.
Kirsteen said: “At the moment, any animal involved in legal proceedings cannot be rehomed unless it is signed over in to our care or we obtain a court order.
“On average, an animal caught up in such a situation spent 203 days – almost seven months – in one of our rescue centres before being rehomed. Now, we’ll be able to rehome these animals within weeks.
“This will free up space in our centres for more animals in need. We have spent more than £2.1 million providing refuge to these animals since 2016 so this will bring us signficant cost savings.
“Most importantly it is in the best interests of every single animal we are able to rehome faster because, despite the first class care and attention of our great team, a rescue centre is not a long-term substitute for a loving home.”
An independently-chaired taskforce will also start work this summer to consider whether the SSPCA should be given extra powers to investigate wildlife crime, following a Scottish Government commitment on the issue during Parliament’s consideration of the Bill.
Kirsteen added: “We welcome the Scottish Government’s pledge to set-up an independent taskforce to explore the potential to extend our powers to allow us to investigate wildlife crime.
“We have a nationwide network of inspectors with the expertise to do this who would gladly take up the opportunity to help even more animals.
“We also welcome the commitment to commission research into empathy training as part of restorative justice and look forward to being part of this inititiave.”
Opposing views on protection of mountain hares
A late amendment to the Bill means a licensing system will be introduced for the killing of mountain hares.
Scottish Green MSP Alison Johnstone lodged Amendment 30 last week and it was supported by the government.
This means that, once the Bill passes into law, it will be an offence intentionally or recklessly to kill, injure or take a mountain hare without a specific licence.
The move has been met with opposing views from a range of organisations in Scotland.
Kirsteen Campbell, chief executive of the SSPCA, said: “The only circumstances under which the SSPCA will accept mass killing or culls of any species is when it is in the interests of the wider health of the species or a serious threat to human health or safety.
“Bloodsport is no excuse for the widespread slaughter of any animal and that includes those who slaughter mountain hares to boost estate income.”
Bob Elliot, director of OneKind animal protection charity, agreed, saying: “The upsurge in public support has been momentous. OneKind is delighted to see a successful conclusion to one of our most heartfelt campaigns.”
However, not everyone has welcomed the decision.
Alex Hogg, chairman of The Scottish Gamekeepers Association, said: “A grave mistake has been made.
“This is a bad law, made by people it will not impact upon.
“There will be no satisfaction in turning around in a few years and saying: ‘we told you so’.”
And Sarah-Jane Laing, chief executive of Scottish Land and Estates, said: “We are extremely disappointed that the Scottish Parliament has voted for sweeping changes to regulations covering the control of mountain hares.
“Mountain hares are thriving on Scotland’s moors and their fate will not be improved by this vote.
“There is clear evidence the control of hares helps combat Lyme disease and protects plants and young trees.
“Balanced wildlife management is key to meeting Scottish Government targets on tree planting. It is disappointing that this seems to have been disregarded.” | <urn:uuid:d9001124-d8e4-489c-bee0-3b95f2b84b52> | CC-MAIN-2022-33 | https://www.falkirkherald.co.uk/news/crime/scotland-to-introduce-five-year-jail-term-for-animal-cruelty-2890311 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00669.warc.gz | en | 0.939394 | 1,513 | 1.828125 | 2 |
Ring Joint Gasket (RTJ) Asme B16.20 in Pipe high pressure and high temperature wellhead according to API 6a asme16.20
Ring joint gaskets come in two basic types, an oval cross section and an octagonal cross section. These basic shapes are used in pressures up to 10,000 psi (64 MPa). The dimensions are standard- ized and require specially grooved flanges. The octagonal cross section has a higher sealing efficiency than the oval and would be the preferred gasket. However, only the oval cross section can be used in the old type round bottom groove. The newer flat bottom groove design will accept either the oval or the octagonal cross section. The sealing surfaces on the ring joint grooves must be smoothly finished to 63 micro inches and be free of objectionable ridges, tool or chatter marks. RTJ assemblies seal by an initial line contact or an edging action as the compressive forces are applied. The hardness of the ring should always be less than the hardness of the flanges to prevent flange deformation. Dimensions for standard ring joint gaskets and grooves are covered in ASME B16.20 and API 6A, API 17D and ASME B16.5/B16.20.
we supplies ring joint gaskets (RTJ Gasket) with the hardness numbers as follows:
||-60 to +400 °C
|Low carbon steel
||-40 to +500°C
|4%-6% Cr ½% Mo:F5
||-125 to +500°C
|Stainless steel 304/304L
||-250 to +650°C
||S304 or 304L
|Stainless steel 316/316L
||-196 to +800°C
||S316 or 316L
|Stainless steel 321
||-250 to +870°C
|Stainless steel 347
||-250 to +870°C
|Stainless steel 410
||-20 to +500°C
We specializes in ring joint gasket, including ring gasket in R, RX, BX, IX types, lens gasket, weld ring gasket and bonnet gasket(according to client's drawing). The metal gasket designed for use in high pressure, high temperature application necessitated the need for a high integrity seal. Our products are widely used in flat gate valve, Christmas tree, pipeline fittings, flange, high pressure vessel, oil &gas industry, wellhead assembly, petrochemical industry and the like.
We can offer more than 30 kinds of materials, such as 321SS, 347SS, 316SS, 304SS, Inconel 625, Monel 400, INCOLY 825, Nickel 200, Duplex F44, soft iron, low carbon steel and so on. We could produce the maximum outside diameter is 2500mm. We have over 10 years experience in export business. Our products are sold to Southeast Asia, Middle East, Europe and America and well appreciated by our clients.
Programming interface ring Joint gaskets come in two fundamental sorts, an oval cross segment and an octagonal cross segment. These essential shapes are utilized in pressures up to 10,000 Rubber Seals and Gasket. The measurements are institutionalized and require uniquely notched spines. The octagonal cross segment has a higher fixing proficiency than the oval and would be the favored gasket. Be that as it may, just the oval cross segment can be utilized in the old sort round base notch. The more up to date level base furrow configuration will acknowledge either the oval or the octagonal cross segment. The fixing surfaces on the ring joint sections must be easily completed to 63 smaller scale inches and to be liberated from shocking edges, apparatus or babble marks. They seal by an underlying line contact or an edging activity as the compressive powers are applied.
There’s a variety of material can be selected for a ring gasket according to a different application.
Check as below:
Soft Iron, Low Carbon Steel, Stainless Steel 304, Stainless Steel 304L, Stainless Steel 316, Stainless Steel 316L, Stainless Steel 321, Stainless Steel 347, Stainless Steel 410, Aluminum, Copper, Brass, Nickel 200, Monel 400, Inconel 600, Hastelloy B2, Titanium (see more information in our products catalog)
Ring joint gaskets are widely used in refinery, petrochemical and oil field drilling industries. and the rings are generally used for high pressure and high-temperature applications.
Q: Are you trading company or manufacturer ?
A: We are a professional production enterprise
Q: How long is your delivery time?
A: Generally it is 7-15 days for stock delivery, and 15-30 days for manufacturing goods , but it depands on the quantity.
Q: Do you provide samples ? is it free or extra ?
A: Yes, we can provide you sample, but you need to pay for the sample and freight firstly.We will return the fee after you make an order.
Q: What is your terms of payment ?
A: Payment<=1000USD, 100% in advance. Payment>=1000USD, 30% T/T in advance ,balance before shippment.
Q:How can we trust you to make a guaranteed deal?
A:We can trade through alibaba credit guarantee orders, which will fully guarantee the effective rights and interests of buyers and sellers.
A:For inner box and master carton are made as per international standards,and we can make special designed for you if need.
If you have another question, pls feel free to contact us. | <urn:uuid:15e6818e-f34d-4593-96f9-037b40e0d19a> | CC-MAIN-2022-33 | https://www.ringjoint-gasket.com/sale-13320775-oval-asme-b16-20-hb120-ring-type-gasket.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00267.warc.gz | en | 0.864268 | 1,385 | 1.851563 | 2 |
Career in the Microbio Sciences
clarosa at biocomp.unl.edu
Fri Feb 18 22:25:07 EST 2000
> Many of the posts point out that the future is hard to predict, and that
> trends in all careers are moving toward the need for continuous retraining.
> The tmost important part of training in a good PhD program is more about
> learning flexible thinking than it is in mastering a particular biological
.Jim Hu suggest that flexible thinking and the ability to keep retraining will
help a PhD survive, but I doubt it. There is this very real phenomenon of age
discrimination which occurs in many fields particularly computer programming and
biological science. A guy may be perfectly able and willing to retrain to get on
board the latest science fad. However, in the real world corporations and
universities do not foster retraining or hire guys who retrain themselves.
They just fire or let contracts expire older professionals and hire that latest
crop of cheaper, (no pension liability) HB-1s, new grads what have you. Over 35
need not apply. Furthermore when that cohort of old professors retire what will
happen is that departments will close about half the positions, or change them to
the next fad...i.e . functional genomics, bioinformatics .
More information about the Microbio | <urn:uuid:7e77e298-bba3-4226-aa99-94d270f01fec> | CC-MAIN-2017-04 | http://www.bio.net/bionet/mm/microbio/2000-February/017717.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284405.58/warc/CC-MAIN-20170116095124-00038-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.917794 | 292 | 1.59375 | 2 |
MARKED FOR DEATH: ISLAM’S WAR AGAINST THE WEST AND ME
By Geert Wilders
Regnery, $27.95, 217 pages
Dutch parliamentarian Geert Wilders has strong views on Islam and its growing influence in the West. In “Marked for Death,” he has penned a powerful book about his political odyssey in the Netherlands, where his Party for Freedom is the third-largest. His book places his personal saga in the context of broader events involving the political ideology of Islam.
In 2004, on a street in Amsterdam, Dutch filmmaker Theo van Gogh was brutally murdered by a Muslim of Moroccan descent. Van Gogh had collaborated with a Somali emigrant, Ayaan Hirsi Ali, to produce the film “Submission,” about the “abuse of women in Islam.”
Incredibly, Dutch political leaders reacted to the murder by suggesting that Islam’s critics should be penalized for “insults and blasphemy.” Meanwhile, van Gogh’s killer had impaled on his victim’s chest an “open letter” threatening death to Mr. Wilders and Ms. Ali, whose politics had put them on extremists’ “kill” lists. Two days after the murder, both were whisked into hiding by police because of “imminent threats” of assassination.
Ever since, Mr. Wilders and his wife have been living in “safe houses,” under guard around the clock. Mr. Wilders never goes anywhere without his government-assigned security contingent. While he was in Rome to receive the Oriana Fallaci Free Speech Award in 2009, a colleague counted 35 policemen guarding the door when Mr. Wilders went to the restroom. He jokes that it was “the best-protected pee” of his life, but the routine he endures because so many Islamists want to kill him is hardly a laughing matter.
Mr. Wilders is a student of Islam. His overview of its origins and doctrine will be familiar in part to readers of such books as Bernard Lewis’ “The Crisis of Islam,” Lawrence Wright’s “The Looming Tower” and George Weigel’s “Faith, Reason, and the War Against Jihadism.” He also offers carefully supported discussions of assorted Islamic practices, such as slavery, that are not as well-documented in these other works. Slavery continues today; having been approved by Muhammad, it cannot be repudiated.
Mr. Wilders draws effectively on the history of Islam to illuminate current events. Thus, he recounts the hijra,or migration, of Muhammad and his followers to Yathrib in the year 622. Taking advantage of its welcome and tolerance, Muhammad proceeded to overthrow the city from within. What was Yathrib became Medina, and there Islam’s first mosque was Muhammad’s “propaganda center, the headquarters of his state … and the barracks of his jihad.”
For Mr. Wilders, Yathrib is the model for the offensive via immigration, or “migration,” that Islam has undertaken against the West almost 1,400 years later. Mr. Wilders also points to Medina’s first mosque as the “prototype” for mosques throughout the West, “primarily a political institution, not a place of worship.”
Mr. Wilders recounts the reaction that greeted his short film “Fitna,”produced to illustrate that “the Koran advocates violence.” He was prosecuted under Dutch hate-speech laws for “group insult” and “incitement” of “hatred” and “discrimination.” Although he was acquitted ultimately, Mr. Wilders’ tale on this topic is sobering, for it shows how “lawfare” can be used to chill unwelcome speech.
More recently, there are indications the Dutch government has moved in a better direction. After his acquittal in the trial over “Fitna,” the Organization of Islamic Cooperation issued a condemnation of Mr. Wilders clearly aimed at intimidating Western governments and politicians. In July 2011, the Dutch government denounced the OIC, refusing “to silence a politician” and reaffirming its “very high regard of freedom of speech.”
Despite difficulties, Mr. Wilders and his Party for Freedom have gained in power and influence. Through a coalition agreement with the two larger parties, proposals have emerged: to crack down on crime (many Muslim immigrants view criminal activity as fulfilling their religious duty of jihad); reduce welfare dependency (non-Western immigrants make up 11 percent of the Dutch population but 44 percent of welfare recipients; many Muslims think they should receive welfare payments as tribute, or jizya, from infidels); abolish affirmative-action programs that discriminate in favor of immigrants; strengthen naturalization requirements regarding language, good conduct and financial resources; and expel illegal immigrants.
In large part because of the courage of Geert Wilders and a handful of others, the Netherlands has begun to confront the damage wrought by Muslim migration and the politics of appeasement that for so long have characterized the West’s reaction to the claims of alleged victims of all stripes. As Mr. Wilders puts it, “The Islamic tide is strong, but the West has repulsed it before, and we can do it again.”
For the millions of tolerant citizens of the West, Mr. Wilders’ message can be captured by paraphrasing what Pericles said to the Athenians about politics: You may not be interested in Islam, but Islam is interested in you. So pay attention. And read this book.
Ray Hartwell, a Navy veteran and a Washington lawyer, is a trustee emeritus of Washington and Lee University.
Copyright © 2017 The Washington Times, LLC. | <urn:uuid:3fbbd777-eca5-498a-b623-86f7f35f5c95> | CC-MAIN-2017-04 | http://m.washingtontimes.com/news/2012/jun/13/how-free-speech-led-to-jihad/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00155-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.967772 | 1,234 | 1.539063 | 2 |
In our quest to prevent skin cancer and wrinkles by wearing hats, daily sunscreen and sitting in the shade we have caused Vitamin D deficiency in our children and adults. Adequate levels of Vitamin D are essential for the proper development of bones and to absorb calcium from our diet. Low levels of Vitamin D or Vitamin D Deficiency has been linked to: depression, propensity to gain weight, cognitive decline, heart disease and stroke, colon cancer and breast cancer. How can we insure that we are getting enough of this “sun vitamin” to enhance our overall health.
The number one way to get Vitamin D is from the sun! For a fair-skin person this means 15 minutes in the sun without sunscreen. Individuals with darker pigment may require more time in the sun to receive this benefit.
Examples of dietary sources that include vitamin D are:
Fatty fish, like 3 ounces of Salmon contain 600-700 IU of Vitamin D
1 cup of milk-120 IU of Vitamin D
1 egg-40 IU of Vitamin D
If your diet is lacking or if you live in areas where the sun doesn’t shine year round like in Sunny Southern California you can take a supplement. Most supplements contain the active form of Vitamin D called D3
Infants<1 year: 400 IU
Children and adults from age 1-70:600 IU
Adults over the age of 71:800IU
Vitamin D levels can be checked by a simple blood test which measures the amount of Vitamin D in the blood called 25-hydroxy Vitamin D.
Deficiency is <10 ng/ml
You cannot get Vitamin D toxic from the sun, the body regulates how much Vitamin D it can absorb at one time. | <urn:uuid:2672d622-deb4-4286-89e7-d97ab8097ff9> | CC-MAIN-2022-33 | https://laobgyns.com/are-you-getting-enough-vitamin-d/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00070.warc.gz | en | 0.892006 | 373 | 3.3125 | 3 |
January is Human Trafficking Prevention Month and we dive into the details of human trafficking and related criminal activity with expert Janet Jensen, founder of The Jensen Project. Through a unique partnership focused on no-cost civil legal representation for women who experience violence from an intimate partner, Genesis Women’s Shelter & Support and The Jensen Project serve the most pressing legal needs of survivors. Together we explore the intersection of domestic violence and human trafficking as well as the possibilities and limitations of legislation in this area. By allowing survivor voices to shape our work, Genesis and The Jensen Project are advancing the legal rights of women and children in Texas, a state that ranks #2 on the list of states in the U.S. with the highest number of reported human trafficking cases. This episode discusses human trafficking, human slavery, sexual assault, and domestic violence. | <urn:uuid:4793161d-2af9-47f0-9028-18d07de68580> | CC-MAIN-2022-33 | https://www.buzzsprout.com/1831684/9920749 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00275.warc.gz | en | 0.928029 | 167 | 1.726563 | 2 |
Known for its ’31 flavors’ motto, with the premise that a client might enjoy a different flavor every day of any month, the brand has become synonymous with frozen yogurt.
How many flavors of ice cream does Baskin-Robbins have?
The combination of the two businesses resulted in the creation of Baskin-Robbins, which went on to become a world-renowned ice cream shop and popularized the tagline ’31 flavors.’
What are the 31 Baskin-Robbins flavors?
Baskin-Robbins 31 Flavors That Are Unique
- Banana Nut Fudge
- Black Cherry
- Black Walnut
- Burgundy Cherry
- Butter Pecan
- Butterscotch Ribbon
- Chocolate Almond
- Banana Nut Fudge
- Banana Nu
What flavors of ice cream does Baskin-Robbins sell?
Flavors for Ice Cream
- Oreo® ‘N Chocolate Ice Cream.
- America’s Birthday Cake® Ice Cream.
- Baseball Nut® Ice Cream.
- Black Walnut Ice Cream.
- CLASSIC. Cherries Jubilee Ice Cream.
- Chocolate Almond Ice Cream.
- CLASSIC. Chocolate Chip Cookie Dough Ice Cream.
Why is it called 31 flavors?
Known for its ’31 flavors’ motto, with the premise that a client might enjoy a different flavor every day of any month, the brand has become synonymous with frozen yogurt. It was coined in 1953 by the Carson-Roberts advertising agency (which eventually joined with Ogilvy Mather) to promote their products.
What are the top 5 flavors of ice cream?
Top 5 ice cream flavors to try this summer
- Ice cream in the flavor of chocolate. It should come as no surprise that chocolate is the most popular ice cream flavor in the United States. Other popular flavors include vanilla, strawberry, mint chocolate chip, and butter pecan ice cream.
What are the 32 flavors of ice cream?
Ice Cream in 32 Different Flavors:
- Almond Joy
- Black Raspberry Chip
- Bubble Gum
- Butter Pecan
- Cherry Vanilla
- Chocolate Chip
- Almond Joy
What are the top 3 ice cream flavors?
The most popular flavor among adults in the United States is a classic: chocolate ice cream. This is the flavor that nearly one in every five Americans (17 percent) considers to be their favorite. Also a popular option, vanilla (15 percent) comes in first place, ahead of strawberry (8 percent), mint chocolate chip (8 percent), butter pecan (8 percent), chocolate chip cookie dough (6 percent), and cookies n’ crème (four percent) in the poll (6 percent ).
What are the 10 most popular ice cream flavors?
The Top 10 Ice Cream Flavors in the United States
- Vanilla. Vanilla is the most popular taste in America for a reason: it’s easy and works with everything.
- Chocolate is a
nother popular flavor. Chocolate is a popular choice since, like vanilla, it can be used in a variety of dishes. cookies cream, mint chocolate chip cookies, chocolate chip cookie dough, buttered pecan cookies, birthday cake with strawberries, mint chocolate chip cookies, mint chocolate chip cookies
What flavor is Baskin-Robbins slime?
It’s a winning combination that will make your day brighter. This tangy and delicious citrus scoop is tied together with a lemon-lime slime ribbon, which adds a hint of acidity. Do you want to take your scoop game to the next level?
What is the new flavor at Baskin-Robbins?
Baskin-Robbins introduces the new Sweet and Savory Mangonada, which delivers real bold flavor. As part of their celebration of this famous Mexican beverage, Baskin-Robbins has scooped up the new Watermelon Swirl Sorbet as the April Flavor of the Month.
Does Dunkin Donuts own Baskin-Robbins?
Sonic and Buffalo Wild Wings are now controlled by the same corporation that controls Dunkin’ Donuts and Baskin-Robbins. Doughnut and Baskin-Robbins are now owned by the same corporation that controls Arby’s, Buffalo Wild Wings, Jimmy John’s, and Sonic restaurants. It was announced today that Inspire Brands has finalized its acquisition of Dunkin’ Brands for $11.3 billion in cash.
What is the healthiest ice cream at Baskin-Robbins?
The number of calories you consume will vary based on the type of ice cream you choose. Keep calories and added sugar to a minimum by choosing nonfat vanilla frozen yogurt or plainer varieties that don’t contain extras such as nuts, chocolate, and other treats. You’re better off sticking with the tried-and-true vanilla, chocolate, or strawberry flavors.
Why is Baskin Robbins ice cream so expensive?
When there is a limited supply and a strong demand, Baskin-Robbins understands that it is possible for them to charge a higher price. These businesses are cognizant of the fact that individuals will pay more money to get ice cream and other treats that are not available at their local grocery store.
Is Baskin-Robbins real ice cream?
Only a few firms in the market, such as Amul, Mother Dairy, Hatsun Agro Food Ltd, and Havmor, provide ice cream, while others, such as Kwality Walls (Hindustan Unilever), specialize on frozen desserts rather than ice cream. Ice cream is available from international brands such as Haagen Dazs, Movenpick (Nestle), Swensen’s, and Baskin-Robbins, among others. | <urn:uuid:9f416889-ff0a-4ee4-abf8-6fcf24db8174> | CC-MAIN-2022-33 | https://www.thesweetspotcleveland.com/ice-cream/how-many-ice-cream-flavors-does-baskin-robbins-have.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00479.warc.gz | en | 0.906402 | 1,240 | 1.546875 | 2 |
Laura N. Gasaway*
Librarians share many values with creators and publishers of copyrighted works, but their interests and values sometimes conflict. Additionally, the core values of each group sometimes conflict with the goals of copyright law. While these conflicts have existed for centuries, they are escalating in the rapidly expanding digital environment, and the debate between the two groups is becoming increasingly acrimonious. Members of both groups often misunderstand copyright law and engage in overstatement, sometimes fairly gross overstatement.
Librarians and content providers share a great many core values, and work symbiotically to promote common goals. Without publishers and producers, librarians would have little to offer their users because there would be no works of literature, no reference works, no videotapes and no databases. Without librarians, publishers would lack a valuable resource to make their works available, to publicize their works, to teach patrons how to use their works, and to preserve their works for posterity. Librarians, publishers, and producers share many core values about works of literature, the value of these works, and the importance of preserving them for future generations. Although librarians and authors often disagree on issues involving digital media, both parties realize the importance and value of information to people in the digital age, and both believe that information should be trustworthy and incorruptible. Both groups believe that publishers play a valuable role in making available to the public works containing information. The editorial work, the management of the peer reviewing process, and the distribution role played by publishers is crucial to the production of quality works, and both groups believe that publishers should be fairly compensated for these contributions.
Despite sharing many common goals and values, significant disagreement exists between librarians and content producers and publishers. Librarians tend to view information as a necessary public good, such as food, shelter, and warmth; that should be made available at a reasonable cost. Commercial producers and publishers of copyrighted works, however, tend to view their works as private property that can be commercialized. Thus, the economic goals of producers and publishers often conflict with the social goals of librarians. From the perspective of the librarian community, publishers often appear to maximize profits at the expense of research and scholarship. Librarians, however, are less concerned about profit than they are about what they view as the higher-minded goal of providing high quality information to people. Conflicting values make it difficult for these groups to compromise and negotiate with each other, and each feels that its existence is somehow threatened by the other. The core value conflicts also negatively impact the debate about what role copyright law should play in resolving competing interests between publishers and librarians. This fundamental distinction between the way creators and publishers, on one hand, and librarians, on the other hand, view and value information has existed as long as public libraries have, but it has not prevented the two groups from working together in the past to create and distribute information. The evolution of the digital world, however, highlights these opposing values and appears to exacerbate the differences.
Popular sentiment sometimes supports the values of content providers and sometimes supports the librarians' values. For example, American society admires and supports capitalistic notions of developing products and then selling them to maximize profits for the entity or individuals who paid for the development and production of that product. Naturally, this position supports the views of the publishers and producers of copyrighted works. On the other hand, society also believes that public access to information and the existence of free public libraries is important - or even essential - in a democratic society. This supports the librarians' values.
The Constitution acknowledges the competing interests between these groups in the Copyright Clause: "The Congress shall have Power ... To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.” By "Science" the Framers meant all disciplines of learning, and thus promoting learning is a goal of copyright. Content providers view the Constitution's Copyright Clause as ensuring protection for their works and focus on the "exclusive Right," while librarians focus on the social good of promoting learning among the public and focus on the mandate to "promote the Progress of Science." The delicate balance between competing interests called for by the Constitution, however, may now be at risk, according to at least one commentator:
As a librarian, I certainly know much more about librarians' values than I do about publishers and producers' values, but I am also a teacher of intellectual property law, and I recognize that both groups have important goals and missions. In discussing the values of the two groups, I do not mean at all to imply that right and wrong values exist. When one is discussing values, there is no right or wrong, but only differences. Additionally, I run the risk of over--generalizing when ascribing values to each group. Clearly, not all librarians have adopted the values I assign to them.If copyright is cast too narrowly, authors may have inadequate incentives to produce and disseminate creative works or may be unduly dependent on the support of state or elite patrons. If copyright extends too broadly, copyright owners will be able to exert censorial control over critical uses of existing works or may extract monopoly rents for access, thereby chilling discourse and cultural development.
Although both groups clearly have values in addition to the ones identified here, this article is limited to a discussion of the primary values that relate to copyright. The core values of authors and publishers that relate to copyright include: (1) compensation for the creation and production of their works; (2) ability to control their works; (3) authentication and recognition of their works; (4) broad marketing of their works; (5) promoting strong intellectual property rights; and (6) viewing, the fair use doctrine as an affirmative defense to copyright infringement. Librarians' core values regarding copyright law include: (1) recognition of public libraries as educational institutions; (2) providing information to the people; (3) providing information on all sides of an issue; (4) promotion of the rights of users of copyrighted works; (5) ability to identify and locate information, (6) recognition of the importance of the public domain as a repository of information; and (7) viewing the fair use doctrine as a right of a person to use a copyrighted work. Societal values relating to libraries, publishers and producers and copyright include: (1) the importance of an educated population; (2) support for entrepreneurship; (3) access to public libraries; (4) the importance of the public domain; and (5) public access to information.
Value differences clearly have affected discussions and negotiations regarding copyright. Since the early 1990s, disagreements between publishers and librarians have seemed increasingly acrimonious to me, and I began to wonder why. What has changed to increase the decibel level in the debate? There may be no easy answer, but, at least in part, conflicting values contribute to the disagreement and create a siege mentality on both sides. Likewise, there may be no simple solution to the disagreements that will soothe the debate between librarians and copyright holders. By recognizing the depth and strength of these values, perhaps the parties can avoid causing further schisms and entrenchment in positions that prevent agreements to solve problems conjointly.
I. CONTRASTING CORE VALUES
A. PUBLISHERS AND PRODUCERS OF COPYRIGHTED WORKS
Publishers and producers are not all alike. Similarities exist among the various types of copyright holders, but their interests are not all the same. Music copyright holders differ from traditional print publishers; videogame owners differ from photographers. Moreover, even within a class of copyright holders, differences may exist. For example, traditional publishers may operate for-profit or as a nonprofit organization, such as a society or professional association. A common goal of all publishers and producers is making their works available to the public, and doing so now requires using both traditional media and recently created digital media to distribute their works. It is evident, however, that something has changed due to the growing presence of digital distribution technology, which makes copying much easier and cheaper, so that core values of the copyright holder community are threatened regardless of whether the copyright holders operate as commercial or nonprofit entities. This threat implicates another stated goal of publishers - to encourage and promote strong intellectual property rights worldwide.
The right to control reproduction is said to be the hallmark of copyright, and copyright entrepreneurs expect to be compensated when their works are reproduced. Reproduction is more common and easier to achieve in the digital world than in the analog world, especially if one considers transient copies made by computers. When libraries reproduce copies and give them away, publishers believe that they should be compensated for the copies. This expectation is not new in the digital environment. Authors have been aware for many years that libraries make reproductions, but have generally tolerated this practice without objection, viewing it as a de minimis infringement. Todayin the digitalage, however, instead of talking about infringing reproductions, copyright holders use terms like "theft" and "piracy" to describe the practice; such words leave little room for debate or for considerations of exemptions such as fair use From the perspective of content providers, what has changed is not only the quantity of reproductions that may be made through electronic means, but the quality of the reproductions. The ability to produce copies from a digital work with no degradation of quality is a significant matter to publishers and producers, because it permits unlimited reproduction of information, whereas previously, the extent of reproductions was naturally limited by the means of reproduction. Perfect copies were not possible until the advent of computer technology, so this is a new concern.
Publishers and producers value the ability to control their works in the marketplace. Fear of loss of control now appears to be much stronger on the part of copyright holders than it has been previously. Is the increased fear justified? Perhaps it is, since loss of control easily can result in total destruction of the value of the work. The volatility of the legal environment also probably contributes to this fear, since publishers and producers cannot depend on the courts to restore that control. Once control is lost, it is lost permanently. Technology presents copyright owners with an opportunity to exert greater control over their works than ever before, since not only access to the works, but also the use of works can be controlled. Concomitantly, however, detecting infringement may be more difficult. One response to the latter problem might be to prevent all copying rather than finding ways to permit lawful reproduction.
Publishers value works that they can authenticate, thus ensuring that the content they originally provided remains unaltered. The fluidity of the digital environment raises concerns on the part of publishers and producers that persons will gain access to their works and then alter the works in a way that reflects negatively on the publisher. Content providers also value the ability to market and protect their works in the digital world. The digital environment permits the sale of access to increasingly smaller bits of information, which makes new marketing strategies possible. Publishers also value the ability to market their works broadly and to explore new markets. Eventually, a pay-per-view distribution system in which each consumer can purchase exactly the information he or she desires may be possible in the digital world, as publishers and producers point out. Such a pay-per-viewdistribution system would allegedly be incredibly inexpensive for users whocan purchase small bits of information as opposed to having to pay for access tothe entire work. The envisioned low cost pay-per-view distribution system, however, has clearly not yet been developed, and whether it ever will be is questionable. Another change relating to marketing in the digital world licensing is increasinglyrecognized as a way to protect intellectual property rights, and licenses are becoming more encompassing and broader. Publishers are beginning to value their control over rights and permissions as an income stream as they never have before. Finally, a core copyright value for publishers and producers is the notion that fair use is only a defense to copyright infringement, and it is not a right of users of copyrighted works.
Based on some of these values, radical public statements made by publishers are understandable, but they raise considerable concern on the part of librarians. Examples of such statements are that in the digital world pay-per-view will be preferable to sales of copies as a way to recoup the cost of creating a copyrighted work, and that interlibrary loans should be eliminated in the digital environment.
B. LIBRARIAN VALUES
Librarians also have deeply held core values, some of which have never been questioned. Statements made by publishers and producers sometimes strike at the heart of these values. Many of these values come from what may be called the public library ethos; librarians as a group tend to share these values whether they work in the nonprofit sector or in the for-profit environment. The education and training of librarians inculcates some of these values, which have been exhibited in debates and considerations about copyright.
What are some of the core values held by librarians? One core value is that public libraries are educational institutions. This core value, held for at least 125 years, potentially conflicts with the Copyright Act, in which public libraries are considered nonprofit libraries, but not educational institutions. To librarians, however, libraries, archives, and museums serve such an important educational function that even when asked today, librarians often say that public libraries are educational institutions. Throughout the Copyright Act, however, phrases like "libraries and nonprofit educational institutions" are used, making it clear that the two are distinguishable. Thus, the exemptions available only to schools and other educational institutions are not available to libraries generally. True, libraries in nonprofit educational institutions straddle the divide, but other types of libraries do not benefit from the exemptions for educational institutions.
The most important core value for librarians is "information to the people." Public libraries are a shared intellectual resource maintained at public expense to provide resources that will be shared. Libraries purchase works and make them available at no charge to any user of that library, which is permitted by the Copyright Act under the first sale doctrine. This may conflict with publishers' goals, but section 108 of the 1976 Copyright Act, called the library exemption, makes clear that the exclusive rights of copyright holders are limited to permit many standard library activities to occur without the need to seek permission from the copyright holder.
Public libraries as institutions question authority by providing information on various sides of an issue. Often it would be easier and less stressful on library staff if the library provided information that supported only the dominant beliefs in a community. From earliest times, however, public libraries have steadfastly provided information on multiple sides of a matter to permit library patrons to educate themselves and make up their own minds about issues. Sometimes individual publishers have suggested that libraries purchase only their materials rather than both theirs and those of a competitor. Even publishers of legal materials have been guilty of this in private conversations with law librarians.
As part of the value of information to the people, libraries promote the rights of users under copyright. Librarians also support the right to read, the right of access to ideas, etc., and they view the role of librarians as advocates for users who often too, are silent about their needs and wants, or who may not even know what they need. Libraries are valuable to society because they provide access to information to the economically disadvantaged and to other "have nots." They provide an equalizing influence that can serve to reduce the differences between rich and poor when it comes to information. Librarians believe that users have the right to browse in the digital environment just as they do in the analog world. Browsing, is a way of selecting what information is needed, but this clearly conflicts with the content providers notion of paying for access.
The Copyright Act itself recognizes some of these values in the section 108 exemption. For example, libraries may lawfully reproduce copies of portions of works, such as an article from a journal issue to satisfy a request from a user. If the library to which the request is made does not hold the requested item, under the exemption, that library may satisfy the request by obtaining a reproduction of the article through interlibrary loan activities. Librarians also believe that section 108 and the fair use doctrine permit them to provide library service to distant learners for whom the library is their primary library. Finally, in order to facilitate teaching, and learning, librarians see the library as an extension of the classroom with the creation and maintenance of reserve collections, including electronic reserves under the section 107 fair use provision.
Although librarians do not necessarily believe that information should be free, they do believe that once a library has subscribed to, or licensed for, access to a work, users of the library should have unfettered access to it. Some librarians would probably further argue that the location of the user is irrelevant. For example, if the user is an enrolled student of the university, whether she is physically located on campus or not should be immaterial; the critical issue is whether she is an enrolled student. Restrictions in license agreements that limit users to physical presence on the campus or restrict the ability of a library to use the work for interlibrary loan conflict with this value.
Another librarian core value is that users of libraries should be able to locate information - i.e., identify that it exists and where. The role of librarians is to assist and teach users to locate information. This depends on standard indexing, and abstracting services as well as Internet search engines. Traditionally, indexing and abstracting services have been provided by third parties and not by the entities that held copyright in the work. For example, the H.W. Wilson Company began its indexing in 1901 with the first Readers Guide to Periodical Literature that included only 20 periodicals that were recognized as “acceptable” by the literary and academic communities. The theory of indexing changed over the years with the addition of indexes such as Index Medicus that evolved into the online service, Medline, but nonetheless, third parties conducted indexing. These organizations may have been for-profit (H.W. Wilson Company), nonprofit (Public Affairs Information Service), or even a Government agency, such as the National Library of Medicine, which produces Medline. Even if the indexer was a commercial entity, it was still a third party that did not hold the copyright in the content.
Today, publishers are adopting new digital object identifiers (DOls) to attach to digital information and to link it through indexing. The DOI index would be linked to the full-text of the work. In theory, this sounds great, since the DOI will stay with the object regardless of whether the publisher sells the digital work, etc., but some concerns about DOls exist. With DOls content providers would not only control the indexing, but also access to the indexing and through the index access to the digital object itself. All of this would be available to users only through licensing arrangements. Publishers state that this would be a great boon to researchers, but this is true only if researchers have access to that publisher's digital materials or to a consortium of publishers' systems that are licensed. If a scholar wants to cite an article using a DOI, it would become an inaccessible reference to anyone who does not have access to one of the publishers' systems in the consortium. No longer would neutral third parties provide the indexing and abstracting services one can use to determine the existence of a work even if the library does not subscribe to the journal or proceeding, in which the work appears.
Perhaps the most important manifestation of the core value of information to the people is the importance of the public domain. Librarians believe that having unrestricted access to non-copyrighted works is crucial for research and scholarship. Copyright law should riot restrict public domain works in any way, and users of libraries should be encouraged to make wideand frequent use of public domain works. Further, U.S. government-produced works should be free of copyright and widely available.
Even though librarians likely hold other core values related to copyright, the last one critical to mention is fair use. To librarians, fair use is a user's right and not just a defense to copyright infringement. Further, librarians believe that not only individuals but also libraries have fair use rights, based on the library exemption in section 108(f)(4), which states that “nothing, shall affect the right of fair use…” The word used in the statute is "right" and not "privilege;" thus, it is easy to see why librarians maintain that fair use is a right, not just a defense to infringement. Whether fair use is a defense to copyright infringement or is a right has Ion- been debated, with librarians and publishers and producers weighing in on different sides. Recently, the National Research Council recognized this divide in a report published in early 2000, The Digital Dilemma, Intellectual Property in the Information Age. It highlights this disagreement in relation to private copying, but does not resolve the dispute.
In recent years a number of professional library organizations have developed policy statements that reflect and restate some of these core values. The American Library Association is currently drafting a statement of core values. In the latest draft of the statement, four of the eight values identified relate to copyright. The first of these concerns is the connection of people to ideas. The other core values flow from that. "We guide the seeker in defining and refining the search; we foster intellectual inquiry; we nurture communication in all forms and formats.” A second core value is the unfettered access to recorded knowledge, information and creative works. "We recognize access to ideas across time and across cultures is fundamental to society and to civilization.” Leaning in all its contexts is the third value. "We aid people to become independent lifelong learners by selecting and offering materials that support the differing needs of all learners, and that entertain and delight the human spirit.” The fourth value that relates to copyright concerns preservation of the human record. "The cultural memory of humankind and its many families, its stories, it expertise, its history, and its evolved wisdom must be preserved so it may illuminate the present and make the future possible.”
The Association of Research Libraries (ARL) has developed several documents that state core librarian values without so identifying them. Fair Use in the Electronic Age: Serving the Public Interest was adopted in the mid-1990s. It details what the public should have a right to expect to do without incurring copyright liability:
Additionally, the ARL document posits that nonprofit libraries should be able to under-take certain activities, such as using electronic means to preserve copyrighted materials and to provide copies through interlibrary loan, on the part of their clientele without infringing, copyright. Further, libraries should not be liable for the actions of their users after they post the appropriate notices on unsupervised reproduction equipment.to read, listen to or view publicly marketed copyright material privately, on site or remotely;
to browse through publicly marketed copyrighted material;
to experiment with variations of copyrighted materials for fair use purposes, while preserving the integrity of the original;
to make or have made for them a first Generation copy for personal use of an article or other small part of a publicly marketed copyrighted work or a work in a library's collection for such purpose as study, scholarship or research; and
to make transitory copies if ephemeral or incidental to a lawful use and if retained only temporarily.
In 1994 the ARL adopted Intellectual Property: An Association of ResearchLibraries Statement of Principles, a statement in response to the White Paper that affirms the rights and responsibilities of the research library community in copyright. The most important of these rights is that copyright exists for the public good, and concomitantly, fair use must be preserved in the developing information infrastructure. It also stated that licensing agreements should not be allowed to abrogate either fair use or the library exemptions provided in the Copyright Act. It recognized that librarians and educators have an obligation to educate the users of information from their collections about their rights and responsibilities under intellectual property laws. The statement opines that federal government works should remain free of copyright restrictions. Finally, it states that the information infrastructure must be formulated to permit compensation to authors for the success of their creative works and to provide fair return on investment for copyright holders.
In 1999 the ARL restated some of these values in a document called its Keystone Principles, which has some impact on core values. The most important of these is a slight change over earlier statements: now access to information is identified as a public good. This recognizes that academic authors and institutions or public institutions often create information, and the public interest is served by having this information available. The ARL believes that commercial enterprises have disrupted the public availability of such information through pricing policies, licensing restrictions, and the like.
C. SOCIETAL VALUES CONCERNING LIBRARIES AND COPYRIGHT
the core value that members of the public hold most dear in this area is
the importance of an educated populace. The U.S. Constitution is
a charter for self-government, and only an educated populace can self-govern
Libraries play a crucial role in creating an educated citizenry through
literacy and reading programs, and simply by making information widely
available to the general public. Thus, it follows that the public
value of education may be furthered by the availability of free public
libraries. Another value the public holds is the importance of the
public domain. While copyrighted works play a key role in “promoting
the progress of science and the useful arts,"
public domain works provide much of the intellectual commons that members
of society share. Evidence of a contrary view might be found in the
recent reduction of the public domain by the retroactive extension of the
already long term of copyright by an additional 20 years.
Additionally, it is clear that American society recognizes the importance
of public libraries and public access to information. There is considerable
public support for libraries. In mid-1998, a Gallup poll showed that
67% of Americans visited a public library within the last year, 54% checked
out a book, and 21% checked out other materials, like a CD or a video.
"In the continuing struggle to establish and maintain democratic values,
free public libraries are essential for providing information and knowledge
There is also a civic aim: the free public library offers citizens
a way to become informed and educated citizens.
II. HOW DID LIBRARIANS' CORE VALUES DEVELOP?
A. HISTORY OF PUBLIC LIBRARIES
As the first major urban public library in the United States, the Boston Public Library was opened to the citizens of Boston in 1854 in rented space on the bottom floor of a school on Boylston Street. The idea for a public library actually had begun 30 years earlier with a proposal to unite some of the city's privately owned libraries. In 1839 Alexandre Vattemare proposed that the great cities of the world exchange cultural items such as books, works of art, etc. He also suggested that the cities build libraries and museums so that the public could then view the collected cultural artifacts. Vattemare visited Boston in 1841 and proposed a merger of 15 private libraries. Not surprisingly, most of these libraries were less than 54 enthusiastic, but in 1847 he persuaded Boston officials to build a public library. The city council succeeded in negotiating a $50,000 loan from a London bank with which it created a book fund. Three years after the 1854 opening, the Boston Public Library moved into its own building with space to house 240,000 volumes. By 1875 the public library movement was well underway; 188 libraries had been established across the country, and more were planned. Public libraries were considered to be educational institutions. The belief behind public support for public libraries is expressed in an 18th century Rationalist view of American Democracy, "that every person should have an equal chance to fulfill his abilities; that every man can and will do so if given the chance; that the individual shall be free to develop his inclinations and capacities; and that society will progress as the enlightenment of its citizens advances.” Librarians viewed themselves as missionaries of literature, and began to assist schools. The general view was that public libraries were poised to help the country solve various social problems. In the last decade of the 19th century librarians wanted to elevate society and raise the levels of knowledge, goodness and wisdom. Libraries then and now are considered to be a public good, and [p]ublic libraries, like public schools, came to be accepted as public responsibilities, civic goods benefiting the entire society and thus worthy of pubic support.
As the library historian Patrick Williams described librarians at the close of the 19th century and into the 20th century, librarians were inspired: "[t]hey idealized the library as messianic, as an agency of national salvation. They saw themselves as missionaries enlivened by the ‘library spirit.’” They continued to insist that public libraries were educational institutions. The Library Spirit was compared to the spirit that built the great European cathedrals. The spirit was one of service, and brought books and learning to towns and hamlets, as well as cities. Libraries were altruistic in nature, and everything seemed to be working. By 1896 there were 971 public libraries with 1000 volumes or more; by 1903 there were 2,283. Between 1906 and 1915 Andrew Carnegie donated money from his personal fortune to build over 639 library buildings in cooperation with local governments. Governments also became more active in library development and building. Books were distributed in traveling libraries to rural areas. Public libraries in cities and towns placed books in public schools, firehouses and police stations.
Public libraries' missionary service also included immigrants. Libraries viewed this Americanization effort as a service to the immigrant community – it was their patriotic duty and a role that librarians willingly accepted, apparently with little question. It seems to have been a goal of public libraries to work with immigrants. Libraries apparently viewed themselves as civilizing influences, and services to immigrants were viewed as a social obligation. Public libraries provided books to immigrants, sometimes in the immigrant's own language, lectures on a variety of topics such as health, food, American law, etc. They offered classes on English, and immigrants were taught manners and how to behave. What was taught was often described as the “American way of life.”
By 1915 the missionary era was coining to an end and was being replaced by the new rage, adult reading courses. From 1920-48 public libraries were involved in the adult education movement. Adult education was not a new idea, but it was newly emphasized by government at this time. There had been earlier lecture series that were aimed at educating adults, like the Lyceum and Chautauqua series in addition to local lectures held at public libraries. After the two World Wars, however, much had changed in society. Although public libraries had made significant contributions to individual lives, they had not been greatly successful in educating the masses. In the 1950s the American Libraries Association (ALA) and others thought that the Library Services Act would contribute significantly to creating equal education opportunity for rural America.
After World War II, the Carnegie Corporation was consulted to see if it could determine why support for public libraries was so weak if they were indeed so necessary to a democracy. After discussions with library leaders, the ALA sent a proposal to the Brookings Institute in 1946 for a study, now referred to as the Public Library Inquiry. Sociologists and others assisted librarians in this important study. The study was to be wide ranging, and to examine how well the public library served its various user populations, along with how effective it was in cultivating loyalty to the basic conceptions and ideals of the democratic way of life. The Public Library Inquiry produced a number of reports that probably were infused with bias, and it assumed certain contentious values were widely shared so that its recommendations could be accepted. One of the central findings came from the belief that the capability of learning was universal. This notion was dubbed as the "Library Faith," which is expressed by the syllogism that printed works have such value that reading itself is a good; reading in order to learn is moral and useful behavior, so libraries contribute value to society. The public library is important to the democratic process because of its relationship to books and reading. It provides free access to all library users of works that have value because they enhance a user's pursuit of knowledge and happiness. Further it provides sources of knowledge for the informed citizenry who are responsible for the very fate of democracy. One final goal and value of the public library is that it both preserves and organizes recorded knowledge worldwide and thus plays a critical role in cultural and social continuity. The Inquiry maintained that this faith was historical and was central to the ideology of public librarianship. The ideology was the lens through which librarians viewed the world and made decisions. Further, the ideology adopted a justification that saw the public library as occupying a unique place as a state institution, which contributed in very specific ways to democratic culture.
The Library Faith has its roots in the 19th century. Charles Coffin Jewett, in his 1849 report to the Regents of the Smithsonian Institution, identified two social benefits provided by public libraries: (1) a direct benefit to the ordinary America who can use the collections and services to improve practical skills, gain cultural knowledge, enhance moral strength and increase productivity, and (2) an indirect benefit to the nation in the form of greater economic productivity and a better quality of life. Jewett's view is consistent with the Library Faith and describes the public library as an intellectual commons, contributed to by everyone and available to all. A part of the value of the public library comes from the very fact that it is a shared resource.
The Library Faith was resurrected in the Public Library Inquiry, but this time it was armed with a strategy for action. The central purpose of the Inquiry was to establish a link between democracy and free public libraries. The Public Library Inquiry offered an empirical examination of the pubic library in terms of what the institution had achieved and what could have been achieved when compared to its own objectives. Then, it attempted to place the public library in the broader context of American culture and politics. It was also an attempt to stimulate librarians to reexamine their professional values.
The Public Library Inquiry resulted in seven books and five special reports. It was really a survey instrument, a study of public libraries that would tell librarians what to do to make their public libraries the instrument of popular education that they wanted them to be. It suggested that libraries should reinvent themselves to ensure users the "widest possible range of reliable information."
Beginning with the Library Services Act in the 1950s, changes were inevitable; bookmobiles hit the road in the 1960s with service especially to rural areas, and adult education efforts continued in to the 1960s. From 1965-80, activists began to push services for persons considered disadvantaged who traditionally did not much use the library. Renewed outreach beginning in 1967 indicated a significant difference in the types of works that public libraries needed to provide: movies, tape recorders, viewmasters, etc. But by 1970 outreach programs began to wane.
A Strategy for Public Library Change was presented at the Public Library Association meeting in January 1972. The Strategy proposed a new role for public libraries, premised on the concept that information in the form of data, facts, and ideas is essential to the flourishing of the country's citizens, which redefined the role of public libraries as information providers. By the late 1970s a new emphasis on providing information to everyone had developed, which stressed that "[all] information must be available to all people in all formats purveyed through all communications channels and delivered to all levels of comprehension.” This very broad role envisioned for public libraries, however, was one few would be able to meet. Nevertheless, the role of information provider is an appropriate one for libraries since “access to the accumulated information, knowledge and wisdom of humankind is essential. ... It is that function which the library performs best ...
B. EDUCATION AND TRAINING OF LIBRARIANS
The education and training of librarians is based on ideals such as the Library Spirit and later the Library Faith. The first librarian education program was founded at Columbia College in January 1887 under the direction of Melvil Dewey. Classes were held across the street from the main campus, because not only did the first class admit women, but the class was also comprised of 17 women and three men. Faculty members were predominantly members of the library staff of the libraries at Columbia with some other librarians brought in as guest lecturers. Faculty members were supposed to inculcate the library spirit - an attitude about library use and access to those collections. It was this library faith that distinguished Dewey and his generation of librarians from earlier generations whose primary goals were security and preservation of collections.
The Library Faith permeated early library education and continues to this day. Librarians are trained with the public library ethos, and it carries over into their work lives. Even librarians in the for-profit sector often still operate with this library faith at work. They have often had difficulty in recognizing that the for-profit environment may significantly chance the relationship between copyrighted works and the user. Librarians have tended to view all users as having, rights to access and use works just as members of the public have this right. The copyright law may, however, differentiate between those users of public libraries and users of a corporate library, if the Texaco case isany example.
C. LIBRARIES IN THE PRESENT DAY
Libraries have developed into well-defined social institutions that hold a collection of "knowledge representing objects." Libraries play several roles: (1) they are consumers in the economic system, (2) they participate in the political system and (3) they serve as locations of social exchange in the everyday lives of people in the community.
Librarians have always been concerned with information content stored in artifact form such as books, journals and film. Librarians are primarily information handlers: they acquire information, organize it, provide access to it, and "serve as intermediaries between the public and the objects of cultural and intellectual authority." Historically, librarians were also concerned with activities relating to the process of publishing and distributing copyrighted works, but to a much lesser degree. Their primary concern was with the collection, storage, and access to static content, rather than with the process of producing and publishing content. Today, however, much information is increasingly dynamic, and it is clear that information consists of both content itself and the process of producing and distributing it.
A central tenet of librarianship is that access to information should be free. Because the accumulated cultural memory is stored in libraries' collections and available for consumption by the library users, libraries facilitate information exchange among individuals and society - knowledge contained in the library is transferred to users, for example, when they read. The result of this transfer is socialization and education, but it also facilitates solutions to personal problems and the generation of new knowledge. One noted commentator says of information that "[p]ower in the information age, just like power in the bronze age, the iron age, and the ages of Enlightenment and Industrialization, flows primarily to information users and creators, and most power in the information age, just like most power in the bronze age, the iron age, and the ages of Enlightenment and Industrialization, flows to those best situated politically, economically, socially and culturally. The librarians' role as teacher is also expanding as they train people to use the Internet and attempt to screen for quality content in the vast sea of digital information. Furthermore, as technology allows information to become more proprietary in the digital environment, the role of libraries is expanding to ensure freedom of access to information. Another traditional role for libraries is preservation, but preservation of new, elusive and alterable digital knowledge is just now beginning to be addressed.
Librarians also fight the dominant culture by collecting materials the dominant culture does not value or approve of. Libraries bring a vast amount of material together and challenge power by facilitating access to works and by organizing the information regardless of textual format or content. Librarianship is essential in a capitalistic democracy because freedom of access to information is crucial in a democracy even though capitalism may not appreciate this necessity. Librarianship facilitates reading, the chief value of which is to produce educated people who, having imbibed knowledge and values, contribute to the important process of cultural and social change and to the survival of culture by virtue of the kind of people they have become. In the information age, librarianship takes on another important role since individuals are viewed as using documents for their information content to solve particular problems, whether personal or social, in addition to generally improving society by reading.
The commodification of information is a threat to the public's access to information. This is why the slogan that "information wants to be free" is so attractive to librarians. What librarians really want, however, is not that information be absolutely free, but that it be only free to the user after the library has paid for access for its users. Librarians view their role as helping and providing information to those who need it; often they do not recognize that this may conflict with publishers' and producers' values. For example, to publishers, the fact that perfect copies can be reproduced from digital copies is a critical concern in evaluating the harm to the market that copying causes. Such copies are basically viewed as "originals." To librarians, however, the fact that a copy of a textual work is a perfect copy is immaterial. Librarians view what they do as providing the copy to users, and as long as the information is legible, the quality of that copy simply does not matter. This is one reason why publishers and librarians are often talking at each other as opposed to reaching real understandings.
Publishers appear to be under the impression that most librarians believe information should be absolutely free. This is not an accurate portrayal of librarians' views. Since libraries were formed, they have purchased materials in order to make them available to users. Thus, the materials budget for many libraries is quite large, and there is an understanding of the value of these works and the importance of the information they contain. Librarians certainly recognize that copies of books, journals and the like must be purchased, since donations are not likely to provide the balance and breadth that most seek in developing library collections to reflect all sides of an issue. Additionally, for several decades libraries have been signing licenses to make information available online to their users; there has been no thought or debate that non-public domain databases should be provided free. Librarians also recognize the investment made by database developers to collect and organize the information contained in these valuable research sources, and that there must be fair return on this investment.
