text
stringlengths
181
608k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
138k
score
float64
1.5
5
int_score
int64
2
5
Home > Flashcards > Print Preview The flashcards below were created by user on FreezingBlue Flashcards . What would you like to do? The complement system helps or “complements” the ability of antibodies and phagocytic cells to clear pathogens from an organism. It is part of the immune system called the innate immune system that is not adaptable and does not change over the course of an individual's lifetime. However, it can be recruited and brought into action by the adaptive immune system.The complement system consists of a number of small proteins found in the blood, in general synthesized by the liver, and normally circulating as inactive precursors (pro-proteins). When stimulated by one of several triggers, proteases in the system cleave specific proteins to release cytokines and initiate an amplifying cascade of further cleavages. The end-result of this activation cascade is massive amplification of the response and activation of the cell-killing membrane attack complex. Over 25 proteins and protein fragments make up the complement system, including serum proteins, serosal proteins, and cell membrane receptors. They account for about 5% of the globulin fraction of blood serum and can serve as opsonins. Endocytosis is an energy-using process by which cells absorb molecules (such as proteins) by engulfing them. It is used by all cells of the body because most substances important to them are large polar molecules that cannot pass through the hydrophobic plasma or cell membrane. The binding of macrophage receptors to their microbial ligands initiates the process called receptor-mediated endocytosis, in which the receptor-bound pathogen is surrounded by the macrophage membrane and internalized into a membrane-bounded vesicles called an endosome or phagosome. Phagosome is a vesicle formed around a particle absorbed by phagocytosis. The vacuole is formed by the fusion of the cell membrane around the particle. A phagosome is a cellular compartment in which pathogenic microorganisms can be killed and digested. Phagosomes fuse with lysosomes in their maturation process, forming phagolysosomes.Some bacterial pathogens that enter cells inside phagosomes either reproduce inside of the formed phagolysosome or escape into the cytoplasm before the phagosome fuses with the lysosome.Many mycobacteria, including Mycobacterium tuberculosis and Mycobacteria avium paratuberculosis , manipulate the host macrophage to prevent nitrous acid-containing lysosomes from fusing with phagosomes and creating mature phagolysosomes. Such incomplete maturation of the phagosome maintains an environment favorable to the pathogens inside it. Phagosomes that fused with cellular organelles called lysosome is called phagolysosomes, vesicle that are loaded with degradative enzyme and toxic substances that destroy the pathogen. The process of facilitation of phagocytosis by coating of protein is called opsonization. Opsonization is usually used in reference to molecules that act as a binding enhancer for the process of phagocytosis, especially antibodies, which coat the negatively charged molecules on the membrane. Molecules that activate the complement system are also considered opsonins. Both the membrane of a phagocytosing cell and its target have a negative charge (zeta-potential), making it difficult for the two cells to come close together. Once the opsonins attach to the target, the negative charge is masked. Take note that the negative charge of the target doesn't disappear. The opsonin simply overrides the charge, making it easier for white blood cells (phagocytic cells) to carry out phagocytosis. chemokines are messegers that direct the flow of leukocyte traffic; they differ in the type of cell or tissue that makes the and in the type of cell they attract. Some chemokines, including CXCL8, attract leukocytes into the sites of tissue damage or infection. Others direct the traffic of leukocytes during their development and during recirculation through lymphoid tissue. Cells are attracted from the blood into infected tissue by following the concentration gradient of chemokine produced by the cells within the infected site. The principal function of CXCL8, a CXC chemokine, it to recruit neutrophils from the blood into the infected area. Chemotaxis is chemically prompted taxis, in which somatic cells, bacteria, and other single-cell or multicellular organisms direct their movements according to certain chemicals in their environment. This is important for bacteria to find food (for example, glucose) by swimming towards the highest concentration of food molecules, or to flee from poisons (for example, phenol). Positive chemotaxis occurs if the movement is toward a higher concentration of the chemical in question. Conversely, negative chemotaxis occurs if the movement is in the opposite direction. Neutrophils is a phagocytic cell. They are short lived dedicated killer is the blood awaiting a call from the macrophage to enter infected tissue. Neutroophils are a type of granulocyte, having numerous granules in the cytoplasm. They are the most abundant white blood cell, a healthy adult having some 50 billion in circulation at any time. They have a a short lifespan, less than 2 days, it means that 60% of the hematopoietic activity of the bone marrow is devoted to neutrophil production. Mature neutrohils are kept in the bone marrow for about 5 days before being released to the circulation. The cleavage of C3 and C5 produces two small fragments:C3a and C5a. These bind to receptors on several cells to produce inflammation at the site of infection. Inflammatory response or inflammation is a result of the innate immune response. In rare occasions, these molecules spread throughout the body and produce systemic inflammatory response called as anaphylactic shock. These peptides are therefore called anaphylatoxins. They bind to phagocytes, endothelial cells, mast cells. By binding to receptors on these cell types they produce, contraction of smooth muscles and release of histamine from mast cells and basophils, resulting