What librarians staunchly advocate is that individual users should not have to pay for information obtained from their public libraries. Libraries should be able to negotiate licenses to provide access for users in their companies, academic institutions, and public libraries. They fear the threat that information will become pay-per-view and that the library will no Ionger be able to negotiate appropriate terms and fees to make a database available to its users. So, statements such as "information wants to be free" may simply mean free to the individual, not free to the library. If database proprietors charge too much for the license fee, then the library will not be able to purchase access for its users. This will mean that patrons with economic means will be able to afford individual access to the data while the masses will not. The idea of "information have-nots" provides a direct clash with the core values of librarians. Librarians deeply believe that information should be available to everyone who chooses to come to the library to use it, and that access by individuals should not be determined by their ability to pay. This likely originates with the idea of free public libraries and universal service.
Pointedly, this does not mean that no one should pay for the information. Indeed, the library has long agreed that it should foot the bill for access to information. It just may not be able to do so if license fees become too high or if the pay-per-view model is adopted. Libraries must have a "sum certain" in the budget - they tried in the early 1970s simply to allow access and pay for "hits" in a database, but many libraries had to abandon this practice or even curtail it in the middle of a fiscal year when the charges reached the amount budgeted to cover use of that database. Negotiating, for a year's access, not on a per search basis, but on a flat rate permits the library greater flexibility even if it then has to narrow access to everything in the database as a way to reduce its costs.
Librarians also fear the possibility that pay-per-view will mean that their role as intermediaries will be threatened. Librarians have long, assisted users with their information quests, taught them how to formulate their queries, how to conduct research more efficiently and effectively, and guided them through the complex maze of available resources. The coal is to help each user get exactly the information he needs; not too much information, and not information that is overwhelming to the user. This intermediary role is a type of information filter, not a censor. The training of librarians helps them to determine which sources are age and experience appropriate, how to best search the contents and how to help users so that they can become independent and confident researchers.
III. LIBRARIES AND DIGITAL COPYING
Many of the value differences between copyright holders and librarians are highlighted by the various exemptions to the Copyright Act. Section 108, which provides certain exemptions for libraries vis-à-vis the rights of the owner of the copyright, is particularly relevant to this discussion. In addition to the library exemptions, libraries also have fair use rights.
A. ELIGIBILITY FOR THE LIBRARY EXEMPTION
Section 108(a) details the conditions under which a library or archives is eligible for the library exemption. First, the section permits making only single copies of works except for preservation purposes, when, under certain conditions, the library may make up to three copies. Second, the reproduction and distribution must be made "without direct or indirect commercial advantage." The meaning, of this phrase has never been litigated, and the legislative history is not abundantly clear. It is in this requirement that evidence of the values conflict is evident: what does “without direct or indirect commercial advantage mean”? Publishers say that if the library is in a profit-seeking entity, the library cannot meet this criterion. Librarians do not accept this interpretation of the words of the statute. They believe the statutory language means that it is the reproduction itself that may not be used for direct or indirect commercial advantage, i.e., sold for a profit. There is additional support for this position in the legislative history discussing section 108(g)(1); the House Report states that even a library in a for-profit entity may reproduce an article for a user to use in her work as long as it is an isolated and spontaneous request. Therefore, if the library provides document delivery services to its users, and, even if there is a fee charged for the service, it can argue that there is no direct or indirect commercial advantage if that fee represents only cost recovery. Instead, it is revenue neutral and there is neither a commercial advantage nor a disadvantage. However, later amendments to other sections of the Copyright Act all seem to insert the words "nonprofit" before library, which offers some evidence that legislators, at least after the passage of the 1976 Act, considered exemptions necessary for libraries to apply only to the nonprofit sector.
The third requirement is that the library's collection must be open to the public or to non-affiliated researchers doing research in a specialized field. Certainly many libraries in nonprofit educational institutions as well as public libraries meet this criterion. For other libraries, this might be met even if the collection is not open to the public generally but only by appointment for qualified users, such as researchers. Libraries that are not open to any outside users have a more difficult time qualifying under this criterion. Librarians likely would argue that a library not open to outsiders but which lends any of its published materials through interlibrary loan also qualifies for this exemption; publishers likely disagree, but the matter has never been litigated. The fourth and final requirement concerns notice of copyright on copies the library reproduces.
B. NOTICE OF COPYRIGHT
Notice of copyright is a term of art in copyright law: it consists of three elements: (1) the word "copyright," the abbreviation "copr." or a "C" in a circle; (2) the year of first publication; and (3) the name of the copyright holder. Under the 1909 Act, an owner lost her rights if she published a work and failed to include such notice on copies of the work and did not give actual notice of copyright. The more author-friendly 1976 Copyright Act softened the automatic loss provision. An author did not lose his copyright for any accidental omissions of notice if, during the first five years after publication, only a small number of copies had been distributed without notice, and if he later tried to correct this mistake. When the United States joined the Berne Convention in 1988, notice of copyright was dropped as a formality, and today, placing notice on protected works is voluntary. Librarians Generally regret this chance in the law. Professional librarians and users depended on the notice of copyright to differentiate between works in which the owner claimed rights and those works that were in the public domain. It seems that the burden on the copyright holder was slight in comparison with what copyright notice did for the public in differentiating works in which someone claimed rights from those in the public domain.
Throughout section 108, libraries that reproduce works under the exemptions are required to put a notice of copyright on the copies they make. The policy behind this requirement is to alert users that although the library was able to make a copy of a work for them, the work is not free of copyright restraints. Within the library community, there continues to be debate over the meaning of "a notice of copyright." To the copyright holder community, notice of copyright is a term of art in the law, and most copyright lawyers believe that it meant the library should include the three traditional elements that comprise notice of copyright under section 401(b) mentioned above. Some librarians argued that a library should simply stamp photocopies and other reproductions with the American Library Association recommended statement "Notice: This work may be protected by Copyright." Despite this on-going debate, the matter has never been litigated. Many libraries have religiously used a stamp containing the ALA recommended wording, while others had a stamp made with ©, _____, 19_ or 20_. Then library staff members would fill in the name of the owner and the year of publication on copies it reproduced.
The Digital Millennium Copyright Act amended section 108(a)(3), which now reads: "Thereproduction and distribution of the work contains a notice of copyright that appears on the copy that is reproduced, or includes a legend stating that the work may be protected by copyright if no such notice appears on the work." Thus, for libraries there no longer is any option for the content of "a notice of copyright." The library must include the notice that appears on the work. This can be done by reproducing the page that contains this notice by writing all of the information on the copy or by creating, a rubber stamp with (©, _______ (for copyright owner), _____ (for year published) and filling in the notice information as it appears on the work. The only instance in which the stamp or legend "Notice: this work may be protected by copyright" may be used now in lieu of the actual notice is when the copyright holder does not place a notice on the work. This is not exactly what librarians had hoped for; librarians had sought an amendment that would alleviate the burden of including a notice of copyright when the copyright holder failed to do so. It is likely that the amendment relates more to the new copyright management information provisions than it does to providing relief for librarians. Although the legislative history states that the goal was not to increase the burden on libraries, that has not been the end result.
The amendment also has implications for the World Wide Web. While webpages are copyrighted, often the developer does not include a notice of copyright. Contrary to popular opinion, publishing a webpage without notice does not place the page in the public domain. When printing or reproducing webpages for users, according to the newly revised statute, librarians must either print the page containing the notice of copyright or stamp the reproduction with "Notice: This work may be protected by copyright" if there is no notice on the webpage.
The Digital Millennium Copyright Act (DMCA) amends the preservation and replacement sections of the library exemptions. The Sonny Bono Term Extension Act also added a new subsection to 108 that expands the preservation right. Both of these amendments relate to digital copying by a library, which copyright holders have Iong said was not permitted.
There are two sections that relate to preservation: section 108(b), which is a true preservation section; and section 108(c), which is a replacement section for lost, damaged, deteriorating or stolen materials. The DMCA amended these two sections making it clear that a library can, under certain circumstances, use digital means to preserve library materials. Further, these amendments were not applicable only to digital works, but also to traditional works. The 1976 Copyright Act always permitted libraries to reproduce works for preservation or replacement purposes if certain conditions were met. The DMCA amended these provisions to provide for meeting national microfilm standards and to make it clear that digital means might be used for preservation, but it also added an additional restriction for works preserved digitally.
Under the original statute, section 108(b) permitted a library to reproduce one copy of an unpublished work for preservation, security or deposit for research in another library. Section 108(c) allowed a library to reproduce a published lost, damaged, stolen or deteriorating work after the library made a reasonable effort to obtain an unused copy at a fair price. The statute did not define fair price but the legislative history does describe what a reasonable investigation might entail. It would require recourse to commonly known U.S. trade sources, such as retail bookstores, jobbers, and wholesalers; contacting the copyright holder or author, if known, or using an authorized document delivery service. Both sections further required that the work either currently be in the collection of the library or if not, that it had been there at one time. Both sections stated that a library could make a "facsimile copy" when the conditions had been met. There was disagreement about whether a digital copy could qualify as a facsimile. Many librarians maintained that digital copies, which scanned the page and represented an exact copy of the page were facsimiles; publishers steadfastly claimed that digital copies were not facsimile copies at all.
The DMCA really terminates the disagreement. It expands the preservation and replacement exemptions in several ways. First, the library is no longer limited to making only one preservation copy of a work. Now it may make three copies, which complies with national microform standards. Second, the word "facsimile" was omitted, and third, the statute specifically permits the copy to be in digital format. While these three changes broaden the preservation exemptions for libraries, each subsection also contains a new limitation. If the copy that is reproduced is in digital format, the digital copy may not be "made available to the public in that format outside the premises of the library ...” This may narrow the library's rights even though a library now may make a digital copy for on-premises use. However, the library could also then make a printed copy from that digital copy and loan the printed one since it is allowed to make up to three copies of a work. Prior to the amendment, a library that reproduced a work under these subsections could treat the reproduction just as it did the original work. It could lend the reproduction to users, provide it through interlibrary loan, and the like. This new restriction may mean that if the work is preserved in digital format, it cannot be used outside the library buildings, and this is much more restrictive. Surely what Congress must have meant was that if the reproduction was digital and was available on the library's network, then it could be used only within the premises and not on a campus network or the World Wide Web. In using the term "digital copy" Congress may actually have narrowed the exemption for works that were originally in digital format. For example, if the original work was a CD-ROM, which now is lost and is not available at a fair price, a library may create another CD, which also happens to be a digital copy. But the Ianguage of the statute says that digital copies cannot be used outside the premises even if the original was a digital copy that could have been outside the premises of the library. This is more restrictive than the previous version of the statute, and likely is not what Congress meant to accomplish by the amendment. Did conflicting values lead to this strange result?
The DMCA amended section 108(c) in an important way. In addition to applying to lost, damaged, stolen or deteriorating works, the amendment added "or if the format in which the work is stored has become obsolete." The amendment then explains when a format may be considered obsolete,"...if the machine or device necessary to render perceptible a work stored in that format is no longer manufactured or is no Ionger reasonably available in the commercial marketplace." This is a great help for libraries that currently are dealing with deteriorating 78 rpm recordings, Beta format tapes, and the like. Thus, if the equipment is still produced but is extremely expensive, a library might determine that it is no Ionger reasonably available in the commercial marketplace and thus may reproduce the work under this amendment. This was a chance that really benefits libraries and their users where there appears either to have been no values conflict with publishers and producers or where the groups were able to reach agreement on this issue before Congress.
Even when a work becomes lost, damaged, stolen, deteriorated or obsolete, the library may reproduce it only after it determines by reasonable investigation that an unused copy may not be obtained at a fair price. This applies to all types of works, including audiovisual works. A library is not required to search the used book or videotape market in order to locate a replacement volume or item. The statute does not define key concepts such as "reasonable investigation" or "fair price." Nor is there any time limit placed on how long a librarian should search for an unused replacement. The legislative history does provide some guidance on what constitutes a reasonable effort to locate an unused replacement, however. According to the House Report, "The scope and nature of a reasonable investigation to determine that an unused replacement cannot be found will vary according to the circumstances of a particular situation." It goes on to state that in the ordinary course of events, a library that seeks to replace a damaged, deteriorating, lost, or stolen work would first approach U.S. trade sources such as retail bookstores, wholesalers or jobbers. If that proves unsuccessful, then the library should contact the publisher or author, if known. Lastly, it should contact an authorized reproduction service such as UMI.
The House Report does not define "fairprice." There are two published definitions of fair price, one from a publication of the Association of American Publishers (AAP) and another from the American Library Association. A values conflict is clear in the contrast between these two definitions. In 1978, the AAP appeared to posit that a fair price was basically whatever anyone charged the library. It defined as fair price the latest suggested retail price, if the work is still available from the publisher. If the work is not so available, the fair price was defined as the prevailing retail price, or, if the library uses an authorized reproducing service, it was defined as the price that the service charged. The ALA publication uses a three-part definition of fair price. First, a fair price is the latest retail price, if the work is still available from the publisher. (This squares with the first part of the AAP definition). Second, the fair price of a reproduction is the cost as close as possible to the manufacturing costs plus royalty payments. While this is more helpful in determining whether UMI or another authorized reproducing service's price is a fair price, it is not without problems either. Authorized reproducing services simply quote a flat price to the library with no division of the charges into manufacturing costs versus royalty payments, so there is no way that a library can use this part of the definition to help it make a decision about whether a price is fair. The third part of the ALA definition deals with the loss or damage to one volume of a multi-volume set when single volumes are not available for purchase. The ALA states that it could be argued that paying, a full set price in order to replace one missing volume from a set is not a fair price.
What is less clear is what happens when the stolen or damaged material does not comprise an entire volume but instead is only an article or two missing from a bound periodical volume. Surely, in this situation the librarian should be able to make a reasoned judgment about how much investigation to do and could determine that there is no fair price to replace the article missing from a bound volume. Most librarians would then simply reproduce the article and insert the photocopy into the bound volume. Determining what constitutes a fair price is left to the judgment of the librarian since there is scant guidance in this circumstance. Thus, librarians must use their best judgment in making the determination. Concomitantly, librarians should ensure that they are being fair to the publisher, which has a legitimate right to profit from its products when they are available for purchase at a fair price.
There is another very common preservation activity practiced by many librarians of all types, which reflects a values conflict. When a library purchases videotapes for its collection, especially very expensive tapes such as those from the American Management Association, it is common practice to duplicate the videotape so that the library has both a use copy and a preservation or master copy. To many librarians, this supports the core value of information to the people. The tape was purchased and it should be available to users. If it is damaged, its availability is compromised; therefore, the reproduction makes sense. To the copyright holder, and indeed likely under the statute, this is an infringement of their reproduction right, although one might be able to make a fair use argument for such reproduction. Video producers may grant permission for such duplication or they may charge for the right.
The Term Extension Act added another subsection to the Act, a new section 108(h). This section permits a library or a nonprofit educational institution, during the last 20 years of a published work's term, to reproduce, distribute, display or perform in either facsimile or digital form, a copy of a work for purposes of preservation, scholarship or research. In order to do this, however, the library must by reasonable investigation determine that none of the following factors exists: (1) the work is subject to normal commercial exploitation; (2) a copy can be obtained at a reasonable price; (3) the copyright owner provides notice that neither of the above conditions applies according to regulations promulgated by the Register of Copyrights. Further, the exemption provided by this subsection does not apply to any subsequent uses by users other than that library. Finally, when a digital copy is made as the preservation copy, there is no restriction that it be used only within the premises of the library.
Because of both the age of the material and the scope of the conditions that must be satisfied, this subsection is of limited value to many libraries. It is likely that the only institutions that will take advantage of this subsection are large academic research libraries. This subsection applies only to works that are already at least 50 years old and probably much older, depending on how long the author lives after producing the work, and thus demand for the work likely has already declined or ceased entirely. The purpose of this amendment was to ameliorate the effect of term extension on libraries and library preservation. Libraries and archives are grateful for the expansions of the preservation sections of the Act; however, the new limitations may make those sections unworkable for all but the largest academic and research libraries.
Libraries view as one of their missions the preservation of the world's knowledge and cultural artifacts. The library exemption as amended deals fairly well with preserving materials that were not originally in digital format. Preserving electronic information is more problematic, however, and many digital works simply are not being preserved either by the publisher or by third parties such as libraries. Even when a library signs a license agreement that gives users access to a work, the library may not have the right to preserve it in any way. There is great concern about the impact of this on the cultural record and on what records will be available to researchers in the future.
Because digital works are generally licensed rather than sold to libraries and other users, there really is no mechanism for preservation. Libraries are concerned because licensed works do not provide a permanent copy. If either party terminates the license agreement, the library is left with nothing. But when the subscription to a print journal is terminated or the journal ceases publication, the library still possesses the volumes covered by the subscription period. This is not true for licensed digital works. Libraries are beginning to negotiate for retention of the electronic product at the end of the license period, but this too may prove difficult as technology chances over time. The library may be able to retain the work in electronic format, but it may not be able to access the work and use it. Even if the library acquires the right to convert the work to newer platforms, it may just not be worth the effort to accomplish the conversion, especially for highly technical and scholarly works with a limited audience. Law libraries have reported purchasing some CD-ROM products, which included a code that made them unreadable after a certain date. The purchase agreement did not mention any expiration date at all, nor was there any actual notice to anyone that they would expire and become unusable. Clearly, this causes conflict between publishers and libraries. The same is proving true of works distributed on the web. Some journals are available on the web for only 45 days because the publisher does not view the website as an archive. The text is simply removed from the web after a certain period. Thus, to ensure continuing access, the library would have to print out the journal and bind it or reproduce it as a digital file.
D. COPIES FOR USERS
The sections of the Act dealing with reproducing copies for users were not amended by the DMCA. However, many of the problems between publishers and librarians arise under sections 108(d), (e) and (g) that concern providing copies to users and relate to values conflicts. Use of the term "document delivery" to encompass all of the activities that a library performs to provide copies in response to user requests has caused some difficulties with the publishing community primarily because of commercial document delivery services. which must pay royalties for this activity. A library, however, may simply call all activities that provide works to users as document delivery, such as delivering the original volume, obtaining original volumes for the patron through interlibrary loan, making single copies of articles from its collection in response to a user request, getting a reproduction via interlibrary loan, obtaining copies from an authorized document delivery service and providing copies at the request of external users. Because of differing values, the groups have very different views of these activities.
Section 108(d) states that the section's exemptions from a copyright holder's rights of reproduction and distribution apply when the user requests no more than one article from a periodical issue or one chapter from a book or other collective work. The single article from a journal issue restriction has been a problem for some libraries when the user requests more than one article from an issue or even a copy of an entire symposium issue of a journal. Libraries, however, have learned to deal with this by either restricting its copying to one article per periodical issue or by paying royalties for copying more than one article in the journal issue for an individual user. Copies made under section 108(d) must become the property of the user and the library must have no notice that the copy will be used other than for typical fair use purposes such as private study, scholarship or research. Additionally, the library must place on the order form and on a sign located where the orders are placed, the Register's warning:
Today, libraries need to consider modem ways to provide this warning in advance of providing copies to users. For example, if the library receives the request via email or the web, then a sign at a physical location in the library is not sufficient, and instead, the library should forward an email warning before providing the copy of the article to a user or include the warning as a part of the email or web-based request system.The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material. Under certain conditions specified in the law, libraries and archives are authorized to furnish a photocopy or other reproduction. One of these specific conditions is that the photocopy or reproduction is not to be "used for any purpose other than private study, scholarship, or research." If a user makes a request for, or later uses, a photocopy or reproduction for purposes in excess of "fair use," that user may be liable for copyright infringement. This institution reserves the right to refuse to accept a copying order if, in its judgment, fulfillment of the order would involve violation of copyright law.
Section 108(g) describes further conditions relating to the reproduction for users conducted under section 108(d) and places other requirements on the library that is making the copy. For example, the reproduction and distribution rights under this section extend to "isolated and unrelated reproduction and distribution of a single copy." This is in contrast to systematic copying described below. The iO8(d) exemption also applies to copies of the same material on separate occasions. Therefore, the library is not required to retain internal records to determine which items someone else has requested. The fact that over time, multiple users request a copy of the same item is not a problem. In other words, each user is treated as an individual.
On the other hand, the rights of reproduction and distribution granted under section 108(d) do not apply if the library or its employees is “aware or has substantial reason to believe that it is engaging in the related or concerted reproduction or distribution of multiple copies of materials described in subsection (d)." Related or concerted reproduction has never been defined by a court. For example, if a user requests multiple articles from a journal issue and the library refuses to copy more than one article due to the restriction of one article per issue for copying under section 108(d), the user could come back each day and request another article until she has received the entire issue. If the library were aware that it was doing such copying in contravention of the statute, it should refuse to make the copies or it should not treat those copies as exempted under the library exemption and instead pay royalties for them.
Similarly, section 108(g)(1) does not exempt the library if it engages in systematic reproduction of single or multiple copies of portions of works described in section 108(d). Systematic copying has not been defined by a court, but cases have held that cover-to-cover copying of commercially-produced newsletters in multiple copies was systematic and was not fair use. Two for-profit entities and one nonprofit trade association have been sued for such activity. Although the earlier case settled,Pasha Publications, Inc. v. Enmark Gas Corp. was a case involving another for-profit company. The library subscribed to both the print and fax editions of the newsletter, Gas Daily, and when the company received each version, copies were reproduced and distributed to employees. The court held that such activity was not fair use and that the company had infringed the publisher's copyright. Television Digest, Inc. v. U.S. Telephone Association was a similar case except that the plaintiff, U.S. Telephone Association was a nonprofit trade association that copied the newsletter Communications Daily for distribution to its members. The court held that the plaintiff's nonprofit status was immaterial to a finding of liability for infringement because newsletter copying is not fair use regardless of whether the copying entity is for-profit or nonprofit.
Systematic single copying has not been defined by a court except for newsletter copying. Many libraries reproduce tables of contents of journals and route them to users, and this could be viewed as systematic especially if the table of contents pages contain more than bibliographic data such as abstracts of the articles. Clearly, it is more systematic if the library then permits the user to return the reproductions of table of contents pages with items marked to be copied by the library for the user. Publishers are likely to view such copying as systematic absent a license to do so. Systematic single copying also could include selective dissemination of information, as when librarians watch for all articles, chapters, etc., dealing with a particular subject and then reproduce copies of those items without a specific request for that item from the user.
Section 108(e) provides an exemption that permits libraries to reproduce an entire work or a substantial portion thereof if certain conditions are met. First, the library must conduct a reasonable investigation to determine that a copy cannot be obtained at a fair price. The legislative history indicates that normally this would require consulting commonly known U.S. trade sources such as wholesalers, retailers, jobbers, etc., contacting the publisher or author, if known, or using an authorized reproducing service, i.e., one that has permission from the copyright owner to reproduce the entire work. Unlike section 108(c), however, this section even requires a library to search for a copy of the work on the used book market. If such an investigation turns up no copy of a work at a fair price, then the library may reproduce a copy of it for a user. Then the three requirements from section 108(d) also must be met: (1) the copy must become the property of the user; (2) the library must have no notice that the copy will be used for other than scholarship, research, teaching, etc.; and (3) the library must provide the user with the Register's warning in advance of providing the copy.
Interlibrary loan (ILL) is a time-honored tradition in libraries, but it too reflects the values conflict. To librarians, the evolution of interlibrary Ioan makes a great deal of sense; from the days of lending the original work with its accompanying mailing costs, wear and tear to the original volume, etc., to utilizing modern technology to reproduce small portions of these works that a researcher might request through ILL. Each year there are still hundreds of thousands of loans of original works through ILL. But few libraries today lend a bound periodical volume when instead they can reproduce a copy of the one article needed and provide it through interlibrary loan. To librarians, the request is simply the same thing. When the original volume is loaned to a user, the patron gets the work. When the work is photocopied, the patron still gets the needed work. Instead of focusing on the end use made of the work by the patron, a publisher or other copyright holder objects to the intermediate step of copying. To librarians, the jump from providing the original work to sending photocopies to satisfy ILL requests was a small one. Publishers view it quite differently. Several years ago publishers began to be particularly concerned about the use of fax technology to provide copies rather than the photocopier, even though certainly it is also a technological copying method. This objection included interlibrary loan as well as classic document delivery. Somehow, using the Ariel system for providing interlibrary loan copies, even though it is based on fax technology seemed threatening.
In the broadest sense interlibrary loan (ILL) is a type of document delivery. Traditionally, however, ILL is a library-to-library transaction, although the newer ILL systems that provide copies directly to end-users blur this distinction somewhat. Publishers have claimed that ILL using digital technologies is systematic copying, but the legislative history disagrees. Publishers have also suggested that if the library charges for an ILL transaction, that fee charged creates a commercial advantage for the library. Librarians disagree. Most libraries that charge for ILL transactions simply use the fees to cover a small portion of the copying, mailing, and staff costs. Very few libraries conduct ILL operations even to provide cost recovery, much less to make a profit, thus it is unlikely that a court would view ILL fees as providing any commercial advantage for the library.
ILL is permitted under the statutory proviso that states:
The CONTU interlibrary loan guidelines then specify what constitutes such aggregate quantities to substitute for a subscription to or purchase of a work. The guidelines state that each year a borrowing library may make five requests from a periodical title going back over the most recent five years (60 months), but the guidelines take no position on materials older than five years. If the library either owns the title but it is missing from its collection, or if the title is on order, the library does not count the ILL copy in its suggestion of five. If the work is not a periodical, the library may make five requests per year for the entire life of the copyright. The borrowing library must maintain records for three calendar years and must certify that the request conforms to the guidelines. The lending library's responsibility is to require a certification that the request conforms to the guidelines and not to fill requests that clearly violate the guidelines. There is no record keeping responsibility on the lending library, however.[n]othing in this clause prevents a library or archives from participating in interlibrary arrangements that do not have, as their purpose or effect, that the library or archives receiving such copies or phonorecords for distribution does so in such aggregate quantities as to substitute for a subscription to or purchase of such work.
As libraries have been forced to cancel expensive journal titles because of escalating costs, many are relying on both ILL and document delivery to provide access to materials for their users. In fact, today academic libraries are often members of the Copyright Clearance Center and directly pay royalties for ILL copies beyond the suggestion of five or, as an alternative, obtain the needed copies from a document delivery service. Libraries may determine that the better alternative is to order the copies for articles beyond the five permitted in the guidelines from an authorized document delivery service. The decision as to the route to pursue is based most often on the need for speed, the charges of the document delivery service, and the like. Because libraries are now using both commercial and noncommercial document delivery as well as traditional ILL, these concepts often are blurred since the end result for the requesting library is the same: the user receives copies of requested materials, and royalties are paid for copies in excess of the ILL guidelines.
More than once during the Conference on Fair Use, publishers' representatives stated that they were determined to eliminate ILL in the digital environment. Clearly, there is a fear of lost sales, etc., on the part of copyright entrepreneurs, which certainly is a core value to publishers. If ILL were eliminated, however, librarians believe that serious scholarship and research would be severely hurt, which impacts a librarian core value. Publishers then proposed that for digital works, the CONTU guidelines be inapplicable or, at a minimum, turned around so that the suggestion of five would apply to the lending rather than to the borrowing library. Not surprisingly, this was not acceptable to librarians since all of the ILL philosophy, and indeed the CONTU guidelines themselves place the burden on the requesting, i.e., borrowing, library. Recent license agreements for electronic journals have led to this outcome, however. Some licenses for full-text journals limit the number of times that the licensee may lend to other libraries from that journal, which puts the burden for record keeping, etc., on the lending library rather than on the borrowing library. This is additional evidence of the values conflict between librarians and publishers.
E. ELECTRONIC COPIES FOR USERS
Section 108, like the remainder of the Copyright Act, was said to be technology neutral when it was enacted, and librarians believe that they may provide digital copies to users as well as photocopies if they follow the remainder of the requirements in the Act. Publishers and producers have often stated that libraries are not permitted to provide digitized copies under the library exemption. They have also said that photocopying, and not scanning, was what was intended in the 1976 Act. Certainly, in 1976, the known reproduction technology was photocopying, but Congress intentionally wanted to encompass new technology as it developed. Some publishers' concerns about digital copying may relate back to the fear of loss of control of their works mentioned earlier. Based on the background and understanding of how important ILL is in satisfying the librarians' core value of information to the people, it is easy to understand how upsetting it was to librarians to hear during the Conference on Fair Use from publishers that they wanted to eliminate ILL in the digital environment.
One could argue that adding the word "digital" to the preservation subsections means that it is also contemplated for the other subsections; or one could make exactly the opposite argument. The matter has not been litigated. Clearly, if a library is going to use digital means to provide copies for users, it may not retain the digital image for reuse. Instead, it must treat scanning just as it did photocopying, e.g., as a "pass-through" activity. Prior to enactment of the DMCA, the Association of American Publishers stated its express disapproval of scanning as a method of providing copies of documents. As stated earlier, to librarians, the move to paper photocopies and digital copies for document delivery and ILL was an insignificant technological chance. To a copyright holder, the jump was significant because of both loss of control and the fact that copies reproduced from the digital copy are perfect copies. Librarians, however, simply look at it as providing information. Copy quality for textual material is immaterial to a librarian as long as it is readable, i.e., usable.
F. ELECTRONIC RESERVES
Publishers and librarians have disagreed quite vigorously over electronic reserves. To date, however, there has been no litigation, nor even a reported cease and desist letter, over electronic reserves. Traditionally, library reserve collections contained materials such as restricted circulation collections of original volumes, journals, etc. After the photocopier arrived in libraries, libraries quickly adopted photocopying to reproduce copies of articles, book chapters and the like for the reserve collection so that the original work would not be removed from the general collection. In 1982, the American Library Association developed its Model Policy with guidelines or suggestions for reserves. This policy recognized that libraries should be able to reproduce articles, chapters, etc., for reserve under conditions similar to those for the Guidelines on Multiple Copying for Classroom Use. There are also restrictions, such as one semester use without permission, balancing the number of copies a library might make with the needs of the class, what else is assigned for the time period and how quickly it must be read. There has been no litigation over the ALA Model Policy and, in fact, little comment about the policy from the publishing community despite the fact that these were not negotiated guidelines. This began to change when libraries started implementing electronic reserve systems.
Converting photocopy reserves to electronic format makes absolute sense to librarians - they simply see no difference in photocopying articles, book chapters and the like for traditional reserves and in digitizing these same works for electronic reserves. The same guidelines can apply: it is simply the delivery of the material that is different. But a core value - information to the people - is still being followed. Publishers see considerable difference and have objected to the creation of electronic reserve collections, thus following one of their own core values: loss of revenue and perhaps loss of control cannot be tolerated without reasonable compensation. The whole point of electronic reserves is to make the material available to users from outside the premises of the library. E-reserves have the added benefit of freeing shelf space in usually cramped reserve rooms, preventing deterioration of photocopies (which often have to be recopied several times in order to keep a usable copy in the reserve collection), preventing theft of the reserve item, making record keeping, easier, and tracking use, all of which makes it very attractive to librarians.
Some libraries request permission for every item placed on electronic reserves and pay royalties when requested. Even when a library seeks permission and is willing to pay royalties, however, some publishers still refuse to allow their works to be included in an electronic reserve collection. Because the permission process for e-reserves is so cumbersome and publishers sometime steadfastly refuse to grant permission, some libraries do not even seek permission to create e-reserves, and others that do seek permission find the process very difficult to manage.
Conflicting values are readily evident in this area. During the CONFU process a working group tried to develop electronic reserve guidelines. The draft guidelines were rejected by content providers who found them too lenient and by librarians who thought them too restrictive. Based on the ALA Model Policy, the guidelines would have allowed libraries to digitize materials for electronic reserve collections under conditions similar to those permitted in the ALA Model Policy. Libraries at academic institutions could have made digitized materials for reserve available over the campus network, and students could read the materials on the screen, print a copy, or download a copy. Access to the material, however, would have been restricted to students enrolled in a course offered by the institution. The guidelines also suggested that the e-reserve system alert users that they were not to distribute further the offered materials electronically. In order to avoid creating undue demand for the digital copies of works, the guidelines suggested that the library catalog the items only at the same level of specificity as it cataloged other items in the online catalog. For most libraries this would have meant cataloging at the journal title level and not at the individual article level. Thus, the reserve items would have to be listed under the faculty member's name, the course number, and the course name rather than directly under the author and title of the article. Finally, the guidelines would have permitted a library to retain scanned images after use in the first academic term of use if the items were not available to users via the system but instead were just retained while the library and the faculty member determined whether the items were needed again. Then the library would be in the permission request process. If the items were then to be used in a subsequent term, the library could move them back to an accessible part of the server and avoid having to re-digitize the work.
One could argue that neither group was ready to deal with guidelines for electronic reserves. The fact that both groups found the guidelines unacceptable owners because they were too permissive, and users because they were too restrictive - could lead one to conclude that the guidelines achieved the appropriate balance. Nonetheless, the guidelines did not become part of the final CONFU Report. Nor has there been any litigation involving any of the huge number of academic libraries that have implemented electronic reserve collections.
G. PRACTICES IN PARTICULAR TYPES OF LIBRARIES
There are some library practices that are not as standard as those already discussed, but which are prevalent in specific types of libraries: digitizing slide collections in art, architecture, botany and medical libraries and audio streaming of sound recordings in music libraries. These practices also reflect the values conflict.
Art, architecture, and other types of libraries that maintain slide collections have been engaged in projects to digitize their collections to facilitate use of the slides for teaching and research. The central question they face is whether the digitization of slides is a fair use or whether it infringes the reproduction and distribution rights of the copyright holders in the photograph. The values of copyright holders and librarians clearly conflict here. The source of the slides in the library collection varies. For example, some of the slides in the collection are purchased, commercially-produced slides, whereas others are taken by faculty members on visits to distant sites, museums and the like. Still other slides are reproduced from photographs in books. Reproducing faculty-produced slides in digital form is less likely to be problematic since faculty members donate the slides to the library with the intention that students and faculty in the institution will use them. Further, obtaining permission from the faculty member to convert the slide to digital format should be relatively easy. If the slides are commercially produced, however, the copyright owner is not likely to agree that digitizing the slides is a fair use. Some university attorneys posit that if the slide is available for purchase in digital format, the library should acquire the digital copy from the copyright holder. If it is not available, then they believe that digitizing the slides for use in the classroom and for students to consult during the semester is a permissible fair use.
Whether digitizing library slide collections is fair use or is copyright infringement may actually depend on whether the digitized slides are high-quality and on whether the slide may be used to reproduce the image or if they are merely thumbnail images used as a catalog of the slide collection. Many art and architecture librarians certainly believe the latter is a fair use. A recent case, Kelly v. Arriba Soft Corp., held that use of copyrighted images by a visual search engine is a copyright violation but that such use may be justified as a fair use. Based on this case, it may be argued that a library in a nonprofit educational institution that digitizes its slide collection for use as a catalog is protected by fair use.
Some librarians argue that digitizing any slides for use in nonprofit educational institutions should be a fair use, but case law on this issue does not exist. Often it . is impossible for the library to determine the source of an individual image since slides from all sources have been mixed together. Further, librarians have frequently removed the cardboard folder from around the slide in an effort to save space in cramped slide collections. Most librarians do agree that the slides should not generally be available on the web but should be available only to students enrolled in a class in which the slides are to be used. Slides often are available on a web server only for the semester and then are removed. Public libraries that house large slide collections are also engaged in digitization projects or are considering them. It is less clear whether their activity would be fair use as the purpose is not to support a particular course in a nonprofit educational institution but to permit broader access to the slides. As more museums such as the Smithsonian, the Getty, and the Metropolitan Museum of Art digitize their slide collections and make them available, it may be less necessary for libraries to digitize their own collections. Instead, faculty and students may be able rely on the publicly available collections, and the faculty members may simply link to those slides for displaying them in class and making them available to their students for consultation throughout the class term.
Music libraries in educational institutions have long housed reserve collections consisting of audiotapes reproduced from sound recordings. Libraries produced the tapes from library copies of sound recordings at the request of individual instructors. Students then were assigned to come into the music library to listen to the copy of the recording. Most often the library even made multiple copies of the tapes to meet the needs of the class assigned to listen to the recordings. Whether this was infringement under the statute is problematic, but it was never litigated. The Guidelines on the Educational Use of Music certainly do not mention this broad practice. Their only mention of reproducing sound recording is the statement that copies of small portions of sound recordings could be made for the purpose of constructing aural exercises. Today, many of these libraries are using streaming audio to provide the same access that the tapes provided. Does streaming audio make a copy or multiple copies of works? And if so, does it constitute copyright infringement? The Music Library Association has taken the official position that it does not, since students are permitted to listen to the work but not to make copies. Copyright holders likely feel that this is infringement of their reproduction and perhaps even performance rights, but there has been no litigation over this issue.
H. COOPERATIVE COLLECTION DEVELOPMENT
Cooperative collection development is another traditional library practice that has been influenced by the digital environment. Cooperative collection development has existed for years, and in conjunction with ILL, can benefit both the libraries and publishers. To libraries, cooperative purchasing can make it possible for the library to acquire materials that ordinarily would be outside the budget capabilities of the individual library. Thus, it furthers the value of information to the people. To publishers, cooperative collection development may mean that one or more copies of expensive sets are sold to one library in the cooperative, which would not have been sold to any library on its own. On the other hand, publishers could take the position that cooperation presents multiple lost sales that could be made to each institution in the cooperative.
digital materials, in order to obtain better licensing terms, libraries
have banded together to sign joint licenses for electronic journals, and
the like. The only impact on copyright is that this forces libraries
either to participate in the cooperative licensing or to forego access.
This would not have been true in the analog world where ILL within the
CONTU guidelines would provide some access, and members of a consortium
could borrow items from each other including photocopies of articles when
adhering to the CONTU guidelines. Now, however, some electronic journal
licenses restrict the ability of the library to use the journal to satisfy
ILL requests. This license restriction certainly reflects conflicting
values; libraries desire to make materials widely available within the
confines of the CONTU guidelines, while publishers want the license to
restrict access to individuals within the institution.
IV. ACCESS TO ELECTRONIC PRODUCTS
Libraries have been signing licenses for many years - this is riot new in the digital age. Many traditional printed works have license agreements with them, but the use of licensed products has been increasing with the advent of works in electronic format. Traditionally, these have been negotiated licenses that benefit both content providers and users, since libraries often can obtain terms that make the works available under conditions that meet the specific needs of its users, and publishers are able to bargain for price and other conditions that benefit them. Section 108(f)(4) states that nothing affects any contractual obligations incurred by a library when it obtains a copy of a work in its collection. Thus, libraries are bound by the license agreements they sign.
Today, however, publishers are insisting on more "take it or leave it" licenses, which threaten access for users and thus conflict with a core value of librarians. Also, license agreements now often have very restrictive terms, such as limiting access to persons either physically located on the campus or who have access through the campus domain name. This does not work well for institutions that have a large number of off-campus students either in distance learning courses or in more traditional residency and internship programs. Restrictions on using licensed products for interlibrary loan have already been mentioned. The Uniform Computer Information Transactions Act (UCITA), currently under discussion for passage in the individual states, if passed, likely will make the licensing issue even more difficult for libraries as the ability to negotiate may be subsumed into standard licensing terms for many products.
There are many questions regarding licenses that libraries sign, which could then be governed by UCITA. An important question is who is authorized to "sign" a click-on license for a library that will commit it to the terms of the agreement. It is easy to say that the library director and his authorized agents have signature authority, but consider law firm libraries. If a partner in the firm clicks on a license, is it not likely that the firm (and specifically the library) will be bound by that license? While book and journal purchases most often have to go through the library in a law firm, when a user is on the Internet, it is unlikely that she will remember not to click on a license for a product that she wants to use immediately. Another unanswered question is whether a library that has signed a license agreement for access to an electronic product has done anything that signs away the fair use rights or privileges of library users. Is there a fair use right of access? The consequences of moving to a pay-per-view system may indeed mean that although users have fair use rights of access, publishers can require waiver of these rights.
B. INDEXING AND ABSTRACTING DIGITAL WORKS
The scholarly community has long relied on bibliographic information and compilations of bibliographic citations first to identify and then to provide access to scholarly and scientific literature. Bibliographies were published by libraries, scholars and organizations. Periodical indexes were also published by third parties that often were commercial in nature, but not always. Thus, libraries, scholars, and copyright holders could be assured that such indexing and abstracting services were being produced to serve the scholarly community, to facilitate the use of copyrighted works, and to make sure that anyone interested had some way to identify whether the information existed in a published format and where it might be found. The development of full-text journals in electronic format offered yet greater access. Not only would the work be indexed and abstracted by a third-party, but the full-text of the work could then be retrieved from a large database or from subscriptions to online Journals.
Beginning in the mid-1990s, the publishing community began to consider how to identify and track these digital works using some sort of digital identifier. The idea of unique identifiers is not new for the electronic environment. For years libraries have relied on International Standard Book Numbers (ISBNs) and International Standard Serials Numbers (ISSNS) to identify books and serials. The ISBN is a unique 10-digit number that is assigned to books prior to publication that helps track them through the publication and sales process. Begun in Great Britain, this system is now used worldwide for books and other monographic works. The number stays with the book or serial regardless of whether the publisher sells the copyright in the work, goes out of business, etc. Each version of a book gets a unique ISBN so there is no confusion between the hardback version, the paperback, and foreign language translations. In the United States the numbers are assigned by R.R. Bowker, and in other countries by a national book numbering agency. The administration of the international system is handled by the International ISBN Agency in Berlin. The use of ISBNs has assisted business communications among publishers, bookstores and libraries. Further, libraries use ISBNs and ISSNs to manage their own internal processes such as serials check-in and the like. Now content providers want to create a new identification system for the electronic world.
The Association of American Publishers created a committee in 1994 to design a system that would protect copyright while enabling electronic transactions. The result was a study that recommended guidelines on an industry-wide standard identifier, which would assist in controlling electronic transactions and other operations. The goal was to design a system of persistent identifiers that would be interoperable between publishers and their clients and which would serve as the basis of a rights and permissions management system for publishers. The committee recognized problems with Internet addresses and uniform resource locators (URLs), which are not object identifiers but denote only the location of objects. There are significant problems with URLs; for example, URLs disappear, and they do not specify content but simply location on a server, which can change. Publishers propose that the "digital object identifier" (DOI) replace the URL for digital works. The goal of DOls is to create identifiers that would stay with the object throughout its life regardless of whether the publisher sells the copyright in the work, merges with another publisher or goes out of business. Further, the DOI would stay the same regardless of the work’s location on the web.
The DOI consists of two parts: a prefix that contains directory information and the registration number. The DOI both specifies the location of the publisher's website where the material resides and identifies the material to the public. An example of a typical DOI is 10.1000/123456789. The portion before the slash is the prefix, which is administered by the DOI Foundation, a not-for-profit organization. Publishers purchase these prefixes. The part after the slash, the suffix, is a unique character string that identifies the specific digital object. The number is currently limited to 128 characters with at least 40 character substitutions (letters, symbols, numbers) allowed for each place in the DOI code. They are basically dumb numbers with any necessary intelligence carried in the metadata.
The DOI Foundation manages the registration system. Publishers purchase each unique prefix from the Foundation for $1000, and eventually there will also be an annual fee for each DOI a publisher registers on the DOI server. The fee will support maintenance of the DOI server. DOls can be used not only for textual digital objects but also for music, video, and the like. The annual cost will increase as publishers move from using DOls to identify large works, such as books, to using DOIs to identify increasingly smaller works, such as individual images in a collection, encyclopedia entries, etc.
At first blush, all of this appears to be a great benefit to everyone - simply substitute the DOI for other unique identifiers, such as URLs or ISBNS. In fact, with a persistent identifier, some of the problems with URLs disappear. Certainly, DOls will be used to track copyright management information and transactions, but there are other uses that may threaten the neutrality of bibliographic compilations, indexing and abstracting services that libraries and researchers enjoy today. Bibliographic data are the current identifiers that most scholars use to identify resources needed for research, to locate these materials in libraries or on the web, and then to cite the works used so other scholars can find them. Bibliographic data are factual in nature and thus each individual bibliographic record is not eligible for copyright protection. On the other hand, collections of bibliographic citations that do not represent a total universe of data may be eligible for copyright protection. Even though content often is copyrighted and publishers claim proprietary rights in the content, the abstracting and indexing of these works has tended to be separate. Indexes traditionally have been published by third party nonprofit and for-profit entities. For example, the H.W. Wilson company publishes most of the indexes of periodical literature including the Index to Legal Periodicals and the Reader's Guide to Periodical Literature. These indexes are proprietary products, the originality of which may be found in the arrangement or indexing (from the creation of the subject headings), but the ownership of the copyrights in these publications is not in the hands of content owners but rather in a third party indexer. The health sciences Index Medicus and its later electronic descendant MedLine were created by a government third party, the National Library of Medicine. Thus, control of the indexing and abstracting services, and the access to journal literature that they offer, lies not in the hands of the publishers who created the content and own the copyright in the indexed journals.
This is not necessarily true with the DOI system or indexing and abstracting systems that will utilize the DOls. Publishers are licensing each other to index and use their DOIs so that basically what is provided is hypertext. Publishers will not allow other users into their systems, so they are providing not only the content that is licensed for use but now are creating the indexing to the content, which also will be licensed. Thus, researchers may be locked out of the tools to determine even if certain content exists. In November 1999, 12 major scientific and technical publishers announced a "collaborative, innovative market-driven reference-linking, initiative" touted as having, the potential to change the wav scientists use the Internet to conduct online research. Initially, it was proposed, approximately three million articles from thousands of journals will be linked, followed by one-half million more linked each year thereafter. The publishers believe that this will enhance browsing and connecting between logically related articles with just a few clicks. The reference-linking service will be run from a central facility and managed by an elected Board, and will operate in cooperation with the DOI Foundation. It will contain a limited set of metadata, allowing the journal content and links to remain distributed at publishers' sites. Each publisher will set its own access standards, determining what content is available to a researcher following a link, such as access to full text or only to an abstract by subscription, document delivery or pay-for-view.
This should be of great concern to librarians, since scholars will not be able even to determine whether a particular paper or article exists unless they have a license to use the publishers' system or access through a library license that provides access. There will no Ionger be publications of abstracts and indexes by third party publishers, as the linking of DOls among publishers will subsume this activity. This could potentially chance the nature of scholarly research, and significantly impede research and scholarship. Not only will licensing control access, but the same publisher will control information about the existence or the work and any summary of it.
and library organizations were not involved in the development of the DOI
system or in plans for its implementation. In May 1999 there was
an announcement, however, that OCLC had joined the DOI Foundation.
The Foundation also approached the Coalition for Networked Information
to work with it to help increase the general understanding on the part
of the library community and to make recommendations on how it can be more
useful to the entire bibliographic community.
V. THE WEB AND INTERNET SERVICES
As librarians use the web to obtain information, they will be increasingly governed by licensing agreements, even as libraries also use the web to provide information and share information. Librarians see this as a new way to make information available to people, and libraries as institutions have something important to contribute. Treating the information universe as property is problematic. Librarians see information as something that should be shared. Information is not information until it is disseminated and used. The often repeated statement that information is power is not really true. Information is not power until that information is used.
Libraries were the first consumers of books and other materials. and supplied the public with information. Now that information has become increasingly valuable in this post-industrial society the production of information products has become a big business. Producers and vendors have more control over information in electronic form than in analog form because it is held in a central source and is instantly available upon demand. Thus, electronic technology and its corporate owners may hold consumers hostage as they never could in the pre-digital age. Concomitantly, the Internet is democratizing the distribution, publishing, and consumption of information. The information industry fears easy access will lead to loss of control and will threaten not only their copyrights but also the financial investment in the development of these products. Librarians worry that fair use and free access are threatened by this more stringent regulation on the part of copyright holders. To librarians, the Internet holds great promise for making materials available in ways never before envisioned. No Ionger must a researcher visit a particular library in a remote location to use unique publications held only by library. By putting these works on the web, scholars all over the world will have access to them from their homes and offices. This corresponds with a librarian core value of information to the people. Copyright holders, on the other hand, see this same activity as a threat to their economic health. Such a direct conflict in values explains why librarians and content providers have such a difficult time talking to one another about copyright and the availability of copyrighted works in libraries and archives.
Not only do libraries provide access to the Internet, they are providing Internet content. A huge number of libraries now have a homepage. A 1996 survey of public and academic libraries showed that 62% had homepages. Some libraries also answer reference questions online. The Internet gives libraries the opportunity to expand their public relations and promote their services. Digitization permits libraries to present their content along with sound and graphics and to reach a wider audience than just the local area.
The professional careers and status of librarians are based on their core values: information to the people, access to information, and the value of the public domain. Questions about whether libraries will exist in the future strike fear in the hearts of librarians because they view what they do as eminently valuable to society. Statements such as "there is no fair use in the digital environment" also threaten these values. Because librarians' core values are altruistic in nature, they often believe that their hearts are good and true: what librarians do, they do for the public good. Therefore, any use made of a copyrighted work for a user should be a fair use. The primary goal librarians seek is to help people and provide them with appropriate information they need and want, not make money. Librarians also want to provide quality service to users.
This makes it hard for librarians to accept that some of their activities may infringe when it comes to using copyrighted works to further these noble purposes. There simply is a disconnect between the public-spirited goals of librarians and the private ownership notions of copyright. The owners of copyrighted works understandably want to market their works in ways to maximize profits. The public good that publishers and producers of copyrighted works produce is economic growth, which many librarians view as overt commercialism.
In addition to this conflict in core values, both librarians and publishers and producers do not always understand copyright. Both misstate the law and make overstatements about the horrors that will befall in the digital world. Copyright holders overstate the law with positions such as there is no fair use in digital works. To wit, warnings appearing in some printed works that "No copying, of this work whatsoever" is permitted are simply wrong. Such warnings should be accurate and, if they are used at all, should include a statement about fair use. Are publishers trying to scare users into behavior that they want to control regardless of what the law permits? Or do they really misunderstand the law? Another recent example is found in the letter that the AAP sent to provosts of universities across the country. The letter purported to explain copyright law and what universities should do to educate their communities about copyright. It pointedly failed to mention fair use, however, or that many activities in nonprofit educational institutions may be fair use.
Librarians often claim that all of their activities are covered under fair use rather than recognizing that the section 108 library exemption is the proper argument. Like faculty and other users, they often say "I am a fair person, and I want to use the work, ergo, fair use." Frequently, librarians use the term "exempted under various sections of the Act" when they really are referring to the library exemption or the classroom exemption. Then, when librarians are talking to copyright lawyers and copyright holders, their misuse of terms causes considerable confusion. Additional confusion occurs when librarians fail to differentiate among the various types of copyrighted works. It is critical for publishers and producers to know whether a work is a motion picture, a nondramatic literary work, or a graphic work. To a librarian, all of these works convey information, so they are "informational works." To the extent that the Copyright Act recognizes the differences among types of works, this causes problems for librarians.
In addition to misunderstanding the law, librarians as well as publishers and producers have been guilty of overstating problems and the horrors they will encounter if the law is changed. Both have used the debates over the digital environment to try to expand their rights or positions. Librarians seek to extend fair use even beyond that permitted in the analog world, while publishers attempt to reduce or eliminate fair use. The DMCA, however, continues to provide exemptions for libraries. For example, libraries are exempted from the prohibition against circumventing technological measures if the reason they do so is to determine whether to acquire the protected work.
An unusual part of the DMCA is found in section 1204, which states that nonprofit libraries, archives, and educational institutions are exempted from the criminal provisions for anti-circumvention or removal of copyright management information. Subsection (b) states that neither the large fines nor federal prison terms wiII be assessed against libraries. Note that the library will not go to jail - the statute does not say “librarian” but “libraries.”
So, where does this recognition of the values conflict lead us? The values of librarians and publishers/producers often conflict. That conflict shapes the debate about the proper role of fair use guidelines and about amendments to the Act to facilitate movement into the digital environment for creators, publishers and users of copyrighted works. Is there any way to compromise and reach common ground? Perhaps, but only if both groups can avoid overstatements and fear tactics. If this happens, then perhaps it will be possible to return to the days when these groups actually talked with each other about how to accomplish each side's goals without unduly hampering the other's. It will take a great deal of effort on both sides to return to this win/win strategy.
Copyright © 2000 by Laura N. Gasaway. This article is based upon a speech given by Professor Gasaway at the 2000 Horace S. Manges Lecture, delivered on March 7, 2000 at the Columbia University School of Law. | <urn:uuid:aa70aa01-f6d3-4eea-809e-93eda0e18501> | CC-MAIN-2017-04 | http://www.unc.edu/~unclng/Columbia-article3.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00060-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.953104 | 23,629 | 3.046875 | 3 |
South Asia is one of the most emerging regions of the globe, both politically and economically. When talking about South Asia, were considering eight countries: India, Pakistan, Afghanistan, Bangladesh, Nepal, Maldives, Sri Lanka, and Bhutan. These are broadly the countries that are also part of the Indian Subcontinent. Indian Continent can be assumed to spread from the Hindu Kush to the Indu Sagara (Sanskrit of the Indian Nation).
South Asia has a magnificent history to trace. The story of this region dates back to 3300 BCE when the Indus Valley witnessed the most advanced civilization of its time at the urban centers of Harappa and Mohenjodaro. But today the matter of discussion is the quest for democracy by South Asia after gaining independence from colonial powers. And yes, the colonial legacy is common across the region. India, Pakistan, Afghanistan, Sri Lanka, and Bangladesh were under the direct control of the British empire. Nepal, Bhutan, and the Maldives were small monarchs but weren’t left out of the hegemony of the Brits. Therefore, the whole of South Asia shares scars of a colonial experience, and the common ground obtained from it.