in enhanced capillary permeability. C3a and C5a also bind to local blood vessels. Thechanges results in passage of cells and plasma proteins to extracellular spaces leading to swelling and redness. Defensins are peptides of 35-40 amino acids in length with antimicrobial properties. They are of two types: a-defensins and b-defensins. The defensins have both Hydrophobic and hydrophilic surfaces, a property used to penetrate microbial surface membranes and disrupt membrane integrity. Bacteria, fungi and enveloped viruses are destroyed by defensis by this mechanism The a-defensins are secreted by neutrophils and the specialized epithelial cells of the intestine (Paneth cells). b-defensins are secreted by epithelial cells of urogenital tract, skin and the respiratory tract. The defensins are activated in the acidic pH of gut, tears and sweat. Cytokines are a broad and loose category of small proteins that are important in cell signaling. They are released by cells and affect the behavior of other cells, and sometimes the releasing cell itself. Cytokines include chemokines, interferons, interleukins, lymphokines, tumour necrosis factor but not generally not hormones or growth factors. Cytokines are produced by broad range of cells, including immune cells like macrophages, B lymphocytes and T lymphocytes, mast cells, as well as endothelial cells, fibroblasts, and various stromal cells; a given cytokine may be produced by more than one type of cell. They act through receptors, and are especially important in the immune system; cytokines modulate the balance between humoral and cell-based immune responses, and they regulate the maturation, growth, and responsiveness of particular cell populations. Some cytokines enhance or inhibit the action of other cytokines in complex ways. cytokines that induce innate immune responses and inflammation at the site of infection are known as inflammatory cytokines. Interferons (IFNs) are proteins made and released by host cells in response to the presence of pathogens such as viruses, bacteria, parasites or tumor cells. They allow for communication between cells to trigger the protective defenses of the immune system that eradicate pathogens or tumors. IFNs belong to the large class of glycoproteins known as cytokines. Interferons are named after their ability to "interfere" with viral replication within host cells. IFNs have other functions: they activate immune cells, such as natural killer cells and macrophages; they increase recognition of infection or tumor cells by up-regulating antigen presentation to T lymphocytes; and they increase the ability of uninfected host cells to resist new infection by virus. Certain symptoms, such as aching muscles and fever, are related to the production of IFNs during infection.About ten distinct IFNs have been identified in mammals; seven of these have been described for humans. They are typically divided among three IFN classes: Type I IFN, Type II IFN, and Type III IFN. IFNs belonging to all IFN classes are very important for fighting viral infections. All interferons share several common effects; they are antiviral agents and can fight tumors. As an infected cell dies from a cytolytic virus, viral particles are released that can infect nearby cells. However, the infected cell can warn neighboring cells of a viral presence by releasing interferon. The neighboring cells, in response to interferon, produce large amounts of an enzyme known as protein kinase R (PKR). This enzyme phosphorylates a protein known as eIF-2 in response to new viral infections; the phosphorylated eIF-2 forms an inactive complex with another protein, called eIF2B, to reduce protein synthesis within the cell. Another cellular enzyme, RNAse L—also induced following PKR activation—destroys RNA within the cells to further reduce protein synthesis of both viral and host genes. Inhibited protein synthesis destroys both the virus and infected host cells. NK (Natural Killer ) lymphocyte The cytokine IL-12 serves to activate a class of lymphocyte called NK lymphocyte, which enters infected sites soon after the infection. NK cells are lymphocyte of innate immunity that specialized in defense against viral infection. Toll-like receptors (TLRs) recognize pathogen derived products and transmit signals to contain infection. There are ten types of TLRs expressed in various cell types. They are transmembrane proteins. The extracellular domain recognizes the pathogen and the intracellular domain transmits the signal to initiate signaling pathways in the cytoplasm. These pathways translocate the transcription factor nuclear factor k B (NFkB) to the nucleus,resulting in synthesis and secretion of cytokines. Depending on the type of infection, bacteria (extracellularor intracellular) or virus, different cytokines are producedby the activation of TLRs. Thus, inflammatory cytokine production and release into extracellular spaces controls extracellular bacteria whereas interferon production eliminates virus infection. Macrophage initiated inflammation Macrophage activation through the TLRs induces cytokine secretion. These cytokines recruit effector cells such as neutrophils and natural killer cells (NK cells) and cause inflammation. Cytokines act on local blood capillaries and cause increase in diameter of blood vessels (vasodilation), decrease in blood flow and increased permeability of blood vessels. This results in increased movement of plasma and blood cells to the tissue surrounding the infection causing fluid retention, swelling, reddening and pain. The macrophages release cytokines:IL-1, IL-6CXCL8, IL-12 and tumor necrosis factor-a (TNF-a). The cytokine CXCL8 is also called as chemokine as it attracts leukocytes into sites of tissue damage or infection. Chemokine CXCL8 attracts neutrophils from the circulating blood to the pathogen infected tissue. Neutrophils express two receptors CXCR1 and CXCR2 which bind to the ligand CXCL8, altering the adhesive property of the neutrophils and causing the cells to migrate toward the site of infection along a gradient of chemokine. An epitope, also known as antigenic determinant, is the part of an antigen that is recognized by the immune system, specifically by antibodies, B cells, or T cells. The part of an antibody that recognizes the epitope is called a paratope. Although epitopes are usually non-self proteins, sequences derived from the host that can be recognized are also epitopes. The epitopes of protein antigens are divided into two categories, conformational epitopes and linear epitopes, based on their structure and interaction with the paratope. A conformational epitope is composed of discontinuous sections of the antigen's amino acid sequence. These epitopes interact with the paratope based on the 3-D surface features and shape or tertiary structure of the antigen. The proportion of epitopes that are conformational is unknown. By contrast, linear epitopes interact with the paratope based on their primary structure. A linear epitope is formed by a continuous sequence of amino acids from the antigen. Major Histocompatibility Complex - Antigen processed and to be presented are carried to the cell surfaced by binding to the glycoproteins call MHC molecules. Each MHC molecule binds to one peptide and carries itto the surface of the cell. The circulating T cells recognize these peptides. The MHC proteins are transcribed from stable genes without rearrangement as in T Cell receptor genes or immunoglobulin genes. There are several gene families coding the MHC proteins.The heterogeneity of MHC proteins is achieved by genetic polymorphisms within the population MHC Class 1 MHC Class I Molecules present intracellular pathogens. These pathogens live inside cells and replicate in the cells. (Example: Virus). The CytotoxicT cells recognize these antigens. MHC Class 2 MHC Class 2 presents pathogens that are extracellular (living and replicating in the spaces between cells) are processed and presented by Class 2 MHC molecules.The T helper cells recognize these antigens Antigen processing enzyme. In the normal tissue,enzymes of the proteasome complex degrade proteins that are damaged or misfolded. In cells infected with pathogens, proteasome complex enzymes are modified to process proteins of pathogen origin into small peptides. These peptides are delivered to the endoplasmic reticulum with the help of a protein (Transporter associated with antigen processing or TAP). The MHC1 molecules bind to the peptides in the endoplasmic reticulum. The subunits of MHC1 bind with peptides and complete the protein folding. MHC1 bound with peptides are transported to the cell membrane. Transporter associated with antigen processing (TAP) delivers cytosolic peptides into the endoplasmic reticulum (ER), where they bind to MHC class I molecules. Expression of MHC class 1 and MHC class 2 molecules. MHC class 1 molecules are expressed by all cells of the body, except the red blood cells. As all cells are prone to infection by intracellular pathogens, expressionof MHC class 1 molecules makes the infected cells to be attacked and destroyed by CD8 T cells. MHC class 2 molecules are primarily expressed on antigen processing cells such as dendritic cells and macrophages, activated T cells, thymic epithelial cells and B cells. Constitutive expression of MHC class 1 and 2 are elevated during the course of an immune reaction. The increase in expression enhances immunes response. The cytokine interferon gamma(IFN-g) induces MHC class 2 expression on cells that do not normally express it. Cell-adhesion molecules are involved in lymphocyte interactions. The main classes are: selectins, integrins ,members of immunoglobulin superfamily and mucin-like molecules. Adhesion molecules are involved in interactions between naïve T cells and antigen presenting cells (APCs), interactions between effector T cells and their target cells ,entry of monocytes and leukocytes into tissues and T-cell and B-cell interactions. What would you like to do? Home > Flashcards > Print Preview
<urn:uuid:864d3693-8848-436a-9cb0-13190c2d9ffe>
CC-MAIN-2017-04
https://www.freezingblue.com/flashcards/print_preview.cgi?cardsetID=257283
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00386-ip-10-171-10-70.ec2.internal.warc.gz
en
0.93195
3,529
4.0625
4
A talented farmer has created his own heartwarming tribute to the NHS – by using his tractor to plough a giant 500ft (152m) rainbow in one of his fields. Jack Pantall, 33, used a drone connected to his phone to map out the huge image in appreciation of Britain’s health workers as they battle the coronavirus pandemic. He crafted the NHS logo and rainbow – which is which is 60m tall and 152m wide – on his farm near Staunton-on-Wye, Herefordshire. Stunning drone footage captured Jack creating the masterpiece, which took just 16 minutes to complete. The dad-of-two said he wanted to show his support for all our NHS heroes as his brother Harry, 31, is a paramedic and his sister-in-law works as a doctor. He said: “My brother being a paramedic is part of the reason for doing it but we’re obviously thankful for all our NHS heroes on the frontline. “I had one field left I could use before my spring planting finished so I decided to do it as soon as a I could. “My brother and I had been thinking about it and we saw some other people showing their appreciation in different ways. He said, ‘yeah why not let’s do it’. “Someone else in Exeter had done #NHS into some corn so we were thinking of something more original. “My brother suggested putting the Stay Safe rainbow over the top. We decided to give it a go and the worst-case scenario is it doesn’t come out right. “Thankfully, however, it did. It turned out beautifully.” The rainbow has become a symbol of support for people wanting to show solidarity with health workers on the front line during the Covid-19 outbreak. Jack planned the drawing, but due to the wrong setting on his tractor, he ended up having to look at a video feed his drone was sending to his phone to make the image. He added: “I had a piece of paper with a drawing on but in fact, that went out the window because I got the wrong setting on the tractor. “My drone connects to my phone so I was watching my phone screen while I drew it. I could see how it was coming out while I was doing it. “So the video you’re watching is how I was able to draw it. “I