India is arguably the most powerful nation in South Asia. This country of 1.3 billion strong is the second most populous and seventh largest in terms of land area. The global stature of India is growing unquestionably with the increased strategic Indo-US partnership. The Global Firepower Index 2022 has ranked India 4th out of 142 nations, just behind superpowers like the United States, Russia, and China. The International Monetary Fund (IMF) has ranked India 3rd in terms of GDP based on purchasing power parity (PPP). India is a nuclear state since 1998, which makes it even more powerful. But the country still lags in terms of HDI (Rank 131) and Per capita income (Rank 142).
Despite many turbulences, India has been successful in working under a democratic framework. Since its independence from Britain in 1947, India has never seen any attempts of a military takeover. Instead, India has demonstrated signs of a mature democracy, as the transfer of power has always been peaceful and warm in the country. But there are still question marks on the democratic system of India due to poor development, poverty, corruption, and poison of casteism. Nepotism and fierce regionalism are also a question of the democratic process.
Pakistan is the second most powerful country in the region. Since its inception in 1947, it has retained close ties with the US and the West. For the last couple of decades, its friendship with China is not to hide. The strategic location of Pakistan, connecting Central Asia with the Indian Ocean, gives it a unique opportunity. Both, the West and China need Pakistan to increase its influence in Central Asia, especially Afghanistan under the Talibani regime. Not to forget, Pakistan is a nuclear state and holds more nuclear weapons than India. The Pakistani army is ranked 9th on the Global Firepower Index. not far behind countries like Britain and France. But Pakistan has its problems.
Democracy is a failed dream for the country. Pakistan has witnessed military dictatorship three times under different leaders, most recently during 1999-2008 under Parvez Musharraf. Even when democratic leaders are in charge, the influence of the military in decision-making is prevalent. The country is very weak in terms of nominal GDP (Rank 44) and Per Capita Income (Rank 178). Performance in HDI is also unsatisfactory at 154th rank. Challenges of down-falling economy, terrorism, poverty, human rights violation, corruption, and increasing debt trap in curbing Pakistan, hence side-lining scope for a free democracy.
Sri Lanka is a beautiful island nation in the Indian ocean. Sri Lanka is known as the “Teardrop of the Indian Ocean”. Sri Lanka has witnessed many challenges since gaining independence in 1948 – a majoritarian regime, ethnic conflict, civil war, and a humongous economic crisis. The civil war between the Sinhalese government and the Tamil rebels under LTTE claimed the lives of about a hundred thousand people. Despite such a serious threat, the democracy of the nation has survived all storms. Former Lankan PM Sirimavo Bandaranaike was the first female head of government in the modern world. The country was successful in maintaining a boosting economy with strong economic indicators.
The HDI performance of Sri Lanka was seen as a miracle in south Asia given the unstable situation in the island nation. But after the post covid economic crisis, the situation in Sri Lanka is unfortunate. After getting into the debt trap, the economy and the Lankan state collapsed. President Gotbaya has fled his residence. The presidential palace is under the control of the protesting masses. Prime Minister has resigned. Markets are struck by hyperinflation. It’s complete chaos. The future of Sri Lanka is uncertain, and the present is dark.
Next on our list is Bangladesh. This country came into existence in 1972 after the fierce Indo-Pak war. From 1947 to 1972, Bangladesh was part of Pakistan and was known as East Pakistan. This Muslim-majority region was partitioned from India in 1947 in hope of more liberty and democracy. But the Urdu-speaking elite of West Pakistan treated Bengali speakers of East Pakistan as second-grade citizens. Pakistani military unleashed barbaric genocide on the Bengalis claiming the lives of more than three hundred thousand people. This ignited the fire of dignity in the hearts of Bengalis, who fought for self-rule. This quest for democracy was supported by India, which sent its army to liberate what is today Bangladesh.
After liberation in 1972, Bangladesh witnessed turbulences as the family of Shiekh Mujibur Rehman was murdered and the military took over the reins of the country. But after protests, democracy was restored in the 1990s and has been working since then. Bangladesh is one of the fastest-growing economies in South Asia and is performing well in development indicators such as GDP and HDI.
The heart-wrenching story of Afghanistan is not unknown to anybody. Often referred to as the “Graveyard of Empires”, Afghanistan has witnessed invasions by the United States, the United Kingdom, and the Soviet Union. All of them failed and had to retreat. After decades of hard-pitched confrontation between the US and Taliban, the Taliban succeded. The grand legacy of Gandhara civilization, to the hopes of the Afghan people, everything died. Afghanistan is going through a shameful period of human history, and the future is not so bright either.
Nepal, Bhutan and Maldives
Nepal, Maldives, and Bhutan all have a monarchical legacy in common. While Nepal and Maldives are republics now, Bhutan is working under a constitutional monarchy. These are small states, but of great strategic importance. Nepal and Bhutan are situated in the Himalayas between the powerful states of India and China. Both want their hegemony over the snow-laden mountains. The Maldives is located in the strategically important Indian ocean and that too on in close vicinity to the middle east and Africa. Nepal witnessed blood spilling struggle for democracy while in Bhutan it was a peaceful process. For the Maldives, it was a struggle with Britain and its Sultan.
Though there are internal conflicts between the states of South Asia on issues like internal security, border demarcation, river water sharing, and marine boundaries. There have been attempts to establish regional peace and harmony. One such attempt was the establishment of SAARC (South Asian Association for Regional Co-operation) in 1985, with all 8 south Asian countries as member states. Though it’s not peaceful and cooperative like the EU, the quest for cooperation is still underway. And there is still hope in eyes of every south Asian child – for a better future.
“Better than a thousand hollow words is one word that brings peace.”– Gautam Buddha | <urn:uuid:5b37e210-f662-4cea-b570-1562fee0679a> | CC-MAIN-2022-33 | https://myvoice.opindia.com/2022/07/decoding-south-asia-hope-or-hopeless/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00075.warc.gz | en | 0.954681 | 1,662 | 3.25 | 3 |
meaning in Hindi is
(नाला) - Synonyms and related
meaning is Debilitate, Drainage and Drainpipe and Enfeeble. Check out
similar words like Drainage, Drain Pipe and Drain Away
Hindu Translation is
- This drain smells awfully
Similar Words With Hindi Meaning
Drain Definition & Meaning In English
- (v. t.) To exhaust of liquid contents by drawing them off; to make gradually dry or empty; to remove surface water, as from streets, by gutters, etc.; to deprive of moisture; hence, to exhaust; to empty of wealth, resources, or the like; as, to drain a country of its specie.
- (v. t.) To filter.
- (n.) The grain from the mashing tub; as, brewers drains.
- (v. t.) To draw off by degrees; to cause to flow gradually out or off; hence, to cause the exhaustion of.
- (v. i.) To become emptied of liquor by flowing or dropping; as, let the vessel stand and drain.
- (n.) The act of draining, or of drawing off; gradual and continuous outflow or withdrawal; as, the drain of specie from a country.
- (n.) That means of which anything is drained; a channel; a trench; a water course; a sewer; a sink.
- (v. i.) To flow gradually; as, the water of low ground drains off.
- (a.) Capable of being drained.
Top Search Words Meaning in Hindi
Multi Language Dictionary
Drain Meaning in Hindi
Dictionary is an essential part of individual life and the world of digitalization helped to carry a dictionary in your pocket without hassle. Know the meaning of the
word in Hindi with this amazing online English to Hindi dictionary.
is an English word that is translated in Hindi and carries a lot more information on this page.
meaning in Hindi is
and it can write in roman as
Nala. Along with the Hindi meaning of
Drain, multiple definitions are also stated to provide a complete meaning of
Drain. Check the spelling of the word
here and learn the appropriate use of the
in a sentence. This English to Hindi dictionary also allows you to translate the word in Hindi to English by searching in a given bar.
Hamariweb has developed this platform with huge data of vocabulary to provide ease in learning new words, languages, and meanings. You can search your desire word meaning same as
meaning in the Hindi language with detailed information as synonyms, similar word are also provided on the related pages. Be bilingual; learn a lot of new words as a person feel better to communicate if he/she has sufficient vocabulary in mind. This mindboggling English to Hindi dictionary surely enhance your linguistic skills with is huge data of word, their meaning same as
meaning is well described here.
meaning in Hindi has been searched times till
Aug 14, 2022. | <urn:uuid:3f0c0c45-0919-48a0-ab17-3bead4f33505> | CC-MAIN-2022-33 | https://hamariweb.com/dictionaries/drain-hindi-meaning | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00270.warc.gz | en | 0.903135 | 704 | 2.5625 | 3 |
Vintage shopping in Bandung might involve digging through smelly piles of clothes and haggling, but the most dangerous part is perhaps discovering that you are running out of space in the two big shopping bags you brought for the purpose.
Back in 1996, word of a new shopping spot in Bandung called Cimol — short for Cibadak Mall— began to spread.
Cimol, however, is not actually a mall. It is composed of numerous street vendors selling used clothes at very cheap prices, some as low as Rp 5,000 (51 US cents) a piece, on Jl. Cibadak.
Reeking piles of clothes cover the footpath, while nicer ones, usually sold at a much higher price, are hung-up.
And so suddenly Bandung’s fashionistas began to rave about Cimol. Perhaps because it was the time when everybody was getting into 1960s and 1970s style and wearing bell-bottom pants and tight patterned shirts, thus, making Cimol the place to hunt for these items. Soon, Jakarta began to hear the whispers too.
However, Cimol was to be short lived as the fashion craze was all about the glimmering millennium and welcoming Y2K and so the vendors moved to Tegal Lega and Gede Bage Market.
Fast-forward to 2011, and a trip to Bandung Post Office on Jl. Asia Afrika reveals two spots selling vintage clothing. These stores, inside buildings next to the post office, have good collections and are much more comfortable compared to Cimol.
The first store is Cimol in an effort to channel the legend, and the second is Dezon.
Dezon, which is inside a colonial building, is larger and more comfortable compared to its darker neighbor Cimol. While Cimol houses only one seller, Dezon is composed of many.
Cimol is open anytime of the day unless they need to close for family matters but just to be safe go there around the same time as Dezon's opening hours, which is daily from 10 a.m to around 6p.m.
Both places sell mostly woman's clothes such as dresses, skirts, shirt dresses, tops, coats and even winter attire.
Owners of both Cimol and Dezon quoted the same source for their collection.
"Korea. Some are pre owned clothes and some are new but could not be sold because the export or import quota had been reached," the owner of a stall at Dezon said. "We buy them in volume or by weight," he added.
That could explain the signature damp, earthy smell that clings to the clothes.
Here are some tips to make your shopping for vintage clothes here a winning trip:
If you come here by car, try to park at the post office parking lot, which is easier to get to before 10 a.m or after 3 p.m.
Alternatively, park at Jl. Alkateri, preferably at the same time of the day as the post office car park.
Take the time to visit both places to compare and find the best pieces. When you do find clothes you like, put them aside as it's going to be hard to find them again!
The sellers here are really nice, so even if you do not buy anything it is unlikely that they would mind.
Cash only. Set a budget aside and stick to it.
Bargain. Do not always agree on the first price.
Check for defects and stains. Judge if you can reduce or remove the stains by normal washing. If you shop at Cimol always check by bringing the clothes outside to the bright light. If you decide to buy, despite imperfections, try to ask for a further discount.
Bring some wet tissues not only to clean your hands but to test if the stain on the fabric is easy to remove with proper washing.
While you are in the neighborhood, reward yourself with a nice cup of coffee and kaya toast at the vintage Warung Kopi Purnama at Jl. Alkateri, which is located within walking distance.
Read also: Finding treasures in Jalan Surabaya | <urn:uuid:d92267af-f5c8-4a6a-89b1-87ac4152f07d> | CC-MAIN-2016-44 | https://sg.news.yahoo.com/shopping-vintage-clothes-bandung-170000211.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718285.69/warc/CC-MAIN-20161020183838-00107-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.967719 | 875 | 1.71875 | 2 |
Using a Launch Screen StoryboardDec 24, 2014 · 6 minute read · Comments
Static Launch Images
Launch images are what iOS displays whilst loading an App to give the impression of a responsive system. Creating these static launch images for the growing number of screen resolutions has become something of a pain in recent years. At the time of writing the list of possible launch image sizes is below (sizes include the status bar region). I have omitted the landscape versions for brevity:
- iPad 2 and iPad mini (@1x): 768 x 1024
- iPad and iPad mini (retina @2x): 1536 x 2048
- iPhone 4s (retina @2x) 640 x 960
- iPhone 5 (@2x): 640 x 1136
- iPhone 6 (@2x): 750 x 1334
- iPhone 6 Plus (@3x): 1242 x 2208
There is some good news with Xcode 6 and iOS 8 which allow a NIB or storyboard launch screen file to be used. By taking advantage of auto layout and size classes a single NIB or storyboard file automatically creates the launch images at runtime. Note that if you want to properly support the larger iPhone 6 and iPhone 6 Plus screen sizes in fullscreen mode without scaling you must supply the appropriate launch images either as static images of dimensions as listed above or with a storyboard launch screen file.
(Updated 26-Dec-2014: made it clearer that supporting iPhone 6 and iPhone 6 Plus requires you to provide the launch images but they can be static image files or from a launch screen file).
Using a Launch Image File
Xcode 6 adds a LaunchScreen.xib file by default to new projects. For an existing project add a new file using the Launch Screen template:
Note that this will add a NIB file to the project which is fine if you have a single view or view controller on the initial launch screen. If you have multiple views you will need to ignore the launch screen template and add a storyboard. You should also specify the launch screen file in the project settings for the target:
This will add the Launch screen interface file base name (UILaunchStoryboardName) key to the application plist file:
At this point you can layout the launch view in Interface Builder using autolayout and size classes as necessary to create suitable images for each screen resolution. The Xcode template does not provide a very good example as it provides a splash screen style layout with the app name and copyright statement that you will probably want to delete before adding your own view layout:
You can preview the storyboard in Xcode or test it in the simulator or on an actual device. Since the launch screen is only briefly displayed you may find it useful to set a breakpoint on application:didFinishLaunchingWithOptions: in the App delegate.
Launch Screen Constraints
The system loads the launch file before launching the app which creates some constraints on what it can contain (some of which may force you back to static image files):
The app is not yet loaded so the view hierarchy does not exist and the system can not call any custom view controller setup code you may have in the app (e.g. viewDidLoad)
You can only use standard UIKit classes so you can use UIView or UIViewController but not a custom subclass. If you try to set a custom class you will get an Illegal Configuration error in Xcode.
The launch file can only use basic UIKit views such as UIImageView and UILabel. You cannot use a UIWebView.
If you are using a storyboard you can specify multiple view controllers but there are again some limitations. For example you can embed view controllers in a navigation or tab bar controller but more complex container classes such as UISplitViewController do not work (at least not yet).
Localizing the launch file does not currently seem to have any effect. The base localization is always used so you will probably want to avoid text on the launch screen.
You cannot specify different launch files for iPad and iPhone. This may be a problem if you have significantly different interfaces for those devices as there is only so much you can do with auto layout and size classes.
Note that if you are deploying to iOS 7 you will still need to include the static launch image files. You can include both a launch image file and static launch images. Devices such as the iPhone 6 running iOS 8 will use the launch image file whilst iOS 7 devices will fallback to the launch images.
Split View Controllers
If your root view controller is a split view controller you do not have too many options at least with iOS 8.1. If you add a split view controller to the launch screen storyboard it will not load. The increased flexibility of split view controllers in iOS 8 also makes me suspect they will not be supported any time soon.
Other than going back to static launch images the only alternative seems to be to simplify the user interface by ignoring the split screen. For example consider the following iPhone and iPad launch screens that use a split view controller. On the iPhone (compact width) device the initial screen shows the master view controller (a table view controller embedded in a navigation controller in this case):
On the iPad (regular width) device the initial screen after launch shows the master and detail view controllers in a split screen layout:
This is a very common setup but there is no good way to use a Launch screen file in this case. I am open to suggestions but the closest I can get is to ignore the split screen and use a view controller embedded in a navigation controller as the launch screen.
It is far from perfect but it does as least more or less match the initial user interface on all devices (albeit without the split on the iPad). As a launch image intended to give the user the impression that the app is loading it may just about be good enough but you will have to judge for yourself.
Runtime Generation (added 28-Dec-2014)
The Apple documentation does not make it clear but the required launch images are generated by the system at runtime. This was briefly mentioned in the WWDC 2014 Platform State of the Union session (at about 1hour,22minutes). You can verify it by looking at the application container of an App deployed to a device or the simulator. The launch images required for a specific device are cached in Library/Caches/LaunchImages. The following screenshot shows the launch images generated on an iPad Air 2:
For comparison the following screenshot shows the launch images generated for an iPhone 6 Plus: | <urn:uuid:a6400558-a1a9-4977-aabc-8b0a946b15c2> | CC-MAIN-2017-04 | http://useyourloaf.com/blog/using-a-launch-screen-storyboard/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00028-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.894905 | 1,351 | 1.804688 | 2 |
Why is focal length measured in millimeters?
Firstly, distance is used for focal length because it measures the distance between the plane of the lens and the point at which refracted rays meet at a point, when the incident rays were parallel. Below is a simple diagram of a single lens. Note: This is only for convex lenses.
The use of millimetres is simply because it is a scale appropriate for this measurement. i.e. the most extreme lengths don't become numbers that are too large or small for us to comprehend easily. Theoretically any measure of length or distance can be used, but this becomes impractical. For instance a 50mm lens could also be said to be approximately 5.28511705 × 10^-18 light years or 0.0005 Km. Both of those measures are extreme but valid, although not practical.
Why not centimetres? Many lenses have focal lengths that are not whole centimetres, and if possible it is better to represent a number without decimal points, and so mm is a more practical unit. There is almost certainly a historical/traditional reason as well.
Camera lenses work on the same principle as the simple single lens, but include many elements for focusing and telephoto purposes.
Because saying you have a .0002485 furlong lens is a lot more cumbersome than calling the same lens "50 mm".
Focal lengths of common lenses happen to be in the range so that integer mm works well. The numbers don't get rediculously large or small, and 1 mm is less than the accuracy we usually care about, but not overly so. In other words, it's a convenient unit.
Whilst it is used to express the field of view, the focal length of a lens is an actual distance - the distance at which a focussed image is formed from parallel rays. As such any unit of distance could be used - if you look at really old lenses you'll often find it stated in inches. Most of the world has now adopted the metric system so that is what is used (for the sake of standardization, also most lens manufactures are based in Europe or the far east). They could have chosen centimetres or meters but that would have involved using decimal places.
It just happens that the millimetre is just fine enough to specify all common focal lengths as whole numbers.
The other logical way to characterize a lens could be by the FOV angle it produces.
We would not longer require to think in "35mm equivalences", but we'd need change the designation of the lens depending on the size of the frame/sensor it's being used on. So it seems that denoting the focal length (in any unit) is more convenient, as it does not change if a lens is used on a medium format, full frame, apsc of 4:3 body.
And we would also need to agree beforehand if the angle is measured horizontally, vertically or diagonally too. And then if we measure it in degrees or radians!
The point about appropriateness of unit size is well taken, however, just like fonts are measured in points (which are 1/72 of an inch) focal length could well have been measured in some scaling of an inch that gave similarly well behaved numbers. I think that the use of the millimeter came about because a bunch of early tinkering with photography was done in Europe, specifically in France which had just adopted the metric system and so the early technical people went for mm, rather than some fraction of inches. I have no sources for this conjecture, however. | <urn:uuid:ddf8a3f8-d8c9-4e1b-a0ad-9f653ff9a30f> | CC-MAIN-2022-33 | https://photo.stackexchange.com/questions/42767/why-is-focal-length-measured-in-millimeters/42820 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00074.warc.gz | en | 0.966417 | 743 | 3.734375 | 4 |
This outlines the 2015-16 National Fairgrounds Intervention Team (NFIT) intervention programme. It focuses on:
The 2015-16 NFIT programme aims to ensure high risk fairground equipment is manufactured, imported, inspected, maintained and operated so that it is safe. It will contribute to the Leisure Sector Strategy objective ‘avoiding catastrophe’.
Larger fairground rides are capable of giving rise to catastrophic incidents affecting large numbers of people. These are ‘low frequency but high consequence risks’ and those affected are likely to be mainly children and young people at leisure. Any such incident is likely to attract public and media attention.
Intelligence from previous NFIT inspections and investigations suggests:
Concerns are still being raised about controllers failing to address issues identified during previous investigations and brought to their attention in HSE Safety Notices.
A number of high speed, high risk rides (Freak Outs, Starflyers etc) have recently been imported from previously unknown manufacturers in Eastern Europe. Sector enquiries have shown that in some cases a lack of design and manufacturing detail has led to inadequate pre-use inspections (design review, assessment of conformity to design, initial tests). Sector is working with controllers to ensure the inspection reports are reviewed/re-conducted as necessary.
At fairground visits during 2015-16, NFIT inspectors should concentrate on;
Between 2001–02 and 2009–10, fairground accident statistics showed a downward trend for both employees and members of the public. There was an increase in reported accidents to members of the public in 2010–11.
HSE statistics from 2011–12 to date show further increases, although analysis suggests this may be partly due to changes in reporting arrangements.
Ride controllers may have their rides inspected by any competent person. They should be able to describe the steps taken to assure themselves of the competence of their ride inspector. HSE has extensive, in-depth knowledge and experience of the industry run ADIPS scheme for pre-use and in service ride inspection. Because of this, HSE considers that registration with ADIPS is good evidence that a ride inspector is capable of working competently. However, NFIT Inspectors should be aware that ADIPS registered inspectors have, on occasion been prosecuted following incidents due to a lack of diligence in their inspections.
Visits to the specific machines mentioned previously may be conducted:
Visits to small fairs may be conducted:
Visits should be targeted on the basis of local or national intelligence which may include:
Crazy frog machines are more likely to be found on medium and major fairs. Superstar machines are comparatively rare and visits will have to be planned in order to see these. Sector will provide detail of machines with their owner’s names and addresses to NFIT who can then organise visits.
This work should be undertaken by NFIT trained Inspectors and, when required, by Specialist Inspectors with NFIT experience. FOD has allocated resource for the proactive NFIT work.
Divisional Intelligence Officers will be given details of fairs to be visited before the start of the work year in order that Service Orders can be raised.
COIN Recording requirements are as per FOD guidelines. Inspectors are reminded that NFIT work should be recorded under NFIT FMU 25.
Entertainments and Leisure Sector.
Based on recent incident history, the sector has selected the Crazy Frog and Superstar type machines, for closer scrutiny over 2015-16.
The Crazy Frog type machine was subject to a Safety Action Notices (SAN) requiring controllers to conduct certain examinations, make physical alterations to the machine and/or change operational use. Certain types of the Safeco Crazy Frog machine are the subject of a recent HSL Study. The Superstar was the subject of a major investigation/ intervention in 2002–2004.
The purpose of focussing on these machines at visits is to confirm that the controller has taken all necessary actions in accordance with the SANs, letters or previous HSE guidance/enforcement and if not, to take appropriate action to ensure that the remedial work is carried out or working practices altered. Sector will, if required, provide details of fairs and the locations of the rides in scope and will liaise with individual NFIT teams as required closer to the fair dates.
This has been involved in number of serious incidents since first imported into UK some 20 years ago. The majority involved:
The machines in scope are a version made by a Spanish company called ‘Safeco’. An openly published HSL Report of a S&T study into these matters can be found at ‘Further References’ above.
The majority of serious hazards affecting both riders and the machine’s structural integrity identified in the HSL Report were attributed to the Controller’s ability to make sudden changes to pneumatic pressure in the machine. This can be addressed by the fitment of a pneumatic restrictor and some Controllers have done this. The restrictor valves have been fitted near to the pay box so they are visible.
Machines without the valve fitted must:
Machines with the valve fitted:
Sector should be informed if Controllers have not used the NDT Schedule provided in the HSL Report.
NFIT Inspectors should take enforcement action as necessary to ensure the machine is run safely. Sector will provide advice and support for action if necessary.
The Superstar class of machine has suffered catastrophic weld failures at positions shown in the diagram below. Investigation into the causes was extensive and resulted in all of these machines requiring remedial work and/or changes to their operation. Enforcement Notices were issued during the investigation and the final PN required alterations to the operating procedures and a comprehensive, in depth NDT regime. This last Notice was unsuccessfully appealed and the regime outlined in the Schedule should still be in force unless equally effective measures have been put in place.
Enquiries following an accident involving a Superstar machine in Northern Ireland in January 2013 showed that many of the machines running in the UK are no longer complying with the regime in the Schedule or put in place equally effective measures.
See ‘further references’ section for copy of the Schedule to the Notice and letter sent to all current ride controllers and inspection bodies reminding them of the standards required.
Inspectors should check that these machines are being operated and tested either in accordance with the Schedule or to an equivalent standard.
Matters of evident concern likely to be found include:
Once identified, Inspectors should take appropriate action to resolve issues as necessary with support from Sector if required. | <urn:uuid:49d1b7a7-e345-4130-a530-28f7c006164c> | CC-MAIN-2017-04 | http://www.hse.gov.uk/foi/internalops/og/og-00070.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00560-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.950482 | 1,353 | 2.21875 | 2 |
GOOD FRIDAY, MARCH 25, 2005
Sermon based on John 18:1-19:42 (RCL) by David Zersen
(->current sermons )
“… Jesus said, ‘It is finished.’ With that, he bowed his head and gave back his spirit.”
COMPLETED IN YOU AND ME
Sometimes reviews can be misleading. Do you ever feel that way? I like to read movie reviews to determine whether I’m going to see a film or not, but I don’t always accept what the reviewer says. Sometimes I need to read several of them. Some bring biases to their reviews, which are not helpful. Sometimes reviewers read one another’s reviews and don’t want to go out on a limb and say something radically different in their own assessment. Sometimes the snowball effect of bad reviews can doom a movie’s acceptance at the box office.
Personally, I think this happened recently to M. Night Shymalan’s The Village. Shymalan developed a good reputation for his cryptic sci-fi plots in The Sixth Sense and Signs, but many felt that TheVillage was too repetitious, that Shymalan needed to get a new angle and that the ending left viewers cold. That, however, is to miss the point of a story which has profound theological dimensions and a powerful application to the meaning of the events of Good Friday.
Two forms of community—one controlled and one free
The story in the film begins in Covington, an isolated village on one side of a deep forest, which no one has crossed in decades. The buildings and the dress of the people, not to mention their archaic language patterns, suggests a time in the 1800s, but the reality is that the time is now. These villagers have isolated themselves, or rather the religious elders of the village imposed an isolation, because, as we later learn, there are things that were done in the outside world which were evil and unspeakable. It’s ambiguous whether the elders themselves were involved in some of the evil, but they chose to stigmatize the people in the towns on the other side of the forest and forbid anyone ever to go there. They would not even allow the villagers to call them by name, regarding them instead as “those whose names we do not mention.” They made up frightening stories about huge creatures who inhabited the forest to assure that no one would dare enter it—and get to the proscribed towns on the other side. As a result, they kept their secret about their complicity in the evil, and they remained provincial and separated, a world apart.
Now the interesting thing is, and we learn this only later, that the same thing is happening on the other side of the forest. When the blind girl from Convington finally breaks through the forest and is discovered by a security official who bears the same name as her own father, we learn something about the other side. The young security official’s boss and father tells him not to concern himself with people from the other side of the forest because this will only create problems for everyone. No one probably remembered what the initial issues, which separated the two groups, were, but they had addressed the problem by scapegoating each other, and in this toxic atmosphere controlled by the leaders of the respective societies, life went on.
It went on, however, with a dirty secret covered up—the secret that certain evil actions had been performed (the words rape and murder were mentioned among them) which were never resolved. The truths about them were repressed. And each side somehow knew that the other was at fault. This process of scapegoating has been called a good/bad technique by Rene Giruard, who has given much thought to these issues. On the one hand, as long as you can identify the evil as belonging to some other individual or minority, you are free to live as if this evil had never happened. On the other hand, to maintain this false freedom, you must maintain the charade resulting from scapegoating, and that is to insist that only others have responsibility for evil, never you yourselves.
Of course, you realize that this is a dead-end situation. This is why the people in Covington never grew up, remained provincial and other-wordly. It is a profound parable about human life, which Shymalan tells in The Village. How to bring about a change?
The change happens only when the power of the old generation, the elders, is destroyed, and the new generation begins again, not with a controlled environment, but with an accepting, caring, emancipating openness. This, in fact, happens in the story as the young blind girl, Ivy Walker, returns with the medicine provided by a caring young distant cousin in the towns, that her beloved young friend, Lucius, so desperately needs. The movie ends by offering the viewer who has been lost in this subterfuge of human scheming, a new sense of hope.
Good Friday’s new opportunity for human community
What does all this have to do with the events of Good Friday? The Good Friday story, like many a movie, is subjected to bad reviews. People don’t like blood, violence, or the prospect for politically incorrect caricatures of events. Furthermore, there seems to be confusion as to what God’s role in this might have been and whether it makes sense to understand God as a judge who demands unreasonable righteousness from us, or the transference of our unrighteousness to Jesus. It all seems very complicated.
At a simpler lever, this much is clear. There was a community of people who controlled the quality of life in their society by making clear who was acceptable and who was not. We know the names of these groups. That’s not important here. What is clear is that elders of the “village,” if I may call it that, knew that evil existed in the minority whom they had clearly identified as outcasts: blind, lame, dumb, lepers (all unclean), tax collectors, and prostitutes. These were sinners and not to be regarded as part of the community of the exclusively righteous. One could even say, although these poor were actually everywhere, the religious elders treated them as if they did not exist—as if there were a forest between the two groups. They lived in their separate societies. The Pharisees knew where evil lay in their world—and it did not lie with them.
Where did Jesus stand in all of this? We know this answer for sure. He sided with the scapegoated minority, with those who were “unmentionable,” the sinners, who, of course, knew themselves for what they were. And we are told, “they heard him gladly” when he called them the children of God. The religious elders, by contrast, were in trouble now. The Romans had told them, we will leave you alone if you do two things: pay taxes and assure that there are no uprisings. What to do with this Jesus, they asked themselves? “It is better,” we remember Caiphas saying, “that one man die for the people than that the whole nation perish” (Jn. 11:30). So, in their traditional way of dealing with evil, they made Jesus the scapegoat, identified him as the ultimately evil one, and did away with him.
Of course, to some this is politically incorrect language, bordering on anti-Semitism. But that is pure foolishness. Not only did the people of that day do what people have always done when they could not reconcile the problem of evil, but these same people later became the first converts and the most ardent evangelists of the very one they crucified. Is it anti-Semitic also to remember such things? Anti-Semitism has to do with hating people for what they are, not with calling attention to ways in which they are like all other human beings.
Here is the miracle of Good Friday and the sense in which this story is very much like what came to pass in the movie The Village. On the one hand, God accepts this lynch mob’s way of dealing with evil, this scapegoating to end all scapegoating, as a kind final word on the matter. Since time immemorial, societies, and individuals have tried to deal with the problem of evil by blaming someone else. All too often, the blame is applied, in more primitive societies, to the vulnerable: the village idiot, the gypsies, the homosexuals, the muslims, the retarded. I get tears in my eyes every time I remember the memorial in Neuendettelsau, Germany, to the retarded people who were taken from this Lutheran city of refuge to the gas chambers by the Nazis because they made no meaningful contribution to society and probably created problems for it! In more educated societies, we like to think we are free from this. However, without becoming politically radical, you and I can name peoples and individuals who, within the last two years, have been scapegoated by our government and our society in general because we have been unwilling to address some of the causes for evil in our world which lie not outside us, but within our very selves.
It is the evil in this very process which, once and for all, God sought to bring to an end at the crucifixion of Jesus. In the great “NO” of the Jewish people—and of all mankind, for all of us are guilty—to Jesus, God gave his “YES.” It is this Jesus who befriended and loved the minorities, the outcasts, the sinners of this world—this Jesus who befriended and loved you, whose death shall not be the last word. From his death a new beginning will emerge.
Beginnings without end
On the first Good Friday, there were several human options in the face of Jesus’ crucifixion and it’s worth remembering what they were. Paul Heim, in an article in the Christian Century, suggests two of them. One of the hopes of people who practice scapegoating is that everyone will rally around the elders and support their point of view and forever separate themselves together against the repudiated minority. This happened in the first generation at Convington in The Village. It did not happen to all in Jerusalem. Another option is to initiate a spree of violent revenge against the perpetrators of the scapegoating. This also did not happen. Both approaches would have meant that our essential human problem has not been overcome, and that the crucified one died in vain.
What did happen was that an odd new counter-community arose which was dedicated to the innocent scapegoat whom God vindicated by resurrection. It was a gathering of brothers and sisters who held all things in common, who met daily for prayer and celebration of the Eucharist, and who cared for each other in love. It was the new generation that had to succeed the old if a new beginning for our world was to begin.
Isn’t it interesting that in the resurrection appearances of Jesus, he inevitably greets those who approach him dumbfounded with the word “peace”? One might assume that a sacrificed, scapegoated, innocent victim who returns miraculously in power to those who had either persecuted or abandoned him would have other words. Only the one who with the word “peace” on his lips can help us discover that a new beginning took place for us on Good Friday and at Easter.
What can such good news mean to you and to me? Think with me for a moment about Jesus’ last words on the cross, typically translated, “It is finished.” And the words which follow, those the King James Version had us calling “giving up the ghost,” but which really means “he returned his spirit to God,” because his task was finished. What is finished here? A better translation might be, “It is fulfilled.” The long night is over. A world which has typically tried to find community—and individuals which have typically tried to find self-worth—by excluding evil and by branding each other—that world has a new option. It is what we have been waiting for. And it has taken place, of course, so that we can take advantage of it. That means, this opportunity for the new generation of believers happens only when you hold one another and our society accountable for the scapegoating which still goes on among us. It is complete when you and I celebrate the grace that removes the necessity of it taking place in you and me. Jesus’ death is fulfilled when we accept responsibilities for our own failures and sins, and let his own acceptance of us all be the basis for our acceptance of others.
Prof. Dr. Dr. David Zersen, President Emeritus | <urn:uuid:e987095f-cebc-474b-befd-eee8579fe166> | CC-MAIN-2017-04 | http://www.predigten.uni-goettingen.de/archiv-7/050325-8-e.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00284-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.980848 | 2,665 | 1.539063 | 2 |
In general , the automation of the business organization process provides a pretty expert reward for the evolution of a fellowship. Any manual work tin can live completed quickly in addition to efficiently alongside automated business organisation processes. As a class of automation, tools are needed to support this business concern procedure. What tools do y’all involve to automate business processes? Here are some tools that y’all must fulfill.
Customer Relationship Management (CRM)
CRM is software that manages your contact listing intelligently. This tool non alone records the contact information of each of your customers, only also helps to record the details of the human relationship in addition to every interaction y’all take amongst the customer, either by phone or past e-mail . This information is a goldfield for your company to identify sales prospects, assistance customers go to know its products as well as services, target markets, in addition to fifty-fifty track invoices . The use of CRM will assistance yous increase productivity, sales, as well as even increase customer satisfaction.
HR Applicant Tracking System (HR ATS)
System tracking applicant or applicant tracking organisation volition live real helpful inwards HR to find candidates that correspond the needs . This tool will record anyone who has applied to your companionship likewise equally who y’all have currently accepted to run alongside. All the data y’all necessitate to assess the character of applicants tin also be recorded properly thanks to this tool . There are filtering categories that you lot tin purpose to choose applicants according to fellowship needs and then that the procedure of selecting prospective employees tin live more efficient.
HR Management Tools
When yous kickoff a business organisation, y’all tin cheque 1 by 1 worker attendance by going about the role. However, this will live rattling time-consuming when y’all accept recruited more employees. This does not include adding novel employee data, tracking employee data, updating employee data, too tracking employee operation each calendar month. All of these things volition be really slowly to make if you lot function HR Management Tools . Equipped with a cloud-based organization , you tin can discover out the data of each employee inward merely a few steps, no matter where yous are. Sleekr HR, is ane of the best cloud-based HRIS which is rattling easy to role for your concern. You tin can tryfree hither immediately.
Accounting work is real tiring. If y’all take the employees to do it, of course not a problem. However, what if your society is simply a minor company that hasn’t been able to recruit accountants? Of class yous volition non have fourth dimension to make that. Accounting tools volition assistance yous complete this task. Just come in the required data and all problems will be resolved inwards but a brusk time. From customer direction to invoicing , everything is inward lodge.
You volition easily do information analysis together with monthly reporting alongside this tool . Warehousing systems generally combine various methods, user management systems, data manipulation systems, together with other technologies that are useful for knowing the weather of a fellowship’s evolution. In sum, warehousing will assist you to analyze the evolution of your companionship. That style, you volition empathise what companionship strategy is correct for your companionship. Actually, this warehousing organization tin can be combined alongside the society’second accounting system, for example inwards Sleekr Accounting , with the warehousing characteristic. so the companionship tin easily monitor the status of its warehouse directly amongst the wellness condition of the fellowship. Register at once for gratuitous hither .
Social Media Monitoring
The beingness of social media as a tool to increase make awareness is really necessary for whatsoever companionship that wants to innovate their products to customers. However, there may not be fourth dimension to make all of this. Simplify your social media affairs with particular tools that are able to monitor your social media activities. How to increase the number of your followers , the evolution of engagement , to effective content for your social media volition live good measured cheers to this tool .
Those are close to of the tools that y’all must use to automate your concern processes. The relaxation together with efficiency offered by these tools volition assistance the fellowship to educate even amend inwards the futurity. | <urn:uuid:6a1c6fd7-f5b3-4cb2-879a-fc7d0dcc8ed8> | CC-MAIN-2022-33 | https://runcarneros.com/half-dozen-important-business-organization-tools-you-lot-will-call-for-to-automate-business-organization-processes/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00267.warc.gz | en | 0.925344 | 898 | 1.578125 | 2 |
Get stuck into our free typographic tutorial for combining the Eiffel Tower and type
Using a Foreground colour of a light black (#121212) and a Background colour of pure black (#000000), select a radial gradient (G) and draw onto a layer below the tower. The effect should be quite subtle.
To help you stay within the Eiffel Tower’s shape, it’s a good idea to draw the outline. To do this quickly, select the Pen tool (P) and create a large shape, bearing in mind it doesn’t have to be perfect.
To be able to see the intricate designs below, make both layers opaque by changing the transparency to around 40% each and then lock the layers (click on the padlock icon) so they don’t accidentally move while you work.
As the layer is no longer text based, you can start warping and manipulating the shape. With the layer selected click Edit>Transform>Warp. The shape then turns into grid, which you can manipulate in any way you want.
For individual characters we can turn a letter into a shape layer and then play with the anchor points. With the layer selected, click the Direct Selection tool (A) and pull or push on the individual anchor points.
Just like the engineer Gustave Eiffel, gradually build your tower from the bottom up. Notice how we’ve used a combination of different characters and effects. You can even play with different fonts to achieve a unique style.
Instead of having all the shapes filled with a single block colour, you can add some variation and just have some text outlined. To do this, select the shape layer, Ctrl/right-click and select a stroke in the Layer Style menu. Choose your colour and thickness and press Enter. To remove the inside fill, change the Opacity to 0%.
Another handy technique is to draw on a path. This means you can wrap text around a shape that curves. Select and unlock the guide layer we drew earlier, then grab the Type tool (T) and hover over the shape. You’ll notice the mouse arrow change. Type the text as it follows around the guide.
Now select all the text layers and group them all into one folder (Layer>New>Group From Layers). Now duplicate this folder and hide one (so we can keep the original layers safe). Ctrl/right-click the new group we’ve just created and merge them into a single layer. Hide the guide layer and photo as well.
It’s time to name your creation. Use whatever title you wish to sum up the image and try placing it in different positions around the page to see which one works the best. Remember the gradient colours you used in the previous step? You can use the same on the text as well!
To take your creation to the next level, add a light texture to the whole document. Place the texture layer over your work, desaturate the image by hitting Cmd/Ctrl+Shift+U and then change the blending mode to Overlay.
We need to add a bit more vibrancy to the document. Create a new layer and select #ffd200 for the Foreground colour and #000000 for the Background. Go to Filter>Render>Clouds and set the layer to Overlay at 40% Opacity.
Just before you finish, create another layer and change the Background colour to #ffffff. Go to Filter>Render>Clouds and this will fill the layer with gold and white clouds. Change the Opacity to around 40% and you’re done! | <urn:uuid:b39c0434-08e9-4ecc-a752-1a9024a0c6e8> | CC-MAIN-2022-33 | https://blog.photoshopcreative.co.uk/blog/tutorials/how-to-combine-photos-with-type-for-artistic-effects/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00675.warc.gz | en | 0.850409 | 750 | 3.328125 | 3 |
(IBList user synopsis):
Space explorers think the alien they just found may help the space agency address policial issues.
First published in Amazing Stories.
Reprinted in Ellison Wonderland.
Original title: Savage Wind
Genre: Fiction→ Science Fiction→ Alien Beings→ First Contact
This work is a subwork of the following works :
Ellison Wonderland (1962) [Collection]
Author: Harlan Ellison | <urn:uuid:dc7b323f-e4e2-4a63-b655-3829b045ee24> | CC-MAIN-2017-04 | http://www.iblist.com/book33481.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00162-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.784751 | 90 | 1.585938 | 2 |
With various fun and trendy applications popping up in the market, more and more programmers wish to try their luck in application development. But programming and mobile app design services is going to take more than just a few bright ideas for it to succeed. The commitment and the amount of hard work it requires can be very challenging, even for programmers.
But not to worry, we’ll walk you through this and guide you every step of the way so you can achieve your goal and successfully develop an iOS application.
- Generate Idea
Every plan starts with an idea. Be creative and come up with something unique and quirky that will set your application apart from the existing software we currently have in the market. This will give you the edge and help you stand out in this diverse and widely competitive field. If brainstorming is a task you find difficult, you could start with something simple and then slowly build it up by adding additional features and functions. You should also determine the vital info of the application such as: the target market, its features and objectives, future competitors and so on.
2. Market Research
Doing market research is a vital part in iOS application development services as this will show and pull data of the demand in the market, how you can better improve your functions, design, marketing and will give you a clear idea of your competitors and how you can appeal more to your target audience.
3. App Wireframe
App Wireframes will bring your ideas into life. This will serve as a blueprint and give a structure to your plans through application sketches or layouts. The mobile app design services’ main objective is to create a visual representation of the app’s functional requirements, user experience, interface and overall print design.
The development phase is where the application will finally be produced and created. This includes several tasks and stages such as programming, coding, preliminary testing and many more. It is further divided into three major parts: the backend, the API, and the front end of the mobile app.
5. Testing Phase
Once the app development is done, it is only necessary for it to enter the testing phase. It will be run and monitored by developers to further evaluate its performance, transition, security, and debugging. If it encounters any problems, developers can automatically make tweaks and adjustments to provide users with a better enriching experience.
6. Application Launch
After adjustments and several testing, it is time to launch the application into the App Store. You can accomplish this by simply submitting an application and wait for Apple’s approval. This might take a couple of days or even a week or two.
Don’t forget that the application launch isn’t the end but is merely the beginning of your journey with application development. You must constantly optimize and upgrade your mobile app design services along with its functions to grow and increase your audience to achieve better results. | <urn:uuid:7fda7207-985e-40cc-8473-4f0508d1d959> | CC-MAIN-2022-33 | https://www.2ndoffice.co/blog/want-to-learn-how-to-develop-an-ios-app-heres-a-step-by-step-guide-for-ios-application-development-services/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00471.warc.gz | en | 0.945504 | 594 | 2.015625 | 2 |
Discover how to create, manage, and deliver interactive reports—not just to print, but to dynamically explore enterprise-level data—with Reporting Services in SQL Server.
- Microsoft (2)
- SQL Server
- Appropriate for all (959)
Investigates several key database-programming concepts and how to combine them to create a high-quality database with Microsoft SQL Server.
“Words cannot express how much you people at lynda.com have changed my life. I have learned more than I could have from reading books.” —Joseph A.
more from our members » | <urn:uuid:cbcbc499-452d-4f56-99c5-c8bafee86294> | CC-MAIN-2016-44 | https://www.lynda.com/allcourses?lpk0=320&pod=ci_blog&category=advanced_339,sql-server_456 | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719215.16/warc/CC-MAIN-20161020183839-00200-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.910873 | 125 | 1.671875 | 2 |
See the Security Bsides Atlanta talk (when it gets posted) at http://www.securitybsides.com/w/page/58266249/BSidesATL-2012. Powerpoint slides can be found here.
The people over at PwnieExpress are coming out with a neat device called the Power Pwn. This device follows up on the Pwn Plug and the PwnPhone (Nokia N900). With my experience as a penetration tester and junior hardware hacker I’ve been working on my own “pwn” hardware. I have a Nokia N810 as well as an Alix 6f2 (PCEngines.ch). I purchased an APC BE650R Battery Backup Power Strip off of Ebay and gutted the inside to fit the Alix board. I integrated the Alix connectors for the serial, ethernet, and external antenna connectors with the existing APC coax, rj45, and rj50 ports. The setup has an internal Xpal portable netbook charger that can run the Alix board for over 4 hours. However, the main power to the board is integrated with the APC power strip. Plugging in the APC will run power to the Xpal battery which in turn powers the Alix. Four of the eight plugs on the APC are also functional. I created a simple DB9 to RJ45 adapter for the serial connection so I can properly configure the device before use. Since the Xpal battery powers it for 4 hours I have plenty of time to get it configured and to its final pwnage destination. I didn’t take any photos of the gutting of the APC but it involved a lot of dremel, plastic nipper, and xacto knife work. I do have photos of everything fitting together. The only missing item is the internal RP-SMA to female F pigtails. But as you can see in the photos you can fit some rubber duck antennas inside the APC with no problems. Also, the best part about the Alix 6f2 is that you can add a mini-pci express GSM card for out of band cellular access to the device. You don’t see the card installed on the Alix in the pictures. I currently have the card in a Mini PCI-E WWAN to USB Adapter for testing.
The software I run on the PCEngines Alix is Debian-for-Alix where I contributed to the wiki with instructions on how to install all the tools.
Below are some images with arrows pointing to key features of my device.
Updated Images / Additional Work | <urn:uuid:e9dbc442-a9fb-487d-8f13-081d1b239734> | CC-MAIN-2017-04 | http://www.jedge.com/wordpress/2012/08/my-custom-power-pwn/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00341-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.927851 | 545 | 1.648438 | 2 |
But 5 years after the Paris pact was signed, the heady wine of worldwide local weather collaboration has been soured by rogue nations backsliding, and within the case of america, even withdrawing from the settlement. And efficient local weather motion has been hampered by continued fossil fuel propaganda and attacks on science and facts, in addition to by associated financial insurance policies like fossil fuel subsidies. Not least, a lethal world pandemic has stalled world local weather talks.
On the identical time, the urgency to implement the deal has grown, because the impacts of worldwide warming have change into extra evident and extra extreme. Within the 5 years because the settlement was signed, people have emitted one other 200 gigatons of greenhouse gases. The 5 hottest years on document have all occurred since 2015, and dozens of studies have proven clear hyperlinks between warming and lethal local weather extremes. […]
THREE OTHER ARTICLES WORTH READING
“The diplomats have executed their job: the Paris Settlement factors the world in the proper path, and with sophistication and readability. It doesn’t, nevertheless, guarantee implementation, which essentially stays the area of politicians, businessmen, scientists, engineers, and civil society.”
~~ Jeffrey Sachs, “Let’s hail the Paris Settlement and get to work,” Dec. 12, 2015
BLAST FROM THE PAST (Proving tonight that plus ça change, plus c’est la même selected)
At Every day Kos on this date in 2002—800,000 jobless employees to lose advantages:
As many as 800,000 jobless People will lose their federal unemployment advantages Saturday, when a federal program that prolonged their advantages expires.
MERRY CHRISTMAS!, say the nice Christians on the White Home:
Daschle nails this one:
The Home Republican management turned their backs on these households and refused to behave, and the (Bush) administration selected to not intervene. This inaction by Republicans was unconscionable then, and it’s much more so now.
So how does the GOP reply to Daschle’s useless on criticism?
The White Home and Republican leaders had no speedy response to the assertion.
Ho ho ho! | <urn:uuid:5987e5f7-8a8d-4340-ac1f-af8edc15ebef> | CC-MAIN-2022-33 | https://brewsinthenews.com/sunday-night-owls-climate-hawks-ponder-whether-paris-accord-can-be-leveraged-into-something-better/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00265.warc.gz | en | 0.935614 | 460 | 1.8125 | 2 |
GULF SHORES, Alabama — As BP PLC touts its efforts to begin retrieving oil that’s been buried beneath the surface of Baldwin County’s beaches, one can visit a stretch of shoreline between this city’s main public beach and Little Lagoon Pass to find that the oil giant has plenty of oil sitting in plain view that needs to be collected.
Viewed from the 1200 block of West Beach Boulevard a swath of beach immediately south of the dune line that ranges from 10 to 15 yards wide is coated with tarballs as far as the eye can see in both directions. In places the sticky, staining bits are as thick as gravel on a driveway.
The sand to the south, however, has been tilled frequently and is nearly void of the tarry bits.
Tyler Goodwyn, who owns an undeveloped lot in the area, said his property has been soiled for more than two months. Early on, he said, there were also larger globs of gooey oil that have subsequently melted into the beach or been covered by wind-blown sand.
On June 23, Goodwyn said, he approached the supervisor of a nearby cleanup crew and tried to show the man his property, but the supervisor refused, telling Goodwyn he’d have to call BP’s spill hotline.
“It was insulting to me that the BP supervisor wouldn’t walk 300 feet with me to see it,” said Goodwyn, who wound up ringing the hotline twice.
Those calls prompted visits from both Environmental Protection Agency officials, on July 16, and the U.S. Coast Guard on July 26, Goodwyn said. In both instances the government representatives assured Goodwyn that the matter would be referred to BP’s cleanup contractor.
Though it sits in plain view and is miles long, the tarball-speckled stretch has somehow managed to escape widespread notice.
A spokeswoman with Meyer Real Estate, which manages numerous vacation homes along the polluted stretch of beach said the company has had no complaints from renters. Indeed, beachgoers today paid the tarballs no mind as they walked through them to the tilled sand nearer to the surf.
Gulf Shores officials said they too were unaware of the extent of the contamination. Public Works Director Mark Acreman said a city employee planned to visit West Beach with an Alabama Department of Environmental Management official tonight and would push BP to address the matter.
BP spokesman Ray Melick said this afternoon that federal rules prevent crews from operating beach-cleaning machines within a certain distance of dune systems.
“It’s sensitive and it’s got to be done by hand,” Melick said. “And it’s got to be done under the supervision of a (federal wildlife official).”
Still Melick couldn’t explain why the area has sat untended for more than two months. BP officials planned to visit the area tonight to assess the extent of the contamination and plan its cleanup, Melick said.
Gulf Shores’ Acreman said that BP is restricted from using heavy equipment within 30 feet of ecologically sensitive areas, but said the company’s reason for letting the stretch sit fouled for months “sounds like a cop out.” | <urn:uuid:347b2a10-d1ab-43e0-b7bd-c4f81c854069> | CC-MAIN-2022-33 | https://www.stuarthsmith.com/looking-for-oil-try-gulf-shores-west-beach-where-tarballs-have-sat-since-june/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00070.warc.gz | en | 0.969532 | 689 | 1.539063 | 2 |
The widespread adoption of intelligent mobile devices has transformed the way we work in innumerable ways. In 2012, IDC calculates that 712.6 million smartphones were shipped globally – 44.1% more than in 2011. In 2013, it predicts worldwide mobile tablet sales will reach 190.9 million, increasing the adoption of cloud and app-based solutions.
By 2016, mobile data traffic will have increased 18-fold, with smartphones, laptops, tablets and other portable devices driving around 90% of that traffic [Cisco]. Yet, alongside the countless new opportunities that these handy communications tools present for flexible workers, the continued rise in mobility also brings with it a myriad of potential security threats.
Most enterprises are already well-accustomed to protecting corporate data, including everything from commercial information to intellectual property and customer/employee information. However, the fact that mobile phones and tablets are small, portable and frequently used in public places or for downloading applications makes them particularly vulnerable to attacks and difficult to manage, especially compared with PCs.
In effect, these devices take corporate information out of the ‘safe’ corporate network and into unsecured environments, such as public Wi-Fi hotspots, and invite users to access a huge range of apps and websites.
The consequences of unwittingly falling foul of security threats can potentially go beyond the need for a simple repair to become far reaching. Whether it’s connecting to a bad Wi-Fi network in an internet café or downloading an app which contains malware, a single unintentional mobile security breach could potentially lead to financial and information loss, a privacy breach, loss of intellectual property or even damage to reputation.
As with other aspects of business, the cost of prevention is far lower than the cost of cure. For this reason, it is critical that today’s businesses assess their security environment and put the necessary protection in place to enable employees to work securely and without risk of infection, whenever and wherever in the world they may be. | <urn:uuid:2a7a455b-7b70-48f4-a713-852a9166026f> | CC-MAIN-2017-04 | http://www.vodafone.com/business/global-enterprise/why-mobile-security-matters-2013-05-17 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00338-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.933098 | 400 | 2.109375 | 2 |
2 Pinellas sites are options for desal plant
By JEAN HELLER
© St. Petersburg Times, published October 17, 2000
CLEARWATER -- With the region's first large sea water desalination plant still in the permitting stage, Tampa Bay Water has started studying where to put a second one.
The first two site options made public Monday might be a hard sell both to neighbors and regulators.
Both locations disclosed to the board of the region's principal water utility are in Pinellas County -- near the power plant at Weedon Island on the bay side of the county, and on McKay Creek on the Intercoastal Waterway on the gulf side.
David MacIntyre, Tampa Bay Water's desalination consultant, said neither site could be considered a front-runner, but both are among "many, many, many" options under study.
Weedon Island is an unlikely choice, MacIntyre said, because the power plant's discharge canal empties into flats and wetlands that do not flush very well.
That means the brine discharge of a desal plant would not be washed away efficiently.
And the island is a preservation area.
"In the end, this site is not likely to be rated very highly," MacIntyre told the board.
The McKay Creek site near the Shipwatch condominium community is where Pinellas County is in the process of shutting down a controversial plant that disposes of treated wastewater by deep-well injection into the aquifer.
Pick Talley, the county's utilities director, said the county planned soon to rezone the area residential, so if Tampa Bay Water wants the site for a desal plant it must act quickly.
St. Petersburg Mayor David Fischer, chairman of the Tampa Bay Water board, said he didn't think a desal plant would necessarily be inconsistent with a residential neighborhood.
"If you look at these plants, they're very small," Fischer said.
He described the desal plant planned for the TECO site in the Big Bend area of Hillsborough County as looking like a "work shed" in comparison to the power plant.
"Desal plants can be made to look like a house," MacIntyre added.
A final decision on a site still is months away.
The reason Tampa Bay Water has fast-tracked a second desal plant reflects the region's dire need for new sources of drinking water.
It is only two weeks since the official end of the rainy season, and the Hillsborough River is discharging 80-million gallons of water a day, less than 25 percent the normal 340-million gallons a day.
The Alafia River at Bell Shoals in southern Hillsborough County is discharging 215 million gallons a day, less than half the normal 450 mgd.
Two wells used to monitor groundwater conditions near well fields in Pasco County are completely dry.
Although summer rains approached normal in many areas, they would have had to be far above normal to alter drought conditions, according to Warren Hogg, Tampa Bay Water's permitting manager.
"Barring heavy frontal system rains (over the fall and winter), we don't expect lake levels to begin rising again until June," and many currently are at levels seen only during periods of extreme drought, Hogg said. "We're going into an extended dry period at a very significant water deficit."
Long-term forecasts predict little relief. The National Weather Service predicts the periods of January-to-March and May-to-August of next year will see below normal rain.
"That's the take-home message," said Tampa Bay Water general manager Jerry Maxwell. "We're setting ourselves up for a very serious problem this spring."
© 2006 • All Rights Reserved • Tampa Bay Times
490 First Avenue South St. Petersburg, FL 33701 727-893-8111
From the Times
local news desks | <urn:uuid:f8fccf54-761c-4c98-944c-d953147ff14a> | CC-MAIN-2017-04 | http://www.sptimes.com/News/101700/TampaBay/2_Pinellas_sites_are_.shtml | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00159-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.947044 | 805 | 1.695313 | 2 |
For many, the research papers and panels at SIGGRAPH represent
the heart of the conference. Indeed, publication in the SIGGRAPH
proceedings is recognized around the world as the pinnacle of research
excellence in the field of computer graphics and interactive techniques.
SIGGRAPH also includes papers from peripheral fields that sometimes
overlap with computer graphics, such as computer vision, cognitive
and behavioral modeling, computer games, robotics, audio, visualization,
and applications of computer graphics. The ground-breaking research
revealed at SIGGRAPH often provides the computer graphics industry—including
graphics hardware designers, animation and modeling software developers,
and special effects shops—with a foundation of ideas on which
to build their next generation of products. And sometimes the opposite
occurs—technological advances in the computer graphics industry
are often so revolutionary that they end up as SIGGRAPH papers.
SIGGRAPH insists that the research presented remain cutting-edge
at the time of the conference. A field as fast-paced as computer
graphics demands that research be presented as with minimum delay,
and so, to SIGGRAPH, speed is critical. Papers are submitted less
than 30 weeks before the final proceedings are distributed! This
gives reviewers very little time to communicate at length with the
authors of the papers during the selection process. Also, unlike
some other conferences, SIGGRAPH does not accept papers of works-in-progress.
All the papers presented at SIGGRAPH are of extremely high in quality
and are complete works with a full set of results. After the selection
process, less than a quarter of the papers submitted find their
way into the proceedings.
The SIGGRAPH papers, after selection, are grouped into several
topic categories. This year, the topic categories were a total of
fifteen categories: Images and Video, Modeling and Simulation, Geometry,
Parameterization and Meshes, Character Animation, 3D Acquisition
and Image-Based Rendering, Animation from Motion Capture, Lighting
and Appearance, Shadows, Translucency, and Visibility, Soft Things,
Humans and Animals, Texture Synthesis, Graphics Hardware, Fluids
and Fire, and Painting and Non-Photorealistic Rendering.
This year, the papers were presented over a course of three days,
from Tuesday, July 23, to Friday, July 26. One of the most exciting
aspects of the paper presentations is that the research is presented
and explained by the very researchers who created it. After each
half-hour presentation, members of the audience are
given a chance to ask questions to the presenters.
For more information, including
links to this year's papers on the web, see http://www.cs.brown.edu/~tor/sig2002.html. | <urn:uuid:a234ff10-0ef2-4c1d-ab12-fbf126fb2b44> | CC-MAIN-2017-04 | http://www.siggraph.org/conferences/reports/s2002/tech/papers.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00553-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.928123 | 592 | 1.820313 | 2 |
Menu items target African Americans in major cities with the following items: Greens Macaroni and cheese Peach cobbler Red beans & rice Menu items targeting Hipics in major cities with the following items: plantains Flan Fried
3. Implementation on non-traditional units including the following: Shopping mall food courts Universities Hospitals Airports Stadiums Amusement Parks Office Buildings Mobile Units
4. Increase profitability of KEF through the following: Reduced overhead costs Increased efficiencies Improved customer service Cleaner restaurants Faster and friendlier service
Continued high quality products
5. Resolve franchise problems in the United States.
1 . Expansion of international operations to provide the following: Increased percentage of overall sales growth Increased percentage of profit growth 2. Increased expansion of franchises into Mexico
3. Expansion of franchise operation beyond Central America
4. Continued promotion of healthier image through removal of the word “fried” from the name
5. Improve menu selection of rotisserie KEF History and Overview Kentucky Fried Chicken was founded by Harlan Sanders in Carbon, Kentucky.
In 1952 he fast food franchising was still a new venture Harlan Sanders traveled across the United States in an effort to influence potential franchisees to buy into his Colonel Saunders Recipe Kentucky Fried Chicken. By 1960 “Colonel “Saunders had granted KEF franchises to over 200 retail outlets and restaurants. By 1963 there were over 300 KEF franchises and revenue totaled over $500 million. In 1964 at the age of 74 Colonel Saunders decided to focus his energies on the public relations issues of KEF and move away from the day to day management. He subsequently sold the business for $2 million to Jack Massey and John Young Brown Jar.
For the next five years the new owners concentrated on growing Cuff’s franchises across the United States. In 1966 the company went public and was listed on the New York Stock Exchange. By this time the company was deeply rooted in the US markets and the owners decided to concentrate on international markets. In 1969 thee company had acquired rights to operate 14 existing franchises in England. Subsidiaries were also established in Hong Kong, South Africa, Australia, New Zealand and Mexico. By 1971 restaurants. In 1971 KEF merged with Hubble Inc primarily because John Young Brown Jar. s interested in politics. Hubble Inc. Produced vodka, mixed cocktails, dry gin, cordials, beer and other alcoholic beverages but they had little experience in the restaurant business. Because of this conflict erupted between Colonel Saunders and Hobbler’s management over quality control issues and restaurant cleanliness. By 1977 the business operations became slow where only about 20 new restaurants per year were being opened, service quality had decline and existing restaurants were not being maintained. As a result of these operating problems, a new management team was sent in to address these issues.
They implemented a back to the basic strategy which focused on cleanliness and service, cut out marginal products, and reestablished product consistency. By 1982 KEF was expanding again by building new units due to a successful implementation of the strategy. As a part of R. J Reynolds Industries Inc. Overall corporate strategy of diversifying into unrelated business, the company merged with Hubble to form a wholly owned subsidiary in 1982. RAJA had wanted to reduce its dependence on the tobacco industry which was currently on a decline due to the health risks associated with the product.
RAJA took a hand off approach to managing KEF despite the fact that they had more experience in the restaurant business than did Hubble. This strategy proved successful because KEF continued it s aggressive expansions and profitability. RAJA subsequently sold KEF to PepsiCo Inc. In 1986 PepsiCo bought KEF from RAJA-Nabisco for $841 million. This acquisition gave PepsiCo the leading market share in chicken (KEF), pizza (Pizza Hut), and Mexican food (Taco Bell), three of the four largest and fastest-growing segments within the US. Fast food industry.
PepsiCo implemented a new strategy which gave them more control over he business. PepsiCo took direct control over the franchises, reduced staff to cut cost and also brought in their own management teams to run the businesses. This was also compounded by a conflict between the KEF culture and PepsiCo culture. The KEF culture was built largely on the Colonel Saunders laid-back approach to management where Job security and stability was paramount. The PepsiCo culture was a highly driven one characterized by strong emphasis on high-performance, and high-accountability.
This resulted in little or no employee loyalty and a higher turnover ratio. Additionally, this breed a poor relationship between PepsiCo and KEF franchises. PepsiCo diversification into three distinct but related markets- soft drinks, snack foods, and fast foods restaurants created one of the world’s larges t consumer products companies and portfolios for some of the world’s most recognizable brands. Between 1990 and 1996 PepsiCo experience an annual growth rate of 10% exceeding $31 billion in sales. This growth however negatively affected PepsiCo fast-food businesses.
Throughout this same period profit margins at KEF, Pizza Hut, and Taco Bell fell from an average of 8% too little more than 4%. This decline in performance was a direct result of increasing maturity in the U. S. Fast-food industry, more intense competition and the aging of KEF and Pizza Hut’s restaurant base. As a result PepsiCo fast-food businesses absorbed nearly one half of the company’s capital spending during the sass’s while generating less than one-third of the cash flows. In 1997 PepsiCo spin off its restaurant division, creating an billion.
KEF had benefited from the hands-on management style of David Novak, who became head of Triton. He changed back the culture to one that was more friendly, encouraging and inclusive. In an effort to address the growth issue plaguing the company, Triton began to open multi-brand stores which combined two or three of the Triton chains. By 2002, Triton had developed 1,375 multi-brand stores. Triton changed its name in 2002 to Yum! Brands, and it acquired two more restaurant chains, the seafood restaurants Long John Silver’s, and the hamburger and root-beer chain A&W.
Despite the fact that the domestic market was not doing well, KEF continued to do well internationally especially in Asia. By 2001, Kentucky Fried Chicken was the most recognized foreign brand in China, where the company had 500 restaurants. KEF also had about 300 outlets in Thailand, and more than 150 in Indonesia. The company adapted its recipes to suit local tastes and was able to maneuver itself in the political and regulatory conditions in which it operated internationally. As a result, Triton’s profits increased by almost 50% from its combined China operations.
By 2006 KEF had over 1,700 restaurants in China and saw profits increases of over 25% in some quarters whilst in the domestic markets increases were only 1 and 2 percents. In China KEF significantly outsold McDonald’s and KEF were opening up a new Chinese outlet every 22 hours. KEF pursued the overseas market vigorously despite its challenges in the domestic markets.
1 . Growth Strategy KEF had a strong emphasis on building company owned restaurants in larger markets such as Japan, China and Mexico. This strategy allowed KEF to coordinate purchasing, recruiting and training, financing and advertising.
Therefore, KEF could spread fixed cost over a larger number of restaurants and negotiate lower prices and was better able to control product and service quality.
2. Refashioning Strategy PepsiCo decided to reduce the number of company-owned restaurants by selling them off to franchises. This lower company sales but reduces the amount of cash tied up in fixed assets and increases cash flow through initial fees charged to franchisees and franchise royalties. Expansion through franchising was an important strategy for penetrating international markets.
3. Marketing Strategy One of Cuff’s most aggressive strategies was the Neighborhood Program. By Mid 1993 Cuff’s had almost 500 company-owned restaurants throughout the major cities in the US. These restaurants were fitted with special menu to appeal to the black community. The introduction of this program increases sales from 5 to 30 percent in hose restaurants appealing directly to the black community.
4. Distribution Strategy smaller restaurants in nontraditional outlets such as airports, shopping malls, universities and hospitals. Secondly KEF experimented with home delivery. Home delivery was offered by some 365 Cuff’s restaurants.
Other nontraditional outlets such as drive-thru and carry-out service were also tested. Finally the third segment was restaurant co-branding. Co-branding with its sister chain Taco Bell allowed KEF to expand its business.
SWOT Analysis – KEF Potential internal strengths Cuff’s brand name and reputation Cuff’s secret recipe KEF”s traditional employee loyalty Cuff’s managerial experience in international markets Cuff’s franchising strategy to penetrate international markets Cuff’s aggressive marketing strategy – Neighborhood Program Cuff’s three-pronged distribution strategy to opening in nontraditional outlets (airports shopping malls, etc. , home delivery and co-branding with Taco Bell. Cuff’s ability to benefit from economies of scale in distribution. Potential internal weaknesses Cuff’s inability to quickly bring new product to the market Cuff’s difficulty to control quality, solve servicing and support problems to franchises Turnover in top management Corporate strategy was unclear due to the many KEF expansions KEF and PepsiCo had conflicting cultures Potential environmental opportunities The Mexican market, which offers a large customer base, lesser competition, and close proximity to the US.
Franchise laws in Mexico give fast food chains the opportunity to expand their restaurant bases. New distribution channels offer a significant growth opportunity Cuff’s opportunity to exploit new market niche and expand its market share. Cuff’s opportunity to diversify into the other fast-food segment. (Sandwich chains, Dinner houses, Family restaurants) Potential environmental threats Saturation of the US market Strong competition from firms in the fast food industry Changing preferences of consumers due to demographic and societal changes.
Obstacles associated with expansion in Mexico The financial crisis facing the world. Evaluating the SOOT analysis Based upon the SOOT analysis, balancing off the strengths and weaknesses against the opportunities and threats KEF is still in an overall strong competitive position. The analysis disclosed that Cuff’s main strengths are its brand name and good to gain a strong competitive advantage over other fast food chains. In terms of its weaknesses, KEF can introduce new product more quickly to the market through its distribution strategies.
In order to control quality and service issues KEF can continue to buy back unprofitable franchised restaurants and convert them into company owned restaurants. In relations to its potential threats, KEF can continue to pursue its strategies due to its strong brand name and reputation. KEF also had experience in the international market to continue its franchising strategy and the ability to penetrate nontraditional markets through its distribution strategy.
KEF can add to its racketing strategy a continual market research to explore customers’ taste and preference due to the demographic and societal changes. Finally KEF needs to develop an overall corporate strategy to match its business level strategies. KEF needs to decide whether to pursue product differentiation or lower cost through distribution to gain an overall competitive advantage in the fast-food industry. Porter’s Six Force Model Porter’s six forces model helps to identify the forces of competition for any company within an industry.
The recognition of the strength of these forces helps to see where Kentucky Fried Chicken stands in the fast food restaurant industry. Bargaining Power of Suppliers: Generally Low Most of the raw materials required in the fast food industry are non-specialized commodity products such as meats, vegetables, dairy products, non alcoholic beverages, labor and machines. This indicates that suppliers are non specialized allowing companies such as KEF in the industry to switch between suppliers without losing any significant cost advantages.
Chains such as KEF and others under the YUM Brand produce a large portion of their inputs; this reduces the dependence on out did suppliers and reduces supplier power as they are internal to the organization. Also Yum states, “We will also increase transparency of our labor code of conduct guidelines to our suppliers, and stimulate them to proactively implement and monitor the code”. This therefore illustrates that the company has some control over its suppliers. Workers in the industry are non unionized, part time employees majority of which are under the age of 25.
There are minimal costs associated with training these employees and thus the industry tends to have a high turn over rate. Taking these factors into consideration it can be seen that workers who supply labor have almost no power in the industry. Bargaining Power of Buyers: Generally High-Low Buyers in the fast food industry include individuals and families with the volume of purchases being dependent on each. The switching cost to competing brands and substitutes are relatively low giving buyer’s strong room to negotiate with sellers on the price and quality of products being offered by the seller.
Whereas on the other because if only one customer threatens to no longer eat, the company will not reduce rice because the cost of loosing that customer is not very great.
Threat of Potential Entrants: Generally Low Looking from the perspective of a single restaurant into the fast food industry the barriers to entry are relatively low as anyone can decide to open a restaurant as long as they find a suitable location and have the ability to handle upfront cost to fund their own company owned restaurant or the cost to be a franchisee. Whereas when it comes to the large fast food chains such as KEF barriers to entry are substantial.
The first being that the US fast food market is very saturated which discourages other firms from entering. Secondly going up against a huge market leader such as KEF may pose as potential barrier to entry, as it would require large capital requirements and advertising cost which would be needed to increase brand awareness for the new restaurant. New entrants may also find it difficult to find a location with sufficient traffic of people and few competing restaurants to allow them to be profitability and ensure their continued existence with in the industry.
Complements: Favorable Complements to KEF and other restaurants in the fast food industry include business that pair well, such as shopping malls, gas stations, sports stadiums, amusement arks, airports and retail outlets, etc. These complements are considered favorable to the industry and its participants as they gain from utilizing the convenient location, Kentucky Fried Chicken is one such chain which gains from these complements as they have locations within malls, airports and retail outlets to sell their products to their customers.
It is also favorable or complementary to other sectors as in the case of Yum Brands which utilizes co-branding with its restaurants and soft drinks. Some KEF unit’s customers can select pizza and taco bell menu items and soft drinks which implement each other’s sales and boost profits for the parent company. Rivalry – Generally High Rivalry within the fast food industry is relatively high as the number of competitors is significantly high.
In the case of KEF in the chicken segment their direct competitor include Chick Fill-A, Poesy’s, Church’s and Boston Market who provide similar products such as fried chicken, with competition within the general scope of the industry coming also from produces of burgers, pizza, sandwiches, seafood and Mexican meals. Due to the large amount of competitors with in the industry firms often engage in price wars through promotion such as value meals and family packages.
Brand loyalty is also hard to retain within the industry, however because of KEF long standing campaign by its founder, they have very strong brand image within the industry making it difficult for smaller companies to compete with their products. Firms such as KEF increases market share through several areas such as improving customer satisfaction by increasing the quality of products produced by introducing new healthy options on their menu as well as the reduction in the use of trans fats to reduce there products. They also engage in franchising which allows them to tap potential. Consequently competition is still fierce within the industry for example in Latin America McDonald’s is a big competitor and threat to KEF.
Threat of Substitutes: Generally High-Medium Substitutes includes burgers, sandwiches, pizza, other courses such as Italian, Chinese etc, pre-package and prepared meals, snacks etc, that a customer would choose to consumer over fast food. There are four main areas that offer these substitutes to the fast food industry they include: Convenience stores (7-11, gas taxation, etc) who offer the closes threat to the industry as they offer sandwiches, burgers, hotdogs, drinks etc.
At relatively low prices and are convenient as they often operated 24 hours and are at locations such as gas stations which provide economies of sale as the customer can fill their gas tank while at the same time grabbing a bit to eat. This is the main factor for all customers to the fast food industry who want something that is relatively cheap and convenient. Coffee ; Snack Shops (Cataracts,etc) are also considered as substitutes as they provide snacks and treats at relatively low price and are very convenient.
Casual and sit down restaurants (Applause’s, Chili’s, etc) are considered substitutes to the fast food industry and they allow individuals different food options. They may not be considered a major threat as they are not as convenient and their products are slightly offered at a higher price. Home Cooking and eating at home may also be considered as a substitute to the fast food industry as customers may forgo eating at KEF and rather fry their own chicken and make their own mash potatoes etc. However, this is heavily dependent on the individuals’ time as they may not find it convenient to cook and eat at home.
Also the way the fast food industry is currently operating in terms of the family meals packages being offered individuals tend to order the food from these restaurants and take it home to consume. It can be seen that the competitive structure of the fast food industry is favorable, where market position and strategy provide good defense against competitive forces allowing firms to earn above average profits. The strongest competitive force within the industry as can be seen from above is the Rivalry among competing firms, with a relatively weak threat from potential entrants.
There is little pressure from suppliers, ND significant pressure from buyers within the industry. However, when it comes to individual firms within the industry such as KEF and others, the effect of an individual buyer not purchasing a product does not have significant power over the firm’s decisions. Although there is high to medium pressure from substitutes as individual have a large selection of other options to choose from convenience and price plays a role in their decision making. In Cuff’s case this pressure is reduced as they posses a secret recipe which there customers enjoy and substitutes and competitors can not replicate.
Kentucky Fried Chicken is an industry leader in terms of market share and strong foreign position. This will help the company to be successful in the industry and further expand. Short-term recommendations Management issue at KEF played an important role for staff and it’s franchises involved. The new acquisition of KEF by Pepsico brought tension within the environment as the company’s past culture was changed from a ladybird to performance culture which then leads to increase in lay-offs.
Pepsico must try to integrate the past culture and take into consideration the working environment and pep its staff motivated, human resource is very important for a company’s success. KEF must keep the strategy implemented by Colonel Saunders of allowing franchises to be owned by local entrepreneurs since they are aware of their local market and would know how best to push the product locally As the company grew into the sass’s era they were faced with the challenge of consumers being more health conscious, and therefore requesting more health conscious dishes.
It is recommended that KEF try to diversify it’s menu in line with consumers needs and as they change over time, they must add more variety to their menu, it is important for hem to keep with the latest trends in the market It is necessary for KEF to study their market and identify the non-profitable markets and to concentrate on the profitable ones in order to have constant flow of cash to invest in other potential markets. The US market has been saturated with a diversity of fast food industries therefore it is important for KEF to concentrate on other external markets.
KEF needs to develop a strategy of carefully selecting the markets it wants to penetrate; they should continue penetrating the smaller markets and strengthen their market there in order to make t difficult for other food chains to enter. They must select attractive countries that can provide above-average returns. Long Term It is important for KEF to keep an eye open for opportunities; they must pay keen attention to possible mergers or acquisitions that will allow then to gain competitive advantage.
Another strategy would be to acquire possible threats like in the case of the Boston market which would allow them to gain market share from that niche market and at the same time provide a healthier food selection acquired from Boston Market KEF should keep their low cost differentiation strategy in order to gain economies of scale, bargaining power, image/brand worldwide recognition. To study the customer base and new trends in the market in order to keeps up-to date with customers changing need.
They must keep a positive image by treating employees fairly and good communication with it’s franchises. Develop long term goals and always keep it’s staff motivated into achieving them. KEF should focus on it’s strategy of seeking attractive countries to invest in, countries like Asia and Latin have chicken as a traditional dish and therefore an attractive market for KEF. They should keep in mind to focus locally in order to overcome certain barriers such as language, law and a good understanding of needs.
Targeting new countries usually work better if you adapt to the local market. Conclusion environment that appeals to pride conscious, health minded consumers” with emphasis on quality food, excellent service and clean restaurant; Keep control over franchises; Come up with new items regularly; and finally be aware of new technology to stay efficient and competitive. Bibliography Thompson & Strickland (1999). Strategic Management. (1 lath De). Irwin/McGraw-Hill Publisher. Websites wry. KEF. Com www. Yum. Com | <urn:uuid:cfb1a38b-75aa-47de-88e8-de53b7345802> | CC-MAIN-2022-33 | https://fountainessays.com/swot-analysis-for-kef/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00278.warc.gz | en | 0.966412 | 4,642 | 1.757813 | 2 |
According to Newsweek’s recently released 2013 rankings, Palo Alto High School places 161st out of 2000 of the best American public high schools.
Paly jumped up 17 spots from last year’s rankings, in which it was ranked 178th in the nation.
Gunn High School, Palo Alto Unified School District’s other high school, dropped from 71 in 2012 to 583 in 2013. However, it should be noted that “a correction to this school’s data was submitted after the list was tabulated and is therefore not reflected in the ranking order,” according to Newsweek’s website.
Other schools around the Bay Area that were on the list include Saratoga High School (81), Monta Vista High School (103), Mission San Jose High School (114) and Lynbrook High School (122), among others.
The formula used to calculate the rankings uses “graduation rate (25 percent), college acceptance rate (25 percent), AP/IB/AICE tests taken per student (25 percent), average SAT/ACT scores (10 percent), average AP/IB/AICE scores (10 percent), and percent of students enrolled in at least one AP/IB/AICE course (5 percent),” according to Newsweek. | <urn:uuid:8b803db8-3ac7-4bb7-a628-7c72bb6f3aad> | CC-MAIN-2022-33 | https://palyvoice.com/64607/news/paly-climbs-up-national-high-school-rankings/?print=true | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00278.warc.gz | en | 0.972564 | 264 | 1.570313 | 2 |
FOR IMMEDIATE RELEASE
Contact: Isabelle Silverman, (917) 445-6385, firstname.lastname@example.org
(New York, NY – January 20, 2010) Environmental Defense Fund (EDF) praised Mayor Bloomberg for addressing the pressing issue of toxic heating oil in New York City during his State of the City speech this afternoon. The mayor pledged that his administration will be “greening the heating fuels used in our schools and big buildings.”
The mayor’s announcement follows an EDF report last month showing that just one percent of New York City’s buildings—those burning the dirtiest grades of heating oil—produce more pollution than all the city’s cars and trucks combined.
“Mayor Bloomberg’s pledge to green the dirtiest types of heating oil is one of the biggest steps New York can take to reduce soot pollution linked to asthma and heart disease,” said Isabelle Silverman, an attorney for Environmental Defense Fund. “The dirtiest grades of heating oil must be phased out by 2020. Ten years is a long enough timeframe for buildings to convert and get the best use out of the older burners that can’t burn cleaner fuel right away.”
Environmental Defense Fund, a leading national nonprofit organization, represents more than 700,000 members. Since 1967, Environmental Defense Fund has linked science, economics, law and innovative private-sector partnerships to create breakthrough solutions to the most serious environmental problems. For more information, visit www.edf.org. | <urn:uuid:4dbedf0d-9b74-4c59-8a0d-1d7165919725> | CC-MAIN-2017-04 | https://www.edf.org/news/bloomberg-state-city-pledge-green-dirty-heating-oil-will-cut-pollution-linked-disease | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00173-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.905629 | 322 | 1.851563 | 2 |
Find information about a range of approaches to managing organisational change – from Action Learning Sets, to the 7s model.
Search by the name of the model using the A-Z index
To view more click on the name of the model to expand to view more, including description, use, and strengths and limitations.
- s Number of entries: 3
Self-managed teams (SMT)
SMTs consist of a group of individuals who undertake interrelated tasks. Typically charged with delivering a complete product or service, they are collectively responsible for making decisions on work tasks (processes) and working methods (practices). They are usually responsible for setting their own goals, act as generalists rather than specialists within their area of responsibility, and are rewarded on the basis of team (as opposed to individual) performance. Team performance and member satisfaction are underpinned by three sets of inputs: task design; process interventions; and organisational support systems.
- Team Task Design: – tasks are derived from stated team goals which must be aligned with organisational strategy and objectives. Tightly-defined tasks provide a clear team boundary and area of responsibility. Large enough to accomplish the required set of interrelated tasks yet small enough to allow coordination and face-to-face decision-making, SMTs are typically responsible for specific work processes. Team members need to be trained to perform tasks without reliance on other teams. Similarly, SMTs require the authority to manage resources, information to monitor performance and freedom to make adjustments as necessary.
- Team process interventions: – over time, teams may not function effectively due to poor communication between members, unclear roles and responsibilities, and an inability yto resolve conflicts. If such problems emerge then reflection and possibly external support will be required.
- Organisational support systems: – in order to function well, there needs to be a good ‘fit’ between SMTs and wider organisational processes. Despite their greater autonomy, external leadership remains important and it requires an understanding by senior managers of group dynamics, the wider external environment and the team’s skills.
Stages in SMT implementation:
- Agreeing the approach: – this involves suspension of existing work rules, provision of time and external facilitation to diagnose current practices and devise new ones. Typically, job and wage security is provided to ensure workers engage fully;
- Diagnosis of the work system: – an assessment of the extent to which current practice meets external demands (e.g. customer expectations of quality)
- Generating appropriate designs: – if diagnosis identifies interdependent tasks then redesign is undertaken to specify team mission / goals, an ideal workflow, skills required of members, training plans for induction, and the decisions over which the team has autonomy. This is undertaken following two guiding principles:
- Compatibility: design processes are consistent with the values underlying the approach i.e. joint communication and boundary management requires a highly participative process involving all stakeholders in order to jointly derive acceptable solutions;
- Minimal critical specification: designers should only specify the features critical to implementation; all others left free to vary according to circumstance (e.g. work methods; task allocation; job assignments)
- Specifying support systems: – wider organisational systems (pay, measurement) also need to be redesigned to support and incentivise team practice
- Implementation: – this generally requires extensive training to enable team members to undertake many tasks, together with opportunities to build the team and its skills in relation to self-management. Evaluation of the work design is also required, together with ongoing adjustment and monitoring in the light of identified difficulties.
- Continual improvement: – continuous redesign of processes as required to optimise operation
(Adapted from Cummings and Worley, 2008: pp. 391-2)
Strengths and limitations
Most published evaluations show sustained positive results; increased productivity, efficiency and quality is a common finding, as are marked improvements in staff job satisfaction. It is important to note that for the benefits to be derived interventions need to honour the core principles – no meaningful information or decision-making autonomy, no improvements.
In relation to social care change the approach will potentially facilitate trust and learning within and between teams and enable staff to have greater autonomy of how they work in practice. There is a danger that teams could become inward looking and therefore it will be important to ensure that the focus remains on the needs and aspirations of the people who access services and their carers.
- Perry EE, Karney, DF, and Spencer, DG (2013) Team establishment of self-managed work teams: A model from the field, Team Performance Management, 19, 1, 87 – 108
- Elloy, DF (2011) Superleader behaviors and self-managed work teams: Perceptions of supervisory behaviors, satisfaction with growth, and team functions, Journal of Business and Economics Research, 4, 12, 97-102
- Druskat, V.U.and Wheller, J.V., (2003) Managing from the boundary: The effective leadership of self-managing work teams, Academy of Management Journal, 46, 4, 435-457
- Cohen, S.G. and Bailey, D.E. (1997) What makes teams work: Group effectiveness from the shop floor to the executive suite, Journal of Management, 23, 3, 239-260.
Soft systems methodology (SSM)
SSM assumes that most change processes which involve people will be complex as there will different views about what is important and how the processes can be improved. In order to address such complexity, SSM requires the application of action learning methods in diagnosis of problems and the crafting of solutions. Stakeholder views are explored iteratively, with the intention of identifying feasible changes which can accommodate the range of views (or even to reach consensus).
The approach places participants at the centre of the process, tailoring the SSM approach to a specific situation – deriving a unique approach in order to ensure learning and change within the specific context. It developed in response to the disappointing real-world application of ‘hard’ approaches to systems design, such as operational research, due to their failure to take account of conflicting worldviews in relation to ‘systems’. In contrast to ‘hard’ systems analysis, which treats systems as objective phenomena, SSM explicitly incorporates the social dimension into the analysis of systems, taking account of the existence of multiple worldviews in relation to the operation of systems and the dynamism at the heart of human systems. Most importantly, it seeks to take account of the generative nature of social action; the way in which the social world is continuously (re) created by people thinking, talking and acting. Systems are present in the very process of inquiry in the world, rather than simply in the world awaiting discovery.
Stages in SSM:
- Exploring a problem, and its causes, from a wide range of stakeholder perspectives. Investigation should proceed with an open mind without giving priority to a particular point of view;
- Developing statements (‘root definitions’) which accurately describe the main purpose(s) of the organisation from the perspectives of different stakeholders , as well as its inputs, outputs and dynamics;
- Debating the manifest ‘problem’ with stakeholders, drawing on;
- Activities required to achieve ‘root definitions’ through diagrammatic depictions of ‘root definitions’ using flow charts;
- Comparing idealised service models with current reality through discussion and observation
- Considering possible changes in structure(s), process(es), practice(s);
- Undertaking a programme of change implementation in the light of agreements
(Adapted from Iles and Sutherland, 2001: pp. 34)
Strengths and limitations
SSM has been criticised for its use in practice to appease stakeholder groups rather than undertake radical system changes. In contrast, Seddon (2005) identifies SSM as a means of forging a single unifying organisational purpose, so that stakeholders’ thinking is influenced during the analysis and discussion of problems in order that they might be addressed. Concerns have also been raised by the time and cost implications of the approach.
In relation to social care change, its emphasis on valuing different perspective, seeking to shape change through discussion, and organisational learning is in line with the change principles. The facilitators will need to ensure that extended discussions do not lead though to the implementation of change being delayed.
- Checkland, P. (1981) Systems thinking, systems practice, New York: Wiley
- Checkland, P. and Poulter, J. (2006) Learning for action: A short definitive account of Soft Systems Methodology and its use for practitioners, London: John Wiley and Sons Limited
- Checkland, P and Scholes, J (2001) Soft systems methodology in action, Chichester: Wiley
- Deming, WE, (1986) Out of the crisis, Cambridge, Mass: MIT
- Flood, R. (1999) Rethinking the fifth discipline, learning within the unknown, London: Routledge
- Hudson, B (2004) Whole systems working: A discussion paper for the Integrated Care Network, Leeds: Integrated Care Network
- Jackson, M. (2003) Systems thinking: creative holism for managers, Chichester: Wiley
- Leahy, B., Clarke, S., and Paul, R. (1999) A case of an intervention in an outpatients department, Journal of Operational Research Society, 50, 9, 877-91
- Seddon, J. (2005) Freedom from command and control, Buckingham: Vanguard Press
SWOT is a tool for identifying priorities for action. The term is an acronym for organisational or service Strengths, Weaknesses, Opportunities and Threats, and is intended to promote reflection on the extent to which an organisation or service can meet the needs and expectations made of it through encouraging reflection from a wide range of perspectives.
The technique is used in many settings and sectors, with analysis typically following the steps below:
Stages in SWOT analysis:
- The team writes down its organisational purpose (‘mission’);
- Using this frame of reference, they then apply tool(s) to assess internal organisational strengths and weaknesses (e.g. 7S, or Weisbord’s six-box model);
- A similar analysis of environmental opportunities and threats is then undertaken, again using an appropriate tool such as PESTELI;
- Further questions are then asked of each of the factors listed under the four SWOT headings:
- Factors related to strengths or weaknesses (internal)
- What are the consequences of this?
- Does it help or hinder our mission?
- What are the causes of this strength / weakness?
- Factors related to opportunities or threats (external environment)
- What impact is it likely to have on us?
- Will it help or hinder us to achieve our mission?
- What must we do to respond to this threat?
- Factors related to strengths or weaknesses (internal)
- Reflection follows on the mission and the four components; specifically the causes of strengths and weaknesses, and response required to the identified opportunities and threats. These are then linked and prioritised, for action by the team.
(Adapted from Iles and Sutherland, 2001: pp. 40-1)
Strengths and limitations
Its key potential strength is the simultaneous analysis of both external environmental context [opportunities and threats] and internal organisational elements [strengths and weaknesses]. The benefit derived from any specific SWOT analysis depends partly upon the extent to which the factors identified are valid, prioritised, and addressed directly via specific change interventions. SWOT has been criticised on the grounds that it often results in an over-long list of factors without prioritising between them, little in the way of verification or supporting evidence, and its results often unused. While the typically subjective, unsystematic and non-quantifiable nature of many SWOT analyses means that in practice they may have little predictive power (), they may still have some practical benefit to the extent that they provide some opportunity for engaging staff in change programmes. The approach has been praised for its combination of ‘oft’ organisational components (staff, style, shared values and skills) as well as ‘hard’ factors (strategy, structure and systems), and its emphasis on the importance of organisational culture in enabling people to agree on what behaviour is acceptable. However, its usefulness has been challenged by others who argue that different viewpoints are important and if managed properly conflict and disagreement can lead to an organisation being stronger.
In relation to social care change it provides a simple framework that most people can follow and if well facilitated can add to any stage of the change cycle.
- Agarwal, R., Grassl, W., and Pahl, J. (2012) Meta-SWOT: Introducing a new strategic planning tool, Journal of Business Strategy, 33, 2, 12-21
- Ansoff, HI (1965) Corporate strategy: An analytic approach to business policy for growth and expansion, New York: McGraw-Hill
- Gazinoory, S., Adil, M., and Azadegan-Mehr, M. (2011) SWOT methodology: A state of the art review for the past, present and future, Journal of Business and Economic Management, 12, 1, 24-48
- Hill, T. And Westbrook, R. (1997) SWOT analysis: It’s time for a product recall, Long Range Planning, 30, 1, 46-52
- Weihrich, H. (1982) The TOWS matrix: A tool for situational analysis, Long Range Planning, 15, 2, 54-66 | <urn:uuid:c29417ff-e75f-412b-a514-efe76cfbdf3e> | CC-MAIN-2017-04 | http://www.scie.org.uk/publications/elearning/organisational-change-in-social-care/resource/a-to-z/s.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00516-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.922917 | 2,859 | 2.46875 | 2 |
Learn to say 'I love you' in the Ukrainian language, the official language of Ukraine.
Learn Ukrainian Vocabulary - English/Ukrainian Flashcards - 101 Household items (FLASHCARD EBOOKS) is one of today's free foreign language books.
Ukrainian Writing System - Україна Incognita infographic
word order in the ukrainian language
Learn how to describe people in #Ukrainian
The Cyrillic alphabet was established as a Slavic written language by Cyril and Methodius during the 9th century.
The formation of the past tense in the #Ukrainian language is very simple. Infinitive + ending: - в (masculine singular) - ла (feminine singular) - ло (neuter singular) - ли (plural)
Learn Russian! Visit www.russiancentre.co.uk to find out about group and individual Russian courses.
Ukrainian alphabet with Ukrainian National transliteration
Learn Ukrainian Language - Lesson 1 - Ukrainian Alphabet.avi | <urn:uuid:d4ba3bf6-863f-460e-a7d1-2b12f2415d1a> | CC-MAIN-2017-04 | https://nz.pinterest.com/explore/ukrainian-language/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00568-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.82452 | 230 | 3.265625 | 3 |
- Raspberry Pi
- Digital & analog sensors
- Development boards
- More +
...where a bunch of geeks got together to make other people's ideas come to life.
The cable connects 10 pin to 10 pin and 10 pin to 6 pin cable (not 6 pin to 6 pin). It is made of flat ribbon cable with 28 gauge copper. It is about 11" long. This cable is designed to work directly with the 10p and 6p ISP interface. It makes programming easy. | <urn:uuid:efad0223-4a63-4e9f-996a-d7a25ede2934> | CC-MAIN-2017-04 | http://www.jayconsystems.com/avr-programming-cable.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281151.11/warc/CC-MAIN-20170116095121-00112-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.898634 | 102 | 1.992188 | 2 |
Pope: Marlborough schools will be ready Tuesday
Superintendent Anthony Pope told district officials last night that the schools are in good shape and will be ready to welcome students next week, despite the lingering effects of Tropical Storm Irene.
The start of the academic year was delayed until Tuesday due to citywide power failures related to Sunday's powerful summer storm.
"It has been a very eventful last two weeks," Pope told the School Committee last night. "We are very excited to start the year."
Pope said that nearly all faculty and staff positions have been filled for the new year.
He also said that high school Assistant Principal Dan Riley has mapped more effective bus routes, which are posted on the district's website, and that officials are working to increase the special education department's efficiency.
Riley reported that the Science, Technology Engineering and Math academy is set to launch for the sixth and ninth grades. Technology Director Mark Gibbs said laptops for the program's students are being prepared and should be ready by tomorrow.
Instruction leadership directors Ronit Carter, Maureen Grevlich and Gabrielle Adams discussed the start of a curriculum overhaul, focusing on a model that would track students' progress from kindergarten through their senior years.
This summer, a team of about 40 Marlborough educators considered how best to evaluate the district's education to craft its new curriculum, which is still in the planning stage. Adams said the team agreed that students should receive an education that will help them be competitive in the global marketplace and in a highly skilled workforce.
Teachers reporting for their first day of work today will attend workshops to become acquainted with the district's new focus in curriculum planning, Grevlich said.
(Kendall Hatch can be reached at 508-490-7453 or email@example.com.) | <urn:uuid:038903e9-fc68-4f62-aef1-bb1364072b36> | CC-MAIN-2022-33 | https://www.metrowestdailynews.com/story/news/education/2011/08/31/pope-marlborough-schools-will-be/37922896007/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00668.warc.gz | en | 0.970248 | 373 | 1.546875 | 2 |
Dr. Backoff Assembly and Use
To help user avoid supine sleep.
- Elastic strap approximately 3 cm wide
- Tennis ball
- Fixed blade or lock-blade knife
- Cut off a length of elastic a little longer than 1 meter.
- Tie the ends of the elastic together (granny knot) to form a circle.
- Use the knife to cut approximately 3 cm long crossed slits on opposite sides of the tennis ball.
- Poke a loop of the elastic near the knot through both holes in the tennis ball (all the way through the ball).
- Push the knot inside the tennis ball.
- Pull and adjust the elastic through the slits on either side of the tennis ball to produce two equal-sized elastic loops coming out of the ball.
- Custom fit by pushing elastic into or pulling elastic out of the slits on each side of the tennis ball such that the elastic loops go around the shoulders comfortably, yet snugly. The elastic should hold and center the tennis ball between the shoulder blades.
Place arms through the elastic loops such that the tennis ball is centered between the shoulder blades.
Machine wash as necessary. | <urn:uuid:2e11b53b-0c07-4d5b-bf1f-237669c672be> | CC-MAIN-2022-33 | https://www.sleepconsultants.com/sleep-disorders-information/dr-backoff-assembly-and-use/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00264.warc.gz | en | 0.880529 | 261 | 1.75 | 2 |
Mission & History
The first permanent European settlement in this country, in Florida, was named St. Augustine and was founded by Pedro Menendez de Aviles on September 8, 1565, fifty years before the landing of the Pilgrims in New England. Just as these Spanish settlers were pioneers in their time, so are the founders of St. Augustine College in Chicago: pioneers in bilingual (dual-language) higher education. The College is also named after Bishop Augustine of Hippo, an educator and philosopher whose teachings helped to shape modern thought.
On October 7, 1980, the Illinois State Board of Higher Education granted operating authority to the first bilingual institution of higher education in Illinois: St. Augustine College. This educational setting is unique in Illinois, and one of a few in the country. It came into existence as a result of years of work, observation, and research, and is based on more than ten years of community work performed by the Spanish Episcopal Services, an educational agency that was created under the auspices of the Episcopal Diocese of Chicago by Father Carlos A. Plazas, Ph. D., in 1970.
The College founders reacted to observation and research that indicated that a large number of Hispanic adults, because of specific circumstances, could avail themselves of dual-language (bilingual) academic and vocational career training. These findings also indicated that many Hispanic adults were capable of actively participating in four-year degree programs, but needed educational assistance to be able to compete at this level of education. Since there were no institutions of higher education to respond to these educational needs and provide opportunities for dual-language learning, the Board of Directors of Spanish Episcopal Services elected to support the formation of St. Augustine College.
St. Augustine College is an independent, bilingual (dual-language) institution of higher education created under the auspices of the Episcopal Diocese to make the American system of higher education accessible to a diverse student population with emphasis on those of Hispanic descent; to strengthen ethnic identity; to reinforce cultural interaction; and to build a bridge to fill cultural, educational, and socio-economic gaps. | <urn:uuid:63bc00f8-23bd-4869-99b7-41255c083b8e> | CC-MAIN-2017-04 | http://www.staugustine.edu/index.php?src=gendocs&ref=ABOUT_missionstatement | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00329-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.96884 | 426 | 2.75 | 3 |
Strategies For The Strategists
Today’s article will focus on the typical problems innovators face and the proposed solution for the problems. Most likely you or your innovation stakeholders have day jobs running production critical projects, so how do you fit in innovation projects or convince others?
Working on innovative projects which typically entails exploring unproven, nascent advanced technology is challenging from financial and resource management standpoint. In most cases, innovative projects with no proven market makes financial forecasting difficult therefore harder to justify resources.
Here is a list of common problems faced by innovators:
- Alignment with company objectives – short term needs are often in conflict with the need for exploratory and unproven causes
- Budget or resources allocation – management is often reluctant to fund ventures that have no direct immediate or discernible impact to company goals
- Prioritization – how to choose the most important projects to work on
- Quantifying Effort – how to justify hypothetical ventures
- Venture Survivability – even well funded innovation programs can struggle with moving from theory to practice. How can one take innovation further?
While not the exhaustive list of solutions, here are some ways to address the issues:
- Offer strict adherence to a timeline in alignment with company long term goals and provide incremental, demonstrable milestones
- Opt for “self-funding” via external/internal potential customers or the beg-borrow-steal method
- Utilize tools for assessing project value
- Implement methods to quantify innovation includes patent creation based on the innovation and potential revenue impact
- Provide alternative paths for the continuity of innovation projects
One of the key challenges with innovating is producing tangible deliverables regardless of how theoretical the innovation is. As with any grand ambitions, the key to success is to break the project into smaller bits that:
- when possible – align with current immediate, intermediate or long term goals
- is quantifiable or demonstrable at every milestone
- can be proven to improve/accelerate/assist in current goals
Take as an example, an innovation project to create a wide-area network to track multiple dispersed outdoor objects using a mesh network of short range radio technology that’s ultra low power and self-powered. Break down the milestones and objectives to short duration achievable milestones.
The project milestones may look like this:
Milestone 1: Find existing ultra low power tracking solutions with key variables such as short range vs. connectivity (modem), outdoor vs indoor, low-power vs need to recharge. Assess the plus or minuses of each variable and note which are important for your use cases. If the project is stalled at this stage, at least you have a portfolio of off-the-shelf products you can leverage.
Milestone 2: Based on your findings from milestone 1, narrow down on a solution that best fit your use case. Assess cost, scalability and feasibility of the solution. If the project is stalled at this stage, at least you have a blueprint for when the project can be picked up again
Milestone 3: Based on the blueprint you have created, you can start building a prototype or two. Assess the lifecycle, vendor/manufacturing feasibility, test in various different environments. If the project is stalled at this stage, at least you have a manufacturing plan, test reports from your prototype that you can leverage when the project can be picked up again.
You can carry on breaking down the milestones even more or continue on expanding on the milestones until you have reached your ultimate use case/objectives. | <urn:uuid:5d187951-2b36-4a39-b9f8-c93347def2e7> | CC-MAIN-2017-04 | http://thinkfuture.com/2016/01/26/strategies-for-the-strategists/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00357-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.913809 | 726 | 2.0625 | 2 |
The Miami-Dade County Police Department (MDPD) will no longer allow its officers to use chokeholds on suspects, MDPD Director Freddy Ramirez announced Thursday morning. The shift comes after widespread protests over George Floyd‘s killing at the hands of Minneapolis police.
“I’m thankful for the valuable conversations I’ve been able to have over the past weeks,” Ramirez wrote on Twitter.
“I have decided to no longer authorize the utilization of the Applied Carotid Triangle Restraint (ACTR). This decision was based on a multitude of factors to include officer & public safety, feedback from policing professionals, members of our community local leaders & officials, as well as recommendations from the Police Executive Research Forum.”
Floyd died after Minneapolis Police Officer Derek Chauvin pressed his knee on Floyd’s neck for nearly nine minutes. Floyd was unconscious the final three minutes. Two other officers also knelt onto Floyd’s back during the encounter.
The ACTR tactic is different and involves an officer wrapping his arm around a suspect’s neck.
Activists have called for widespread police reforms following Floyd’s death. Critics have targeted the MDPD and other South Florida police agencies for still permitted chokeholds, which can be fatal. In 2014, Eric Garner was killed in New York City after police placed him in a chokehold. Like Floyd, he cried out “I can’t breathe” before dying.
Protests against the Floyd killing spread throughout the U.S. in recent weeks.
“Upon being appointed Director of the [MDPD] at the beginning of this year, I began a review process that initiated changes which I believe will help our Department live up to our vision of being the model law enforcement organization in the Nation,” Ramirez said.
“As a progressive agency, we must remain in a constant state of review & open to emerging best practices and community feedback.” | <urn:uuid:723e86e6-1028-4875-965e-9bf11e7b4f84> | CC-MAIN-2022-33 | https://floridapolitics.com/archives/339928-miami-dade-police-bans-chokeholds/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00473.warc.gz | en | 0.960035 | 408 | 1.640625 | 2 |
Letting Go with Ceremony
LET IT GO. Such a simple little phrase which can be incredibly difficult to embrace.
Why A Ceremony?
Momentous occasions in life are often celebrated in meaningful and potent ways. Birthdays, graduations, weddings, births, and deaths - each one is honoured with ceremony. We need to commemorate the releasing of our old wounds with the same respect.
If we consciously create the space to recognize our struggles, develop a personal toolbox of healing elements, and find forgiveness and acceptance for our journeys, we discover ways to move beyond our darkness and into our light.
Whether you are carving out five minutes during your work day or dedicating several hours deep in nature, your intention is what matters the most. Ceremonies allow us to recognize the universal qualities between beings, and things. They highlight our importance as specks of dust in the macrocosm of life.
Choosing your tools.
Create your ceremony and space with purpose. Add the elements of nature, so that the Universe is with you. The size or shape of the item doesn’t matter, as long as it is significant to you.
Earth - soil, flora, spices, herbs, wood, bones, or stones.
Air - pranayama (breath work), incense, or a feather.
Water - rain, a bath, or a body of water.
Fire - a candle, a fire pit, or a shell with two sticks burning inside.
Know why you are using each item and how it will support your intention. Spend some time with every piece. Notice the detail and then zoom out and see it with a soft eye.
Feel its texture and temperature, smell it, taste it, caress it. Make it a part of you - blow into the object and share your essence, your DNA.
In those moments find forgiveness and acceptance.
"Know that every feeling that comes up is valid. Feel it for all it is worth, for as long as you need."
As you are performing your ceremony, ask yourself two questions:
The answers to these questions could be simple - one word that is the distillation of what you are working towards or away from, or it could be very specific.
Know that every feeling that comes up is valid. Feel it for all it is worth, for as long as you need. There is no right or wrong. Your ceremony is your ceremony. Free yourself from the confines of being polite or proper and do what your intuition is guiding you to do.
Shake a rattle, bang a drum, cry, scream, howl, moan, laugh, dance, crumble, stand tall. Do not shy away from your primal nature, but be tender with the integration.
Feel it all.
Hear it all.
Taste it all.
Then let it go.
Whenever Jes von Henzke isn’t in school studying to be a Registered Massage Therapist, you can find her teaching yoga, climbing mountains, dipping her head and toes in the ocean, or beating her drum and singing. For more information about her or her schedule, scope out http://www.facebook.com/SadayaYogaJes. | <urn:uuid:17eccd1d-db65-4760-9f09-ccdf2ebaff2b> | CC-MAIN-2017-04 | https://www.malacollective.com/blogs/mala-collective/14791829-letting-go-with-ceremony | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279489.14/warc/CC-MAIN-20170116095119-00017-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.93547 | 666 | 1.679688 | 2 |
- Local Authority level five-year age band population estimates (release 1B) are scheduled for release on 21 March, with single year data (release 1C) following in May.
- Key & Quick Statistics tables (release 2) will begin in Summer 2013, Local Characteristics (release 3) in Autumn 2013, and Winter 2013 (release 4) will contain Detailed Characteristics tables.
- Table layouts for Key and Quick Statistics are now available on the NRS website (.xls)
- NRS are keen to hear from users if they should follow ONS/NISRA and change the order of Releases 3 and 4
All the Census outputs relating to releases 2, 3 and 4 will be made available through SASPAC. | <urn:uuid:8d7e56aa-a585-4b72-bc6b-b4776e50863e> | CC-MAIN-2022-33 | https://saspac.org/2013/03/08/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00270.warc.gz | en | 0.876181 | 149 | 1.515625 | 2 |
Ray Bradbury was the first writer to blow my mind. He died today. This T-Rex description from Sound of Thunder, itself an incredible Sci-Fi story, has always stayed with me.
It came on great oiled, resilient, striding legs. It towered thirty feet
above half of the trees, a great evil god, folding its delicate watchmaker's
claws close to its oily reptilian chest. Each lower leg was a piston, a thousand
pounds of white bone, sunk in thick ropes of muscle, sheathed over in a gleam of
pebbled skin like the mail of a terrible warrior. Each thigh was a ton of meat,
ivory, and steel mesh. And from the great breathing cage of the upper body those
two delicate arms dangled out front, arms with hands which might pick up and
examine men like toys, while the snake neck coiled. And the head itself, a ton
of sculptured stone, lifted easily upon the sky. Its mouth gaped, exposing a
fence of teeth like daggers. Its eyes rolled, ostrich eggs, empty of all
expression save hunger. It closed its mouth in a death grin. It ran, its pelvic
bones crushing aside trees and bushes, its taloned feet clawing damp earth,
leaving prints six inches deep wherever it settled its weight. It ran with a gliding ballet step, far too poised and balanced for its ten
tons. It moved into a sunlit area warily, its beautifully reptilian hands
feeling the air. | <urn:uuid:b92fd824-129c-401a-8593-f186d14b0ed7> | CC-MAIN-2017-04 | http://mypoorfoolishanged-keith.blogspot.com/2012/06/ray-bradbury.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00136-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.948646 | 326 | 1.679688 | 2 |
There are many myths on digital advertising and its approach which should be busted. Content marketing is better known as the art of communicating with customers by adding valuable experiences and information. Content marketing is significantly on the rise compared to the traditional display advertising.