wasn’t looking at the field because it didn’t make any sense because the picture was so big. “I was driving around trying to get it done in a hurry because the drone battery only lasts about 20 minutes and I had to be relatively quick on it. “I managed to complete it in about 16 minutes, which was just in time really.” Brother Harry, a paramedic for the South Central Ambulance Service who lives in Bromsgrove, Worcs., then cut together the video in the style of a time-lapse. Jack added:“Harry has created that video which is a minute long which is absolutely fantastic because no one would want to watch it in full. “It is about 60 metres tall and about 150 metres wide. It was supposed to be bigger when I first planned it – but we’re more than happy with the outcome.” Jack has also set up a JustGiving page to support NHS staff, which includes sister in law Shay-Anne who is a Psychiatric Doctor, and hopes his stunt can help raise spirits. He said: “It horrendous, with people dying at the moment it can’t be nice. “Not just for my brother and sister in law but for all of the NHS staff, all of the front liners and the key workers involved. “Even down to the delivery people have gone mad just trying to support the whole country. “The NHS is the main ones we must thank because they’re right in amongst it. “It was all just to say a massive thank you to them. “We’ve got various friends who live next to us who are all nurses, resuscitation nurses, so they are in the mix of it. It’s a small contribution and they were ecstatic over it. “It really makes you feel good when they know there are people out there appreciating them. “You never know someone is appreciating you until someone says. “My gesture was just something we thought that we do down the field. It’s just us showing a small amount of appreciation. “At the very least it brings a smile to people’s faces and makes them know we are thinking of them.” You can donate to the brothers NHS fundraising efforts here: https://justgiving.com/fundraising/farmerjack4k Watch Video Here
<urn:uuid:13f81d75-fb72-48e5-8484-3a915fbedf09>
CC-MAIN-2022-33
https://www.thelondoneconomic.com/must-reads/watch-farmer-creates-tribute-to-nhs-ploughing-massive-rainbow-183840/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00674.warc.gz
en
0.983252
1,046
1.59375
2
What happens if a golfer runs out of balls? If you happen to run out of balls, you can borrow one from any other player, including a practice or X-Out ball (which are generally conforming balls). If you play a wrong ball, you lose the hole in match play or get a two-stroke penalty in stroke play. Is there a limit to the number of golf balls a pro can carry? But even at that level, most pros will use a few balls per round. On the PGA Tour, change happens far more often. There’s no limit to how many golf balls a player can carry in his or her bag, so long as they comply with the One Ball Rule, which dictates the same model and manufacturer. Do pro golfers use a new ball on each hole? “Guys didn’t get out here by losing that many in a round.” Russell Knox, of Jacksonville Beach, said he takes three sleeves (nine balls) with him for a tournament round – changing balls every other hole. He does that for a desert course with no hazards or the Stadium. How many golf balls do pros hit a day? With a field of 156 and 5,000-plus balls a day of up to a dozen brands, it’s no small task. Can you change balls to putt? If you remove a ball from play due to damage, the rules regarding removal must be followed. So, under the Rules of Golf, you may not change balls on the green and putt with a different ball than with which you played the hole. Why don t pro golfers use colored balls? Most pro golfers just use white golf balls because that is what they are familiar with. Professional golfers try to do everything to keep things the same, which provides consistency and comfort when playing. Also, many of the top professionally-branded golf ball manufacturing companies don’t make colored golf balls. Are Pro V1 good for beginners? The Winner The Titleist Pro V1 is the best golf ball for beginners due to its durability and how it provides a distance increase off the tee box. For the amateur, the Pro V1 supplies an excellent golf ball option for creating more spin and better control. Are Kirkland golf balls Pro V1? Are Kirkland golf balls Pro v1? No, they most certainly are not. Though they do have many similarities. Think of these Costco golf balls as a low-cost alternative to Titleist Pro V1. Do golf balls go bad with age? Titleist golf balls have a shelf life of five years or more. “Under normal storage conditions — 70 to 80 degrees Fahrenheit — a golf ball can last forever,” states The Golf Professor. What percentage of golfers can break 80? Only about 2 percent of all golfers ever break 80, which generally is considered the Holy Grail of scoring. Eleven of the world’s best golfers failed to break 80 last week during the PGA Championship. Chumps. Is it legal to draw a line on your golf ball? Yes: Drawing a line around your golf ball, then using that line to help you line up your putt, is perfectly OK under the Rules of Golf. What golf balls do the pros use 2020? Titleist Pro V1/Pro V1x Soft-feel, high-trajectory balls with consistent flight over a long distance. The 2020 Pro V1s have new, faster cores and more efficient design, making for more speed and less spin. How far does Tiger Woods hit a 7 iron? According to Golf Digest, Tiger hits the driver an average of 285 yards with carry. His long irons (2- to 4-iron) range from 250 to 200 yards. His middle irons (5, 6, 7) range from 208 to 172 yards. His 8-iron travels 158 yards, and 9-iron flies 142. How far should you hit a 7 iron? How to Know Which Golf Club to Use |Club||Men’s Average Distance||Women’s Average Distance| |4-iron||170 yards||150 yards (consider a hybrid, instead)| |5-iron||160 yards||140 yards| |6-iron||150 yards||130 yards| |7–iron||140 yards||120 yards| What is Tiger’s best score? When Tiger Woods, a man who has 79 PGA Tour victories, second-most in the history of professional golf in the U.S., shoots an 85, the highest score in his career, you want to know how it happened.