Display advertising is popularly known as has the easiest and most effective way to reach customers by pushing out information, often in small remains. Display ads can be text ads, videos or digital banners and they appear in discrete sections on a site that are naturally reserved for paid advertisements.
The main aim of these ads is to peddle out the customer and generate a quick conversion. Billions of dollars are spent every year on display advertising, however, that number is declining as marketers are spending more of their budgets on developing content marketing strategies and constructing communities around quality content.
Content Marketing and Content Advertising
Content marketing can take the cloak of anything and can be a wide-ranging solution for the marketers. It can be blogs, reviews, articles, e-books, graphics, videos or any medium where the purpose is to create a value exchange with the customer. Lately, many companies have made a huge modification in their marketing budgets to spend more on content marketing. Many big names like Microsoft, Procter and Gamble, Coca-Cola are more focusing on a quarter of their budgets on these kinds of strategies.
Why is Display Advertising is getting less engagement?
There are numerous reasons behind this question. Firstly, even with marketers’ attempts to create more immersive and disruptive display ads, customers are becoming trained to overlook these placements. Customer’s eyes know these mutual areas of the site where ads are typically located and placed. Hence, markets should focus on the content-rich portions of the site. We are so habituated to skimming over these ads that the likelihood of a customer clicking on a display ad is very infinitesimal.
Secondly, display ads with the course of time are becoming unbelievably weak branding vehicles. Almost, each customer can identify an ad immediately and know that the motive behind it is to sell a product or service. On the other side, content marketing is premeditated to deliver a more eloquent experience to the customer without any attachment. By doing so, companies gather more conviction and become the specialist in that subject field.
Thirdly, unlike display ads that last for average 1.6 seconds, customers spend almost 345 times longer engaging with branded content. This means better user engagement with the brand, which in turn leads to a higher quality of customers. Sharing generates lasting content marketing impressions as the content can be supported through social media channels and other content sharing platforms. Companies are building organic communities around these loyal customers and thus 78% of customers are accountable about the relationship between themselves and a company.
Quantity vs Quality. Which medium to prefer?
However, we tried to bust some common myths on display advertising and looking towards the future of content marketing and content advertising. Nowadays, many companies are pulling their audiences in with rich content experiences. This means all these companies are pointing less towards their brand and more about generating a true value exchange.
However, if the companies start thinking about the customer first and the conversion vehicle second, companies will be more suitable to deliver buzz-worthy content that will fast-track the brand to the top of customers’ minds. Additionally, they should focus more on content skills rather than a content strategy by capitalizing in a meaningful mission rather than a metric-driven attitude. Great content marketing should also be an amalgamation of sponsored content and customer generated content. Letting customers socialize with the brand and compatible peers, it helps to generate opinions and in some cases, they become content experts themselves! Companies can gain real insights regarding their brands by listening to customer opinions and preferences. In this give and take process customers become more loyal towards the brands and it increases the demand simultaneously.
Wherever the future of content marketing is heading, one thing is certain: it is not fading or phasing out soon. And why a customer would we want it to? As a customer, we benefit more from the added value that companies are delivering. As companies, we are creating sturdier, advanced quality leads and are generating lasting impressions via more durable and treasured content. | <urn:uuid:61813ebe-c7b3-426b-ab80-abc0c99be9d6> | CC-MAIN-2017-04 | http://www.vertoz.com/blog/content-marketing-vs-display-advertising/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00330-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.954178 | 863 | 1.804688 | 2 |
The British government is being sued for the first time over its complicity in the operation of the CIA rendition program.
A former detainee at Guantanamo Bay, now living back in Pakistan, claims the CIA plane that took him to be interrogated in Egypt stopped to refuel on the British island of Diego Garcia in the Indian Ocean, where the U.S. has an air base.
Mohamed Saad Iqbal Madni is filing a lawsuit in the High Court in London that alleges the stopover makes the British complicit in the torture he received at the hands of the Egyptians and Americans – and, moreover, the British government now has a duty to help him win justice.
Madni says he was first beaten up, tied in chains, and then packed on a Gulfstream jet in a wooden box when he was picked up in Jan. 2002 in Jakarta, Indonesia. He says he was still bleeding from his nose, mouth and ears when the plane touched down to refuel six or seven hours into the flight.
After the stopover, flight records show the plane went on to Cairo, where Madni says he was badly tortured. He told the BBC World Service, "When I arrived in Egypt I was blindfolded and left in a room... they interrogated me three times. Each was for 17 hours and they electrocuted me in my knees. And they asked if I knew Osama Bin Laden or went to Afghanistan or if I met Richard Reid or knew anything about a shoe bomb or future attacks."
Madni was accused of being an Al Qaeda operative and of plotting attacks on U.S. officials. He was released last year from Guantanamo, where he had attempted suicide, and returned to his native Pakistan, where he now lives. His lawsuit is being filed on his behalf by a British legal charity, Reprieve, that has represented many inmates at Guantanamo Bay. Reprieve claims to have worked out that it was Madni who landed on the island by analysing statements made by the British government.
Island of Diego Garcia
Ever since 2002, news reports have alleged the CIA was using Diego Garcia as a secret site to hold terror suspects, either in a prison or to transport them.
The British Government was always pretty strong and sharp in denying all that. But they based their firm denials on what the Americans told them, until the U.S. changed its position.
Last February, British Foreign Secretary, David Miliband, was forced to make what was quite an embarrassing statement that two planes – rendition flights- did in fact stop there, each with one prisoner.
From its database of the records of prisoners held at Guantanamo and comparing them to the details released by Miliband, Reprieve claimed it worked out that Madni was one of the two prisoners involved. It will deploy the legal argument that since torture is a crime, the British government needs to do everything in its power to help its victims seek justice from the perpetrators. Reprieve successfully deployed the same legal argument last year to force the British government to release its files on a British resident, Binyam Mohamed, then held at Guantanamo, and to secure his release.
Speaking of the Madni case, Clive Stafford Smith, legal director, of Reprieve told the BBC program, " I would defy the British government to deny that we are right." He said, "The issue for Britain is that Diego Garcia is a British territory, we're responsible for it and what happens on it... the Americans are meant to tell us what they are doing and we, as supervisor of Diego Garcia, have a responsibility to make sure that crimes do not happen on it."
The British Foreign Office said it could not comment in detail because of the pending legal action. But, in a statement, they said that while the movement of prisoners through UK territory without permission was "concerning….it did not mean that the UK has been complicit in torture."
Stephen Grey, an ABC News consultant, is the author of "Ghost Plane: The True Story of the CIA's Rendition and Torture Program" (St. Martin's Press). He is an award-winning investigative reporter who has contributed to the New York Times, BBC, PBS and ABC News among others. | <urn:uuid:1cb096b3-0949-4dd4-8e90-41f85350d423> | CC-MAIN-2016-44 | http://abcnews.go.com/Blotter/story?id=8194127 | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719566.74/warc/CC-MAIN-20161020183839-00262-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.980474 | 851 | 1.703125 | 2 |
Microsoft Marketing Strategy – Marketing Strategy of Microsoft: Bill Gates founded Microsoft in 1975. The American MNC is the technology titan that makes the lives of people all over the world easy, comfortable, and more productive through its many offerings in personal computers, computer software, and consumer electronics.
It produces, develops licenses, and provides support services for the services. It is the largest company in the world and is ranked as one of the top 100 most valuable companies worldwide.
Microsoft At A Glance – Marketing Strategy of Microsoft
Company : Microsoft Corporation
CEO: Satya Nadella
Founder: Bill Gates | Paul Allen
Year founded: 4 April 1975, Albuquerque, New Mexico, United States
Headquarters: Redmond, Washington, United States,
Annual Revenue: US$138.6 Billion
Profit | Net income: US$46.3 Billion
Number of employees : 181,000
Products & Services: Bing | Bing Video | Cortana | docs.com | LinkedIn | Microsoft Azure | Microsoft Dynamics |Office | Microsoft Money | Microsoft Office Online | Microsoft Office 365 | Microsoft Windows Apps for iOS Applications available for Android Surface Pro | Microsoft Teams
Microsoft Fun Facts: At age 31, Bill Gates was officially the youngest billionaire in the world. This was 2 years after Microsoft Windows was released.
Marketing Strategy of Microsoft
Microsoft’s Marketing Strategy covers various aspects of the business right from segmentation and targeting to the overall mission and vision of the company and the various parameters which the company executes to become the top brand that it has in the market. So what is your Marketing Strategy for Microsoft? Let us discuss.
Segmentation, Targeting, Positioning – Microsoft Marketing Strategy
To segment the market into groups with similar characteristics, the tech giant employs a mix of demographic and behavioral segmentation strategies. Segmentation Demographic is used to segment products such as Office products and Operating systems that are universally applicable. Behavioral segmentation can be used for products such as the Microsoft Windows server operating system and Windows mobile phones. It is used in a large number of hardware and software companies, ranging from mobile manufacturing and selling to operating systems.
Microsoft has a large product and service portfolio. This allows them to mix differentiated and undifferentiated targeting strategies. The population of office and Windows is homogenous. In operating systems, the target refers to the entire world that has access to computers. Microsoft must have a different target in mobiles and development tools because there is a lot to choose from and the market is split based on the features.
The company recently underwent a turnaround to reposition itself as an organization that is value-based and aims to improve the lives of people worldwide. Microsoft’s positioning means that its operating systems and many software are top-of-the-mind in the market. Any product that Microsoft launches is given a great positioning because of its brand values. It might not be the most prominent in every case. Example: Microsoft mobile phones vs Samsung and Apple on the smartphone market.
Microsoft Mission Statement
“Empower every person and every organization on the planet to achieve more”.
Microsoft Vision Statement
“What we can do & who we want to become.”
“Your Potential, Our passion”
Competitive Advantage – Microsoft Marketing Strategy
Microsoft is in the business. It offers a wide range of products and services that gives it an edge over other companies around the globe. There are offerings for everything from Microsoft tablets to Xbox console gaming to software. The company’s meta-market industry allows it to use shared capabilities to succeed in its functional business operations.
Microsoft’s acquisition strategy is one of its most significant competitive advantages. Microsoft has acquired many of the most prestigious companies around the globe, including Hotmail, Skype, and Nokia.
Microsoft also has a competitive advantage over Apple. Its operating system can be installed on any computer or laptop. There is no hardware binding. This is a key problem in the distribution of Apple Smartphones. This also means that there are huge losses due to piracy.
Microsoft’s product line is a major advantage. It is the most popular operating system for computers in the world and is nearly dominating that market when we compare global figures. Windows 10 was the last and latest version of its series and was offered as a free upgrade to Windows 7 owners. Microsoft has focused on TCO (Total Cost of Ownership) to make the software affordable and easily accessible to customers.
It also offers a solid product line, including Skype, Xbox series, mobile phones, Xbox games, browsers, search engines, Microsoft office, and Business solutions. It is, naturally, a huge organization. This is its competitive advantage.
BCG Matrix – Microsoft Marketing Strategy
The company’s Windows & Online Service Division and the business division that deals with client-side businesses are both stars. It is built on the Windows OS platform. With a high market share of OS, the software it offers seems to be attractive to customers. Apple recently overtook Microsoft as the most widely used operating system in its own country, the USA. However, the OS Windows is not comparable globally.
Both the Xbox 360 and the office suite are stars due to their high market share. However, there are constant direct and indirect competitors in both these segments. The former is from Nintendo and Sony, while the latter is from Open office and Kingsoft.
Its devices division, such as Zune or Microsoft phones, is facing stiff competition from the competitors in this segment. Therefore it is a question mark on the BCG matrix.
Distribution Strategy – Microsoft Marketing Strategy
The company’s wide distribution channel, and multi-channel strategy to make its products and services available to end customers have helped it increase its visibility & awareness. Microsoft makes its products and services easily accessible to customers through a large network of retail outlets, online sites, and exclusive showrooms.
The tie-up with OEMs like Dell and HP is a key factor in Microsoft’s distribution as an Operating System. These companies then supply laptops already equipped with the Windows OS system.
Brand equity – Microsoft Marketing Strategy
In 2016, Microsoft was the 5th most valuable brand in the world! Microsoft’s operating system Windows is widely accepted in the market and has high TOMA (top of mind awareness) levels. It is also the oldest company in the technology sector. The company has always changed with the changing business environment.
Its campaigns like “Get the facts”, Scroogled, and many others helped to increase the brand visibility.
Competitive Analysis – Microsoft Marketing Strategy
Companies are now creating new products and services that meet the needs of their customers, thanks to the Hi-tech culture. This industry is booming because of the high acceptance of technological products. All over the globe, IT companies are striving to be the leader. Google has the largest rival to Microsoft.
Market Analysis – Microsoft Marketing Strategy
Microsoft is experiencing rapid growth due to the industry’s challenges and growth. This industry is outsourcing services to developing countries to lower their operating costs. Large numbers of clients can give the client-side bargaining power. Many companies on the market offer similar products
Customer analysis in Microsoft’s Marketing Strategy – Microsoft offers products and services for all ages and all types of customers, whether they are individual customers or enterprises.
You May Also Like:
- Marketing Strategy of Cafe Coffee Day
- Marketing Strategy of China Mobile
- Marketing Strategy of Kellogg’s
- Honda Motors Marketing Strategy
- Marketing Strategy of Dunkin donuts
This is the Marketing Strategy of Microsoft. Please let us know if you have additional suggestions to add.
Let us know What do you think? Did you find the article interesting?
Write about your experiences and thoughts in the comments below. | <urn:uuid:705ee6df-2b86-4bd8-9a49-811b9b177179> | CC-MAIN-2022-33 | https://bsmarketingstrategy.com/microsoft-marketing-strategy-marketing-strategy-of-microsoft/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00276.warc.gz | en | 0.933508 | 1,617 | 1.5625 | 2 |
The Use of Medical Marijuana Strains For Ailments
There are a number of medical marijuana strains, which can be used for different injuries, ailments, or pain users are suffering from. Depending on the desired effects, and the type of pain relief one is hoping to attain, different strains will be prescribed or recommended to individuals, who have a medical marijuana card when it is available.
Medical Marijuana Strains
This type of marijuana plant can vary from 6 to 25 ft in height. The leaves on the plant are long, thin fingered, and a lighter green color. As the drug matures, the leaves may begin to turn yellow, and begin to fall off the plant. The buds on this strain is far less dense than indica. The effect of this strain is generally a cerebral one; users will experience a feeling of optimism and well being, and the strain provides pain relief, for certain ailments. Certain plants in this strain are also high in THC levels, which results in a hallucinogenic state.
Indica strain –
These plants are generally short, 6 ft or under, the leaves are short, and have a darker green color, than Sativa strains. Once the plant matures, the leaves begin to turn a darker purple color. In contrast to Sativa, this medical marijuana strain produces a more pleasant “body buzz.” They help with stress relief, relaxation, and produce a sense of calm and serenity. This strain is also very effective for overall body and pain relief, and can often be used to treat insomnia.
A third of the medical marijuana strains, is the hybrid. As the name implies, it brings together a combination of Indica and Sativa strain, to provide relief, both on the mental (cerebral level), as well as pain relief for different injuries or ailments. Depending on the hybrid mix, the potency of the medical marijuana strain will vary, based on whether it is dominant in Sativa or Indica strains of marijuana plants.
Benefits of using Sativa strains –
Depending on the potency level of the strain, this sativa blend can treat a number of ailments; prescriptions generally help with:
– Reducing nausea and stimulating the appetite.
– It can help fight depression, and bring about a positive, happy cerebral effect on the user.
– Relax muscles and help with pain levels.
– Can be used for treating conditions such as ADD or ADHD.
– Arthritic conditions, back pain, and muscle spasms can also be treated.
Of course the potency levels, and the type of sativa strain you are prescribed, will have an effect on the treatment of certain injuries and ailments. Due to the fact that it is a cerebral based strain, it can provide an overall feeling of well being, and help reduce pain levels, when used to treat different injuries.
Benefits of Indica strains –
Like sativa strains, the indica strain is also prescribed for a variety of conditions; treatment can range from:
– Pain reduction or working as a muscle relaxant.
– Spasm relief, and can be used to help reduce the possibility of having seizures.
– Works as a sleep aid, and can be prescribed to individuals who suffer from insomnia.
– Reduces inflammation, and helps reduce stress levels.
– It can also help reduce headaches and migraines.
This strain can also be used to help individuals with appetite problems, can be used to treat conditions like ADD, or anxiety. Depression is often treated with this strain of medical marijuana, as is epilepsy.
Effects of medical marijuana –
Whether using a hybrid, indica, or sativa strain, all three medical marijuana strains will have certain effects on users. Some of these include: increased appetite, higher energy levels, uplifting and stimulated arousal, or the strain can work as a sedative, which is best when taken before bed. Depending on the illness, ailment, or condition being treated, the different strains of marijuana, will be prescribed to different individuals.
Medical marijuana has gained more and more recognition over the years; not only as a means of treating various conditions, but also as a way to help treat pain, and other symptoms experienced, due to a condition which the user suffers from. When prescribed by a licensed doctor, and used as prescribed, these medical marijuana strains can do quite a bit of good for users, and in certain cases, can help treat their condition, as no other medicine or prescription is able to do. | <urn:uuid:bbed6385-feb3-4d29-a35e-ac1e46a2d339> | CC-MAIN-2022-33 | https://floridamarijuanainfo.org/the-use-of-medical-marijuana-strains-for-ailments/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00070.warc.gz | en | 0.939622 | 927 | 1.960938 | 2 |
The Truckee Meadows Remembered project involved moving five small historical ranch outbuildings to Bartley Ranch Park in May of 2004. The five buildings were originally from the Joe Ferretto Ranch in the Huffaker’s area on South Virginia Street, Reno, Nevada. Boomtown moved them to their casino property in the early 1990s and used them for a couple years in a country jamboree setting. Thanks to the volunteer efforts of Reno citizens Jack Hursh, Loren Jahn, Jack Sutton, and Terry Cynar, the buildings were relocated and arranged at Bartley Ranch Park in a similar fashion to the original setting at the Joe Ferretto Ranch. These buildings date to circa 1860s to 1910s and include a cook house, carriage house, bunk house, outhouse, chicken coop with pigeon loft, granary/tool shed, and lambing shack.
These humble shacks and shanties represent some of the oldest remaining examples of vernacular (home built) architecture in the region. A couple of these buildings may have existed in territorial days before there even was a Reno. Their architectural style is not Italianate, not Greek Revival, not Colonial, or not Victorian—They are Nevadan!! Besides that their rusty tin roofs and sun beaten wood siding make them beautiful!
This website features the photographic work of Jack Hursh
and pen and ink work of Loren Jahn, both of Reno, Nevada.
Truckee Meadows Remembered historical ranch outbuilding display at Bartley Ranch Park, Reno, Nevada, December 2004. | <urn:uuid:c1110d48-edf4-486e-a650-7f9a3be7672b> | CC-MAIN-2022-33 | https://www.truckeemeadowsremembered.com/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.95/warc/CC-MAIN-20220817032054-20220817062054-00472.warc.gz | en | 0.94962 | 320 | 1.992188 | 2 |
On the face of it, the figures in the Union Budget 2021-22 suggest that the Government opted for imparting to the Indian economy a massive fiscal stimulus in the Covid financial year (April 2020 to March 2021), which is now being gradually moderated or wound down as the economy ‘recovers’. The estimated fiscal deficit of the Central Government (the excess of its expenditure over tax and non-tax receipts) for the financial year ending in less than two months on 31 March 2021 has been placed at a whopping 9.5 per cent of GDP. This is a level way beyond anything in living memory and is 6 percentage points above the original Budget Estimate of 3.5 per cent. This also follows a smaller increase in the previous year, from 3.4 per cent of GDP in 2018-19 to 4.6 per cent in 2019-20.
The truth, however, is entirely different from what the fiscal deficit figure might make it look to be. What appears as a moderation of the stimulus in 2021-22 is actually a retreat from a stimulus that was never given in the first place. The ‘stimulus’ is purely an artifice of budgetary accounting procedure, through a massive contraction of GDP (the denominator of the ratio) and the attendant plummeting of revenues. Unlike what some headlines have tended to suggest, there is absolutely no spending spree or loosening of purse strings. The purpose of putting out the 9.5 per cent of GDP figure appears to be to shock and awe and to provide the rationalization for what is exactly the opposite of a stimulus, a particularly savage fiscal compression. The Union Budget 2020-21 has only reinforced the existing evidence that the Modi Government has been among the stingiest in the world in the face of an unprecedented crisis, even while making the tallest claims to the contrary. Behind all the spin, however, also lies a darker reality that explains why most of the media has played the role of a cheering crowd for the budget.
The Myth of Expenditure Expansion in 2020-21
The Budget presented by the Finance Minister before Parliament on 1 February of 2021 relates to the future, the financial year stretching from 1 April 2021 to 31 March of 2022. The planned expenditure for that year (Budget Estimates or BE) has been pegged at Rs. 34.8 lakh crores. This is no more than the Rs. 34.5 lakh crores that according to Revised Estimates (RE) would have been the total expenditure incurred by the end of the current financial year. Indeed, if obligatory interest payments are removed from the total, then the planned expenditure in 2021-22 is less than the revised estimate for total expenditure in 2020-21. It would be downright strange to argue in such circumstances that the Government is proposing to boost its spending if these figures are accepted. The accurate description of the Government’s plan instead would be that it is proposing a real contraction of its total expenditures. This is indisputable even if the spin masters try and conceal it in different ways.
It could of course be still argued that the spending in 2021-22 will still be high because it is only a contraction compared to the highly elevated levels of expenditure in 2020-21. After all, the Budget did put out figures that suggested that the extra expenditures by the Government in response to the pandemic was to the tune of Rs. 4.1 lakh crores, which was the excess of the revised estimates over the original plan made last year of spending Rs. 30.4 lakh crores (BE). This figure initially does look surprising because there has been no evidence of such large scale expenditure. Indeed, in the first nine months of the year the Central Government had spent only Rs. 22.8 lakh crores, which was about 74.9 % of the budgeted amount of 30.4 lakh crores. In the previous year, that is 2019-20, the Government had spent Rs. 21.1 lakh crores in the same period, which was also similarly 75.7% of the budget estimate for that year – and the final figure by end-March 2020 ended up being 26.9 lakh crores which was almost 1 lakh crores less than the full year budget figure. In other words, in order to reach the RE figure of 34.5 lakh crores by 31 March 2021, the Central Government expenditure in the last quarter of the year would need to be Rs. 11.7 lakh crores or double the Rs. 5.8 lakh crores spent in the same period the previous year. This begs the question, why would such a large expenditure of the year have remained pending till the end of the year? Why had it not been spent when the situation in the country was at its worst? And where would such a large expenditure be made in so short a time?
A major part of the answer to these questions lies in one single head of expenditure – food subsidies. Under this head alone, the apparent extra expenditure in 2020-21, the excess of RE over BE, would be about Rs. 3.1 lakh crores which accounts for 75% of the total difference of Rs. 4.1 lakh crores. The pending expenditure under this head, the difference between the RE figure and the amount spent by December 2020 is also almost Rs. 3 lakh crores while last year more than the entire full year expenditure had been spent in the first three quarters itself. If we look at the break-up of the food subsidy, Rs. 3.44 lakh crores is the revised figure of the food subsidy to be to be given to the Food Corporation of India (FCI) under the National Food Security Act. The FCI accounts up to 21 January 2021 however show a subsidy claim of only Rs. 2.19 lakh crores for the year of which it has received Rs. 77,980 crores, which is actually the original BE amount for this head. However, the FCI also has an accumulated unpaid subsidy claim on the Government of Rs. 3.85 lakh crores – which is a result of the long-standing practice of not showing the full expenditure on subsidies in the Central Government’s own account by undercompensating the FCI and instead providing it loans from the National Small Savings Fund. This way the total borrowing of the Central Government in the Government’s own account was artificially reduced by shifting it to the FCI’s account. This is now to be changed and the expenditure and the corresponding borrowing are being brought into the Government’s account directly. This change would have temporarily increased the RE figure from the BE figure even if there had been no increase in the actual subsidy benefit received by people had happened in 2021-22, because part of subsidy expenditure of previous years would get shown as current year expenditure. As such it artificially inflates the level of food subsidy expenditure for the current year. Indeed, the FCI’s claimed subsidy for 2020-21 (till 21st January) is only Rs. 87,000 crores more than in 2019-20 while the excess of RE over BE in the Government’s account is about Rs. 2.66 lakh crores. To put it differently, had the same method been used as in the previous years to determine the food subsidy expenditure of the Central Government, or the new method had been the one used in the past too, the food subsidy bill would have shown an increase of somewhere around Rs. 1 lakh crores between the 2020-21 BE and RE , instead of the 3.1 lakh crores presented. If we adjust for this alone, the additional expenditure in 2020-21 over the original budget estimates would be halved from the Rs. 4.1 lakh crores shown – and going by past experience and the large amount of expenditure still pending, the final level may be even less than that.
Expenditure Cuts Today as well as Tomorrow
Expenditure on food subsidy was of course one of those expenditures that the Modi Government was compelled to step up beyond the levels originally budgeted in February 2020, in response to the pandemic and the economic collapse. The Statement of Major Variations in Expenditure Between BE 2020-21 and RE 2020-21 shows that the next most important heads where such increase took place were fertilizer subsidies, rural employment, Capital Expenditure of Railways and Social Security and Welfare – which together accounted for about Rs. 1.72 lakh crores of the increase.
- The Rs. 65,000 crores additional allocation for Fertilizer Subsidy under Atmanirbhar Bharat, reportedly used to clear pending dues to fertilizer companies, more than explains the Rs. 62,638 crores extra shown in that head.
- The Rs. 50,000 crores increase in expenditure on Rural Employment is the additional allocation for MNREGA.
- The variation on account of additional Capital Expenditure of Railways of Rs. 38,398 crores attributed to provision of special loan for COVID related resource gap to Railways is in fact significantly lower than the Rs. 79,398 crores shown elsewhere in the Budget documents as the actual amount of the loan. This is because the regular Capital Support from the Budget to the Railways was simultaneously slashed from Rs. 70,250 crores in the BE to 29,250 crores in the RE.
- The variation shown in Social Security and Welfare, of Rs. 28,534 crores on account of “releases through ‘Direct Benefit Transfer’ under Pradhan Mantri Jan Dhan Yojana to women account holders” is also less than the Rs. 30,957 crores shown as the actual expenditure under this head.
The indications coming from the above that the Modi Government’s reluctance to increase expenditures was reflected in the ‘moderation’ or neutralization of the increased expenditure under some heads by cuts being imposed on other heads is confirmed by the evidence of how wide-ranging these cuts have been. Among the various alternative ways in which the Budget documents present the break-up or distribution of the total expenditures, one is as Expenditure by Major Items. Table 1 shows the change in 2020-21 from BE to RE figures for expenditures on each of the Major Items as well as the changes in planned (BE) expenditures on these heads in 2021-22. It can be seen from the table that on several important items the expenditure in RE 2020-21 is in fact lower than in BE 2020-21 – and these heads accounted for almost half the total BE expenditure other than interest payments. What is more, a few of them are to experience further cuts in 2021-22 and in many more the increase in 2021-22 will be less than the cut in 2020-21 – in other words the cuts will not be fully reversed, and they will still be below the previous year BE levels. On the other hand, some of the major increases in expenditure in 2020-21 – on food and fertilizer subsidies, rural development and even health are slated to be significantly reversed in 2021-22. Cutting rather than expanding expenditures clearly emerges as the more common feature of the Modi Government’s current fiscal approach.
That, however, is by no means all. The item showing the greatest increase in 2021-22 over the RE of 2020-21 in Table 1 is ‘Transfer to States’, Rs. 35,000 crores of which is the special allocation for Covid-19 vaccination. That there is still a balance increase of Rs. 57,855 crores might suggest that more resources are going to be devolved to states. This again is the opposite of what is true. Transfers to states take place under several different Items so that the total transfers to states is more than what is shown in Table 1. It also includes one especially important transfer which does not appear as an expenditure in the Central Government Budget – namely the states’ share in Central Taxes. The amount states received under this head in 2018-19 was Rs. 7.61 lakh crores, which was 36.6 per cent of the Gross Receipts from all Central Taxes. In 2019-20, however, this amount had dropped to precipitously to Rs. 6.51 lakh crores or 32.4 per cent of the Gross Receipts. The level was budgeted to recover in 2020-21 to 7.84 lakh crores but instead has plummeted further – what the RE figures show is that states will receive only Rs. 5.5 lakh crores which is 28.9 per cent of Gross Receipts. For the coming year, 2021-22, this has been budgeted to recover partially to 6.7 lakh crores (30 per cent of Gross Tax Receipts), still far below the 2018-19 figure. This is also only if this truly materializes and as we shall see shortly, it may not. Even with this figure, however, the picture that emerges is that any increases in transfers to states that fall within the Central Government’s expenditure account, such as transfers for expenditure on Centrally Sponsored Schemes (like MNREGA) or Finance Commission Grants, has tended to be completely neutralized by the reduction in the devolution of states’ share in Central Taxes. In 2020-21 this meant a reduction of total transfer of resources to states and Union Territories by Rs. 76,729 crores compared to the BE figure. Including the additional support for Covid vaccination, states are budgeted to receive only Rs. 74,565 crores more in in 2021-22, which would still be marginally lower than the amount they were budgeted to receive in 2020-21.
Taxation: The Move Towards Centralization and a More Regressive System
The fiscal deficit is a difference between two magnitudes and the real reason for the increase in it is the collapse of revenues. A tendency towards such a collapse was inevitable given the contraction in GDP that the economy has experienced in 2020-21. However, an adverse trend in revenues preceded this contraction. Nominal Gross Revenues from Central Taxes had declined by 3.4 per cent even in 2019-20 even though nominal GDP had supposedly increased by over 7 per cent. In response to the revenue collapse in 2020-21, the Government did have the option of increasing the burden of direct taxes on the corporate sector and the rich in a staggered manner and that would not have been an anti-stimulus measure if the additional revenue translated into public expenditure (indeed, the income base for those revenues would also have expanded as a result). The path chosen instead was to raise the excise duties on petrol and diesel, a measure that the Modi Government has repeatedly resorted to since 2014 – indeed, it has been its solitary go to measure for raising revenues. New hikes in petrol and diesel duties were put in place even before the reopening after the lockdown had proceeded. In two steps taken in March and May of 2020, the excise duties on petrol and diesel were raised by Rs. 13 and Rs. 16 per litre respectively. The result of these was that despite the lockdown and economic contraction resulting in a squeeze on consumption of petrol and diesel, revenues from Central Excise Duties boomed substantially in 2020. While the revenues from all other taxes in 2020-21 are going to be Rs. 6.17 lakh crores less than was originally estimated at the time of last year’s budget, revenue from Union Excise Duties is headed to be Rs. 94,000 crores greater.
Excise duties on petrol and diesel are the closest that one might get to having universal taxes that everyone has to share the burden of. This is because they enter into the price of everything, directly or indirectly. They constitute therefore not only a regressive tax but raising them in the context of a demand constrained situation is also unambiguously a contractionary policy. That this additional levy was imposed on those who experienced losses of an already low income makes it a particularly gross measure. What direction things are headed in can be gauged from the following. In 2018-19, India’s nominal GDP was 189.7 lakh crores, and, in that year, Corporate Tax receipts were Rs. 6.6 lakh crores, those from income taxes were Rs. 4.7 lakh crores while receipts from Union Excise Duties were Rs. 2.3 lakh crores. In 2020-21, when the nominal GDP is estimated to be at a Rs. 194.8 lakh crores level, Corporate Tax Revenues are going to be less than Rs. 4.5 lakh crores – a reduction as a proportion of GDP by 1.2 percentage points from 3.5 per cent to 2.3 per cent. Income taxes are pegged at a level of Rs. 4.6 lakh crores – which would be 2.4 per cent of GDP as against 2.5 per cent in 2018-19. Union Excise Duties are however going to be at a level of Rs. 3.6 lakh crores – a rise from 1.2 per cent to 1.9 per cent of GDP. These together describe a process of where the taxation system is being used as a mechanism of redistribution of income from the working people to the rich and the corporate sector in the midst of an economic catastrophe. That no measures have been announced of raising direct taxes (even the corporate tax concession announced in 2019 has not been withdrawn), while the raised levels of petrol and diesel taxes have been retained, point towards this process being carried on in the coming year too. Confirmation of this can be had by looking at the projections of revenues from different heads. A further dimension of the fiscal approach to fuels is the development on the expenditure side – a process of cutting both the LPG and the Kerosene subsidies, which is the reason for petroleum subsidies showing a fall in Table 1. In both heads the RE levels for 2020-21 are lower than the original BE figures – which means they fell in the category of expenditures which were reduced. For 2021-22, a further 60% cut in the LPG subsidy and the elimination of the kerosene subsidy has been planned.
An additional dimension of the changes in taxation is its increased centralization and the squeezing out of the states, as already indicated. A major part of the increased taxes on petrol and diesel, Rs. 9 in each case, was under the head Road and Infrastructure Cess rather than Basic or Special Additional Excise Duty. Cesses are not included in the divisible pool of central taxes and therefore state governments do not receive a share of the revenues for them. By adopting this method, the Central Government ensured that this compensation for loss of revenues was not shared with the state governments. The Union Government is now carrying this process further by Budget 2021-22 imposing a new Agriculture Infrastructure Development Cess (AIDC) on several items including petrol and diesel, while correspondingly reducing the basic customs and excise duty components. In other words, the tax burden on the people will remain the same but the part of revenues which has to be shared with states will be reduced. Since this combination of mutually cancelling out measures cannot have any effect on total revenue realization, the only possible explanation for this lies in the motivation behind it of centralizing the tax pool. Combine this with the refusal to meet its promise on GST loss compensation in the name of the Covid crisis and forcing states to borrow instead – a clear pattern of squeezing the finances of states is evident which of course adds to the public expenditure compression.
Conclusion: Driving India’s Economy and the People to the Brink
While the advent of the Covid-19 pandemic itself was outside the Modi Government’s control, the same cannot be said about how it responded to the pandemic. That response worked more to generate an economic collapse than to contain the pandemic and the public health crisis. The economic policy component of the response was marked by an extreme refusal to loosen the purse strings which also had a direct bearing on the magnitude of the crisis. The ballooning of the fiscal deficit to an unprecedented level thus indicated no real stepping up of expenditure. Over 61 per cent of the increase in the deficit from BE and RE of Rs. 10.5 lakh crores were accounted for by the lack of realization, of budgeted tax and non-tax revenues and also the planned receipts from disinvestment. Another 20 per cent or more is on account of artificial inflation of the expenditure through accounting jugglery. This artificial inflation of course served the purpose of concealing that the pandemic induced net increase in total expenditure was abysmal. It also means that going forward the full level of the food subsidy has been brought within the ambit of the process of reducing the Central Government’s fiscal deficit, eventually to 3 per cent of GDP. In other words, the intentions behind the apparent cleaning up of accounts at this juncture are not necessarily above board.
The reaffirmation of the objective of fiscal consolidation and progressive reduction of the fiscal deficit was made loud and clear by the Finance Minister. How this will be sought to be achieved is clear from what has been already done – a regressive push in taxation, a squeezing of the states’ share in taxes and compression of expenditure. This will be combined with disinvestment and privatization of public enterprises for which a road map has also been laid. In the meanwhile, the rich and the wealthy will finance the government not by paying taxes but by lending against which they will receive interest and by buying profitable public assets that will be privatized.
So, you have a Central Government fiscal policy that: a) Cuts expenditure on most heads over two years and forces state governments to follow suit by squeezing them financially; b) not only centralizes a shrinking revenue pool but also increases the burden of taxation on common people; and c) effectively redistributes income in favor of the corporate sector and high income groups. Whatever one would call such a policy, anyone seeing any ‘fiscal stimulus’ character in it would need to get their eyes and head checked. Given its context of an economic catastrophe along with a public health disaster, it is a particularly hard and heartless adherence to neo-liberal fiscal orthodoxy. If there is no stimulus or demand expanding component in it and it also aggravates the extreme inequality already existing, it would also end up pushing India’s economy further towards the brink.
The extreme concentration in the ownership and control of wealth in India, the latter more than the former, has already proved itself to have a strong self-reproducing and reinforcing character. Those who monopolize the use of much of this wealth, the leading component of which are a few big business houses, are unable to create adequate gainful employment for the vast majority for whom laboring is the only option for survival. Instead, they use them as a permanent reservoir of exploitable cheap labour, which has fueled greater inequality in the distribution of income and narrowness of the demand base for accumulation and growth. The last decade has proved that the contradiction between the two sides of this regime of growth and accumulation has become increasingly sharper. As its expansionary element is consequently becoming more and more mired in a crisis, the accumulation regime of Indian capitalism is also turning more parasitic in nature. Between the tendency towards increasing corporate encroachment and monopolization of existing economic activities and assets, and the expansion and creation of new ones, the tilt towards the former is becoming stronger by the day. Neo-liberalism is a handy weapon for that, and a communal and authoritarian regime an effective vehicle for its implementation, and a crisis is an opportunity for such a regime. The Union Budget for 2021-22 in the background of a battered economy, and the fact that India’s corporate bigwigs are cheering – it despite the missing stimulus – are testimony to this reality. That there is no ‘atmanirbhar’ element in even that is shown by the raising of FDI limits in insurance after the increase in defense production announced earlier – India’s ‘defense’ is being ‘insured’ against risk by placing it in foreign hands. This, the exceptional commitment shown to fiscal consolidation, and the absence of any measure to control volatile capital flows are instead signals to ‘assure’ international capital that India is in ‘safe’ hands from their point of view.
Yet, as India’s economy is being pushed downhill and its working people are being pushed towards an increasingly hopeless situation, the unprecedented movement of farmers should also serve to draw attention to the possibility that the potential for change may also be growing in the womb of that crisis.
The author is Professor at CESP, JNU, New Delhi | <urn:uuid:20bcaaec-173b-4dab-9a07-20a68be06d30> | CC-MAIN-2022-33 | https://vikalp.ind.in/2021/02/union-budget-2021-22-no-step-forward-two-steps-back/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00674.warc.gz | en | 0.966375 | 5,063 | 2.46875 | 2 |
On fields where baseball has been played for decades, young athletes last Saturday were unpacking bats and balls for a friendly game on the diamond.
But it wasn't America's pastime.
Youngsters in the Lutherville-Timonium Recreation Council were playing a game better known to athletes from other parts of the world: cricket.
And the sport is already taking hold. In June, the rec council welcomed 20 players to its first session at Ridgely Middle School. Two weeks later, nearly 30 young athletes showed up for the June 30 session.
"This is the first time that cricket has been attempted in this area," said Jamie Harrison, founder and president of the U.S. Youth Cricket Association.
"In the LTRC program, we're getting three or four more kids per session," he said.
Harrison first got involved with cricket when he was teaching U.S. History at the now-defunct Cardinal Gibbons High School. On a field trip to Richmond, he wound up as a participant in a cricket demonstration.
Now, it's one of his main missions in life to make cricket more accessible to young people, and for the association, Maryland is fertile ground.
"We distributed approximately 500 sets of cricket kits to schools in the state," Harrison said. "Our goal was to get kids who had been exposed to cricket in school physical education programs involved in their local youth sports programs."
That strategy seems to be working at Ridgely Middle. The LTRC program meets twice a week, gathering on Tuesdays, 6 to 8 p.m., and Saturdays, 9-11 a.m. Most players are between the ages of 8 and 12, and few had any previous exposure to cricket outside of a physical education class.
But several have been influenced by parents, such as Richard Ugarte, who grew up with the game. The Anneslie resident played the sport in England, where participation in cricket and rugby were mandatory.
"It introduces them to a game that is played a lot in the rest of the world," Ugarte said as he watched his 9-year old son, James, at his first formal practice. "This is a World Cup and Olympic-level sport in places like England, India, Pakistan, the whole British Commonwealth.
"It's basically like baseball, except for a little more action," he said.
Shielded from the sun by his New York Yankees cap, James seemed to enjoy the game he and his father had played informally on several occasions.
"I like whacking the ball as hard as I can," James said. "If the ball is in the right spot, I can get a six-pointer (the cricket equivalent of baseball's home run). It's a lot more fun here because I get to play with more people."
While James got his first cricket tips from his father, he also credited his friend Raja Herman for raising his interest in the sport. Raja, whose family hails from Trinidad, was introduced to the game during beach vacations and began playing cricket a year ago.
"When I started liking it, my grandfather got me a book on the history of the West Indies," said the 10-year-old, who lives in North Baltimore. "I started playing more, and I've become an "all-rounder' — that's someone who can bowl (pitch) well and bat really good."
While cricket has been compared with baseball, there are noticeable differences. Instead of bases, there are two "wickets" or stations.
Batsmen take their place at each of the two wickets. The bowler (pitcher), who is much closer to the batsman than in baseball, throws the ball overhand without bending his elbow. As the ball bounces toward the wicket, the batter chooses to hit or take the pitch.
Even if the batsman strikes the ball, he does not have to run. But if he believes that he can make it safely to the other wicket, the batsman takes off. At that time, the other batsman also must run from his wicket.
Of course, there's plenty more to learn, including cricket terminology — from a "googly" and "ducks" to a "leg bye" and a "sticky wicket."
Kathy Gabriel hadn't been exposed to the sport until her son, Zach, 10, came to Ridgely for his first practice on Saturday.
"I know absolutely nothing about it," said Gabriel, who grew up in Buffalo, N.Y., and now lives in Towson. "Zach isn't just focused on one sport, and likes to try different things. This is the first time he's ever been on a team. He likes individual sports, and I could see this working for him."
Corinne Hart's interest is a family tradition. The Timonium resident was born and raised in Melbourne, Australia, and wanted to teach her sons Mason, 10, and Alexander, 8, about a game that has been in her family for generations.
"This is a gentlemen's game, a backyard sport from home that I was pleased to see come into the area," said Hart, a volunteer who was keeping the lineups and recording the statistics from one of the games on Saturday at Ridgely.
"It's a game you can play from a young age right through adulthood. My brother was heavily involved in cricket at the minor league level in the state of Victoria, and my dad also played. I wanted my boys to be able to learn something about Australia and my heritage.
"They have been very receptive to it," she said. "A generation later, it's carrying on."
Harrison is fortunate to have plenty of help from people who know the game, like Hart and volunteer coach Warren Prestwych. A native of Australia who came to the U.S. 12 years ago, Prestwych likes what he sees of the fledgling LTRC program.
"Jamie's left it in my hands, because he knows that I grew up playing the game," said Prestwych, a Carney resident. "We're trying to teach the kids how to play, along with the rules and terminology of the game. As we move forward, we want to have these kids play in leagues against teams from other areas.
"But right now, what makes the challenge of teaching the game easier is their enthusiasm."
The Lutherville-Timonium Rec Council summer cricket program at Ridgely Middle School runs through July 28. The cost is $30 and players receive a hat and T-shirt. For more information call 240-487-9224 or email firstname.lastname@example.org. | <urn:uuid:5e69648e-850e-4ef2-8214-79c18ff959c7> | CC-MAIN-2016-44 | http://www.baltimoresun.com/ph-tt-cricket-0704-20120706-story.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718309.70/warc/CC-MAIN-20161020183838-00405-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.987507 | 1,382 | 2.125 | 2 |
People who purchase wine buy and eat healthier foods than beer drinkers do. Danish researchers analyzed 3.5 million purchases from nearly 100 supermarkets over six months, categorizing shoppers as "wine only," "beer only," "mixed," or "nonalcohol" buyers. Wine drinkers favored a Mediterranean diet (olives, produce, poultry, and low-fat cheese and milk), while beer buyers bought more sausages, chips, butter or margarine, and soft drinks. These findings may partly explain wine's link to reduced heart disease and cancer risk versus that of beer. But doctors also attribute wine's health benefits to its antioxidants and to the fact that people tend to drink wine with meals, a glass or two at a time, while beer is often consumed with snacks. | <urn:uuid:d76adf3e-9db2-4310-a0a9-d60535568f7a> | CC-MAIN-2017-04 | http://www.allure.com/story/wine-diet | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279224.13/warc/CC-MAIN-20170116095119-00483-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.973438 | 155 | 2.40625 | 2 |
English: Irish Celtic Cross (Photo credit: Wikipedia)
St. Patrick’s Day already. One of the favorite American holidays, but why is that? Well part of it might be that there are more Irish here than there are in Ireland. That’s true but it’s not the whole answer, because for one day we all turn Irish (Yes the African-Americans give a whole new meaning to Black Irish) and the answer to that is buried in our history.
One of our pre-revolutionary immigrant stream were the Scots-Irish left over from Cromwell’s time, more on that later. The big immigration stream started with the Potato Famine, and it’s never really stopped. But the Irish were different, they were our first predominantly Catholic immigrants (in large numbers) and there were simply so many of them that they distorted the labor market for years. Most of the manual work done in industrializing America was done by the Irish, since that time many of our big city police and fire departments have been Irish, and are to this day as are lots of Federal Law enforcement agencies. And the military too has been a home to them, to the point that there was a small uproar during World War II when somebody said that England couldn’t have won without her two allies: the Irish and Texas. And so for a long time, we’ve been proud to share the country with them, and party with them as well.
The Chicago River on St. Pat’s Day
I’m a good Lutheran so I don’t celebrate Saints’ days but there a few, St. Crispin/Crispians Day, All Saints Day, and of course, St. Patricks Day. I suspect it has become more of a holiday in the States than in Ireland itself.
We all know the conventional parts: The green beer and milkshakes, the green rivers, the parades, the green beer and so forth. There’s more to it than that.
Way back when my forebears went on a bit of a tear and founded an empire, we managed to conquer all or parts of England, Scotland, Ireland, Iceland, Greenland, and not least there’s this province in France named after us: Normandy. Yep. named for the Vikings. While we were over there in Ireland we founded a few settlements such as Dublin, Waterford, Wexford, and a few others. You see, Viking has two meanings. Yes, we were warriors, if you go by our missions, you could probably have called us marines but, we were also traders who like to buy and sell stuff. So when we left, we left the Irish some new towns, and probably some new kids too.
Anyway time moved along till shortly after the Conquest of England, the King decided he ought to have Ireland as well. This was mostly by the Marcher Lords but King Henry II was perfectly happy with the idea. This war lasted all through the centuries, the Tudors tried, Cromwell tried it, the expatriate Scottish nobles tried it. Ireland resisted them all, even causing Captain Boycott to try his new tactics. Ireland became independent in 1919. And you thought the American revolution was a long war.
Here’s where we slip back across the ocean. You remember I mentioned those expatriate Scots? They became one of our immigrant streams: the Scots-Irish. Many, many of them came to the southern colonies, and most became patriots during the revolution, afterward settling the Old South and the southern parts of the Old Northwest. They were a stubborn, independent lot, not willing to give up a jot of their independence, and imparting a good bit of that to all Americans.
Then in 1849 the potato crop failed in Ireland, and the country was starving, huge immigrant streams came to America searching for a better life. They didn’t get a warm welcome. The people saw that they would work for nearly nothing, they were catholics, probably needed a bath, and whatever else they could think of. The sign of the day was:
No Irish Need Apply
But the Irish persevered, eventually got better jobs and moved up. They were the laborers that built many of the railroads, including the Union Pacific.
But they did something else too. When the Civil War came along, they enlisted in droves, entire brigades of Irish from New York and other cities took the field. The most famous was the Irish Brigade of New York: 63rd New York Infantry, the 69th New York Infantry, and the 88th New York Infantry. The three New York regiments were soon joined by a predominately “Yankee” regiment from Massachusetts, the 29th Massachusetts. The 29th was never fond of being brigaded with three Irish “Fenian” regiments from New York and soon after the Battle of Antietam the 29th was replaced by the 28th Massachusetts Infantry regiment, made up mostly of Irish Immigrants.
Incidentally there was a Confederate Irish brigade too, from Texas, I think.
And the Army that became famous in the Indian campaigns was mostly Irish, too.
And so the Irish earned their way into the heart and soul of America, where they reside today. So, as you lift that Guinness or John Jameson today, remember a people who fought for their freedom for almost a thousand years. And listen to one of the most famous of Irish-American tunes.
A friend of mine, Laura from Catholic Cravings published a prayer of her Irish Great Grandfather’s from the 1950s, and that is another thing to respect in the Irish, their stubborn Christianity.
O Most Sacred and Most Loving Heart of Jesus, to which the Irish nation is most solemnly dedicated, preserve our nation in faith, in purity, and in charity. Through all its trials, its sorrows, its persecutions in the past it has remained faithful to the teaching of its great Apostle, St Patrick.
May the former glory of its apostolic faith again appear. May it become again the seat of learning and religion. May the rising generation see its rights restored. May the zeal of its priesthood increase. May the purity of its daughters preserve its stainless character. May the honour of its sons remained unsullied.
May the evil of intemperance cease. May the spirit of infidelity and rationalism never reach its shores. May its attachment to the See of Peter and its obedience to ecclesiastical superiors never suffer diminution. May sanctity be its atmosphere.
And may it daily render greater glory and honour to thee, Most Sacred Heart, to which every true Irish heart is, and will ever be, most devotedly attached. Amen.
God save Ireland, and bless her Bishops, priests, and religious; her leaders, her friends, and her people everywhere. | <urn:uuid:71db2be2-9b25-4196-8f8d-8eaa04486cc8> | CC-MAIN-2017-04 | https://nebraskaenergyobserver.wordpress.com/tag/saint-patrick-day/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00439-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.981441 | 1,428 | 2.34375 | 2 |
Hernan - A very unique male name
Hernan appeared on the charts for the first time in 1933 on position #1596. In this article you'll learn the history of this name, statistics, see famous people named Hernan and more.
With that position 1 in 28,790 baby boys were given this name - making this a very unique male name according to our Popularity Score algorithm. Hernan peaked in popularity 25 years ago in 1992 on position 760.
Famous with this name
How would you rate Hernan, 1-5?
Hernan is currently topping the charts in...Did you know that popularity can vary a lot between states? Hernan is currently topping the baby name charts in Arizona at position #629 - and is the least popular in California at position #1,240.
Why care about state specific baby name charts? It could be that a name that is very popular on the national overall charts is less (or even more) popular where you live. So make sure you check out the state specific charts below and find out how popular or unique Hernan is where you live.
Comment and discuss
Hernan origin and meaningHernan is a 6 letter name with 2 syllables. We couldn't find any information about what this name means. To see famous people named Hernan, pop culture references for the name Hernan and nicknames & variations - visit Nameberry or Wikipedia.
Similar to Hernan
We've found the following names that sound similar to Hernan, sorted by popularity.Herman / Hiram / Harmon / Hermon / Hyrum / Herminio / Harman / Haroon / Heron / Harun /
Most parents-to-be know if they want a popular or unique name, and with these charts and data tables you can easily get a better
understanding of how popular or unique this name is.
With a quick glance you can easily tell if this name is increasing or declining in popularity - But note that its current popularity can actually differ a lot from state to state.
Chart position per year (visualized)
Chart position per state (visualized)
Chart position per year (table view)
Chart position per state (table view)
Even more about Hernan
These are some of the common questions you may want to have answered to know if this is the perfect name for your baby. | <urn:uuid:6d7a0d18-d7ad-44d8-b119-2eaefd468829> | CC-MAIN-2017-04 | http://www.babynamescience.com/baby-name/Hernan-boy | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00433-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.767177 | 503 | 1.90625 | 2 |
GeoSights: Comb Ridge, San Juan County, Utah
By Marshall Robinson
One may say Comb Ridge was Mother Nature’s way of splitting southern San Juan County with an enormous wall. Another may say it was a giant skateboard ramp for dinosaurs. One thing is certain: Comb Ridge is a spectacular ridge of steeply tilted sandstone rock layers, trending north-south for approximately 80 miles from Utah’s Abajo Mountains to Kayenta, Arizona. Similar to a rooster’s comb, the jagged appearance of Comb Ridge provides the logic behind its name.
Comb Ridge is a classic example of a step-like crease (or fold) in the Earth’s crust known as a monocline. Along the axis of the monocline, the rock layers are tilted skyward, whereas they remain relatively flat away from the monocline. The exposed rocks at Comb Ridge range in age from the Permian-aged Organ Rock Formation (280 million years old) to the Jurassic-aged Navajo Sandstone (185 million years old).
Compressional forces during the Laramide mountain-building event (40–70 million years ago) uplifted an area of southeast Utah known as the Monument Upwarp. Comb Ridge is the abrupt eastern flank of the Monument Upwarp. The San Rafael Swell, Uinta Mountains, and Rocky Mountains are examples of other geologic features that were formed during Laramide time.
How to get there:
If traveling from the north, drive south from Moab on U.S. Highway 191 for approximately 80 miles to the junction with Utah State Route 95. To view Comb Ridge from the northern road cut, turn west (right) on SR-95 and follow it for 14 miles. Or, continue south from Blanding on U.S. 191 through Bluff (here the highway turns into U.S. Highway 163) 30 miles to the southern road-cut view.
If traveling from the west, drive south and east from Hanksville on Utah State Route 95 for approximately 108 miles to County Road 235. From this view point, you can continue east on SR-95 to U.S. Highway 191, and travel as described above to the southern view point.
The best time and place to view Comb Ridge is in the afternoon on the west side, from breathtaking road cuts (either Utah State Route 95 southwest of Blanding, or U.S. Highway 163 west of Bluff). If you have an extra hour and 4-wheel drive, travel along Comb Wash on County Road 235 between SR-95 and U.S. 163 to take in 18 miles of beautiful scenery.
Survey Notes, v. 44 no. 2, May 2012 | <urn:uuid:2e35ce59-fb2d-4aab-b8ae-6e207bf7e8a8> | CC-MAIN-2022-33 | https://geology.utah.gov/map-pub/survey-notes/geosights/comb-ridge/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00475.warc.gz | en | 0.940255 | 569 | 3.265625 | 3 |
Cabbage is not only delicious vegetable served as salad or in other meal, but this plant has ability to help you in treating variety of diseases. Cabbage leaves have properties similar like magnet since they can pull out diseases from our bodies.
Do not take pill under the counter if you have unbearable headache. This type of headache can be do eyes problem, tiredness or excessive stress. How cabbage leaves can help here? Simple compress application of fresh cabbage leaves onto your temples and the upper part of the head will do the work. In order to keep the leaves in place put some kind of hat.
Since we know that during breastfeeding are not recommendable using medications using something to release you from the pain should be natural. If you experiencing strong pain in your breasts, just use fresh cabbage leaves as compress and the pain will go away.
This gland has important role in the body. It’s important for the growth, proper function of the metabolism and the function of the organs in the digestive system. Cabbage leaves can help you to maintain or restore the normal functioning of the gland. Apply a compress onto the throat where the gland is located before going to bed. Remove the cabbage leaves next morning.
Swelling caused by traumas
Cabbage leaves can help you to heal the swollen area after you have hit your hand or leg. Wrap the area with cabbage leaves and tighten with a bandage. This treatment works if you have hurt ankle or swollen legs. Sleep with the compress for the best results. | <urn:uuid:65b6ac4e-5bad-4012-82ba-83a909793b2d> | CC-MAIN-2017-04 | http://dailyhealthgen.com/2016/11/20/put-cabbage-leaves-onto-chest-legs-go-sleep-next-morning-will-feel-healthier-ever/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279368.44/warc/CC-MAIN-20170116095119-00328-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.941435 | 307 | 2.640625 | 3 |
Pict File:30-Jan-2020-Sperad-Of-Corona-In-China-768X601 with Corona Open China Location
Article Related to Corona Open China Location :
Corona virus – corona open china location
Corona virus or severe acute respiration syndrome coronavirus 2 (SARS-CoV-2) is a virus that attacks the respiration Gadget This illness caused by a viral inflammation is called COVID-19. Corona virus can cause meting out of the breathing System acute pneumonia, until eventually death.
Serious acute respiratory syndrome coronavirus 2 (SARS-CoV-2), better known as the Corona virus, is a new type of coronavirus that is transmitted to Individuals This virus can have an affect on Anybody whether Infants Awl adults, the elderly, pregnant women, and nursing mothers.
This virus illness is called COVID-19 and was first discovered in the city of Wuhan, China, at the end of December 2019. This virus spread quickly and has spread to other areas in China and to a number of countries, adding Indonesia.
Coronavirus is a collection of viruses that can infect the breathing Gadget In many cases, this virus only causes light respiration infections, such as flu. But it this virus can also cause severe respiration infections, such as lung infections (pneumonia), Middle-East Respiratory Syndrome (MERS), and Extreme Acute Respiratory Syndrome (SARS).
Symptoms of Corona Virus
Corona virus irritation or COVID-19 can cause sufferers to knowledgeable flu symptoms, such as fever, runny Nose cough, sore throat, and headache; or symptoms of extreme respiratory infections, such as high fever, cough with phlegm and even bleeding, shortness of breath, and chest pain.
But it in general there are 3 general symptoms that can indicate person is contaminated with the Corona virus, namely:
• Fever (body temperature above 38 degrees Celsius)
• Troublesome to breathe
According to Analysis symptoms of COVID-19 appear within 2 days to 2 weeks after publicity to the Corona virus.
When to see a doctor
Quickly see a health professional if you experience symptoms of a Corona virus illness (COVID-19) as pointed out above, primarily if symptoms appear 2 weeks after returning from an vicinity that has a COVID-19 case or interacting with a sufferer of Corona virus infection.
If you might be exposed to the Corona virus but don’t knowledgeable any symptoms, you don’t need to go to the hospital to have a checkup, just stay at home for 14 days and limit contact with others.
Alodokter also has a characteristic to help you check the risk of contracting the Corona virus more easily. To use the Characteristic please click the photograph below.
Causes of Corona Virus
Corona virus irritation or COVID-19 is caused by coronavirus, which is a group of viruses that infect the respiration System In most cases, coronaviruses only cause easy to moderate respiratory infections, such as flu. Nonetheless it this virus can also cause serious respiratory infections, such as pneumonia, Middle-East Respiratory Syndrome (MERS), and Serious Acute Respiration Syndrome (SARS).
It is suspected that the Corona virus was initially transmitted from animals to Persons Nevertheless it it was later discovered that the Corona virus was also transmitted from human to human.
A person can get COVID-19 through a variety of ways, namely:
• Accidentally inhalation of saliva splashes from sneezing or coughing sufferers of COVID-19
• Hold the mouth or nose without washing hands first after touching an object affected by saliva splashes of COVID-19 patients
• Close contact with people with COVID-19, such as touching or shaking hands
Corona virus can infect Someone but the effect will be more unhealthy or even fatal if it occurs in elderly people, pregnant women, people who are sick, or people whose immune procedures are weak.
Corona Virus Diagnosis
To determine whether the patient is infected with the Corona virus, the physician will ask about the symptoms experienced by the patient. The medical doctor will also ask if the patient is visiting to an space that has a case of Corona virus contamination before symptoms appear.
To determine the analysis of COVID-19, the medical doctor will carry out the following follow-up examinations:
• Blood sample test
• Throat swab test to think about sputum samples
• Chest radiograph to discover infiltrates or fluid in the lungs
Corona Virus Treatment
Corona virus illness or COVID-19 can not be Handled but there are some steps that medical doctors can take to become independent from symptoms and prevent the spread of the virus, namely:
• Referring people with COVID-19 to undergo medication and caratina at the specially hospital
• Provide a fever and pain reliever that is safe and appropriate to the Patients condition
• Encourage sufferers of COVID-19 to get adequate rest
• Encourage victims of COVID-19 to drink plenty of water to maintain body fluid levels
Headaches of Corona Virus
In extreme cases, Corona virus an infection can cause the following serious complications:
• Secondary an infection in other organs
• Kidney failure
• Acute cardiac injury
• Acute respiration distress syndrome
Corona Virus Prevention
Until now, there is no vaccine to stop Corona virus contamination or COVID-19. Subsequently the best preventive way is to avoid the factors that can cause you to be contaminated with this virus, namely:
• Avoid visiting to public places that are crowded with visitors.
• Use a mask when on the circulation in public places or crowds.
• Routinely wash hands with soap and water or hand sanitizer containing at least 60% alcohol after doing activities outside the home or in public places.
• Do not touch the eyes, mouth and nose before washing hands.
• Avoid contact with animals, specifically wild animals. In case of contact with animals, wash your hands afterwards.
• Cook the meat till it is totally cooked before consumption.
• Cover mouth and nose with tissue when coughing or sneezing, then throw the tissue in the trash.
• Avoid being shut to people who are sick with a fever, cough, or runny nose.
• Keep clean objects that are often touched and environmental clean.
For people suspected of being affected by COVID-19, there are numerous steps you can take to hinder the Corona virus from being transmitted to others, namely:
• Do not leave the house, except for treatment.
• Seek advice from a healthcare professional only if you expertise symptoms or complaints.
• Try to stay apart from other people for a while. If it is not possible, use a bedroom and bathroom that is different from what others use.
• Forbid and hinder others from journeying or visiting you till you are soak up healed.
• As much as possible do not meet with people who are sick.
• Avoid sharing the use of eating and consuming utensils, toiletries, and sleeping equipment with others.
• Wear a masks and gloves when in a public place or with person else.
• Use tissue to cover your mouth and nostril when coughing or sneezing, then without delay throw the tissue in the trash. | <urn:uuid:979d783b-d250-446d-a9f5-9e3a5cc112f4> | CC-MAIN-2022-33 | https://popcultureworldnews.com/corona/corona-open-china-location | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00076.warc.gz | en | 0.919955 | 1,546 | 2.875 | 3 |
Putin's gas war is 'high risk' for Russian economy says Herbst
We use your sign-up to provide content in ways you’ve consented to and to improve our understanding of you. This may include adverts from us and 3rd parties based on our understanding. You can unsubscribe at any time. More info
As fears of a complete cut-off from Russian gas grow, EU ministers held a special Energy Council to hammer out the details of a contingency plan should Putin try to plunge Europe into darkness. During this meeting, member states finally agreed to EU Commission’s plan to ration countries’ natural gas supplies by 15 percent for the next two years.
However, the bloc was forced to water down its plans significantly, after facing heavy opposition from a number of states.
The biggest point of contention in the EU Commission plan was the bloc’s first article, which would give the Commission the power to impose mandatory cuts.
The plan sparked an intense row, as diplomats at yesterday’s summit gathered to demand exemptions, loopholes and carveouts that would allow countries to avoid having to cut their gas usage by 15 percent from August to March.
Under the new plans, the bloc announced that countries that are not interconnected to other’s gas networks will not be forced to cut their gas usage by 15 percent.
According to the EU Council’s statement, this is because these countries “would not be able to free up significant volumes of pipeline gas to the benefit of other member states.”
The Council also ceded ground on a number of different scenarios, allowing for a relaxation of the targets if states overshoot their gas storage target, or if they are heavily dependent on gas for their critical industries.
The last point may be specifically for countries like Germany, which is heavily dependent on gas imported from Russia, accounting for more than half of its supply before the war in Ukraine began.
Jozef Síkela, the Czech minister of industry and trade, who holds the rotating presidency of the EU Council, at a press conference: “I know the decision was not easy. But I think, at the end, everybody understands that this sacrifice is necessary.”
Describing the plan as a “satisfying compromise”, he said: “We have to and we will share the pain.”
The agreement came less than 24 hours after Russia’s state-backed energy behemoth Gazprom, announced a sharp reduction in gas supplies through the Nord Stream 1 pipeline from Wednesday.
The head of the European Commission, Ursula von der Leyen, accused Putin of blackmailing the EU, saying that there was “no justifiable technical reason” for the cut.
‘Looks like an alien’ Mutant kitten branded bad omen [INSIGHT]
Shell gives North Sea gas field go-ahead: ‘No more imports!’ [REVEAL]
China’s rogue rocket heads back to Earth! Experts pinpoint exact date [REPORT]
She said: “The announcement by Gazprom that it is further cutting gas deliveries to Europe through Nord Stream 1, for no justifiable technical reason, further illustrates the unreliable nature of Russia as an energy supplier.
“Thanks to today’s decision, we are now ready to address our energy security at a European scale, as a union.”
The rationing plan has not yet been codified as law just yet, as it now needs to be approved by at least 15 of the 27 states in the bloc, representing 65 percent of its population.
Source: Read Full Article | <urn:uuid:43daf99a-0da2-4300-8f61-77e7dce47a2c> | CC-MAIN-2022-33 | https://comparemobile.org/2022/07/27/putin-rubbing-his-hand-with-glee-as-vdl-bows-to-eu-fury-and-waters-down-rationing-plan/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00674.warc.gz | en | 0.952965 | 759 | 1.90625 | 2 |
To assess clinicians'responsiveness to health-risk behaviors reported by adolescent patients during a comprehensive clinical preventive services visit.
Nonprobability sample of adolescent patients scheduled for a routine physical examination.
Seven clinical sites in the Chicago, Ill, area.
Fifteen primary care providers and 95 adolescent patients between 11 and 18 years of age.
Providers delivered comprehensive clinical preventive services to adolescent patients using the Guidelines for Adolescent Preventive Services model.
This model includes screening, guidance, a physical examination, and immunizations.
Prior to the visit, adolescent patients completed a screening questionnaire that included a 52-item health-risk behavior profile.
Responses on the screening questionnaire were discussed during the visit.
Each provider's responsiveness to reported health-risk behaviors was determined by comparing the adolescent patient's responses on the screening questionnaire with those reported during a debriefing interview with the adolescent about whether specific subjects were discussed.
Responsiveness to highly sensitive behaviors was determined by comparing the screening questionnaire and the medical record.
On average, each adolescent patient reported 10 risk behaviors, of which 7 were discussed. (...)
Mots-clés Pascal : Comportement dangereux, Santé, Evaluation, Responsabilité publique, Equipe soignante, Soin santé primaire, Conseil psychologique, Information biomédicale, Education santé, Etude statistique, Adolescent, Homme
Mots-clés Pascal anglais : Dangerous behavior, Health, Evaluation, Collective responsibility, Health care staff, Primary health care, Psychological counseling, Biomedical information, Health education, Statistical study, Adolescent, Human
Notice produite par :
Inist-CNRS - Institut de l'Information Scientifique et Technique
Cote : 98-0404320
Code Inist : 002B30A01B. Création : 25/01/1999. | <urn:uuid:f1db3aab-91f1-4cde-a3ba-1bbf9de29e69> | CC-MAIN-2017-04 | http://www.bdsp.ehesp.fr/Base/172117/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279189.36/warc/CC-MAIN-20170116095119-00059-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.82532 | 401 | 2.109375 | 2 |
Eyes Wide Open: A Novel by Andrew Gross (William Morrow, $25.99, 338 pages)
“A horrible family tragedy that may not be what it seems…”
Location, location, location… They say that these are the three most important factors in real estate, and on occasion location, location, location matters in fiction, also. Take this novel, Eyes Wide Open, by Andrew Gross (author of Reckless). You will probably enjoy this thriller of a crime story if you’ve visited at least two of the three California locations in which the action takes place: Morro Bay, San Luis Obispo and Pelican Bay State Prison in Crescent City, near the California-Oregon border. Since I’ve visited all three – the first for play; the latter two for work – it was easy to visualize the scenes in this novel.
In the tale (based on something that happened in real life to author Gross), our protagonist New York State-based physician Jay Erlich learns that his nephew has apparently committed suicide by jumping off the famed 600-foot high volcanic rock in Morro Bay. At the request of his troubled older brother Charlie, Erlich flies out to the calm, coastal community to see if what the police have reported is correct. Early on it’s clear that someone is covering something up, as there are problems with the offical story.
Charlie Erlich was once a chart-topping musician, but then he fell in with a wild group of drug users in Marin County. And this is where the story telling goes a bit sideways. It’s immediately clear to the reader that Charlie was once a member of the Charles Manson Family, but here Manson is fictionalized as the “leering and wild-eyed” person known as Russell Houvanian. [Houvanian, of course, is first imprisoned at San Quentin before being moved to Pelican Bay – just like Charles Manson.] The author devotes page after page to recreating the events surrounding the Manson Family, but for some strange reason moves them from Ventura and Los Angeles counties to Marin and Santa Barbara counties.
I have no idea why Gross spent so much time and energy to transforming Manson into a fictional character. But instead of adding to the story, it significantly detracts from it. It’s as if I were to write a novel about the first Irish-Catholic president elected in the 1960s, a character that I decide to name John McNeal. McNeal, in my story, has a brother named Richard who happens to be the U.S. Attorney General, and another brother, Ned, who is a senator from Massachusetts. It wouldn’t take the reader long to ask the questions, “Why not just set this period novel among the Kennedys? Why fictionalize actual events and real people?”
While the author’s credibility takes a hit with his strangely disguised historical events, the story itself is engaging. Lives are at risk and it’s up to Doctor Erlich to become an instant, skilled criminal investigator in order to figure out which authority figures are telling the truth and which are telling lies to protect their own reputations. As with the novels of David Baldacci, Joseph Finder and Michael Connelly, events speed up rapidly as the conclusion approaches, and it all ends in a rather breathless fashion.
Once you’ve finished Eyes Wide Open, you may want to check on the availability of a room at The Inn at Morro Bay. Just make sure to be very careful if you decide to climb the famed rock of Morro Bay!
A review copy was provided by the publisher. “Should be read with the lights on and the door closed. A rare and menacing psychological thriller…” Nelson DeMille
Note: Morro Rock is actually 576-feet high. While it’s illegal to climb it, as per Wikipedia, “every few years, someone is caught trying to climb the rock.” | <urn:uuid:3ad2aa70-4200-435c-bb00-c36e5c4193cf> | CC-MAIN-2017-04 | https://josephsreviews.wordpress.com/2011/09/13/into-the-great-wide-open/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280900.71/warc/CC-MAIN-20170116095120-00008-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.962457 | 826 | 1.601563 | 2 |
Microstar Laboratories (Bellevue, WA) has announced the release of the Rotating Machinery Analysis module with software tools to facilitate mixed time measurements and rotation measurements of rotating machinery. The software enables time-based sampling or encoder-based sampling, or both at the same time. The module processes data captured by a fixed-rate, high-resolution sampling clock with software processing operating at continuously varying rates aligned to pulses from the encoder device. The processing uses DSP technology based on classical sampling theory.
Users can observe and record instantaneous speed at each index pulse position. At these locations, users can trigger the capture of a block of encoder-based data, and also trigger the capture of a block of fixed-time data. The module also can generate profiles of speed and acceleration at each sampling location. The company’s xDAP Data Acquisition Processor device provides the operating environment to support the module. The xDAP 7420 can support continuous operation at up to 1 million 16-bit samples per second per channel on 8 channels simultaneously.
For Free Info Click Here | <urn:uuid:828df40b-5ef0-4a03-9c8f-615584d225f6> | CC-MAIN-2022-33 | https://www.techbriefs.com/component/content/article/tb/supplements/mcat/features/products/14502?r=17551 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571234.82/warc/CC-MAIN-20220811042804-20220811072804-00069.warc.gz | en | 0.898147 | 220 | 1.679688 | 2 |
By Safa Faisal
BBC Arabic Service
In the major capitals of the Arab world, it is very common to find girls, rather than boys, on the front pages of newspapers, celebrating their academic success.
But this conceals the fact that in total numbers, far fewer Arab girls than boys are completing - or even going into - education.
Muslim tradition in Jordan is particularly restrictive
In countries like Sudan and Yemen, the situation is particularly bad. Indeed, Sudan is actually going backwards - 45% of children of school age are not attending school.
And literacy rates of women in the Arab world, according to the latest report of UNDP, are around 55%.
The reasons for girls' comparatively poor performances are varied, though some are common to girls' education throughout the Arab world.
In Sudan, they are undoubtedly linked to the civil war and Sudan's desperate economic situation - as well as the fact that it is such a vast country, with parents simply unwilling to let their children travel the long distances needed to attend school.
A similar problem exists in Yemen - where it is exacerbated by poor resources and funding that means children have to be taught in classes of a hundred or more.
When we asked parents why they did not allow their girls to school, they would say "because it's wrong, it's irreligious, it's improper - they should stay at home to prepare for their real life, their married life"
Girls also face an added hurdle in that Yemen, as a conservative society, would usually object to the girls being educated by male teachers and mixed sex education.
But in Jordan, enrolment is excellent at 86 percent - however, girls drop out in secondary school because of early marriage.
Jordanian society is very conservative with tribal traditions and many girls are pressurised into marrying young. Some still continue their education after marriage - but many of them do not, especially if they have children.
Sociologists in the country - such as Dr Nazih Hamdi - pointed out to me that a girl's role in Jordanian society is heavily stereotyped, and this is reflected in the education students receive. The system tends to make very strong statements in school books to children, such as "my father is working and my mother is cooking".
At one Jordanian girl's secondary school, 80% of the girls I spoke to said that the first role of the woman was to stay at home and bring up her children.
I met the head of student affairs in the Jordanian Ministry of Education, who said, "in our experience, women tend not to endure work like men".
While teaching as a job is very popular to women in the Arab world - as is the case all over the globe - teachers are not paid well, and rarely receive enough training. Many also teach using very old-fashioned methods.
I found that the quality of education was affecting both girls and boys - but especially girls.
If the school environment is bad, if it is remote, unclean, and has no toilets, it is the girls who tend to give up and go back home. If the teacher is bad and is not qualified, the girls tend to simply fail at the end of the year.
After failing two or three times, the girls simply give up altogether.
Some women are returning to school after having their children
When we asked parents why they did not allow their girls to school, they would say "because it's wrong, it's irreligious, it's improper - they should stay at home to prepare for their real life, their married life".
The latest UNDP report stated that education in Arab schools in the future is likely to be split into two parts - very expensive private education, enjoyed by the better-off minority, and poor quality government education for the majority.
Should this happen, it is likely it will be the girls who suffer more - Egyptian sociologist Dr Abdel-Basset Abdel-Moti said such a split would be "dangerous" for girl's education.
In the Arab family there is a tendency to pay for boys' education but not girls'.
I met a Syrian father who said to me, "I can pay for my son. But not for the girl. This is the way we are thinking in our society and this is the life that we are used to."
One of the results of these long traditions is a vicious circle whereby very few women receive the education needed to become policy-makers - and therefore education policy remains male-dominated.
Further, some Muslims in the region believe that there is little point in paying for a girl's education, as they are destined only for a life as a mother, and not a career where they could make money.
Thus money is spent on boys, who could eventually pay it back.
However, there are many who argue that this situation derives from a specific way that Islam has been interpreted in the region, rather than from Islam itself.
The Mufti of Egypt, Dr Ahmed Al-Tayeb from Luxor, told me he found a huge difference between his society and what he had been taught about Islam at university.
The principles of Islam - such as allowing women to give back her dowry in order to obtain a divorce - were not happening. In Jordan, and attempt to pass such a law failed - whereas it was accepted in the Prophet Mohammed's time, 1400 years ago.
Parts of Egypt offer some of the best education for girls in the region
All these problems would make a gloomy picture. However, there were always bright success stories in the countries that I visited.
I met many teachers committed to their own profession.
Fatima in Sudan, for example, agrees to run a small basic school for two villages, teaching the children in their home rather than their struggling to school. Her "nomadic school" is very popular with girls.
Elsewhere, a girl who married very young and had three children had now chosen to go back to university and is now looking at completing a Masters degree.
Meanwhile educated girls in Egypt and Sudan have begun campaigning against female circumcision - and their campaign for women's rights has even involved going out and protesting in their holidays.
Where it is received, education is obviously changing the character of Arab girls. The task now is to make sure many more are able to access it.
A six-part series on this topic is being broadcast on BBC Arabic over the next five weeks.
What do you think of this article? Send your comments using the form below.
All people, regardless of age or gender deserve a good public education. There are no exceptions to this rule (assuming normality) and any attempt to make excuses is unacceptable. "Tradition" is just an excuse to oppress someone.
Once again the corruption of a country has been associated with the teachings of Islam. One would find it impossible to quote anything in the traditions of the Holy Prophet (peace be upon him) or in the Holy Quran that allow, much less demand, lesser education for women. This is a case of the rich minority using Islam as their excuse for suppressing the poor majority.
Qasim Rashid, USA
While the article is correct in many aspects, it is very misleading to generalize and to say there is a problem with female education in the entire Arab world. The article only portrays the negative. However, in many Arab countries girls actually outnumber boys in high school and college attendance. In Bahrain for example, the majority of the top 10% of high school graduates are females and female attendance in the university of Bahrain is much higher than males. The 'problem' has reached a point that the university's admission's board is actually considering lowering the minimum high school GPA requirement because most male high school graduates do no meet that minimum. I know for a fact that the same problem is occurring in Kuwait as well as Oman.
Rasha Al-Mahroos, USA
In the Arab world girls are restricted by cultural beliefs not by religion. In fact, Islam encourages girls as well as boys to educate themselves, and whoever does will be rewarded. But the common problem is the ideology that says girls are made to stay at home. This is what keeps girls from going out and participating in society.
Problems with female education are not restricted only to Arab countries but to the third world at large. Most countries in the third world have a rather high illiteracy rate for females as compared to males. This is not restricted to the poorer classes but even to the conservative rich ones.
Taha Suglatwala, USA/ India
I grew up a Christian in Amman, Jordan and received private schooling all the way through my Masters degree, including college.in the US. The Muslim tradition of lesser education for women has also been passed on to Christian families in the Arab culture. A major indicator of a country's civilization is the quality of its education.
For the third year in a row in Iran, more women have gone to university and colleges than men.
Mohammad Ali, Iran
I do not have the slightest clue why Islam is blamed for the so called lack of women rights in the so called Islamic countries. We must be careful not to confuse real Islam with the prevalent form of twisted Islam. Contrary to the common perception, Islam emancipated women and gave them their deserved respect. The West did not give women the right to vote till early 1900s whereas Islam did this 1400 years ago. Headings such as "Muslim girls struggle for education" cause confusion and lead some readers to believe that it is Islam that is the cause of this struggle.
I find it quite rewarding to find that more and more women are getting their education. Unfortunately many people in the Middle East and in other parts of the world where Islam is practiced feel that women do not need education. This is contrary to Islamic beliefs and what the Prophet has written and said. Islam specifically says that women should be treated equally.
Statistics tell us clearly that the status of women in a country determine the status of that nation. Women spend a higher proportion of what they have on their children, they often determine whether and how well their children will be educated. An educated woman is better able to nourish her children, both emotionally and physically. Any nation that wants to improve its status must educate its girls. This is often an issue more of culture than religion. Has anyone looked at the statistics between Muslim Pakistan and Hindu India? We need to separate these issues in order to consider them fairly.
Pat Young, USA
Even if the girls are not to be educated in order to carry on into a profession they have the right to an education according to the Unicef charter. Apart from that, a wife and mother who is educated is a definite bonus to any man and his family. Unfortunately the impression that many gain from this behaviour of the male dominated society in the Muslim world is that men are frightened of what the women could do with a little education. This will of course be refuted but as the western world is slowly coming to realise woman has her place beside her man. Neither above him, nor below him.
I think this article in general presents a slanted view on education for women in the Arab world. In response to the quote: "Literacy rates of women in the Arab world, according to the latest report of UNDP, are around 55 percent." My question is what are the literacy rates of men in the Arab world? It would be better to compare the literacy rates between genders to present a more accurate picture of the problems involving education in the Arab world. As a university student who studied Arabic and Middle Eastern Studies, I am aware of issues involving equality for women in the Arab world and Middle East and believe there are obstacles to overcome, however I think there are other issues that need to be explored more that are relevant to the lack of education in the Arab world - such as poverty and sociological issues.
Melissa M, USA
From the quote: "When we asked parents why they did not allow their girls to school, they would say "because it's wrong, it's irreligious - they should stay home." This implies an uneducated study, like the interviewer took this out of context. In fact, Islam encourages education for females as well as males. Those who release such phrases are unfamiliar with Islam themselves. On the contrary, it is unreligious to keep females from being educated. As long as it is within a decent environment, education is highly encouraged. Unfortunately, the Western media emphasises undermining the Muslim world, forgetting the great Muslim and Arab history.
The general information is ok, but I don't think that the higher illiteracy rate of women has anything to do with Islam. It is all about tradition and general poverty. Has the writer made any comparison in the rate of literacy between Muslim Egyptians and Christian Egyptians for example? Not only in literacy, but I think it can apply also to male and female circumcision.
I do not agree with Amany. I know from my experience from many different Muslim countries that some teachers in schools discourage girls from pursuing pursue their education and/or abandon their careers and instead encourage them to get married and focus on supporting their husbands. In many Muslim regions there are layers of scholars who promote these misinterpretations of the true words of Allah. Even in a relatively rich country like Malaysia, it still happens, refuting the argument that it all has to do with poverty. As a Muslim, I am not particularly proud of it. This is one of many salient issues we have in the Islamic community today. I feel that instead trying to find external enemies and come up with all kinds of fantastic conspiracy theories, we need to be doing some much needed soul-searching and to go back to the fundamentals of the Holy Qur'an.
Gender discrimination in virtually all aspects of social life is not endemic to Arab countries, yet very visible there. Improvement is a challenging and necessary goal for Arab societies.
Michal K., Poland
As a returned Peace Corps Volunteer who taught English to girls in a rural Jordanian village, I commend you for recognizing the cultural impediments to Arab girls receiving a full and fair education. In fact, emphasis on female education in the Arab world is lacking almost altogether. The teaching methods employed by teachers are far outdated and the facilities often lack even the basic necessities. Additionally, the use of force in punishment also clearly affects the abilities of the students to perform, but this is not a purely gender problem; boys also often face significant corporal punishment on a daily basis as well. In short, regardless of cultural issues that prevent girls from receiving a full education, there is a plethora of other issues that must be addressed as well.
Jennifer Ward, USA | <urn:uuid:10882ba3-c17b-4c29-ac84-717a2beba298> | CC-MAIN-2016-44 | http://news.bbc.co.uk/2/hi/middle_east/3130234.stm | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720972.46/warc/CC-MAIN-20161020183840-00251-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.977015 | 3,005 | 2.328125 | 2 |
Clinical Trials Consortiums in Pediatrics | Overview
The ICCTR is excited to announce a new funding opportunity to develop new multi-institutional Clinical Trials Consortiums in Pediatrics to support Clinical and Translational Research. Requests for funding are supported through the recently approved Research Strategic Plan to support our community.
The purpose of this pilot funding is to facilitate new multi-institutional consortiums led by BCH faculty with the expressed intent of developing early phase human clinical trials. These trials may represent basic and clinical translation of our own laboratory science or science from elsewhere that leverages our faculty expertise and ability to convene other institutions in a collaborative process. We anticipate the potential to fund one new consortium per division or department, but this will depend on the quality and number of the proposals. As such, the divisions/departments are responsible for prioritization of proposals in their specific areas. Funding at initial levels (Level I and Level II) does not guarantee future support at a higher level (Level III), which will be dependent on progress made and subject to re-review.>
Three levels of support available
Expected outcome: Basic plan for consortium outlined, a rough plan for a disease-specific protocol.
Expected outcome: Organizational structure defined. Protocol defined.
IRB approved protocol in 6 months with activation in 12 months. Enrollment complete in 36 months.
How to apply
Please see the attached Funding Opportunity Announcements (FOAs) and guidelines to submit your LOI for each level of funding: | <urn:uuid:f331fd41-3e21-4f6a-9caa-e164863a8cf8> | CC-MAIN-2022-33 | https://healthlibrary.childrenshospital.org/research/icctr/funding/clinical-trials-consortiums-pediatrics | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00265.warc.gz | en | 0.909368 | 319 | 1.570313 | 2 |
Relief” will be heard all through the Old Town Temple Building in Lansing with
a wide range of music from rock to hip-hop to electronic in an event to benefit
relief efforts in Haiti.
started out as a modestly sized event sponsored by Lansing Electronic Artist
Kollective and other organizations has turned into an eight-hour night of music
from 6 p.m.-2 a.m Friday, March 19.
“We started to piece
together more and more people to really get this thing flying,” said Dean Cue
of Kurrent Productions, who helped organize the event and is also acting as
disc jockey. “As more people were interested in doing something and the ability
and motivation came to make this even bigger, it has turned into something very
consists of two shows, the first featuring live local and high school bands,
including Catalina Wine Mixer and 10 to Impact, and the second featuring local
DJs such as Beatloaf and DiscoGirlfriend for attendees 18 years and older.
is musically all across the board,” Cue said. “It shows the collective effort
going into it.”
McKeel of Global Exchange helped spark the idea for the event and experienced first-hand
the collaborative efforts involved.
really cool to work with people with such different backgrounds and working
with all these different artists,” McKeel said.
is part of a two-week campaign with Global Exchange and the Energy Action
Coalition called “Define Our Decade.” This national campaign is hosting events
with environmental groups all over the country calling out for clean energy and
sustainability, and “Sounds of Relief” is one of these events.
proceeds will be donated to Partners in Help, an organization that has been
working in Haiti for over 10 years.
[the money] is going to be used the way we’d like it to be used,” Cue said.
“It’s not a quick fix, but sustainable growth economically, health-wise and educationally.”
of “Sounds of Relief” is local and national impact through a night of music and
donating to a lasting cause in Haiti.
going beyond immediate relief to a long-lasting infrastructure,” McKeel said.
“We want to support sustainable solutions that you can see along with helping
for “Sounds of Relief” can be purchased at soundsofrelief.eventbrite.com and
can also be purchased at the door. | <urn:uuid:f1c74a60-51f8-40f2-bdba-3387592f764f> | CC-MAIN-2016-44 | http://lansingcitypulse.com/article-4093-sounds-of-relief-for-haiti.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720000.45/warc/CC-MAIN-20161020183840-00024-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.945689 | 547 | 1.6875 | 2 |
WASHINGTON — Despite recent reports of China as an emerging threat, its economic outlook is much more dim. The manufacturing sector of the country actually contracted (or shrunk) in the first three months of this year.
Reuters reported that the world’s second-largest economy now has to worry about if its government stimulus will be enough for the country.
The data came from a private survey of firms. Specifically, manufacturing output and new orders were weak the first three months of 2014 even with some increase in export orders. What is to blame? Weak domestic demand at home.
This comes at a time where China is trying to reform its economy and privatize it, but has only seen a prolonged slowdown. The Chinese government has promised more investment in solar power, but the solar energy sector in China has pretty much collapsed due to too many firms and too few buyers. | <urn:uuid:27195500-b783-4659-a5a2-4cf07730adbe> | CC-MAIN-2017-04 | http://www.aim.org/newswire/chinas-economy-possibly-slowing-down/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00328-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.980255 | 174 | 1.820313 | 2 |
Guest Author - Nicole Pickens
Editing is one of a writer’s most important skills. In the past, domineering publishers filtered a submitted work through several departments for a finished product. That is not always the case in today’s market. Some of the best writers learned to be their own editors. Your editor eyes must look for as much as possible, including but not limited to spelling, typographical errors, topic flow and unnecessary word fillers.
A first to look for is spelling, grammar and punctuation. These errors can make a writer seem completely brainless even if they hold a PhD. The reading audience normally catches these errors and expects the writer to have the same degree of observance. Audiences are very judgmental and it is through the combination of words and grammar that ideas are conveyed to others. This skill should come very easy to those who write and if it doesn't use your computer's spelling and grammar check feature.
The next task is regarding topic flow. This is a very common issue for even the most season writer. An idea falls into your head and then your pen frantically scratches the page. A relief washes over you. You’ve gotten it out of your head in written form. When someone else reads it, they see several topics competing for attention.
This frantic writing belongs to a process called brainstorming. Brainstorming is part of the creative process, a wild muse that lacks discipline. It’s a wonderful visitor but when it departs the writer is left to clean up what was left behind.
Some topics are so large and complex that when you proceed with the written project, the reader is bombarded with ideas that scurry around like running insects on the page. Read your work as if you never read it before. Put it down for a few days and then read through it again. How many topics jump forth from the page?
Another common element to look for is unnecessary words and filler sentences. Word count has a strong hub in writing, especially in the educational arenas. In the real world, it is only a guide line, an approximation, it does not guarantee quality. Most students take it too literal and create writing projects that are filled with words but lack real meaning.
Editing helps the writer’s awareness of their personal creative process and everyone’s is unique. You’re not looking for flaws as much as pieces that don’t fit. Writing and editing are challenges that should work together. Writers should embrace it in spite of its time consumption.
If you happen to be a writer who only wants to spend their time engulfed in ideas and not on the science of grammar, expect to share your profits with editing geniuses who make you look brilliant. | <urn:uuid:dada3712-4c56-4929-8506-727901738307> | CC-MAIN-2017-04 | http://www.bellaonline.com/articles/art69405.asp | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00284-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.962571 | 563 | 2.6875 | 3 |
Additives have been helping improve fuel efficiency – and thereby reducing emissions – for years. Optimised combustion results in a substantial reduction of pollutant emissions and considerable fuel saving.
ecomanda AG, which is based in Hünenberg, Switzerland, has developed X-Fuel Energizer, a hypersonic technology that significantly reduces emissions in addition to improving combustion on petroleum fuel engines and increasing flame temperatures. The additive technology acts physically on liquid fuel molecules to improve the combustion process. The patented technology consists of a liquid chemical solution, composed predominantly of propane-2-ol. The mixture is then ‘charged’ using a hypersonic frequency before being added to fuels.
The additive directly affects air-flow into the cylinders. Water vapour is completely broken down into hydrogen and oxygen. Both components recombine to water vapour upon ignition of the fuel-air mixture. Thus, a further energy source is created, which optimises combustion and ultimately leads to fuel-savings.
When diluted into a fuel at a ratio of 1:5000 – 1:10,000, X-Fuel Energizer has a range of effects that derive from the ‘charge’ left by the hypersonic treatment. Firstly, the ultrasonically charged molecules aggregate to, and partition, agglomerated fuel molecules into smaller particles. A reduction in fuel consumption is achieved by these mechanisms, as well as others, although research continues to ascertain which effects are dominant. Dosing units are available for fleet applications.
Additives provide the fastest and lowest-cost return on investment in green solutions available in the market today. They produce results in existing engines without having to make any physical modifications. It is estimated that X-Fuel Energizer could save industrial users of liquid fuels 5-8% on their fuel costs, paying back the cost of the additive over an extremely short period of time.
- Improved combustion significantly reduces carbon monoxide and nitrogen oxides
- Improved combustion means less unburned hydrocarbons
- Reduced fuel consumption
- Reduced particle emissions in diesel exhaust.
Further positive effects have been proven in official laboratory tests and are especially noticeable in real-life driving situations:
- Better starting behaviour during the cold weather / warm-up phase.
- Engines run more smoothly.
- Engines have more power and greater dynamic range whilst accelerating
Application in vehicles
In engines X-Fuel Energizer leads to fewer unburned hydrocarbons, reduced particle emissions from diesel engines, better performance at start up and in cold weather, greater dynamic power and longer engine life-times.
This has been confirmed by the numerous independent organizations in the field of vehicle emissions, which showed fuels savings of 8-17%, a 8-17% reduction in CO2 emissions, a 43-73% fall in CO emissions, a 36-65% reduction in hydrocarbon emissions and a 10-20% decrease in NOx.
Safe to use
Tests have proven X-Fuel Energizer to be safe to use. After the addition of X-Fuel Energizer, commercial fuels continue to comply with EU standard regulations for diesel (EN 590), petrol (EN 228), heavy fuel oil (RMG 380 2012) and marine diesel (DMA 2012). Consequently, it meets the EU standard regulations and is not harmful to engines. On the contrary, X-Fuel Energizer reduces combustion residue, thus prolonging engine life. In addition, X-Fuel Energizer has no effect on the temperature or pressure inside the engine. | <urn:uuid:67544ec5-eb4c-4153-81b8-2b8659d028c1> | CC-MAIN-2022-33 | https://www.ai-online.com/2019/06/reduce-fuel-consumption-and-emissions-with-hypersonic-technology/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570977.50/warc/CC-MAIN-20220809124724-20220809154724-00473.warc.gz | en | 0.934557 | 746 | 2.8125 | 3 |
It can be just as painful to grieve the death of a four-legged friend as it is to grieve the loss of a human family member or friend. It's important to take the time to grieve and to experience your emotions.
Our compassionate team can provide resources to help you after the loss of a companion animal.
How a Pet Loss Support Group Can Help
We are honored to provide any support and resources we can as you grieve the loss of your beloved pet. Grief counseling services can help you process your loss and provide tools for a healthy mourning process. We can provide support and guidance in these areas:
We will help you take care of yourself during this difficult time.
Although it can be difficult to face, it's important to give yourself time to mourn. You may want to suppress the grief and keep up appearances, but your to-do list can wait and your friends and family will understand if you need some time to heal.
Be kind and gentle to yourself, and remember that sadness is not a weakness, but a part of life. Suppressing your feelings will only increase stress, anxiety and anger in the long run.
We will help you find a way to honor your lost loved one.
Finding a way to honor your departed pet is an important part of the healing process. Memorializing your pet can help bring you closure, and provide a sweet reminder of all the good times.
Did your pet have a beloved toy? A personalized collar or a favorite spot to curl up? Reflect on these details and take the time to create a little memorial just for them.
Communicating with Children
We will help you talk to your kids about grief and loss.
While it may seem kindest to lie to your children about the death of your pet, consider it an opportunity to teach them a valuable lesson about mortality and the grieving process.
Pet loss can show your children what your family does when something sad happens, and that grief and loss are normal parts of life. They can and should grieve, but it's also okay to eventually move on and feel happy again.
We will help you talk to friends and family about your loss.
You may encounter people who are insensitive to your loss because they don't understand it. They may diminish how you feel (intentionally or not) and suggest you should "just get a new pet".
We will help you navigate conversations about your loss with the people in your life, and give you tools to politely but firmly insist on your right to process your loss in your own way.
You may choose to take advantage of these local resources. Here are some pet loss support hotlines and websites that offer trained counselors you can talk to:
- Pet Loss Support Hotline at the University of California, Davis, School of Veterinary Medicine 800-565-1526 or 530-752-4200
- Ohio State University Pet Loss and Support Information Line: 614-292-1823. Email: email@example.com.
- Chicago VMA: 630-325-1600
- Cornell University: 607-253-3932
- University of Illinois: 212-244-2273(CARE) or 877-394-2273(CARE)
- Iowa State University: 888-ISU-PLSH (888-478-7574)
- Michigan State University: 517-432-2696
- Tufts University: 508-839-7966
- Virginia-Maryland Regional College of Veterinary Medicine: 540-231-8038
- Washington State University: 509-335-5704 | <urn:uuid:865194aa-0062-46bb-880a-9c1b5a63fdb4> | CC-MAIN-2022-33 | https://www.stlouisanimalemergencyclinic.org/site/resources/pet-loss-grief-counselling | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00067.warc.gz | en | 0.929584 | 770 | 1.65625 | 2 |
Images from Today’s Lecture: African American Writing
Recordings from today’s classes:
Today we strode through a host of key writers, men and women, who were powerfully proclaiming the need for free expression and total acceptance as humans. Underpinned by Martin Luther King Jr, all these writers expressed passionately their sense of injustice and their need for healing. Most powerful of all was James Baldwin in his agonizing story “Going to Meet the Man”. This story expresses all the deep hurt, pain and buried hypocrisy and injustice. James Baldwin carves for himself here a niche for all time writing about the incredible humanity that man is capable of.
Blog topics for today are potentially from a huge list. Let’s see whether you can turn our questions from today into good clear answers:
* DU BOIS “The problem of the Twentieth Century is the problem of the color-line”. What do you think Du Bois means?
* What qualities does Du Bois believe African Americans can bring to the country?
*Does Toomer’s use of vernacular for Tom help or hinder the reader’s sympathy for Tom?
*What is Langston Hughes’ attitude to the way the Blues are being presented on Broadway? See “Note on Commercial Theatre”
*What is Hughes’ attitude to the idea of Freedom in “Words Like Freedom” and “Freedom” What is the underlying theme of “Theme for English B”?
*BALDWIN- How does Baldwin through his language technique succeed in immersing his reader in the experience of his characters? Chose any section of his amazing story “Going to Meet the Man”
*Write a letter to James Baldwin telling him what you think of the power of his writing.
*WALKER Does Alice Walker believe that the “Everyday Use” of the old quilts is protecting or destroying tradition? Remember from the Introduction that we are told that Alice Walker resembles each of the characters in her narrative.
* Write a dialogue between two sisters who are diametrically opposed in their attitudes to life at home. Use “Everyday Use” as a starting point.
Remember you are permitted ALWAYS to create your very own topic. | <urn:uuid:c23f3aa6-772f-4718-b7fb-c0cb508f8a4e> | CC-MAIN-2022-33 | https://michaelgriffith1.com/2019/09/10/african-american-literature/?shared=email&msg=fail | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.95/warc/CC-MAIN-20220817032054-20220817062054-00473.warc.gz | en | 0.954146 | 484 | 3.734375 | 4 |
7 Glossary Terms Found.
Business to Business. Products and services designed to be sold to other businesses.
Business To Consumer. Products and services designed to be sold to the general public.
The practice of comparing the performance of your organisation, department or function against the performance of ’the best’ - whether they be other organisations, industry standards or internal departments. The aim is to look at how well you are doing compared to others in the same field or industry, and to learn from their best practices as a basis for improving your own.
A process or methodology that has been proven to work well and produce good results, and is therefore recommended as a model. Some people prefer to use the term ’good practice’ as in reality it is debateable whether there is a single ’best’ approach.
Bitcoin is a payment system invented by Satoshi Nakamoto, who published the invention in 2008 and released it as open-source software in 2009. The system is peer-to-peer; users can transact directly without needing an intermediary.
A breadcrumb is a navigation trail that leads from the user?s current location in your web site, back to the home page. This is useful for larger web sites that have deeply nested pages or sections in their site.
Example: Home > All Categories > Pre Sales Questions
Software that translates digital information into pictures and text so that you can view them on your computer. Some commonly used browsers are Internet Explorer, Mozilla FireFox, Opera and Netscape. | <urn:uuid:dd9ea21b-b0a8-422c-92f8-844b9faf0b80> | CC-MAIN-2022-33 | https://www.knowledgepublisher.com/glossary.php?l=B | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00273.warc.gz | en | 0.929312 | 335 | 2.34375 | 2 |
Governor Bill Haslam touted the revenue modernization plan in his “state of the state” address earlier this year, and is expected to sign the legislation.
The legislation, if enacted, would make changes to Tennessee’s franchise and excise, business, and sales and use tax laws.
The legislation would adopt factor-presence nexus standards for excise (income), franchise, and state business tax purposes.*
*The Tennessee Business Tax is a state and local tax assessed for the privilege of conducting business within the state and certain counties and/or incorporated municipalities.
Specifically, taxpayers that are doing business in Tennessee and have a substantial nexus in the state would be subject to excise, franchise and business taxes effective for all tax years beginning on or after January 1, 2016.
“Substantial nexus” in Tennessee means that a person has any direct or indirect connections to Tennessee so that it could be required under the U.S. Constitution to remit the taxes owed. Examples of substantial nexus include, but are not limited to:
The legislation would clarify that a company treated as a foreign corporation under the Internal Revenue Code that has no income effectively connected with a U.S. trade or business (as determined under the Code) would not be considered to have a substantial nexus in Tennessee. For excise and franchise tax purposes, if a foreign corporation has effectively connected income, then only the corporation’s net earnings and net worth connected with the U.S. trade or business would be taxable and only property, payroll and receipts connected with the U.S. trade or business would be considered in determining the corporation’s apportionment factor.
Under current law in Tennessee, a taxpayer must apply to the Commissioner of Revenue before it may deduct intangible expenses paid, accrued, or incurred in connection with a transaction with one or more affiliates. In general, the expense will be deductible if the Commissioner determines the principal purpose of the underlying transaction is not the avoidance of tax. There are certain circumstances or “safe-harbors” under which the Commissioner is required to approve an application to deduct intangible expenses.
The bill would eliminate the application process and would require taxpayers to disclose relevant intangible expenses.
In addition, the legislation seems to narrow the circumstances under which intangible expenses paid to related parties could be deducted by eliminating the safe harbors involving payments to an affiliate that are passed through to an unaffiliated entity (commonly referred to as the “conduit exception”), and payments that are subject to tax in certain other states that the Commissioner, under current law, is required to allow.
Under the bill, an intangible expense paid, accrued or incurred in a transaction with one or more affiliates could be deducted for excise tax purposes only if the intangible expense has been disclosed (in a manner prescribed by the Commissioner) and one of two conditions are met.
It appears that these are the only circumstances under which intangible expenses paid, accrued, or incurred in a transaction with one or more affiliates would be deducted. Taxpayers that fail to disclose intangible expenses or to add the expenses back to net earnings would be subject to a negligence penalty. These changes would apply to tax years beginning on or after July 1, 2016.
Under current law, taxpayers apportion their tax base to Tennessee for franchise and excise tax using a three-factor double-weighted sales formula.
The legislation provides that for tax years beginning on or after July 1, 2016, net earnings and net worth would be apportioned to Tennessee using a three- factor formula with triple-weighed sales, i.e., the sales factor will account for 60% of the overall apportionment factor.
Under current Tennessee law, receipts from sales other than sales of tangible personal property are sourced to Tennessee if a greater proportion of the earnings-producing activity is performed in Tennessee than in any other state, based on costs of performance.
Under the bill, effective for tax years beginning on or after July 1, 2016, sales, other than sales of tangible personal property, would be sourced to Tennessee if the taxpayer’s market for the sale is in Tennessee. Specific rules would apply in determining whether the market for certain types of sales will be deemed to be in Tennessee:
Any receipts from a sale of intangible property not specifically described in the statute would be excluded from the numerator and the denominator of the sales factor entirely (i.e., a throw-out rule would apply to such receipts). If a taxpayer cannot source any type of receipt using the rules discussed above, the legislation allows taxpayers to reasonably approximate the state or states to which the receipts are to be assigned. If the location of the sale cannot be determined or reasonably approximated, the receipts would be excluded from both the numerator and the denominator of the sales factor.
The new market-sourcing rules would also be used for excise (income) tax and Tennessee franchise tax purposes. The bill also includes a provision stating that if the application of the market-sourcing provisions results in a lower apportionment factor than current law rules, taxpayers could elect to use the rules in effect prior to the law change if this results in higher apportionment for that year and if the taxpayer had positive net earnings for the tax year, rather than a net loss.
This rather odd election presumably may allow some taxpayers to achieve a more rapid utilization of accumulated net losses being carried forward.
Effective for tax years beginning on or after July 1, 2016, a new apportionment rule would apply to receipts equal to the net gain or income from the sale of a security made by a person who is a dealer in securities under IRC section 475. Such receipts would be attributed to Tennessee if such person’s customer is located in Tennessee and such receipt is not otherwise attributed to Tennessee under the rule that applies to receipts from the sale of an intangible or tangible asset.
A customer is considered to be in Tennessee if the customer is an individual, trust or estate that is a resident of Tennessee or if the customer’s commercial domicile is in Tennessee. Unless the dealer has actual knowledge of the customer’s residence or commercial domicile, the customer will be deemed to be a Tennessee customer if the billing address is in Tennessee.
The bill would require certain “qualified members” of certain “qualified groups” in the communications industry to use a special apportionment formula. Under this formula, total receipts in Tennessee (i.e., the numerator of the sales factor) equals the receipts from all sales of tangible personal property attributed to Tennessee under the sourcing rules for tangible personal property plus the arithmetical average of receipts from all sales of other than tangible personal property that are in Tennessee as determined under (1) the new market-sourcing rules, and (2) the historical earnings producing activity test.
A “qualified member” is a person principally engaged in the sale of telecommunications services, mobile telecommunications services, internet access services, video programming services, direct–to-home satellite television programming services, or some combination thereof. A qualified group is an affiliated group that meets these two criteria: (1) one or more members of the group is a qualified member; and (2) the members of the group, during the tax period, incur “qualified expenditures” of greater than $150 million or make sales subject to Tennessee sales and use tax of greater than $150 million.
“Qualified expenditures” are expenditures incurred in transactions with persons who are not members of the qualified group for: (1) tangible personal property placed in service in Tennessee by a member of the qualified group; and (2) payroll for employees employed by a member of the qualified group at a facility in Tennessee.
Effective for tax years beginning on or after January 1, 2016, the legislation contains an election specific to taxpayers that: (1) make sales of tangible personal property to Tennessee distributors exceeding $1 billion during the tax year; and (2) have a Tennessee receipts factor that exceeds 10% under the application of the normal sourcing rules and before the exclusion. Such taxpayers may elect to exclude from the sales factor numerator the total amount derived from “certified distribution sales.”
“Certified distribution sales” are sales made to a Tennessee distributor (regardless of whether such distributor is related to the taxpayer) that are certified as being resold for use or consumption outside of Tennessee. Taxpayers electing to exclude such receipts are required to pay an annual excise tax on the excluded certified distribution sales. The amount of excise tax is based on the amount of certified distribution sales excluded.
Effective July 1, 2015, the legislation adopts click-through nexus provisions for sales and use tax purposes. Specifically, a dealer is presumed to have substantial nexus with Tennessee if it enters into an agreement with one or more persons in Tennessee who, for consideration, refer prospective customers, directly or indirectly, to the dealer via a link on their website or other means if cumulative gross receipts from retail sales in the state created through such affiliation exceed $10,000 in the preceding 12-month period.
The presumption that nexus exists may be rebutted “…by clear and convincing evidence that the person with whom the dealer has an agreement or contract did not conduct any activities in this state that would substantially contribute to the dealer’s ability to establish and maintain a market in this state.”
Under current law, the sale of computer software is subject to Tennessee sales and use tax “regardless of whether the software is delivered electronically, delivered by use of tangible storage media, loaded or programmed into a computer, created on the premises of the consumer, or otherwise provided.”**TENN. CODE ANN. § 67-6-231(A).
Effective July 1, 2015, the legislation adopts a definition of “use of computer software” that includes the access and use of remotely hosted software that remains in the possession of a dealer or a third party on behalf of such dealer.
If a customer accesses the software from a location in Tennessee as evidenced by a residential street address or the primary business address of the customer, such access would be deemed equivalent to the sale or license and electronic delivery of the software in Tennessee.
When the sales price includes users located both in and outside Tennessee, the sales price would be allocated for tax purposes based on the users in Tennessee. The legislation specifies that the provision is not to be construed as imposing tax on any services that are not currently subject to Tennessee sales and use tax, including but to limited to, information services or data processing.
The general rules regarding purchases for resale will apply to dealers that purchase access to computer software for resale. However, a qualified data center that purchases software for use by an affiliated company would not be eligible for a resale exemption. In that situation, the data center would be considered the end- user of the software and would be eligible for the industrial machinery exemption for such purchases.