<urn:uuid:7437d593-3594-41c8-aff8-4da975fc2231>
CC-MAIN-2022-33
https://beavercountybookfest.com/tips/how-many-balls-can-a-pro-golfer-carry.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00076.warc.gz
en
0.922628
975
1.742188
2
scroll to top Stuck on your essay? Get ideas from this essay and see how your work stacks up Word Count: 1,439 It was once forcasted that computers in the future would weigh no more than 15 tons Of course in todays technologically savvy times its a common occurrence to see people holding their computers in their lap or even in their hand Theres no doubt about it the computer already plays an important role in our lives and that role is likely to expand as more advancements are made However new innovations mean new controversies The Internet for example has transformed the way people communicate conduct business learn and entertain themselves With a simple click of the mouse key one can do things that were thought science fiction just a few decades ago For all the benefits associated with the Internet the presence of pornography hate groups and other distasteful topics has lead to a nationwide debate on first amendment rights and censorship The goal for the Internet should not be total freedom for unsavory groups to deliver their message to whomever they can but a balance between the freedom of those who want this material and the freedom of those who do not When President Clinton signed the Communication Decency Act into law on February 8 1996 he effectively approved the largest alteration of national communication laws in 62 years In order to elicit a response from web creators who published indecent sites the bill instituted criminal penalties However the emphasis in the bill was on decency and not obscenity- which had long been established as the method to determine what was supported by the first amendment and what was not The CDA was eventually overthrown in Reno vs ACLU because of the unconstitutionality vague wording and the noted importance in keeping the Internet a hospital arena for free expression and speech In 1998 another piece of legislation was approved called the Child Online Protection Act or COPA that is considered less stringent than the Communication Decency Act but is currently undergoing the same @Kibin is a lifesaver for my essay right now!! - Sandra Slivka, student @ UC Berkeley Wow, this is the best essay help I've ever received! - Camvu Pham, student @ U of M If I'd known about @Kibin in college, I would have gotten much more sleep - Jen Soust, alumni @ UCLA
<urn:uuid:10de4937-9115-4e27-ac2e-4e9b14f045dd>
CC-MAIN-2017-04
https://www.kibin.com/essay-examples/an-analysis-of-the-forecast-that-computers-in-the-future-would-weigh-no-more-than-15-tons-m9OFvZua
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283301.73/warc/CC-MAIN-20170116095123-00508-ip-10-171-10-70.ec2.internal.warc.gz
en
0.975269
456
2.28125
2
Alaska was originally colonized by the Russian Empire in the 1780s. The discovery of gold in the Yukon area by Winston Carew of Kramer Associates in July 1896 brought about conflict between K.A. and the Russian government. In the spring of 1898, war broke out between Russia and the U. S. M., leading to the Mexican conquest of Alaska during the first stage of the Great Northern War. A nominally independent Alaskan republic was established in the fall of 1898, controlled behind the scenes by Kramer Associates. On 22 March 1922, President Emiliano Calles called for a plebiscite in Alaska to determine whether the republic would be admitted to the U.S.M. as a state. In spite of K.A.'s control of the state's economy, the Alaskan legislature ignored the wishes of K.A. President Andrew Benedict, and voted in favor of holding a plebiscite. The vote was scheduled for early in 1923, and resulted in a majority vote for statehood. Alaska gained Mexican statehood in November 1923. However, in the subsequent 1926 Mexican elections, only 46% of the new state's voters supported Calles, who lost the election to his opponent, Assemblyman Pedro Fuentes. Fuentes devoted most of his term in office to an attempt to reduce K.A.'s influence in Mexico. In the 1932 Mexican elections, he was able to retain a bare majority of the vote in Alaska, winning 51%. Elsewhere in Mexico, Fuentes lost in every state except Durango, and Senator Alvin Silva was elected president. Silva went on to win re-election in 1938, this time winning 51% of the state's votes. Towards the end of the Global War, a Japanese task force assaulted the Aleutian Islands in December 1948, but was defeated, suffering heavy losses. A base was established at Point Harrington in the 1960s to carry out atomic bomb tests. As of November 1971, those tests have all been unsuccessful. The frontispiece map in For Want of a Nail ... indicates that the Alaska/California border is roughly 100 miles south of the IOW border between Washington State and British Columbia. In For All Nails, however, the border is on or near the IOW border between California and Oregon. |States of the U.S.M.| |Alaska • Arizona • California • Capital District • Chiapas • Durango • Hawaii • Jefferson • Mexico del Norte|
<urn:uuid:ff6d7949-b524-438f-bb49-ea960ee0ff9d>
CC-MAIN-2022-33
https://fwoan.fandom.com/wiki/Alaska?veaction=edit
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00667.warc.gz
en
0.962954
515
3.921875
4
England's Perfect Hero Besorgung - Lieferbarkeit unbestimmt BeschreibungLucinda Barrett's best friends ended up married to the men to whom they delivered their 'lessons in love'. So Lucinda decides to choose someone who definitely needs lessons, but someone who will not complicate her life. And that person is definitely not Robert Carroway. Robert is nothing if not complicated, and though he is the brother of a viscount, he rarely goes about society, and finds the weather and hat fashions ludicrous subjects for discussion. Robert is attracted to Lucinda's unpretentious ways, her serenity and her kindness. When she chooses someone for her love lessons, Robert offers to help her deliver her lessons, but sets out to convince the woman he has fallen for to take a chance on love ... and on him. PortraitA lifelong lover of books, Suzanne Enoch has been writing them since she learned to read. She is a full time writer, born and raised in southern California where she lives with her collection of Star Wars action figures and a Cairn terrier. Untertitel: Lessons in Love. 'An Avon Romantic Treasure'. 'Lessons in Love'. Sprache: Englisch. Verlag: AVON BOOKS Erscheinungsdatum: Juli 2011 Seitenanzahl: 384 Seiten
<urn:uuid:f6412e9e-68a0-4c49-b130-98f0e042cb31>
CC-MAIN-2016-44
https://m.ebook.de/de/product/2544200/suzanne_enoch_england_s_perfect_hero.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988725475.41/warc/CC-MAIN-20161020183845-00509-ip-10-171-6-4.ec2.internal.warc.gz
en
0.869389
296
1.640625
2
LGM - Dairy More information on LGM-Dairy can be found on the Pennsylvania Center for Dairy Excellence website: http://www.centerfordairyexcellence.org/index.php/risk.html Track the current numbers for your farm using the excellent U-WI calculator located at: http://future.aae.wisc.edu/lgm_analyzer/ Note: If you are interested in purchasing LGM-Dairy, be aware that this program is allocated a fixed amount for underwriting expenditures each Federal fiscal year. Once this amount has been expended, LGM-Dairy is no longer available for enrollment. Contact your crop insurance agent for more information on availability and sales closing dates for this plan. Using RMA Dairy Gross Income Insurance Rules Milk Income over Feed Cost. June 2011 Improvements strengthen risk management landscape for dairy risk management. Milk Income over Feed Cost. Includes estimates for August 2008-January 2010 enrollment periods. 2010. Powerpoint presentation Income over Feeds Cost Worth? March 2011 February 2011 Enrollment Period. Excel Spreadsheet Provides dairy producers a monthly enrollment opportunity to develop and implement a financial safety-net for their business plan for the year ahead, with protection the last 10 months of each 12 month enrollment period. Penn State Extension Educators. September 2010 The Federal Crop Insurance Corporation's (FCIC) Board of Directors (Board) approved revisions of the Livestock Gross Margin for Dairy Cattle (LGM-Dairy) plan of insurance on August 12, 2010. Dairy producers interested in locking in milk prices for a portion of their future delivery of milk can use the futures market to reduce their risk. They do this by hedging, which is the buying or selling of futures contracts to offset the risk of price changes in the cash market.