The existing sales and use tax exemption for the use of computer software developed and fabricated by an affiliated company would remain in effect but modified to address the taxability of software accessed remotely. In addition, the existing sales and use tax exemption for the fabrication of computer software by a person, or its direct employee, for such person's own use and consumption, would be expanded. The expanded exemption applies to the access and use of software that remains in the possession of a dealer or third party when such access and use of the software is solely by a person or that person’s direct employee for the exclusive purpose of fabricating other software that is both: (1) owned by that person; and (2) for that person’s own use and consumption.
In addition to expanding the sales tax to access of hosted software, the legislation expands the types of digital goods subject to sales and use tax to include online gaming, effective July 1, 2015. Currently, Tennessee taxes “specified digital products,” which includes electronically transferred digital audio-visual works, digital audio works and digital books.*
*TENN. CODE ANN. § 67-6-102(88).
Under the legislation, “specified digital products or video game digital products” are subject to sales and use tax. “Video game digital products” means “the right to access and use computer software that facilitates human interaction with a user interface to generate visual feedback for amusement purposes, when possession of the computer software is maintained by the seller or a third party….”
The Tennessee Attorney General (AG) issued Opinion No. 15-37 (April 22, 2015) addressing a number of aspects of the legislation, including whether the factor-presence nexus standards would run afoul of the Commerce Clause and the Tennessee J.C. Penney case.
In the J.C. Penney case, the Tennessee Court of Appeals held that “physical presence is required in order to satisfy the substantial nexus requirement of Complete Auto.” The AG observed that courts in other states have frequently rejected the reasoning in J.C. Penney and, in his view, the factor presence standards incorporated into the legislation would be “defensible under the United States Constitution.”
For information, contact a KPMG State and Local Tax professional:
Loren Chumley | +1 (615) 248-5565 | email@example.com
Blair Norman | +1 (615) 248-5544 | firstname.lastname@example.org
Justin Stringfield | +1 (615) 248-5510 | email@example.com
© 2017 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved.
The KPMG logo and name are trademarks of KPMG International. KPMG International is a Swiss cooperative that serves as a coordinating entity for a network of independent member firms. KPMG International provides no audit or other client services. Such services are provided solely by member firms in their respective geographic areas. KPMG International and its member firms are legally distinct and separate entities. They are not and nothing contained herein shall be construed to place these entities in the relationship of parents, subsidiaries, agents, partners, or joint venturers. No member firm has any authority (actual, apparent, implied or otherwise) to obligate or bind KPMG International or any member firm in any manner whatsoever. The information contained in herein is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act on such information without appropriate professional advice after a thorough examination of the particular situation. For more information, contact KPMG's Federal Tax Legislative and Regulatory Services Group at: + 1 202 533 4366, 1801 K Street NW, Washington, DC 20006. | <urn:uuid:3276aa6a-23a0-491e-860c-1550ae939eef> | CC-MAIN-2017-04 | https://home.kpmg.com/xx/en/home/insights/2015/04/tnf-tennessee-legislation-amending-franchise-excise-business-and-sales-and-use-taxation.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00348-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.947954 | 3,116 | 1.609375 | 2 |
This document is not completed and will be updated anytime.
Unix is a family of multitasking, multiuser computer OS.
Derive from the original AT&T Unix, Developed in the 1970s at Bell Labs (贝尔实验室), initially intended for use inside the Bell System.
C 语言也是 Bell Labs 的产物,从一开始就是为了用于 Unix 而设计出来的。所以 Unix (在 73 年用 C 重写)在高校流行后,C 语言也获得了广泛支持。
AT&T licensed Unix to outside parties(第三方) from the late 1970s, leading to a variety of both academic (最有有名的 BSD ) and commercial (Microsoft Xenix, IBM AIX, SunOS Solaris)
微软 1979 年从 AT&A 授权来的 Unix OS,配合着 x86 成为当时最受欢迎的 Unix 发行版。后来 M$ 和 IBM 合作开发 OS/2 操作系统后放弃,后来最终转向 Windows NT。
Barkeley Software Distribution, also called Berkeley Unix. Today the term “BSD” is used to refer to any of the BSD descendants(后代) which together form a branch of the family of Unix-like OS.(共同组成了一个分支)
- BSD 最大的贡献是在 BSD 中率先增加了虚拟存储器和 Internet 协议,其 TCP/IP(IPv4 only) 代码仍然在现代 OS 上使用( Microsoft Windows and most of the foundation of Apple’s OS X and iOS )
- BSD 后来发展出了众多开源后代,包括 FreeBSD, OpenBSD, NetBSD 等等……很多闭源的 vendor Unix 也都从 BSD 衍生而来。
FreeBSD 不但是 Open Source BSD 中占有率最高的,还直接影响了 Apple Inc : NeXT Computer 的团队在 FreeBSD 上衍生出了 NeXTSTEP 操作系统,这货后来在 Apple 时期演化成了 Darwin ,这个“达尔文”居然还是个开源系统,而且是 the Core of Mac OS X and iOS.
An object-oriented, multitasking OS. Low-level C but High-level OC language and runtime the first time, combined with an OO aplication layer and including several “kits”.
大家都知道 NeXT 是 Steve Jobs 被 forced out of Apple 后和 a few of his coworkers 创办的,所以 NeXTSTEP 绝对是证明 Jobs 实力的作品。
Darwin), the core set of components upon which Mac OS X and iOS based, mostly POSIX compatible, but has never, by itself, been certified as being compatible with any version of POSIX. (OS X, since Leopard, has been certified as compatible with the Single UNIX Specification version 3)
所以说 Mac OS X 算是很正统 Unix 的了
可移植操作系统接口, Portable Operating System Interface, is a family of standards specified by the IEEE from maintaining compatibility between OS, defines the API along with Command Line Shells and utility interfaces, for software comaptibility with variants of Unix and other OS.
- Fully POSIX compliant:
- OS X
- QNX OS (BlackBerry)
- Mostly complicant:
- Darwin (Core of iOS & OS X)
- Complicant via compatibility feature (通过兼容功能实现兼容)
- Windows NT Kernel
- Windows Server 2000, 2003, 2008, 2008 R2, 2012
- Symbian OS (with PIPS)
- Symbian was a closed-source OS.
- Windows NT Kernel
- Fully POSIX compliant:
A Unix-like (sometimes referred to as UNX or nix) operating system is one that behaves in a manner similar to a Unix system, while not necessarily conforming to or being certified to any version of the Single UNIX Specification.
There is no standard for defining the term.
其实 Unix-like 是个相对模糊的概念:
- 最狭义的 Unix 单指 Bell Labs’s Unix
- 稍广义的 Unix 指代所有 Licensed Unix, 即通过了 SUS 的 Unix-like ,比如 OS X
- 最广义的 Unix 即所有 Unix-like 系统,无论它是否通过过任何 SUS,包括 Linux,BSD Family 等
The Single UNIX Specification (SUS) is the collective name of a family of standards for computer OS, compliance with which is required to qualify for the name “Unix”, like POSIX.
iOS is a Unix-like OS based on Darwin(BSD) and OS X, which share some frameworks including Core Foundation, Founadtion and the Darwin foundation with OS X, but, Unix-like shell access is not avaliable for users and restricted for apps, making iOS not fully Unix-compatible either.
The iOS kernal is XNU, the kernal of Darwin.
XNU, the acronym(首字母缩写) for X is Not Unix, which is the Computer OS Kernel developed at Apple Inc since Dec 1996 for use in the Mac OS X and released as free open source software as part of Darwin.
Linux is a Unix-like and mostly POSIX-compliant computer OS.
严格来讲,术语 Linux 只表示 Linux Kernel 操作系统内核本身,比如说 Android is Based on Linux (Kernel). Linus 编写的也只是这一部分,一个免费的 Unix-like Kernel,并不属于 GNU Project 的一部分。
但通常把 Linux 作为 Linux Kernel 与大量配合使用的 GNU Project Software Kit (包括 Bash, Lib, Compiler, 以及后期的 GUI etc) 所组合成的 OS 的统称。(包括各类 Distribution 发行版)
The GNU Project is a free software, mass collaboration project, which based on the following freedom rights:
- Users are free to run the software, share (copy, distribute), study and modify it.
- GNU software guarantees these freedom-rights legally (via its license).
- So it is not only FREE but, more important, FREEDOM.
In order to ensure that the entire software of a computer grants its users all freedom rights (use, share, study, modify), even the most fundamental and important part, the operating system, needed to be written.
This OS is decided to called GNU (a recursive acronym meaning “GNU is not Unix”). By 1992, the GNU Project had completed all of the major OS components except for their kernel, GNU Hurd.
With the release of the third-party Linux Kernel, started independently by Linus Torvalds in 1991 and released under the GPLv0.12 in 1992, for the first time it was possible to run an OS composed completely of free software.
Though the Linux kernel is not part of the GNU project, it was developed using GCC and other GNU programming tools and was released as free software under the GPL.
Anyway, there eventually comes to the GNU/Linux
- GPL: GNU General Public License
- GCC: GNU Compiler Collection
其他与 GPL 相关的自由/开源软件公共许可证:
- Mozilla Public License
- MIT License
- BSD Public License
- GPL 强制后续版本必须是自由软件,而 BSD 的后续可以选择继续开源或者封闭
- Apache License
Android is a mobile OS based on Linux Kernel, so it’s definitely Unix-like.
Linux is under GPL so Android has to be open source.
Android’s source code is released by Google under open source licenses, although most Android devices ultimately ship with a combination of open source and proprietary software, including proprietary software developed and licensed by Google (GMS are all proprietary)
Android’s kernel is based on one of the Linux kernel’s long-term support (LTS) branches.
Android’s variant of the Linux kernel has further architectural changes that are implemented by Google outside the typical Linux kernel development cycle, and, certain features that Google contributed back to the Linux kernel. Google maintains a public code repo that contains their experimental work to re-base Android off the latest stable Linux versions.
Android Kernel 大概是 Linux Kernel 最得意的分支了,Android 也是 Linux 最流行的发行版。不过,也有一些 Google 工程师认为 Android is not Linux in the traditional Unix-like Linux distribution sense. 总之这类东西就算有各种协议也还是很难说清楚,在我理解里 Android Kernel 大概就是 fork Linux Kernel 之后改动和定制比较深的例子。
既然提到 Android 就不得不提提 Android ROM
Read-only memory (ROM) is a class of storage medium used in computers and other electronic devices. Data stored in ROM can only be modified slowly, with difficulty, or not at all, so it is mainly used to distribute firmware (固件) (software that is very closely tied to specific hardware, and unlikely to need frequent updates).
ROM 在发展的过程中不断进化,从只读演变成了可编程可擦除,并最终演化成了 Flash
- PROM (Programmable read-only memory)
- EPROM (Erasable programmable read-only memory)
- EEPROM (Electrically erasable programmable read-only memory)
- Flash memory (闪存)
Flash 的出现是历史性的,它不但可以作为 ROM 使用,又因其极高的读写速度和稳定性,先后发展成为U盘(USB flash drives)、移动设备主要内置存储,和虐机械硬盘几条街的固态硬盘(SSD),可以说这货基本统一了高端存储市场的技术规格。
所以我们平时习惯说的 ROM 其实还是来源于老单片机时代,那时的 ROM 真的是写了就很难(需要上电复位)、甚至无法修改,所以那时往 ROM 里烧下去的程序就被称作 firmware ,固件。久而久之,虽然技术发展了,固件仍然指代那些不常需要更新的软件,而 ROM 这个词也就这么沿用下来了。
所以在 wiki 里是没有 Android ROM 这个词条的,只有 List of custom Android firmwares
A custom firmware, also known as a custom ROM, ROM, or custom OS, is an aftermarket distribution of the Android operating system. They are based on the Android Open Source Project (AOSP), hence most are open-sourced releases, unlike proprietary modifications by device manufacturers.
各类 Android ROM 在 Android 词类下也都是属于 Forks and distributions 一类的。
所以我说,其实各类 Android ROM 也好,fork Android 之流的 YunOS、FireOS 也好,改了多少东西,碰到多深的 codebase ……其实 ROM 和 Distribution OS 的界限是很模糊的,为什么 Android 就不可以是移动时代的 Linux ,为什么 Devlik/ART 就不能是移动时代的 GCC 呢?
Chrome OS is an operating system based on the Linux kernel and designed by Google to work with web applications and installed applications.
虽然目前只是个 Web Thin Client OS ,但是 RoadMap 非常酷……
- Chrome Packaged Application (Support working offline and installed)
- Android App Runtime (run Android applications natively…fxxking awesome)
Chrome OS is based on Chromium OS, which is the open-source development version of Chrome OS, which is a Linux distribution designed by Google.
For Detail, Chromium OS based on Gentoo Linux, emm… | <urn:uuid:e750e201-0ae3-4c3e-ae8b-66d56ce88f5a> | CC-MAIN-2017-04 | http://blog.kaijun.rocks/2015/04/14/unix-linux-note/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282926.64/warc/CC-MAIN-20170116095122-00397-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.652542 | 3,806 | 3.046875 | 3 |
Home / News
8. CHAPTER VIII
Mr Pontifex had set his heart on his son's becoming a fellow of a college before he became a clergyman. This would provide for him at once and would ensure his getting a living if none of his father's ecclesiastical friends gave him one. The boy had done just well enough at school to render this possible, so he was sent to one of the smaller colleges at Cambridge and was at once set to read with the best private tutors that could be found. A system of examination had been adopted a year or so before Theobald took his degree which had improved his chances of a fellowship, for whatever ability he had was classical rather than mathematical, and this system gave more encouragement to classical studies than had been given hitherto.
Theobald had the sense to see that he had a chance of independence if he worked hard, and he liked the notion of becoming a fellow. He therefore applied himself, and in the end took a degree which made his getting a fellowship in all probability a mere question of time. For a while Mr Pontifex senior was really pleased, and told his son he would present him with the works of any standard writer whom he might select. The young man chose the works of Bacon, and Bacon accordingly made his appearance in ten nicely bound volumes. A little inspection, however, showed that the copy was a second hand one.
Now that he had taken his degree the next thing to look forward to was ordination--about which Theobald had thought little hitherto beyond acquiescing in it as something that would come as a matter of course some day. Now, however, it had actually come and was asserting itself as a thing which should be only a few months off, and this rather frightened him inasmuch as there would be no way out of it when he was once in it. He did not like the near view of ordination as well as the distant one, and even made some feeble efforts to escape, as may be perceived by the following correspondence which his son Ernest found among his father's papers written on gilt-edged paper, in faded ink and tied neatly round with a piece of tape, but without any note or comment. I have altered nothing. The letters are as follows:-
This is page 33 of 431. [Mark this Page]
Mark any page to add this title to Your Bookshelf. (0 / 10 books on shelf)
Buy a copy of The Way of All Flesh at Amazon.com
Customize text appearance:
(c) 2003-2012 LiteraturePage.com and Michael Moncur.
For information about public domain texts appearing here, read the copyright information and disclaimer. | <urn:uuid:f0e6d625-f078-4c8b-bb3d-56ff8690e253> | CC-MAIN-2017-04 | http://literaturepage.com/read/butler-way-of-all-flesh-33.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00377-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.993021 | 552 | 1.710938 | 2 |
Empowering Knowledge Societies
The archival, records and data landscape in the 21st century is changing public expectations, how we do our work, what constitutes credible evidence and how we protect our holdings. It is time for our profession to discuss, reflect and challenge existing practices to explore and expand the critical role played by archives and information professionals in the 21st century knowledge societies. The ICA Congress 2020, Empowering Knowledge Societies, will be an opportunity for the profession from all over the world to share innovative ideas and research and for colleagues from allied and other professions to join us at this important event. We encourage the community to submit its proposals, but we would also encourage you to reach out to librarians, museum professionals, data managers, journalists and people working in civil society to be part of this conversation. The 21st century information challenges do not simply belong to archives and records professionals, they belong to everyone, so let’s share ideas, build networks to empower our knowledge societies!
The congress will be structured with three inclusive sub-themes
Artificial intelligence, digital preservation & emerging technologies
Artificial intelligence and emerging technologies are quickly changing how we do our work, but we need to understand both the strength and weaknesses of these technologies in archives and records endeavours. What do they do well? What can they help us do better? How do we engage with these new practices? What are the ethical implications?
These technologies will also impact how we preserve information and make accessible information (records and data), but we not only to discuss this but there are persisting questions about how to preserve records and data in a sustainable, practical and cost-effective way.
Sustainable knowledge is fundamental to sustainable development and the achievement of development initiatives like the Sustainable Development Goals (SDGs). At the core of these initiatives is the need for trustworthy information, regardless of format.
Sustainable information is also about how we protect our holdings from climate change, theft, looting, and illicit trafficking. It also about looking beyond what is done to the archives and records institutions and examining our impact on society and the environment.
Trust and evidence
In the age of ‘alternative facts’, ‘fake news’, misinformation and cybersecurity threats, the need for trustworthy evidence (records, information, data) has become ever more essential. What is our role in this space? Who are our allies? What is the role of records and archives professionals in the area of internet governance?
Trust and evidence also mean reaching out and understanding what our users need, so that they can believe in what we do and how we acquire, preserve and make accessible information. How do we empower them? To empower us?
- Advance your professional development: learn from and interact with colleagues, experts and thought leaders in archives and related fields
- Contribute your perspective and experience to the global discussion. We need to hear from YOU
- Take advantage of a series of practical workshops to extend your skills; learn creative solutions to 21st Century challenges
- Renew acquaintances and make new friends
- Develop your network of colleagues, internationally; a network for mutual benefit throughout your professional career: you are not alone
- Participate in meetings of your regional ICA branch: think globally; act locally
- Test your ideas and plans with colleagues: seek and offer advice
- Plan joint initiatives and projects; collaborate
- Get involved in the International Council on Archives; understand current issues and challenges; participate
- Speak with suppliers in the exhibit area
- Become known internationally as a resource person or expert in some aspect of archival science
- Enjoy a special week with friends and colleagues in a lively, welcoming ambience. The United Arab Emirates is famous for its hospitality. Dubai Expo 2020 is becoming widely known as THE travel destination for 2020. With the support of the UAE government, ICA Congress Abu Dhabi 2020 promises to be a memorable event. You have to be there!
Venue: Abu Dhabi National Exhibition Centre – ADNEC
The venue for ICA Abu Dhabi 2020, ADNEC is a world-class exhibitions and conferences hub in the heart of the city, surrounded by urban architecture and international hotel chains.
The contemporary spaces feature purpose-built conference halls offering a superior environment for business functions, with premium facilities and stylish modern interiors. | <urn:uuid:86eb753b-42d1-492c-81fc-9bfad178f492> | CC-MAIN-2022-33 | https://devica.digitalresearch.ae/en/about-the-congress/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00473.warc.gz | en | 0.921529 | 889 | 2.171875 | 2 |
Circuit training is a type of exercise that requires performing a variety of workouts in a single session in rapid succession. The swimmer will do each individual exercise for five seconds to as many as 60 seconds and will then immediately move onto the next exercise in the circuit. This type of training can significantly boost performance, promote weight management, increase muscle mass and encourage better flexibility.
Cardiovascular exercise benefits swimmers in a number of ways, including better athletic performance, more energy, better mood, better sleep and weight control. This involves varying several forms of cardiovascular exercise for a set amount of time, such as jogging for 30 seconds, sprinting for 30 seconds, high knees for 30 seconds, jumping jacks for 30 seconds and walking for 60 seconds to break before repeating the circuit up to three times. This should be done at least five days per week to enhance your cardiovascular fitness and to improve overall endurance both in the pool and when on land.
Lower Body Circuits
It is much easier to tone and strengthen your lower body on land than it is in a pool, and a strong lower body is necessary for injury prevention. Lower body exercises that can be included in a circuit include squats, plie squats, lunges, side lunges, reverse lunges, wall sits, calf raises, bridges, reverse leg lifts and side leg lifts. Each exercise should be done for a period of five to 60 seconds and then move onto the next until all have been completed, then take a 60-second break and repeat the circuit, and do lower body circuits three days per week.
Upper Body Circuits
A strong upper body is necessary for speed and endurance in the pool and those who are lacking upper body strength will not be able to adequately compete. Upper body exercises that can be included in a circuit include tricep dips, pushups, shoulder flies, bicep curls, chest presses, bench presses, one arm rows and lateral raises. Each upper body exercise should be done for five to 60 seconds and then go to the next exercise until all are done, then take one full minute to break and repeat the circuit, and do this circuit three days per week.
There is no arguing that swimmers need a very strong and stable core to ensure proper swimming technique and to improve swimming endurance. Core circuits will include exercises like crunches, planks, situps, leg lifts, twisting crunch, side plank, glute pushups and V-sit hold. All of these should be done for five to 60 seconds, depending on the swimmer's current core strength and the swimmer should do two sets of each. Each exercise is performed once and then you go right onto the next without stopping until all exercises are done, take a 60-second break and repeat the circuit, and do this three days per week. | <urn:uuid:2779c114-380c-408e-a7d8-207ef6322b04> | CC-MAIN-2017-04 | http://www.livestrong.com/article/350670-circuit-training-for-swimming/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00119-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.938833 | 572 | 3.3125 | 3 |
Lets Get REAL About What Happens To BOOBS In Your 20s, 30s, And 40s.
Whether they are large or small, breasts are a hot topic of conversation. Everything from showing too much bosom to not having a cup size worthy enough to need support; we place a lot of emphasis on them.
And yet we probably still have a lot of unanswered questions that we are either too ashamed to ask or don’t even know where to begin. Here is a list of fascinating facts about breasts. It may not convince you to love yours, but you will certain appreciate your body more. I can't believe #15 is not common knowledge.
#1. Breasts come in all different shapes and sizes.
It is very normal and common for one breast to be larger than the other.
#2. You might have noticed that your breasts change over the years.
Breasts change throughout a woman's life. Do you know why this happens?
#3. When you're in your 20's...
Breasts tend to be perkier at this stage in life. This is also the time when the body is settling into its adult stage.
#4. Monthly period cycle.
Breasts are larger during the menstrual cycle as hormones level increase.
#5. When you gain or lose weight they will change.
The breast and fat tissue in the breasts will decrease with weight loss and increase with weight gain. Although the amount of fat lost or gained is different for everyone as the composition of fat and tissue varies.
Page 1 of 4Next › | <urn:uuid:2c86616b-72c9-48ab-ab4c-4415726a6cde> | CC-MAIN-2017-04 | http://www.lifebuzz.com/breasts/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00064-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.968643 | 327 | 2.09375 | 2 |
Filed under: Art, Cool Site of the Day, Freedom, Fun n Games, Heartwarming | Tags: Blowing Bubbles, Freezing Temperatures, Making Magic
When the temperature dropped to 16 degrees in Washington, and everyone hid indoors around the fireplace, the stove, or just wrapped up in blankets, Angela Kelly and her 7 year-old son mixed up some homemade soap and blew bubbles to see what would happen:
Angela took photos as the frost created intricate designs in the larger bubbles, while the smaller ones froze and shattered as they it the ground. Before the sun came up the bubbles behaved as if they were made of glass. After the sun came up, the tops of the bubbles would defrost. Here is the rest of the story:
What a great idea. Perhaps people all over America will be blowing bubbles in the cold.
Leave a Comment so far
Leave a comment | <urn:uuid:dd47867d-2949-4428-81e2-a2d432f6ce45> | CC-MAIN-2016-44 | https://americanelephant.wordpress.com/2014/01/06/the-magic-of-winter-blowing-bubbles/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721027.15/warc/CC-MAIN-20161020183841-00550-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.932132 | 184 | 2.015625 | 2 |
Greenhouse gases are known for absorbing the infrared radiation from Sunlight and heating up the environment to unbearable limit for all the living beings. The majorly known gases causing greenhouse effect in the environment are Carbon Dioxide and Chlorofluorocarbons (CFCs). Both these gases are already there in the environment and the human being are responsible for increasing their impact. It is due to various activities performed by the human beings extra greenhouse gases are also produced. Apart from Carbon Dioxide, the greenhouse gases which get release in the environment due to human activities include nitrous oxide, methane, Ozone CFCs, etc.
For the survival of all the living beings it is urgent to reduce the emissions of Greenhouse Gases. Actually the greenhouse gases trap the heat and help in making the planet earth warmer. Ever since industrial revolution has taken place, the impact of greenhouse gases has increased manifold. Around the globe the people are suffering from scorching heat due to greenhouse gases. It is therefore urgent to reduce the greenhouse gases emissions to prevent global warming.
Ways to Reduce Greenhouse Gases
The worst impact of greenhouses gases has become visible in the form of growing number of premature deaths around the globe due to unbearable heat coupled with heavy pollution levels in the environment. Due to their combined effect climate change has also occurred all throughout the world so we need to strictly follow the following ways to reduce the greenhouse gases in the environment:
- We must take measures to reduce carbon footprints if we seriously want to reduce the impact of greenhouse gases. The mantra to lessen the impact of greenhouse gases is, “Reduce, Recycle and Reuse”. By simply recycling most of our household waste we can reduce carbon dioxide considerably.
- We should maximum use energy efficient products, especially for lighting purposes.
- Driving less is important to reduce the emissions of greenhouse gases. Maximum carbon dioxide is produced due to combustion of fuels and so we must limit our driving aspirations. As an alternative way should use public transport or rather depend on biking.
- Plantation is the biggest way to save the earth from the impact of greenhouse gases. It is since the trees absorb carbon dioxide and release life giving oxygen, we must plant trees on a mass level.
- Most of the industries contribute in releasing heavy amount of greenhouse gases in the environment, though there are norms to control and release only treated gases in the environment. To reduce industrial release of greenhouse gases it is urgent for every factory to get studded with pollution control mechanism.
How to Reduce Greenhouse Gases in Your Home
The environments at our homes where we spend maximum time of our daily routine are silently turning into silent killers due to the increasing amount of greenhouse gases. And our own activities are responsible for this situation. We need to strictly take care of the following to reduce greenhouse gases in our homes:
- We need to use energy efficient electrical products with star ratings at our homes. These ratings or energy star labels certify that the product uses less energy hence it contributes in reducing carbon footprint on earth.
- We must switch off the air-conditioners when they are not required. Air-conditioners and Fridge both discharge carbon monoxide gas—the most harmful greenhouse gas responsible for sudden death.
- Replacing the light bulbs with CFLs and LEDs are important to reduce greenhouse gases in our homes. CFLs and LEDs use less electricity and give much brighter light and that too without generating much of heat and greenhouse gases in the environment.
- Switching from coal to natural gas for cooking is another way to reduce the production of greenhouse gases in our homes.
- Using solar panels for our energy requirements is an effective way to reduce greenhouse gases in our homes. Solar energy is an excellent means of the required heating and lighting requirements at our homes and it doesn’t produce or release greenhouse gases at all.
How to Reduce Greenhouse Gases in Agriculture
The ecosystem of Soil combined with Livestock requirements together creates complex environments responsible for greenhouse gases emissions from agriculture. To reduce the emission of greenhouse gases form agriculture it is important to limit the inputs of nitrogen in the agriculture. Nitrogen is excessively used in the soil to ensure good farm yields as it contributes in the growth of the crops. However, following are the ways to reduce greenhouse gases in agriculture:
- Farmers are required to reduce the levels of fertilizers in the fields as most of the fertilizers contain Nitrogen in one form or other. Moreover, the farmers should also limit the use of applied products in agriculture.
- The farmers should use maximum amount of organic manure in their farms. Organic fertilizers are made from vegetable matter, animal matter and dried leaves of the plants which limit the level of greenhouse gases production. If farming is done this way it will help reduce the production of greenhouse gases.
- Adding bacteria to the farm soil is an excellent way to reduce production of greenhouse gases from farm soil.
- Food for the livestock emits methane gas—an important constituent of greenhouse gases. The best way to control the emission of greenhouse gases while giving food to the livestock is to add nitrate in their food, but in limited amount. Nitrate instantly helps in reducing methane emissions.
- Another way to reduce greenhouse gases emissions form livestock foods is to add considerable amount of lipid, or fat in their food.
How to Reduce Greenhouse Gases from Cars
Cars account for heavy emissions of greenhouse gases. Playing as monsters for the environment, emissions from cars are negatively impacting our environment. Excessive use of fuels to run our car is one of the major reasons responsible for global warming. We need to reduce greenhouse gases emissions from cars in the following ways:
- Using fuel efficient cars only is one of the excellent ways to reduce greenhouse gases from cars.
- Electric cars are excellent to reduce greenhouse gases emissions and so we need to maximize the use of electric cars, provided the electricity is produced through renewable sources. The government is required to popularize these cars among the public by providing subsidies on their purchase.
- Use of cleaner fuels in the cars is another way to reduce the impact of greenhouse gases.
- Using cellulosic biofuels can also reduce greenhouse gases emissions from cars considerably.
- Another way to reduce greenhouse gases emissions from cars is to keep the cars properly maintained. Overhauling the car’s engine time to time and maintaining proper pressure in the tyres reduces fuel consumption hence emission of greenhouse gases also gets reduced.
How to Reduce Greenhouse Gases at School
The schools can contribute immensely in reducing the production of greenhouse gases. Most of the daily activities of the students and the staff members at school are responsible for heavy production of greenhouse gases. Here are the ways to reduce the emission of greenhouse gases at school:
- To reduce greenhouse gases at School — the School management should lay emphasis on proper solid waste management. This can be done either by waste prevention or by recycling the waste at schools.
- The schools should use fuel efficient vehicles for transportation of the students.
- The schools can play an important role in raising awareness among the kids on greenhouse emissions, besides educating them on how to control them. By following a standard practice at schools like minimising the use of the materials responsible for increasing the greenhouse gases and promoting litter less lunches, or eliminating the use of bottled water, etc.
- The schools can considerably reduce greenhouse gases at their premises by organizing waste reduction weeks from time to time.
- Saving energy by using maximum CFLs and LEDs is another way to reduce greenhouse gases at school.
How to Reduce Greenhouse Gases from Power Stations
Power stations which run on coal, or atomic energy produces maximum amount of greenhouse gases. While the power stations running on coal emits greenhouses gases such as carbon dioxide and carbon monoxide gases, the nuclear energy operated power plant produces many harmful greenhouses gases. To control greenhouse gases from power stations we must lay emphasis on the following:
- To reduce greenhouse gases from power stations the best way is to operate power plants at their best efficiency so that per unit electricity production can be achieved using less fuel.
- Using hydro power plants for electricity production is another way to reduce greenhouse gases from power stations.
- Encourage the people to conserve energy.
- Use of various technologies at power stations to absorb the carbon dioxide gas before it may reach to the environment.
- Using wind and solar powered power stations can also reduce greenhouse gases considerably.
How to Decrease Greenhouse Gases in Industry
Industries contribute immensely in polluting the environment by producing a large quantity of greenhouse gases. While producing different goods and materials the industries releases most harmful greenhouse gases. We can decrease the emission of greenhouse gases in industry the following way:
- To reduce greenhouse gases from power stations the best way is to operate power plants at their best efficiency so that per unit electricity production can be achieved using fewer fuels.
- By time to time assessing the carbon footprint of any particular industry and taking measures to control them on regular basis is the best way to decrease greenhouse gases.
- By controlling the direct emissions of greenhouse gases in the facility itself helps a lot in decreasing the greenhouse gases in any industry.
- Putting sanctions on heavy release of greenhouse gases by any industry can surely decrease the emission of greenhouse gases— the sanctions encourage the industry to apply emission control measures within their premises.
- By investing in green energy for their operations the industries can decrease greenhouse gases emissions.
Other Ways to Reduce Greenhouse Gases
Among the other ways to reduce greenhouse gases are the following steps which everyone should follow:
- Use less energy and air conditioning.
- Everyone should at least plant one tree in a year.
- Spread awareness about energy conservation and the harmful effects of greenhouse gases in the society to encourage maximum people towards bringing reduction in production of greenhouse gases.
- Use carpool, biking or public transport can also reduce total amount of greenhouse gases in the environment.
- The industries must abide by all the rules and regulations made by the government to reduce the level of polluting greenhouse gases in the environment.
We must understand that greenhouse gases are already creating significant environmental issues for all. It’s high time we should take measures to reduce greenhouse gases in the environment and for this purposes all the stakeholder including the industry and the common people will have to make combined efforts. By putting all the efforts jointly we can not only reduce greenhouse gases in the environment, but we can also save the mother earth from global warming. | <urn:uuid:73aa71c1-f919-4e55-ada5-bef4963d6a70> | CC-MAIN-2022-33 | https://vocalinternational.com/how-to-reduce-greenhouse-gases-and-their-emissions/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00477.warc.gz | en | 0.921728 | 2,138 | 3.8125 | 4 |
Journal of Cognitive Neuroscience
The anterior temporal lobe (ATL) sits at the confluence of auditory, visual, olfactory, transmodal, and limbic processing hierarchies. In keeping with this anatomical heterogeneity, the ATL has been implicated in numerous functional domains, including language, semantic memory, social cognition, and facial identification. One question that has attracted considerable discussion is whether the ATL contains a mosaic of differentially specialized areas or whether it provides a domain-independent amodal hub. In the current study, based on task-free fMRI in right-handed neurologically intact participants, we found that the left lateral ATL is interconnected with hubs of the temporosylvian language network, including the inferior frontal gyrus and middle temporal gyrus of the ipsilateral hemisphere and, to a lesser extent, with homotopic areas of the contralateral hemisphere. In contrast, the right lateral ATL had much weaker functional connectivity with these regions in either hemisphere. Together with evidence that has been gathered in lesion-mapping and event-related neuroimaging studies, this asymmetry of functional connectivity supports the inclusion of the left ATL within the language network, a relationship that had been overlooked by classic aphasiology. The asymmetric domain selectivity for language of the left ATL, together with the absence of such an affiliation in the right ATL, is inconsistent with a strict definition of domain-independent amodal functionality in this region of the brain. | <urn:uuid:6097dacf-db1e-4e8b-8a72-2befd755df5b> | CC-MAIN-2022-33 | http://cognet.mit.edu/node/54295 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00076.warc.gz | en | 0.902057 | 296 | 1.609375 | 2 |
11 Sleep Hacks For Babies & Toddlers: Help Them Fall Asleep & Stay Asleep
Desperate to figure out how to get your baby and/or toddler to go to sleep and stay asleep? (Us too!) In this guide, Health Writer Lindsay Haskell shares 11 tried and trusted sleep hacks.
You’re tired and so is your little one, but for some reason, NOBODY is sleeping.
All babies are different when it comes to sleep, just like with eating or anything else. Nonetheless, there is a healthy range for how much sleep your child should be getting per their age group. Your child does a lot of developing “under the hood” while getting that shuteye, so it’s important that she get enough of it.
How much sleep do babies and toddlers need?
- Infants need 14 to 17 hours of sleep in a 24-hour cycle. Newborns generally wake every 2 to 3 hours for milk.
- Toddlers 12 to 24 months of age need 11 to 14 hours of sleep in every 24-hour cycle, and they typically take 1 or 2 daytime naps.
- Toddlers older than 24 months need 10 to 14 hours of sleep in each 24-hour cycle.
While we can’t totally eliminate the trial and error process for you (because every baby is different), we’ve examined 12 expert-approved and research-proven ways you can get your baby or toddler down to sleep faster and help them stay asleep longer.
Scroll down to learn the best sleep hacks for babies and toddlers.
11 Sleep Hacks for Babies and Toddlers
Whether you feel like you’ve tried everything or you have no clue what to do from the jump, try as many of these hacks as you need.
At last, you’re bound to find something that works for your child. If not, be sure to consult with her pediatrician about the sleep issue.
1. Look for signs of irritated skin
If your baby is having a hard time falling asleep, the first thing to do is look at their skin for signs of irritation. Sometimes, dry, itchy, irritated or painful skin keeps your baby awake. Check their diaper for a rash and then look for any signs throughout their body that there’s irritation on their skin. You can also check their fingers and toes for any hair that may be wrapped around them.
Shampoo & baby wash / Massage oil / Diaper cream
2. Give your baby a gentle oil massage
Massages are relaxing for babies just as they are for adults. While your newborn doesn’t need any deep tissue work done, a very gentle massage of their muscles from head to toe can signal their body to relax. In fact, a soothing massage with oil after a bath can lower your baby’s heart rate and reduce the release of stress hormones that keep her awake.
A baby oil that incorporates essential oils like lavender oil or chamomile oil offer aromatherapy to help soothe your baby and promote better sleep.
- After your baby’s bath, lay them down on their back in a warm room with just a diaper on.
- Apply some baby oil to your warm fingertips and softly rub the oil into your baby’s shoulders, chest, and down their arms. Rub it smoothly along their belly, onto their thighs and down the rest of their legs. Use your palm to massage slowly in circular motions on larger muscles like the quad, hamstring or calf.
- Take your baby’s foot in your hand and gently rub and squeeze it for a massage. If your baby retracts their foot, then stop, but if not then they’re enjoying it and benefiting from reflexology.
3. Use the 3 “S’s” tosoothing your infant to sleep
Swaddling your baby mimics the feeling of being inside the womb, with almost no room to move. You can learn how to use swaddling blankets to wrap your baby up, or you can use a swaddling “sack” for your baby that helps you Velcro them up more conveniently.
Available in more prints
Your mouth will get pretty tired after a while of “shushing,” but anything that makes a white noise sound can work. Parents swear by the Baby Shusher which is a portable white noise machine that makes rhythmic shushing sounds similar to those your baby heard in the womb, so incorporating it into their sleep routine is calming.
As you cradle your baby in your arms, try different movements and see how she responds.
Sometimes walking around the room will lull her to sleep, or swinging her side to side in your arms or in a newborn sway swing will do the trick. Or, rock her in a rocking chair in a forward and backward rocking motion, with her body lying sideways across your lap or against your chest. This way, be able to sit down as you soothe your baby and give your back a rest.
4. Dress your child in breathable sleepwear
As a general rule of thumb, babies need one extra layer of clothing than adults. They also need to be dressed in clothing that is going to help regulate their body temperature. Materials like sustainably produced bamboo rayon, pima cotton and organic cotton work best.
Available in more colors
Available in more prints
Available in more colors
TOG Rating 1.0
5. Reduce stimulation before bedtime
Babies easily become sensorily overstimulated, with everything in the world being brand new to their eyes and ears.
The brain is only triggered to make the body feel sleepy when melatonin (a neurotransmitter) is released. However, the blue light emitted from screens has an inhibiting effect on melatonin release.
If your baby and/or toddler is exposed to TV screens or mobile device screens, keep them away or turned off each night 2 hours before bedtime. This limits the blue light your baby takes in from the screen, which can disrupt the hormones that regulate her sleep-wake cycle.
Avoid excessively bright lights in the home 2 hours before bed, too. Make use of any dimmer lights you have in your home, or just turn off some of your lights to reduce the brightness.
Here are some tips for letting your baby’s senses unwind before bed:
- Dim the lights
- Put your phone on silent
- Avoid music and play white noise
- Keep toys and screens out of sight
If your tot needs something to wind down, try the screen-free story telling machine from Lunii or a nice book!
6. Follow the same routine every night
Doing the same thing in the same order night after night trains your child’s brain and body to get ready for sleep when the night-time routine begins.
Rather than wait for your child’s cues such as rubbing their eyes or yawning, start the bedtime routine at the same time every night. After a few weeks, your child will be asleep easily by the end of the routine. You might start with bath-time, then a baby oil massage, and then after getting dressed, move on to reading books. Then, sing a bedtime song or start the white noise. Whatever it is, do it in the same pattern every time and your little one will know what to expect.
Put all of the kids to bed at the same time.
Excluding the teens, try to have all siblings going down at the same time. When it’s bedtime for one and for all, it can be easier for your kids to transition to bed as a group. While it may seem chaotic to have everyone going through their bedtime routine at the same time, it does help the younger kids to have older kids going to bed when they are.
Besides, it’s a lot less chaotic than protesting little ones who want to stay up with the older ones, or older kids being too loud for the little ones to sleep. When everyone’s going to bed, it feels like more of an event, and none of your children feel alone in going through the process.
7. Diffuse essential oils
Essential oils contain the medicinal compounds of various plants in their most concentrated forms. The active therapeutic molecules in essential oils are highly volatile, which means they quickly evaporate into gas. These are the molecules you smell when you open a bottle of essential oil. As they evaporate as gas and release their odor, they also release negative ions, antioxidants and plant compounds with medicinal effects. For example, chamomile oil produces a calming, sedative effect that can help children relax and fall asleep.
Incorporate soothing essential oils into your baby or toddler’s nap and bed routines by using a diffuser. A diffuser emits negative ions into the air, helping to clear the air of airborne allergies. It also puts out the soothing compounds inside essential oils for your baby to safely inhale from wherever she is in her nursery.
8. Supplement with Vitamin D
Vitamin D is probably best known for building strong bones. However, it also plays a crucial role in the brain’s sleep-wake cycle. Insufficient vitamin D levels can wreak havoc on sleep-wake patterns in your child, causing them to have trouble falling to sleep. Supplementing with vitamin D is a safe and effective way to prevent this.
If you’re breastfeeding your baby and neither your or your baby is supplementing with vitamin D, then your baby could be at risk for vitamin D deficiency. You can find vitamin D3 drops suspended in an MCT oil base and no other added ingredients. Give this supplement to your baby to ensure they’re getting this essential nutrient.
9. Calm with chamomile
Chamomile is best known as a tea, but you can also find it as an alcohol-free tincture that might help your child settle down to sleep. As a mild sedative, chamomile helps the nervous system relax. If your baby has gas, constipation or another source of stomach discomfort, chamomile tincture can also help her by soothing intestinal inflammation. If your older baby or toddler is drinking water, you can even try giving her some chamomile tea at night instead of water.
10. Nourish them before bed
Often, the key to a long night’s sleep is a full tummy. Feed your baby milk as part of your routine in putting her down to sleep. Once your baby can eat rice cereal or baby oatmeal, start giving it to her at night around the same time—ideally, about 30 minutes before she goes to sleep.
Toddlers also need a solid bedtime snack to hold them through the night. You could offer a yogurt smoothie, some crackers with cheese, or whatever healthy snack your child enjoys. With a settled stomach, the waves of sleep can come on more easily. Plus, your little one won’t get up as frequently for night feedings.
11. Use a smart baby monitor
Called one of the “Best Inventions of 2018” by TIME Magazine, the Nanit Plus smart baby monitor does double time as a sleep coach by tracking your baby’s movement and sleep from a high definition bird’s eye view. By monitoring the room temperature, how many times a parent had to go in, how long it took your baby to self soothe and other crucial sleep stats, the Nanit works with its app to give you insight into your baby’s sleep patterns so that you can make the necessary adjustments to improve them.
Designed to work directly with your phone or tablet, you don’t need a parent monitor to hear or see how your baby is sleeping. Background audio even lets you hear your baby while in other apps, or when your screen is locked. There’s also a two way microphone that lets you speak or sing right through your app.
Also available as a Floor Stand
Sleep is so important to your little one’s developing mind and body.
If your baby and/or toddler is having any sleep issues, early intervention is key. When bedtime troubles go on without solutions, children start to develop anxiety around bedtime, and it makes the problem worse.
Helping your child get the sleep they need can make all the difference for them and for you! The more tricks or “hacks” you try, the more chances you have of finding what works for your baby.
Hopefully we’ve helped you out with these tips. Still, the biggest thing is to get down a routine and stick with it. If your little one still struggles with sleep, be sure to talk with your pediatrician about it. | <urn:uuid:3a3db4b5-05aa-4e2d-90df-562b24e146b4> | CC-MAIN-2022-33 | https://www.thetot.com/mama/11-sleep-hacks-for-babies-toddlers-to-help-them-fall-asleep-stay-asleep/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00474.warc.gz | en | 0.942912 | 2,743 | 1.671875 | 2 |
As promised, here is the tutorial outlining how I made the felt ice cream’s for Immy’s ice cream shop.
You will find the downloadable template here.
1. Cut out felt pieces for scoop and cone using template. I used pinking shears to cut around the top of the scoop and along the top of the cone shape, just to add a little further detail.
2. Attach velcro dots to base of scoop and top of cone. These were self adhesive spots but I also machine sewed over them to strengthen the bond as I do not find that the self adhesive ones work that well on fabric, you could also use a spot of PVA glue or handsew them into place.
3. To make the cone: Working about 1 cm from the top edge of the cone base, start stitching the top of the cone into place. In the photo you can see I started about 1 cm inside the edge and I am using a small backstitch. Use clear or matching thread obviously, I just used the red for illustration purposes.
4. Ensuring that you keep the distance from the top of the cone base even, continue to stitch around the cone top.
5. Once you get all the way around, the two sides of the cone base will overlap.
6. Stuff the cone with wadding to form the correct shape, overlap edges slightly and pin together.
7. Stitch into place. That is the cone done.
8. To make scoop: Working approx. 1 1/2 cm from the edge of the scoop top, start stitching the scoop bottom into place using a small back stitch. Every five to six stitches make a small pleat in the scoop top felt and stitch into place. Be careful to maintain an even distance from the edge of the scoop top.
9. Continue stitching until 3/4 of the way around the scoop. Stuff the scoop with wadding.
10. Continuing in the same manner, stitch the opening closed. Voila!
And that’s it, a completed ice cream cone and scoop for your ice cream shop!
If you missed our ice cream shop tutorial, visit it here. | <urn:uuid:32c82b89-8729-4302-bd3b-fe726f6db737> | CC-MAIN-2017-04 | http://childhood101.com/2009/12/felt-ice-cream-tutorial/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00387-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.926606 | 452 | 1.5625 | 2 |
Level Up is a proven blueprint for students ages twelve and up who have the ultimate goal of improving their overall results in grades and sports, as well as paving a path to an exciting and brilliant future.
Read also7 Minute Superhuman
WARNING: Your Life Needs To Change...Whether you know it or not, your life is subpar. I don't say that to point fingers or anything. But it's true. Your life is not nearly as great and happy as it could be. As it should be. Don't believe…
After fifteen years of researching industry experts and leaders, Andrea Samadi has put all of these SUCCESS STRATEGIES in one place using the most current brain research and neuroscience techniques. This book will give your teen or young adult the SUCCESS TOOLS they will need to thrive and succeed in this ever-changing world.
About the Author
Andrea Samadi, a former middle school teacher, has spent the past fifteen years researching some of the most brilliant minds on the planet. She participates in ongoing mentoring featuring some of the top neuroscience researchers in the country and has developed an online course that inspires and motivates students to excel with their academics as well as their personal lives, using the most current brain research and neuroscience techniques. | <urn:uuid:53f42ed1-b9cb-4f06-9fcb-945d1f481db3> | CC-MAIN-2016-44 | http://www.mamzelle-deybow.com/fb2/online-epub2-MBR-level-up-a-brain-based-29125.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719215.16/warc/CC-MAIN-20161020183839-00200-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.949586 | 260 | 2 | 2 |
The No Footprint House (NFH) is located at the edge of the vast tropical rain forests along the western coastline of Costa Rica. Placed in a humid tropical climate, the building responds to its surrounding habitat by passive climate control through natural ventilation and solar shading.
The NFH is organized around a central service core, which contributes to the efficiency of space, assembly and maintenance. Additional furniture pieces are “plugged” into the double-layered envelope in-between the vertical interior structure and the inclined outer façades. The function of the oblique is to decrease the direct impact of sunlight and precipitation, it protects the elevated floorplan from overheating and splashing water. Façade panels can be opened or closed individually in order to regulate views and exposure, augment or reduce air flows, as well as to increase privacy and security. Various layers of glass sliders and “curtain walls” create further protection for the private rooms of the house. They convert open into closed spaces and play with the indoor-outdoor dynamic of tropical architecture.
The house in Ojochal is based on a larger toolbox of residential typologies. It was prefabricated in the Central Valley of Costa Rica and transported to the target location overnight and on one single truck. Designed as a prototype for serial production, the house creates valuable experience for differently sized building typologies that can be auto-configured with regards to their materialization and desired level of services. The client can choose from a larger catalogue of pre-selected components for sustainable construction, the first of its kind in Central America. The efficiency of building design and logistics allows for the product to be offered at affordable cost, the diversity of options caters for a broad customer segment. The NFH seeks integral sustainability in terms of its environmental, economic, social and spatial performance.
Project Credits – Lead architect: Oliver Schütte / A-01 Design team: José Pablo González, Mauricio Rodríguez, Misael Rodríguez, Ronald Carvajal Soto / A-01 Typology research: Marije van Lidth de Jeude / A-01 MEP engineering: Pablo Mora / Consost Structural engineering: Rafael Cañas / Ingeniería Cañas Construction: Hernán Mora / SLO Studiolocal Photography: Fernando Alda / Fernando Alda Fotografía Documentary: Soren Pessoa, Valeria Romero / Manduca Audiovisual Marketing: Luuc van Wezel / Villas Gaia | <urn:uuid:33292259-16a4-4f06-8671-20277250e820> | CC-MAIN-2022-33 | https://architizer.com/projects/no-footprint-house-nfh/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572304.13/warc/CC-MAIN-20220816120802-20220816150802-00478.warc.gz | en | 0.893596 | 528 | 1.640625 | 2 |
Differences in the reporting units of data from diverse sources and changes in units over time are common obstacles to analysis of areal data. We compare common approaches to this problem in the context of changes over time in the boundaries of U.S. census tracts. In every decennial census many tracts are split, consolidated, or changed in other ways from the previous boundaries to reflect population growth or decline. We examine two interpolation methods to create a bridge between years, one that relies only on areal weighting and another that also introduces population weights. Results demonstrate that these approaches produce substantially different estimates for variables that involve population counts, but they have a high degree of convergence for variables defined as rates or averages. Finally the paper describes the Longitudinal Tract Data Base (LTDB), through which we are making available public-use tools to implement these methods to create estimates within 2010 tract boundaries for any tract-level data (from the census or other sources) that are available for prior years as early as 1970.
Keywords: 2010 Census; areal interpolation; census geography; census tract; population interpolation. | <urn:uuid:adde21b7-f7d1-480c-85e5-a8b8505590a7> | CC-MAIN-2022-33 | https://pubmed.ncbi.nlm.nih.gov/25140068/?dopt=Abstract | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00276.warc.gz | en | 0.924659 | 225 | 2.3125 | 2 |
|03-11-2013, 03:07 AM||#1|
Join Date: May 2011
Location: JAPAN (US expatriate)
Device: Sony PRS-T2, ADE on PC
Twain, Mark: Mark Twain's Notebook. v1. 11 Mar 2013
Mark Twain’s NOTEBOOK ~ Journal Entries, 1865 - 1908
by Mark Twain (Samuel Langhorne Clemens) (1835 – 1910)
Edited by Albert Bigelow Paine (1861 – 1937)
First published 1935
Mark Twain is most noted for his novels, The Adventures of Tom Sawyer (1876), and its sequel, Adventures of Huckleberry Finn (1885), the latter often called "the Great American Novel." Among dozens of titles, some of his works include The Innocents Abroad, A Tramp Abroad, Roughing It, Life on the Mississippi, The Prince and the Pauper, A Connecticut Yankee in King Arthur's Court, and many more.
The “Notebook” is a compilation of journal entries from many notebooks filled during 43 years of Twain's writing career, with foreword, afterword, and copious commentary by the editor, Albert Bigelow Paine, Twain’s official biographer and literary executor.
These jottings furnish a tantalizing record of Twain’s thoughts and fancies, and glimpses of the joys and sorrows of his life. Here we can observe the beginnings of the creative process – many of the seeds planted in those notebooks sprouted into published essays, travel books, and novels. An abundant supply of delightfully Twainian maxims and philosophical comments are sprinkled throughout.
Editorial Notes --
Formatted curly quotes, emdashes, diacritics, italics. Corrected numerous OCR errors, minor punctuation and spelling changes for consistency. Cross-linked chapter end-notes to source paragraphs, cross-linked chapter titles to html table of contents. Embedded decorative font for titling.
The source was a truly hideous OCR scan. I would be most grateful for reports of errors.
Last edited by GrannyGrump; 03-11-2013 at 03:10 AM.
|diary, journal, memoirs, memoranda|
|Thread Tools||Search this Thread|
|Thread||Thread Starter||Forum||Replies||Last Post|
|Short Fiction Twain, Mark: At Length ~ Collected Novelettes & Essays. v3. 05 January 2015||GrannyGrump||ePub Books||7||02-02-2015 06:03 AM|
|Short Fiction Twain, Mark: In Brief ~ Collected Short Works. v2. 11 June 2014||GrannyGrump||ePub Books||11||06-12-2014 04:45 PM|
|Other Non-Fiction Twain, Mark: At Large ~ Selected Travel Correspondence. v2. 11 June 2014||GrannyGrump||ePub Books||3||06-11-2014 10:51 AM|
|Biography Twain, Mark: Chapters from My Autobiography.v1. 21 Feb 2013||GrannyGrump||ePub Books||0||02-21-2013 02:00 AM| | <urn:uuid:e64ec94f-f05d-4b27-a4ab-02513ffca6fe> | CC-MAIN-2017-04 | https://www.mobileread.com/forums/showthread.php?t=207703&goto=nextnewest | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282926.64/warc/CC-MAIN-20170116095122-00393-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.82827 | 688 | 1.679688 | 2 |
Derbes Falgoust Commercial Real Estate
Mortgage Default Risk Hits Record HIGH
In a disturbing new finding from the American Enterprise Institute (AEI), the risk of purchase loan defaults under stressful economic conditions hit an all-time high in April. The "flash release" put out on Monday showed the National Mortgage Risk Index (NMRI), climbed to 11.89 last month, meaning that nearly 12 percent of loans would be at risk of default in the event of another serious economic downturn. The figure is up from 11.5 in the previous month.