<urn:uuid:6fe4f6d8-3eae-40e4-81f2-131b61393778>
CC-MAIN-2017-04
http://extension.psu.edu/business/crop-insurance/lgm-dairy
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00060-ip-10-171-10-70.ec2.internal.warc.gz
en
0.908237
381
1.710938
2
Diving in La Palma The sea beds of La Palma make up a real paradise waiting to be discovered. Due to the eruption in 1971 of the Teneguía volcano (Fuencaliente), its main attraction is the fact of being the youngest seabed in Spain. They are mainly stunned and very deep, with numerous cracks, caves and edges, some of them are protected because of their importance and uniqueness. At the same time, there are some areas with sandy bottoms. The beauty of the underwater world in the Atlantic ocean is full of surprises. Its tropical waters are absolutely fascinating for divers, no matter whether they are a beginner or not. Volcanic eruptions have created, both in the north and south of the island, a marine ecosystem of rare and fascinating rock arches, towers and caves. Sea cliffs, with a depth of up to 300 meters, host really incredible sites. To scuba dive along underwater strange formations of volcanic rock, enjoying the diversity and colourful of the sea fauna and flora, is undoubtedly an unique experience. The marine fauna is composed of fishes like parrot fishes, combers, muraenas, white sea breamss, soles, sarpa salpas, groupers ... Among them, the spot fin burr fish, protected by the Endangered Species Catalogue of the Canary Islands, plays an important role in controlling the so called blanquizal. In the area reached by sunlight are a lot of species of flora abundant, such as red and brown algae as well as many invertebrates which feed fishes and other benthic animals. If the seabed of the Canary islands combines water purity and temperature with the abundance of sea life to enjoy some incredible divings, the island of La Palma adds to this the lighting of its waters, as light reaches as far as 50 metres. The visibility and water temperature of almost 20º C in winter and 25º C in summer, make possible to enjoy scuba diving throughout the year. And if we have little or no diving skills, snorkelling is another way to enjoy the sea. It's easy, funny and safe and can be done anywhere. Just a pair of diving glasses and a tube are needed to go diving.
<urn:uuid:6ac5ee5a-4ad9-4f03-84e2-64ac11850ca6>
CC-MAIN-2022-33
https://www.casitascanarias.com/en/destination/La-Palma/diving
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00665.warc.gz
en
0.942161
466
2.265625
2
|University of California, Berkeley| |Jepson eFlora: Taxon page Key to families | Table of families and genera Index to accepted names and synonyms: | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | |Family: Brassicaceae (Cruciferae)||View Description||Dichotomous Key| |Genus: Carrichtera||View Description||Dichotomous Key| |Species:||View Description||Dichotomous Key| Carrichtera annua (L.) DC. Habit: Hairs simple, reflexed. Stem: erect to decumbent, generally branched, (0.5)0.7--3.5(4.5) dm. Leaf: basal, not rosetted, 1.5--4 cm; petiole 1--4.5 cm; blade 1- or 2-pinnately divided, lateral lobe pairs 3--6, ultimate segments 0.5--1.5 mm wide, linear to oblong; cauline short-petioled, similar to basal. Flower: sepals erect, not sac-like at base, 4--5 mm; petals spoon-shaped, cream to pale yellow, dark-purple- to brown-veined, 6.5--8 mm, 1--2 mm wide. Fruit: silicle, reflexed, lower segment 3--4 mm, 2.5--3.5 mm wide, widely ovoid to +- spheric, stiff-hairy; terminal segment 3--5 mm, 3--4 mm wide, flattened, glabrous, margins curved inward; pedicel strongly recurved, 2.5--4 mm, 1-sided. Seed: 4--6, 1.1--1.6 mm wide, +- spheric. Chromosomes: 2n=16. Ecology: Disturbed areas; Elevation: < 100 m. Bioregional Distribution: CCo, SCo; Distribution Outside California: native to Mediterranean, southwestern Asia. Flowering Time: Apr--May eFlora Treatment Author: Ihsan A. Al-Shehbaz Jepson Online Interchange Previous taxon: Carrichtera Next taxon: Caulanthus Citation for this treatment: Ihsan A. Al-Shehbaz 2017. Carrichtera annua, in Jepson Flora Project (eds.) Jepson eFlora, http://ucjeps.berkeley.edu/cgi-bin/get_IJM.pl?tid=82303, accessed on January 17, 2017. Citation for the whole project: Jepson Flora Project (eds.) 2017. Jepson eFlora, http://ucjeps.berkeley.edu/IJM.html, accessed on January 17, 2017.