The report said the spike in risk is "due to FHA, which had higher market share and increasing loan level risk." The volume of FHA's home purchase loans was up 36 percent over March. Because more of the mortgage loans last month were FHA loans, the overall risk level in the market increased, as FHA loans are generally considered riskier than conventional loans. The NMRI for FHA loans was 25.12 percent, suggesting that nearly a quarter of the new FHA loans would be at risk if another economic downturn occurred. The same measure for GSE loans (primarily Fannie Mae and Freddie Mac) was just 5.93 percent. AEI suggests that as long as that number remains below 6 percent, it is "indicative of conditions conductive to a stable national market." So, while not all the news was bad, most of these measures are either already in dangerous territory or at least near it.
While new Qualified Mortgage (QM) rules have attempted to lessen the risk of another real estate collapse by demanding higher credit standards for borrowers, AEI suggests the new rules have had little effect on making the market any better, as both FHA and GSE loans remain exempt from rules that establish a borrower must have a maximum 43 percent debt-to-income ratio. This means that while a rule was established that no more than 43 percent of a borrower's monthly income should go towards debt costs (housing debt plus other debt like car loans, credit cards, etc.), those rules are ignored in many of the new loans being made today. | <urn:uuid:59993276-fa7d-49bd-8d94-090563ee6c6e> | CC-MAIN-2022-33 | https://www.derbesfalgoust.com/news/entry/2014/05/19/mortgage-default-risk-hits-record-high | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00477.warc.gz | en | 0.974429 | 433 | 1.546875 | 2 |
We report a case of fetal Wolff-Parkinson-White (WPW) syndrome diagnosed prenatally by magnetocardiography (MCG). At 32 weeks' gestation, the fetus was diagnosed to have a paroxysmal supraventricular tachycardia by ultrasonography and direct fetal electrocardiogram (ECG). Transplacental fetal therapy by maternal oral administration of propranolol resolved the fetal tachyarrhythmia. Although the wave forms of the fetal MCG at 32 weeks' gestation were normal, the fetal MCG at 35 weeks' gestation showed a short PR interval and a long QRS complex duration with a delta wave, indicating WPW syndrome. The findings of the fetal MCG were confirmed by the postnatal ECG. MCG made the prenatal diagnosis of WPW syndrome possible.
- Prenatal diagnosis
- Supraventricular tachycardia
- Wolff-Parkinson-White syndrome
ASJC Scopus subject areas
- Pediatrics, Perinatology, and Child Health
- Radiology Nuclear Medicine and imaging
- Obstetrics and Gynaecology | <urn:uuid:e507e538-210d-4221-ad59-92f8f434a480> | CC-MAIN-2022-33 | https://okayama.pure.elsevier.com/en/publications/a-fetal-wolff-parkinson-white-syndrome-diagnosed-prenatally-by-ma | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00074.warc.gz | en | 0.798227 | 271 | 1.9375 | 2 |
Early Childhood School
18 months - 2 years old
2-3 years old
3-4 years old
4-5 years old (Pre-Kindergarten)
At ISA, the Early Childhood School starts with children at 18 months of age and is dedicated to a language-emergent experience, focusing on the unique learning and social/emotional needs of the younger child. Our program is designed to welcome students throughout the school year, with three options in PK1 to PK3 to ease the transition. These options are 5 full-day, 5 half-day, or 3 full-day programs.
The first steps are understanding the target language, and then moving to the use of the language during everyday activities. Our PK1 through PK4 classes are full immersion in the target language.
Our program sets the foundations for reading, writing, and problem-solving. The skills acquired are gross and fine motor development and the ability to concentrate, to control behavior, to analyze, to communicate, and to socialize. We feel that the early years should be positive and fun, while enriching children’s knowledge and understanding of the world and their place in it. We see parents as important partners in this effort.
Supply List 2022-2023
If you do not wish to order from Edukit please see supply list below.
Our French and Spanish Programs are organized into the following six domains:
Our daily schedules include center-based instruction called “workshop” or “atelier” or “taller”, which encourages cooperative learning while building pre-academic skills with hands-on activities.
During a typical day, all children participate in large and small group activities, games, free play, songs, stories, quiet time (naps for PK1, PK2, and PK3), outdoor recess, snack, and lunch.
ISA follows a consistent schedule. In addition to being a licensed childcare facility, we are a fully accredited, non-profit, independent international school that offers a structured curriculum, and follows a traditional school calendar for all students beginning at age 18 months.
For more information about the curriculums, please visit the website of the French Ministry of Education / Le Ministère de l’Education Nationale (look in “Les Instructions Officielles”) or the Spanish Ministry of Education / El Ministerio De Educación y Ciencia.
Choosing a French Education
Enrolling your child in a French school from “maternelle” onward is giving him or her the chance to grow harmoniously in a caring environment, perfectly adapted to his or her needs. It also means giving your child the opportunity to start learning languages progressively and efficiently. Attendance at an ecole maternelle prepares children well for future school life learning, basic numeracy and literacy, as well as life skills such as teamwork, respect for others, and imagination. Children are also introduced to art, sciences and physical education. Download this flyer in Spanish and Englise to learn more. Why don’t you come and see it for yourself? | <urn:uuid:32904388-9286-4450-a0a0-5e63f92fae32> | CC-MAIN-2022-33 | https://isaz.org/early-childhood-school/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00278.warc.gz | en | 0.9435 | 658 | 2.046875 | 2 |
Menstruation is a normal, healthy part of being a woman. So why do so many girls feel embarrassed or ashamed when it comes to having their periods? Why might they hesitate to talk about or ask questions about their experiences? One way to understand why girls often feel that their periods must be “kept hidden” is to look at the messages about menstruation that women have received over time.
In ancient times, menstruating women were considered to be “dirty and toxic” or even “possessed by a demon” (Knight, 1991). If you have ever heard menstruation referred to as “the curse,” then you may have a sense of how long-lasting these messages have been! Other myths that have persisted over time include those that suggest that girls are particularly weak or fragile during their periods; that menstruation is more like an illness than a sign of health. For instance, an educational packet from the 1930’s told girls to avoid hot or cold baths, swimming, horseback riding, lifting heavy weights, “athletic dancing,” or strenuous household chores during menstruation (Delaney, 1988). Though these kinds of “rules” might seem crazy to you now, for many years they were widely accepted as being true.
If you asked your mom or grandmother about the kinds of messages they received about their periods when they were growing up, they might recall that periods were treated as a “hygiene crisis.” One advertisement from the 1930’s suggested that “ultimate humiliation would be any indication that (a girl was) menstruating” (Houppart, 1995). Girls were told to focus on keeping their periods hidden by ensuring that their bodies and clothes remained “clean,” as though there were something unnatural and offensive about menstrual blood. As feminine hygiene products such as pads and tampons became widely available, advertisements for these products reinforced the idea that menstruation was dirty and shameful -- a secret to be kept at all costs.
Even today, you may notice that you don’t hear the words “blood,” “bleed,” or “vagina” in advertisements for pads and tampons. Instead, you’ll often find that ads play on girls’ fears that others will find out they have their period, or that suggest that, by using the right product, that you can avoid having your periods interfere with your life and activities. The underlying message is that periods are shameful, talking about them is taboo, and that any evidence of bleeding should be carefully hidden.
These myths don’t have to continue to define girl’s experiences of their bodies and their periods. By talking openly about your experiences with your girlfriends, or with younger girls, you contribute to a new set of messages -- that periods are healthy, positive, and natural. You can help create a new set of norms, ones that empower girls with access to information about their bodies, and with opportunities to make decisions based on this information, rather than outdated myths and fears. These conversations between girls and their friends, sisters, mothers, teachers, and doctors can play an important role in creating a new, healthy, positive attitude about periods.
Delane y, J., Lupton, M. J., & Toth, E. (1988) . The curse: A cultural history of menstruation.
(rev. ed.) . Urbana, IL: University of Illinois Press.
Houppert, K. (1995, February 7). Pulling the plug on the sanitary protection industry. Village Voice.
Knight, C. (1991). Blood relations: Menstruation and the origins of culture. New Haven, CT: Yale University Pre ss.
When I was a teen my father referred to my period as "the illness." I adapted that nickname myself for years. Now I hate that name as it implies that there is something wrong with me when in fact what is happening is perfectly normal. What nicknames have you called your period?" - LauraMartin
Do not include personal information within comments including name, age, location. | <urn:uuid:1cfa2dc8-aeca-42e6-af07-a4b376dad704> | CC-MAIN-2016-44 | https://www.ubykotex.com/en-us/periods/period-advice/a-history-of-menstrual-messages | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721174.97/warc/CC-MAIN-20161020183841-00281-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.97288 | 857 | 3.453125 | 3 |
Be the Speaker You’ve Always Wanted To Be
Public speaking is the number one fear in the United States. Death is number five. If the thought of speaking in front of a large audience makes you sweat, you are not alone. Mimi Donaldson understands your fears.
Your success as a professional depends on your ability to speak clearly and powerfully. Mimi is a superstar in the speaking business, keynoting with celebrities for audiences of thousands. Her rare combination of sophisticated humor and solid content makes her one of America’s most popular speakers. She has created speeches for executives, celebrities, and entrepreneurs. She was the Pitch Coach for the contestants on ABC’s American Inventor, the TV reality show. And now she can be YOUR personal speech coach for your elevator pitch, marketing presentation, and full keynote.
- Learn to convert your nervousness to positive energy so you look and sound confident.
- Identify the clients’ problems that you are uniquely qualified to solve.
- Create your speech with a step-by-step presentation outline based on your listener’s frame of reference.
- “Find the funny” in your speech, because when people are laughing, they are buying.
- Learn to handle questions with grace and control. | <urn:uuid:f24e25f9-2484-44a0-9620-78ea260f29df> | CC-MAIN-2016-44 | http://www.mimidonaldson.com/coaching/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718296.19/warc/CC-MAIN-20161020183838-00539-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.93841 | 264 | 1.554688 | 2 |
Regional Climate Centres Implementation in South America
At the fifteenth session of Regional Association III (South America) in September 2010 discussions were held on the establishment of three Regional Climate Centres (RCCs) / RCC-Network structures to cater to the needs of the northern, southern and western sub-regions of South America.
In April 2011, WMO organized a Consultation Meeting on Implementation of RCCs in South America. The Meeting agreed to establish one RCC and two RCC-Networks in RA III in different sub-regions:
After successful completion of demonstration phase, RCC-WSA hosted by the Centro Internacional para la Investigación del Fenómeno de El Niño (CIIFEN) was officially designated as RCC-WSA-CIIFEN at the Seventeenth Session of the World Meteorological Congress, in May 2015.
The Regional Association commended the efforts undertaken by Argentina in collaboration with Brazil which are currently implementing RCC-Network in demonstration phase, for the sub-region of Southern South America, the RCC-Network-SSA.
The Association also welcomed the offers of Brazil, in collaboration with French Guyana to establish the RCC-Network-NSA.
Regional Climate Outlook Forums in RA III
Two RCOFs, namely Western Coast of South America Climate Outlook Forum (WCSACOF), coordinated by CIIFEN, and Southeast of South America Climate Outlook Forum (SSACOF), under coordination of RCC-Network-SSA, have sustained their operations for more than a decade in RA III.
|©2016 World Meteorological Organization, 7bis, avenue de la Paix, CP No. 2300, CH-1211 Geneva 2, Switzerland - Tel.: +41(0)22 730 81 11 - Fax: +41(0)22 730 81 81| | <urn:uuid:ebca7940-d026-4a4c-a614-753ca4c7ab10> | CC-MAIN-2017-04 | http://www.wmo.int/pages/prog/wcp/wcasp/RCC-SouthAmerica.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00566-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.886893 | 392 | 2.203125 | 2 |
Throughout the Bible, kings were the leaders of civil government. Today, most nations no longer have a king, but governments still have “shepherds” who execute the various powers found in government. Shepherds oversee the people of God, both in the church (Acts 20:28) as well as nations (Jeremiah 23:1).
God has raised up shepherds in His creation. The shepherd is essential, often unliked, and as a result has the most difficult job in the world. The shepherd’s role is to guide sheep who do not wish to be guided to the path of life. They are a guide, a guardian, and a protector. God calls His shepherds to lay down their life for their sheep, even when the sheep do not notice and will seldom thank them for it. The shepherd rarely looks out for his own interests, but for the interest of others.
God’s institution of government also has shepherds. That role traditionally rested with a king as lawmaker, judge, and executive. In America, these roles rest with U.S. Congress and state legislatures, the president and governors, and supreme court justices. These are America’s shepherds of government.
The Church Ambassador Network wants to connect pastors, who are the shepherds of the Church, to governing authorities, who are the shepherds of government. It is therefore important to identify who fulfils the roles of the king, the shepherd, in our government. As an example, we will look at the powerful kings in the book of Daniel, identifying the six primary powers of the king. Whoever holds these powers are the shepherds of government.
The roles of king in America are found in congressmen and legislators, the president and governors, supreme court justices, and the people. Other examples in Kansas can be found in 309 school boards, 607 incorporated cities, and 105 counties. The Church is called to be the moral compass and guide to all of them. | <urn:uuid:c3e83d76-8c0e-4d06-9437-755ea0253562> | CC-MAIN-2022-33 | https://can-ks.org/foundational-principles/the-six-powers-of-the-king/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00273.warc.gz | en | 0.968685 | 419 | 3.65625 | 4 |
So much Roma, so little time-a! Even with a grocery list sized checklist of monuments and sights to see in the Eternal City, you can’t leave Italy without at least one foodie experience. Food is a huge part of the culture, and one of the best souvenirs you can take home are your new skills whipping up authentic Roman pizza and pastas from scratch in a lot less time than you probably think. That’s why when I got to design my Rome and Venice trip with Monograms Travel, a Rome pizza and pasta making class was top of my Italian bucket list.
The excursions were actually two separate excursions we could select from Monograms’ various options of things to do in Rome. Both ended up being with the same cooking school, located in a beautifully restored palazzo just around the corner from Piazza Navona. Not only were the instructors knowledgeable and really fun, the atmosphere was oh-so-Italian and the resulting meals were some of the best we’ve had in Italy. And that’s saying something, considering we lived in Italy for seven years.
Roman Pizza and Gelato Making Class
Pizza and gelato are some of Italy’s best creations. And though Naples is credited as the inventor of modern pizza, the history of pizza goes back much, much further to ancient Rome. The Romans were eating a type of flatbread with toppings added, perhaps even at the Colosseum during gladiator games since paintings depict vendors selling food and drinks outside.
Though the panis focacius would have been much different than Roman pizza today, Rome still has a prominent place in the history of Italian pizza. The word pizza was first documented in Gaeta, a seaside town in Lazio and not far from Rome, in 997.
There are two types of pizza in Italy: Neapolitan and Roman. The major difference is in the dough, with Neapolitan dough containing more moisture and never any olive oil or sugar. Roman style pizza does have sugar, olive oil or both and is cooked a little crispier, so it can handle more toppings on it than Neapolitan. But the great thing about Italian pizza is the simplicity, and just two or three toppings is plenty for a delicious pizza.
When in Rome! We were making Roman style pizza and, of course, started out with the dough. Not much is needed to make pizza dough: flour, water, yeast, salt and sugar. I’d bet you regularly have most of the ingredients as staples in your pantry.
Our cooking class group kicked things off with a glass of Prosecco and some some suppli, a Roman version of Sicily’s arancini, that our instructors had freshly fried. There would be no hungry chefs in this Roman cooking class.
Before we got to making the pizzas, dessert was the first order of business. We were making a traditional Italian gelato, which you don’t need any sort of machine to make. You just need a little time for it to freeze.
A vanilla gelato, which you could top with fruit, syrups, chocolate sauce or a caramel is shockingly quick and easy to make. Best of all, it’s just four ingredients: cream, egg yolks, sugar and vanilla extract. It’s such a simple dessert, which is easy to impress with.
It’s as simple as separating 4 egg yolks, then mixing the yolks with 4 tablespoons of sugar until the yolks are a pale yellow color. We then folded in 500 milliliters of fresh cream. Add 1 teaspoon of vanilla extract, then freeze until firm. If you’re in a hurry like we were, the thinner you spread the gelato out, the faster it will freeze.
We began with activating the fresh yeast, then mixing it with the flour. A dough starts to form in the bowl, and then we began mixing in the salt. Then we kneaded the dough in to a ball for about 5 minutes. The dough does need to rise for at least 24 hours, so our instructor pulled out dough that had already risen for us.
We got a lesson on how to work the dough. It can get sticky and if you overwork it, you can make holes in the dough. So you want to gently shape it in to a round, thin pizza using the palm of your hand.
Aside from waiting for the dough to rise at least 24 hours, the pizza dough only takes about 15 minutes to mix and roll out. It’s really not as time consuming as you might have thought – or at least as I thought.
And you don’t go through making your own pizza dough to use a store bought pizza sauce. In just about five minutes, we whipped up a homemade pizza sauce using canned peeled whole tomatoes, fresh basil, oregano and a little salt to taste.
Roman pizzas aren’t saucy and just a spoonful of sauce gently spread out over the dough is plenty.
With the sauce spread on our pizzas, we sprinkled a handful of mozzarella on the pizzas and had a selection of toppings to choose from. With Italian pizzas, less is always more. I topped mine with just some mushrooms and sausage, which was always one of the my favorites to order from our local pizzeria.
inRome Cooking School has pizza ovens, so the pizzas cook quickly for just about 3 – 5 minutes at 800°F – 900°F. The entire group’s pizzas were ready in just a few minutes, and we all sat down together to enjoy them. With wine, of course.
I’ve eaten a lot of pizza in Italy, and this was one of the best I ever had. And aside from my own kitchen not being equipped with a pizza oven, the pizzas were really simple to make. It’s definitely a recipe I can easily repeat at home and preheating a pizza stone helps to achieve similar results you get with an actual pizza over.
Roman Pastas and Sauces Private Cooking Class
Unlike my Roman pizza making class, which was a small group of some Monograms guests and some others that booked with inRome Cooking Classes directly, my Roman pastas and sauces class was a private class. And I was particularly excited about learning to make some of my favorite Italian pasta dishes: cacio e pepe, carbonara and amatriciana.
As much as I adore France, really good Italian restaurants serving a variety of pastas and sauces beyond bolognese and carbonara are lacking. And the selection of pasta sauces at the grocery store is disappointing. I got spoiled when we lived in Italy with a selection of made from scratch egg pastas and delicious regional sauces to top it with available right in the grocery store.
Now for a really good bowl of pasta, I need to whip it up myself…from scratch.
Like the pizza, I was surprised at how easy it was to whip up fresh egg pasta. I’ve taken pasta making classes before in Italy, but they’ve always been focused on the pasta types and took a lot longer since we did everything completely by hand.
But at inRome Cooking, we used hand crank pasta machine to roll out and cut the dough into a couple different shapes of noodles best suited for the three Roman sauces we were making. And the machine is inexpensive enough (under $50) to have one in your arsenal of kitchen gear at home.
After rolling the dough out in to flat sheets and just the right thickness with the machine, it was as simple as switching the position of the crank to cut the sheets into pasta noodles. We made tagliatelle, a long ribbon just slighter thinner than fettucine that would be great with the amatricana, and taglionlini, which is similar to spaghetti but thicker and great with the cacio e pepe and carbonara.
Including mixing the ingredients for the dough, rolling it out and cutting it, I had fresh pasta from scratch in about 20 minutes.
Cacio e pepe is one of those Roman pastas that looks and tastes incredibly decadent, but is unbelievably easy to make. Fresh tagliatelle and tagliolini cooks in just 2-3 minutes. Then cacio e pepe is a lot of pepper in some of the pasta water, a heap of pecorino cheese that melts in the peppered water and the cooked pasta stirred in to soak it all up.
Though I haven’t made the pasta from scratch just yet, I’ve already made the cacio e pepe sauce at home with some pecorino I picked up from one of my favorite restaurants that also has a little shop that sells fresh Italian products here in Bordeaux. Once I get a pasta machine, look out!
Once the cacio e pepe was ready, my instructor served up a little for me and little for him and the other workers. There was definitely plenty. I took it in to the 17th century dining room of the cooking school to enjoy.
My stomach got a little break between each of the three Roman pastas, and once I finished my bowl of cacio e pepe we got started on the carbonara. First up was chopping the pancetta, which would be used in both the carbonara and amatriciana.
While we worked on the carbonara, the rest of the pancetta was cooking with some red onions for the amatriciana.
Like cacio e pepe, carbonara is another rich yet easy-to-make Roman pasta that only take a couple of minutes. The sauteed pancetta, some reserved water from the cooked pasta, raw beaten egg and a handful of grated pecorino are whisked together until the sauce thickens and then the pasta is tossed in.
The final Roman pasta was the amatricana, and we added tomato sauce and chili flakes to the onions and pancetta already sauteing on the stove.
Finally, we tossed in the cooked tagliatelle so it could soak up and get coated in the amatriciana sauce.
All I can say is come hungry to this Roman pasta cooking class, because you definitely won’t leave with any room left in your stomach. And as full as I was, it was worth every twirl of pasta and last bite because these were definitely the best I’ve had of all three of these Roman pastas.
Shop This Post
This trip is a project managed by iambassador in partnership with Monograms Travel and other sponsors. However, Luxe Adventure Traveler maintains full editorial control of the content published on this site. As always, all thoughts, opinions, and enthusiasm for travel are entirely our own. This article contains affiliate links. When you shop on Amazon through our affiliate sites, we earn a small commission at no additional cost to you. | <urn:uuid:13112e9a-d41e-407b-aa80-704654737037> | CC-MAIN-2022-33 | https://luxeadventuretraveler.com/rome-pizza-and-pasta-making-class/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571911.5/warc/CC-MAIN-20220813081639-20220813111639-00467.warc.gz | en | 0.964556 | 2,283 | 1.804688 | 2 |
A basic economic principle is that government ought to tax what we want to discourage, and not tax what we want to encourage.
For example, if we want less carbon dioxide in the atmosphere, we should tax carbon polluters. On the other hand, if we want more students from lower-income families to be able to afford college, we should not put a tax on student loans.
Sounds pretty simple, doesn't it? Unfortunately, congressional Republicans seem intent on doing exactly the opposite.
Earlier this year, the Republican-led House passed a bill pegging student-loan interest rates to the yield on the 10-year Treasury note, plus 2.5 percentage points. "I have very little tolerance for people who tell me that they graduate with $200,000 of debt or even $80,000 of debt, because there's no reason for that," said Rep. Virginia Foxx, Republican of North Carolina and the co-sponsor of the GOP bill.
Republicans estimate this would bring in around $3.7 billion of extra revenue over a 10-year period, which would help pay down the federal debt.
In other words, it's a tax -- and one that hits lower-income students and their families hardest. Which is why several leading Democrats, including Senate Majority Whip Richard Durbin, Democrat of Illinois, oppose it. "Let's make sure we don't charge so much in interest that the students are actually paying a tax to reduce the deficit," Mr. Durbin argues.
Republicans claim the president's plan is almost the same as their own. Not true. President Barack Obama's plan would lead to lower rates, limit repayments to 10 percent of a borrower's discretionary income, and fix the rate for the life of the loan.
Meanwhile, a growing number of Republicans have signed a pledge -- sponsored by the multibillionaire Koch brothers' political organization, Americans for Prosperity -- to oppose any climate-change legislation that might raise government revenues by taxing polluters.
It is officially known as the "No Climate Tax Pledge," and its signers promise to "oppose any legislation relating to climate change that includes a net increase in government revenue."
At least 411 current officeholders nationwide have signed on, including the entire GOP House leadership, a third of the members of the House as a whole, and a quarter of U.S. senators.
The New Yorker's Jane Mayer reports that two successive efforts to control greenhouse-gas emissions by implementing cap-and-trade energy bills have died in the Senate, the latter specifically targeted by Americans for Prosperity.
Why are Republicans willing to impose a tax on students and not on polluters? Don't look for high principle.
Big private banks stand to make a bundle on student loans if rates on government loans are raised. They have thrown their money at both parties but have been particularly generous to the GOP. A 2012 report by the nonpartisan Public Campaign shows that since 2000, the student loan industry has spent more than $50 million on lobbying.
Meanwhile, the Koch brothers -- whose Koch Industries ranks among America's worst air polluters, according to Forbes Magazine -- have long been intent on blocking a carbon tax or a cap-and-trade system, which would cut into their profits. And they, too, have been donating generously to Republicans to do their bidding.
We should be taxing polluters and not taxing students. The GOP has it backwards because its patrons want it that way.
Robert Reich, former U.S. Secretary of Labor, is professor of public policy at the University of California at Berkeley and the author of "Beyond Outrage," now available in paperback. He blogs at www.robertreich.org. | <urn:uuid:3df55083-7580-42ae-9a53-3f39cd10432a> | CC-MAIN-2016-44 | http://www.baltimoresun.com/news/opinion/bal-why-republicans-want-to-tax-students-and-not-polluters-20130716-story.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719027.25/warc/CC-MAIN-20161020183839-00301-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.969914 | 760 | 2.46875 | 2 |
I meant to post this sooner, unfortunately just did not get around doing it.
This was a little project of mine to make it for fun (and pretty) for the children in encouraging them to perform more good deeds in this blessed month. It is basically a tree that when they do a good deed a flower blossoms. Below are the steps of making one.
You would need a flower pot, a styrofoam ball, florist foam, stick (I used a dowel) and some pipe cleaner to wrap around the stick. I had all these supplies at home except for the styrofoam ball that I purchased from a dollar store.
You would start by cutting the florist foam into shape so that it fits tight into your chosen flower pot. Then, push the stick through the florist foam making it stand out of the pot. At this point you can wrap some pipe cleaners around the stick if you want to. Lastly push through the styrofoam ball into the other end of the stick till it is about three quarters through.
I stuffed some tissue paper into the base of the tree to hide the florist foam. I also used some sticker letters I had to decorate the flower pot.
To make the flowers, I used a die to cut out flower shapes out of card stocks. Made a little hole in the middle of the flower using a paper piercer and pushed through a coloured toothpick for stem.
There are several other options for this. You can purchase precut flower shapes made out of cardstock or foam at most craft stores. Also you can purchase flower punchers to punch out flower shapes. Here are some sample flower punchers.
The idea is to reward the child a flower for a good deed. The bonus (Insha-Allah) is that there will be a fully blossomed good deed tree to put on the side table by Eid 🙂 | <urn:uuid:d8d0f96d-a83e-4005-ab50-4133c58cedc6> | CC-MAIN-2022-33 | https://muslimlearninggarden.wordpress.com/2011/08/09/ramadhan-good-deed-tree-topiary/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00667.warc.gz | en | 0.952318 | 392 | 1.695313 | 2 |
By Lieutenant Lawrence Heyworth IV, U.S. Navy
In studying leadership, surface warfare officers (SWOs), like their fellow military professionals, gravitate toward histories of extreme heroism in combat. Stories of Colonel John Ripley and the bridge at Dong Ha, Vice Admiral James Stockdale in the Hanoi Hilton, or the courageous crews depicted in The Last Stand of the Tin Can Sailors are useful because abstract concepts are made more tangible in the face of danger. These heroes inspire a sense of duty to which SWOs can relate in their chosen profession. The pitfall, however, is the confusion of valor with leadership. Junior SWOs can be forgiven for feeling that their opportunities for leadership are inconsequential compared with those of their combat-hardened peers in other services. Nothing could be further from the truth.
While most active SWOs have not been called to lead sailors into direct combat, they are still called daily to lead. Such persistent commitment to professionalism and personal development is not only crucial to the readiness of a warship, it can serve as the foundation for heroic leadership. While we hope our sailors and officers are never burdened with harrowing circumstances such as those Stockdale and Ripley confronted, the surface-warfare career model develops leaders who will rise to meet extraordinary challenges.
Observing and Following Leaders: Midshipmen
Commissioning sources provide most midshipmen or officer candidates with their first opportunity to observe military leadership firsthand. Attentive midshipmen should have no trouble recognizing positive qualities in their immediate leaders, many of whom are senior midshipmen. They are afforded time and opportunity for study, introspection, and exercise of leadership, and they are expected to develop a personal style that emulates the positive and effective while consciously avoiding the negative. This process is illustrated throughout James Webb’s novel about the Naval Academy, A Sense of Honor:
The clock ticked over to zero nine-hundred and [Commander] Pratt immediately opened the door from his private office. It was almost comical, thought [Marine Corps Captain] Lenahan, rising to attention with the others, that a man could put so much energy into such wasted routine, while being so absolutely empty of real leadership . . . Lenahan briefly fantasized about the bulky battalion officer leaning against the door inside his office, hand on the knob, waiting for the clock to tick over. Punctuality, the thick brain would be pulsing, as he watched the clock. Punctuality is a key to good leadership. I will be punctual. I will have nothing important to say, but that’s all right. I was exactly on time.1
A midshipman’s moral development is critical to her or his foundation as a leader. Most commissioning sources underscore this through an honor concept or code to which midshipmen are expected to adhere. In addition, most officer candidates are required to take classes in ethics and morality. Direct observation should further cement a midshipman’s moral conduct.
In addition to developing their own leadership ability, they begin to learn and practice active followership. Most officers eventually have the unenviable task of leading a command in a direction that may be correct but will be extremely difficult. It is at such times that active followership becomes important. In the words of Technology, Entertainment, Design speaker Derek Sivers, “The first follower is what transforms a lone nut into a leader.”2 Without the active support of influential members of a group, even the most well-intentioned leaders can find themselves atop a caustic and cynical organization.
Midshipmen and officer candidates at every commissioning source likely hear their campus referred to as a “leadership laboratory”: each stage in pre-commissioning provides fresh opportunities to follow, mentor, train, and lead. This suggests that the period before commissioning is when a leader hones his craft, and once commissioned, he executes. Instead, commissioning should be thought of as a license to learn. Leadership development continues steadily throughout a SWO’s career. Officers are commissioned with different leadership potential, but even the most talented will be quickly eclipsed by less-gifted peers if they do not continually refine their skills.
First-Tour Division Officer: Avoiding “Likership”
The moment a new SWO checks in on board his first ship, he must be completely prepared to set a strong moral example for his division. A sophisticated academic understanding of morality and ethics is unnecessary; junior leaders must simply always do what is right. Entry-level officers who find themselves close in age and life experience to those under their charge will be tempted to practice “likership” in place of leadership. But sailors don’t need another friend; they have plenty to choose from in their berthing. What they need is the very best leader.
Division officers may be initially tempted to always be the nice guy to gain the favor of their subordinates, but sailors deserve better. One division officer learned this when standing watch in an important but often overlooked watch station: after steering. SWOs man after steering as supervisors during restricted maneuvering situations, when local control may be taken at the rudders in the event of a loss of steering from the pilothouse.
Although critical in an emergency, this watch quickly becomes tedious, and the hum of machinery makes it difficult for junior sailors to stay awake. Away from the accountability of senior officers and chiefs, this young SWO’s watch standers let down their guard and began to sleep during the restricted maneuvering situation. Uncomfortable as it was, the ensign insisted they stay awake throughout the watch. Initially they were resentful, but a surprise visit to after steering by the executive officer vindicated the ensign. By being the nice guy and allowing his sailors the easy way out, he would have let them all down.
Upon commissioning, new SWOs are routinely placed in charge of a division of 10 to 30 sailors, some many years their senior. These officers may question if their role can be anything more than figurehead, since they are so inexperienced compared with their senior technicians. On the contrary, this lack of experience forces junior SWOs to tune in to the expert and to support and amplify that person. Division officers learn to recognize talent around them and use it to further their ship’s goals.
They also play a crucial role in translating command-level guidance and long-term vision for individual sailors. Sailors value knowing the why behind orders, and they need to know their role contributes to the mission. A well-informed sailor is a satisfied sailor. This often takes place at morning quarters, when leaders deliver purpose, motivation, and direction. Furthermore, when a division officer has a daily plan, this ensures that sailors are used effectively, and it circumvents perceptions of command disorganization.
Division officers should strive to leave their first ships with good habits of moral leadership, the courage to avoid likership at all costs, the ability to tune into the expert, and the vision to translate command-level guidance to individual sailors.
Second-Tour Division Officer: “Leading Up”
Second-tour division officers transfer into the new command with credibility as they assume their new responsibilities. Expected to have achieved the Fleet standard of knowledge and experience, they will find themselves in a frequent audience with the commanding officer. Department heads will count on their counsel to a greater degree. These officers must learn how to “lead up.” This delicate form of leadership involves steering a senior officer toward the correct course of action through wise counsel or persuasive argument. Leading up never involves deceit; a junior leader discovered withholding information from the chain of command to steer a decision would instantly be labeled dishonest.
Second- tour division officers also maintain many of the same responsibilities they had in their first tour and are able to refine their leadership style. One important aspect of this style is knowing one’s people. Leaders must have personal knowledge of those placed in their care and their motivators. In this process, even more important is sailors’ awareness that leaders cares about their condition. Put more succinctly, “people don't care how much you know until they know how much you care.”3
One second-tour division officer transferred to a new command and conducted an initial interview with an intelligent but underutilized and unmotivated third-class petty officer. Arguably the greatest raw talent in the division, this sailor did not seem to respond to appeals to personal pride, awards, or even the prospect of promotion. It was only through the division officer’s intense effort to know this person that he discovered his “currency,” or what he truly valued in life. The officer persuaded the captain to allow the sailor to miss an important two-week underway to attend a professionally enhancing school. After seeing the support of his chain of command and his shipmates assuming extra watches throughout the underway, the sailor returned to the ship motivated and reenergized, finally realizing those around him really cared about him. He advanced to second-class petty officer, became a leader within the division, and earned several advanced underway qualifications.
At the conclusion of their second tour, SWOs should be comfortable leading up and should fully know their people.
Shore Duty: Sharpen the Saw
Four years after commissioning, SWOs rotate to shore duty. This time away from the waterfront presents an invaluable opportunity to hone leadership style by reflecting on and critiquing time in the Fleet. Would I be an effective department head? Can I be a proficient tactical action officer? Am I a confident shiphandler? A confident leader? If not, what can I do to address my shortcomings before returning to the Fleet? The first step toward great leadership is always self-awareness and the confidence that empowers acting genuinely. Stephen R. Covey describes this as “sharpening the saw”: intentionally taking time to develop physically, spiritually, mentally, and emotionally.4 Shore duty is when the surface-warfare community provides the time to do that.
Reading and thinking about leadership during this time is critical. Keeping a journal may prove helpful. Many officers find themselves in an academic environment during this tour, perhaps as an ROTC leadership instructor or a student at the Naval Postgraduate School, and transitioning to a studious mindset may be easier. But even officers a world away from academia must spend time becoming acquainted with and refining their leadership abilities. Consistent study should help cement the good leadership habits formed in junior officers on their sea tours and bring to light any shortcomings that need correction.
On shore duty, SWOs hone their personal leadership style through critical introspection and by sharpening the saw.
Department Head: Flexibility, Delegation, Trust
Department heads are expected to return to the Fleet as polished and ready leaders. Commanding officers count on them to wield command-wide influence in the arenas of their specialty. This is their time to lead in the intentional manner they developed on shore duty.
Thankfully officers are not called to change everything to match the characteristics of ideal leaders they study. In fact, the qualities of outstanding leaders are often difficult to pinpoint, because exceptional leadership is highly dependent on the situation. This is not just circumstantial, but depends as well on the personalities and skills of subordinates and what is natural for the leader himself. SWOs must learn to perceive these nuances and flex their style in order to effectively lead and delegate.
Delegation becomes essential as a department head, because the scope of responsibility is now far greater than one individual can manage. Instead of personally verifying every detail in a department, a SWO must develop a sense of where the most risk exists. By evaluating the impact and likelihood of failure, a department head can decide when to provide hands-on direction and when to back away and allow a competent subordinate to tackle a problem on his own. Only through a full awareness of sailors’ strengths and weaknesses can an officer begin to empower his team through delegation.
Responsible officers learn quickly that delegation without follow-up can be setting sailors and their ship up for failure. The frequency of follow-up will depend on the skills of the sailors and the consequences of non-completion. A competent navigator, for example, can rapidly demonstrate to a department head that he can function autonomously. But even the most talented and well-meaning officers can make mistakes. In one instance, a navigator had successfully guided his ship around the globe and in and out of dozens of different ports. His chain of command responded by providing less and less oversight. On the eve of an important straits transit, the commanding officer received an excited message from his squadron staff questioning why the ship was intending to travel through several internationally contested bodies of water without the required permission from the Fleet commander. The navigator did not have the experience to recognize the mistake in his plan, and his chain of command had failed to provide proper oversight or anticipate these requirements.
A crucial prerequisite to delegation is trust. Leaders who do not trust their subordinates are primed for micromanagement. But trusted sailors are more likely to reach their full potential. Confidence in an organization does not obviate the need for follow-up, which provides SWOs the opportunity to be out and about, to demonstrate to sailors that they value their efforts, and to provide gentle steering to prevent major steps in an incorrect direction.
Successful department heads learn to flex their leadership style, master delegation, and trust their sailors.
Surface Warriors: Developed Leaders
Upon completion of their department-head tours, some SWOs proceed directly to command a patrol-coastal or mine-countermeasures ship. Following these sea tours, another shore duty provides officers with another opportunity to sharpen the saw before executive officer/commanding officer Fleet up, and the leadership development model continues.
As SWOs return to the waterfront again and again throughout their careers, they are able to continually refine and develop their leadership styles. This and character development are habit-forming: a division officer who insists on the moral course of action throughout his career would be expected to act morally in command. Furthermore, all lessons and practices are cumulative. For example, department heads are called to active followership when the commanding officer sets command policy, relying on a skill they have honed since they were midshipmen.
Although a career progression in surface warfare provides an excellent opportunity to develop as a leader, not everyone takes full advantage of it. It is often difficult to detach oneself from daily stressors to instead focus on people. Introspection can be time-consuming and uncomfortable. Consequently commanding officers on rare occasions fail, but these are generally due to personal failures and do not suggest a flaw in the SWO leadership-development model or the command-selection process. The surface-warfare career model is an excellent one for developing effective leaders with great consistency.
Junior SWOs must first realize that the daily leadership they are expected to provide is absolutely necessary to promote the teamwork and fidelity to high standards critical to combat readiness of the ship. It is just as real and important as that provided in a combat environment. Second, officers must recognize both the cumulative and habitual nature of their leadership development and focus on this aspect early and often. Each tour offers an important opportunity for growth. The natural progression in the surface-warfare career model is proven to develop officers capable of guiding large and complex organizations in or out of uniform. It ensures that when the next conflict arises, our surface fleet will have fully developed leaders throughout its ranks, standing ready to overcome extraordinary challenges.
1. James Webb, A Sense of Honor (Annapolis, MD: Naval Institute press, 1995), 38–39.
2. Derek Sivers, “How to Start a Movement,” TED 2010: http://www.ted.com/talks/derek_sivers_how_to_start_a_movement.html.
3. John C. Maxwell. Winning with People: Discover the People Principles that Work for You Every Time (Nashville, TN: Thomas Nelson, 2007).
4. Stephen R. Covey, The Seven Habits of Highly Effective People: Powerful Lessons in Personal Change (New York: Free Press, 2004).
Lieutenant Heyworth IV, a 2005 Naval Academy graduate, is currently leading sailors at sea as a surface-warfare-officer department head. | <urn:uuid:fbbe9e65-270b-48a4-b040-9012c3ed2886> | CC-MAIN-2017-04 | http://www.usni.org/surface-warfare-model | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280929.91/warc/CC-MAIN-20170116095120-00420-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.968305 | 3,386 | 2.046875 | 2 |
The Power of Meekness (3 of 8) by Dennis Marquardt
This content is part of a series.The Power of Meekness (3 of 8)
Series: THE "BEATTITUDES"
Matthew 5:5; 11:29-30; 21:5; Numbers 12:1-18
There have always been those who have attempted to conquer the earth. We have seen the likes of the Pharaohs of Egypt, Alexander the Great, Ghangis Khan, Napoleon Bonaparte, the Caesar's of Rome, Adolph Hitler, etc. All these have failed!
Each one of these men who almost did it shared one thing in common; though they controlled huge armies and had great power they did not have rule over their own spirit! In the end, their kingdoms were lost and they were ruined!
And now we read Jesus' words here in this beatitude: "Blessed are the meek, for they shall inherit the earth." This is not the quality most people associate with conquering the world!
Part of the problem is our concept of "meekness." What we usually associate with meekness is not what the Bible teaches as "meekness."
"Meekness" is a word in Greek that means, "the wild horse that has become obedient to the bit and bridle." It literally is strength under control! It is anything but whimpishness and passivism!
PROP. SENT: The Bible teaches us that it is the "meek" that will inherit the earth, and the "meek" are those who are strong in ruling their own spirit, under God's control.
I. PROPERTIES OF MEEKNESS Matt. 5:5a; 11:29-30; 21:5
A. Spirit of Contentment 5:5a; 11:29-30
1. Like the other beatitudes this one also says that those who are meek are "blessed" or "happy."
a. Contentment is the expression of happiness.
b. The meek are not restless with the need of finding something to satisfy them more than what they already have.
c. The meek find happiness in the knowledge that they are under control, God's control.
THE STORY IS TOLD ABOUT A RICH INDUSTRIALIST WHO NOTICED ONE DAY A FISHERMAN THAT WAS SITTING LAZILY BESIDE HIS BOAT. THE RICH MAN ASKED, "WHY AREN'T YOU OUT THERE FISHING?" THE FISHERMAN RESPONDED, ...
There are 16099 characters in the full content. This excerpt only shows a 2000 character sample of the full content.
Sign up for a Free Trial with SermonSearch.com and download this sermon free today! | <urn:uuid:47d2b7da-aa36-4f49-a52e-f088100945bb> | CC-MAIN-2016-44 | http://www.sermonsearch.com/sermon-outlines/24150/the-power-of-meekness-3-of-8/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721027.15/warc/CC-MAIN-20161020183841-00549-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.946175 | 593 | 2.5 | 2 |
Definition of afraid not
—used as a polite way of making a negative statement when one wants to show regret at having to do so <“Can you come to our party?” “I'm afraid not.”>
Seen and Heard
What made you want to look up afraid not? Please tell us where you read or heard it (including the quote, if possible). | <urn:uuid:3b49619e-fe25-4205-8a63-1df2b557f8b9> | CC-MAIN-2017-04 | https://www.merriam-webster.com/dictionary/afraid%20not | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00557-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.949269 | 82 | 2.421875 | 2 |
Critiquing Interviewing as a Data Collection Method
AbstractInterviewing is one of the data collection methods which are employed when one adopts the qualitative methodology to conduct research. This article relies on extensive literature review to critique interviewing as a data collection method. Although interviews have various forms and styles, it is important to note that there is no one interview style that fits every occasion or all respondents. The interviewer must work diligently to ensure the validity and reliability of the interview data otherwise, interviewers themselves, can turn out to be weaknesses due to their own bias, subjectivities and lack of interviewing skills. It is also important to note that interviewers themselves become part of the “interviewing picture” by asking questions and responding to the respondent and sometimes even sharing their experiences with interviewees; working with the interview data, selecting from it, interpreting and describing and analysing it regardless of their discipline and dedication in keeping the interview data as the product of the respondent. Weaknesses of interviewing have been both discussed and critiqued from different theoretical perspectives which are “postmodern, feminist, sociolinguistic” “conversation analytic”, “ethnomethodological perspectives” and even data analysis.
How to Cite
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. | <urn:uuid:3e8da1a8-ba07-49e1-b4ae-4023b9c91f00> | CC-MAIN-2022-33 | https://www.richtmann.org/journal/index.php/mjss/article/view/3280 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00277.warc.gz | en | 0.921029 | 288 | 2.328125 | 2 |
ADIDAS UNVEILS SNEAKER MADE FROM BIOSTEEL FIBER
FUTURECRAFT BIOFABRIC FEATURES INCLUDE BEING 100% BIODEGRADABLE
Adidas has unveiled the world’s first performance shoe made using Biosteel fiber – a replication of natural silk. The Adidas Futurecraft Biofabric prototype shoe features an upper made from 100% Biosteel fibers, a nature-based and completely biodegradable high performance fiber, developed by the German biotech company, AMSilk. The material offers a unique combination of properties that are crucial in performance, such as being 15% lighter in weight than conventional synthetic fibers as well as being the strongest fully natural material available.
In addition, Biosteel fibers also provide a far more sustainable offering, with it being 100% biodegradable in a fully natural process. This continues Adidas’ journey of sustainable innovation – from a starting point of virgin plastics, to recycled plastics, to its partnership with Parley for the Oceans and now a totally new frontier of investing in solutions that leverage science and nature as an integral part of innovation. The shoe was unveiled at the renowned Biofabricate Conference in New York as Adidas and AMSilk announce a partnership that will explore the use of Biosteel fibers in performance products on a larger scale.
James Carnes, Vice President of Strategy Creation at Adidas, said: “In a year of ground-breaking innovations from Adidas, the announcement our partnership with AMSilk – and the unveiling of the Adidas Futurecraft Biofabric shoe – is another step in our commitment to redefining the sport industry. This concept represents premium innovation. By using Biosteel fibers in our products, we achieved an unrivalled level of sustainability. We are moving beyond closed loop and into an infinite loop – or even no loop at all. This is a pioneering stride forward beyond sustainability into a new territory of bionic innovation”
Jens Klein, CEO of AMSilk, said: “The sports shoes which have been developed together with adidas are the first products worldwide with a high-performance material made of nature-identical silk biopolymers. With this development we are setting new standards regarding the functionality of renewable textiles.”
The release of the Adidas Futurecraft Biofabric shoe comes in a year where the brand has released a series of products that have pushed the boundaries of sneaker innovation. These include the Futurecraft Tailored Fibre, which utilised revolutionary manufacturing techniques to enable unique footwear designs and the Futurecraft M.F.G., the first product to be created at Adidas’ industry-changing SPEEDFACTORY facility. These cutting edge product developments have been complimented by Adidas’ commitment to sustainability, with its relationship with Parley for the Oceans having led to the release of the first mass produced footwear created using Parley Ocean Plastic, the UltraBOOST Uncaged Parley.
Commentscomments powered by Disqus | <urn:uuid:c5a63485-e7da-4778-be75-e15ac4483e99> | CC-MAIN-2017-04 | http://menswearstyle.co.uk/2016/11/21/adidas-unveils-sneaker-made-from-biosteel-fiber/7456 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00124-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.925539 | 628 | 1.9375 | 2 |
Join historian Dan Jones for a look at the enduring legacy of the Middle Ages
This event takes place in the British Library Theatre and will be simultaneously live streamed on the British Library platform. Tickets may be booked either to attend in person, or to watch on our platform (online) either live or within 48 hours on catch up. In person ticket bookers will also be sent a bonus link to the online event. Viewing links will be sent out shortly before the event.
The British Library collection contains some of the most celebrated and important documents to have survived from the Middle Ages. From the Beowulf manuscript and Magna Carta to Matthew Paris’s vividly illustrated History of England, the Library’s collection is a vital resource, which helps scholars and ordinary readers alike to understand this formative thousand years in western history.
In this lecture, internationally bestselling medieval historian Dan Jones puts all these treasures into context as he takes you on a vivid tour of the Middle Ages in the round, from the sack of Rome by barbarians in 410 to the age of the Renaissance and the New World voyages. Based on his new book, Powers and Thrones: A New History of the Middle Ages, Dan will explore how the medieval world emerged from the ashes of the classical era, and how it left a commanding legacy to western politics, law, religion, art, architecture, music, language and identity.
Dan also argues that although many think of the Middle Ages as backward, brutish and ignorant – using ‘medieval’ as an insult – this was a time that was shaped by factors that are still of critical importance to us today. Climate change, mass migration, pandemic disease, technological change and global networks all shaped the medieval world. The better we understand these, the better we will be equip ourselves for the challenges of our own, rapidly changing world.
Online event bookers can buy a copy of Powers and Thrones: A New History of the Middle Ages by Dan Jones at checkout for £28 (UK orders) and watch the event at no extra cost.*
Dan Jones is a historian, broadcaster and award-winning journalist. His books, including The Templars, Crusaders and, with Marina Amaral, The Colour of Time and The World Aflame, have sold more than one million copies worldwide. He has written and hosted dozens of TV shows including the acclaimed Netflix/Channel 5 series, Secrets of Great British Castles.
*Prices include postage and packaging (£3 for UK orders and £7.50 for non-UK orders). Books will be dispatched after the event, normally within 7 days. Please ensure your postal address is up to date on your British Library account before placing your order.
If you’re attending in person, please arrive no later than 15 minutes before the start time of this event. We are committed to the safety of our event bookers. Click here to find out how we are welcoming you to the Library safely.
The British Library is a charity. Your support helps us open up a world of knowledge and inspiration for everyone. Donate today.
|Name:||A New History of the Middle Ages with Dan Jones|
The British Library
96 Euston Road
Show Map How to get to the Library
Full Price: £14.00
Registered Unemployed: £7.00
Senior (60+): £12.00
Young Person (18-25): £7.00
Online Full Price: £5.00
Online Member: £5.00
Online Event w/Book (Powers and Thrones: A New History of the Middle Ages by Dan Jones) UK Postage: £28.00
Online Event w/Book (Powers and Thrones: A New History of the Middle Ages by Dan Jones) Non UK Postage: £32.50
|Enquiries:||+44 (0)1937 546546 | <urn:uuid:c95e4dc7-b9af-419d-a701-a446cce8053a> | CC-MAIN-2022-33 | https://www.bl.uk/events/a-new-history-of-the-middle-ages-with-dan-jones | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00667.warc.gz | en | 0.916905 | 867 | 1.921875 | 2 |
Over the years there has been heated debate on abortion, an issue that many
countries face globally. Since the seventies America has recorded at least 53 million
legal abortions. According to www.abort73.com in 2011, a highly informative and
Determine the population of your state 10 years from now.
Determine how long and in what year the population in your state
F = P (1+r)n is the formula to determine the population of your state 10 years from
now. 1,431,603 (1.01)10 = 1,581,380. Therefo
Apportionment is one of the most important functions of the decennial census.
Apportionment measures the population so that seats in the U.S. House of Representatives can be
correctly allocated among the states. The Constitution does not specify a certain | <urn:uuid:27258713-efb9-4317-bdee-2c63113972a0> | CC-MAIN-2016-44 | https://www.coursehero.com/sitemap/schools/1211-Argosy-University/courses/2047597-BUSINESS212/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721555.36/warc/CC-MAIN-20161020183841-00178-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.918843 | 180 | 3.015625 | 3 |
SY 21-22 K-12 COVID-19 Testing Project
|Date:||September 16, 2021|
|Subject:||SY 2021-2022 K-12 COVID-19 Testing Project|
|Next Steps:||Share with appropriate staff|
Beginning today and continuing through the end of school year (SY) 2021-2022, the Department of State Health Services (DSHS) and the Texas Education Agency (TEA) will be supporting school-based COVID-19 testing activities through the work of vendors funded by an $800 million federal grant.
This program is open to eligible public and private school systems in Texas. Stand-alone Pre- K only and child-care providers are not eligible. If school systems have a Pre-K or childcare program that is in the same building as K-12 students and they co-mingle, then staff and students in those programs are eligible for testing through this program.
TEA has posted a list of public school systems with their opt in status and test allocation. If a public school system participated in the state’s previous testing program, they do not need to reapply. If a public school has not signed up yet and would like to participate, the school system should submit an application. All eligible private schools will need to submit an application to opt into the program.
Independent of the state’s testing program, the City of Houston also received funds through the same federal grant program to support a set of public and private school systems within the City of Houston boundaries. If you are in the Houston area, please review the list of school systems the City of Houston will support and determine if you are considered eligible for their program. If so, you will see that you have a reduced allocation to use through November 15 through TEA’s program, after which you will transition to being supported by the City of Houston’s grant.
As part of the SY 2021-2022 K-12 COVID-19 Testing Project, school systems should develop a plan for testing throughout the year. Tests provided under this project are designed to be used immediately, not stocked for future use.
As part of this program:
- All eligible public and private school systems will be provided a list of COVID-19 testing providers that are associated with this program and will choose the providers that meet their needs. School systems are able to change their vendors throughout the duration of the program and may work with multiple vendors for different services as needed.
- Schools will be provided COVID-19 tests from their selected providers at no cost to the district. The cost at which a school system will receive their testing kits or services will vary by vendor.
- COVID-19 test providers will bill DSHS directly, so school systems are not required to enter into contracts with vendors.
- School systems will be required to submit documentation certifying receipt of goods and services, as well as reporting testing results consistent with grant guidelines and state requirements. This form will be available next week.
TEA and DSHS have created a number of resources to support school systems involved in the testing program:
Additionally, beyond the availability of tests, a $221M grant program will also be available to provide funds for eligible school systems to contract for additional services or products. TEA will provide more information on the grant program at upcoming webinars:
- Register to attend the grant overview webinar on Monday, September 20th (10:00- 11:00 AM)
- Register to attend the grant overview webinar on Tuesday September 21st (1:00-2:00 PM)
Please send any questions to email@example.com. | <urn:uuid:96162fde-4ea3-479a-b69e-2a05066017a8> | CC-MAIN-2022-33 | https://teadev.tea.texas.gov/about-tea/news-and-multimedia/correspondence/taa-letters/sy-21-22-k-12-covid-19-testing-project | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00467.warc.gz | en | 0.950895 | 771 | 1.539063 | 2 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.