<urn:uuid:e33dc954-bf6f-4f94-9e2a-e965ad2dac73>
CC-MAIN-2017-04
http://ucjeps.berkeley.edu/eflora/eflora_display.php?tid=82303
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00548-ip-10-171-10-70.ec2.internal.warc.gz
en
0.662398
657
2.125
2
“Transparency in the allocation and distribution of resources, an active and informed society that has the capacity to transform public policies and add value to urgent decisions that affect them, as well as public management models that learn to integrate and replicate positive changes in a flexible and fast way, would be good starting points to approach regenerative & just societies,” says Anna Higueras as we speak about the DLT4EU accelerator programme together with Javier Creus. The DLT4EU accelerator programme identifies and connects distributed ledger technology (DLT) entrepreneurs with leading public and private sector organisations for social and public good. Sebastian Klemm: Which deep economic reforms do we need to tackle, in order to arrive at regenerative & intragenerationally just societies that manage to live within planetary boundaries? Anna Higueras: The resolution of resource distribution problems must be approached from a systemic perspective. It seems useless to understand the needs of a part of the system without evaluating the excess of resources and their intensive use in those segments where there is availability. Transparency in the allocation and distribution of resources, an active and informed society that has the capacity to transform public policies and add value to urgent decisions that affect them, as well as public management models that learn to integrate and replicate positive changes in a flexible and fast way, would be good starting points to approach regenerative and just societes. Javier Creus: I believe there are at least three ingredients that would surely help to build such a desirable mental framework. First is long term thinking, making “good ancestors” decisions in Roman Krznaris’s terms, and which is an essential balance to a real time society. Second is continue exploring system dynamics, what we need are better systems, capable of doing more, with less, and better. Third is to build upon new sources of trust. We are living at the midst of the biggest institutional trust crisis ever. According to the Edelman Trust Barometer more than 50% of citizens in the world don’t rely on their administrations, business, media or even NGOs. In the meantime Wikipedia celebrates 20 years of trust in openness, and Airbnb goes public built upon peer-to-peer trust. DLTs are in this sense a third source of new trust upon which to build new social institutions. Sebastian Klemm: Why did you originally establish “Ideas for Change“? Javier Creus: Science & technology open up new possibilities, they widen what is possible at any time. Ideas are needed about what is not only possible but desirable in order to conduct innovation towards the common good. Sebastian Klemm: Ideas for Change together with Metabolic and Digital Catapult form the consortium that lead DLT4EU: What particular qualities of the DLT4EU accelerator distinguish this programme in your opinion? Anna Higueras: The acceleration programme is the true experiment of this project, a leading bet – developed in a totally virtual context due to the presence of the Covid-19 – that has put eight software development companies to work hand on hand with public sector organizations, aiming to solve specific and real challenges, all of them related to urgent problems for society that these organizations face in their daily lives. Javier Creus: I see lots of value in the selection and commitment of challenge owners into the process. This has allowed us to attract a wide array of startups and to provide them with a real opportunity to test their ideas, approaches and applications. Sebastian Klemm: What are your particular strengths at Ideas for Change that you were able to add to the DLT4EU accelerator programme? Anna Higueras: I feel that we have left behind a very complicated year to manage, and that the learnings are still beginning. In this context, developing and delivering results in a programme like DLT4EU, which is a very short project with immediate objectives, has been a challenge for the management team. In that sense, I believe that Ideas for Change has contributed its immediate reaction capacity and its commitment to discuss and co-create the adaptation of formats in the rare times of Covid-19. In the same direction, we have tried to make up for the lack of possibility of physical encounters and therefore the difficulty of obtaining more engaging communication materials and pieces, with the development of an attractive image and accessible, less-complex messages, to bring the citizens closer to the possibilities of DLT technologies and their relevance to bring trust and transparency to the public sector bodies. Javier Creus: I believe that we have been able to deploy our coordination and communication skills to the process. We have also applied our Pentagrowth methodology, a process to design disruptive business models, to inspire startups as to how they could generate and capture value at scale. Sebastian Klemm: How did you evolve the Pentagrowth methodology and what kind of “growth” is it all about? Javier Creus: We analyzed 50 organizations that had grown more than 50% on users and income during five years in a row, and came up with a model of the “five levers for accelerated growth”. From then on we started applying these principles to help organizations design new business models. Five years later, Pentagrowth has evolved into a solid methodology to help all sorts of organizations explore new business models, taking into account not only the external levers but their actual assets and capabilities as well. Sebastian Klemm: Growth in users or income alone does yet not say how fairly distributed thereof generated value and profit is or how depleting and unsustainable the underlying business practice. Impact – in terms of social responsibility and sustainability – has become a critical focus for a wide variety of businesses, policy makers, researchers and governments. How did you include models for social impact and ecological sustainability when mediating the Pentagrowth methodology towards the DLT4EU programme participants? Javier Creus: Thanks. Sure there are no measures of impact. What we can learn from them is not necessarily their business practice, ranging from Wikipedia to Uber, but how their value generating and value capturing models had been designed to grow leveraged on system assets and capabilities. Our process starts by defining #FuturesThatRock: the outcomes of a system able to meet natural and social needs at a new level of performance. Scientific, technological and social innovation open up the idea what is already and what will probably be possible in the next wave. More, with less, better. Pentagrowth guides through framing the outcome, discovering existing capacities in the system, looking for system leverage, designing contributive value models. Sebastian Klemm: The five levers for accelerated growth identified by the Pentagrowth methodology are: Connect Network, Collect Inventory, Empower Users, Enable Partners, Share Knowledge. In our previous interview, Alice MacNeil – upon being asked about which deep economic reforms are needed to build towards a more sustainable world – states: “(…) we need to increase resilience. A big part of that resilience is increasing the decentralization and distribution of key systems. Distributed Ledger Technologies and programmes like DLT4EU can play a big part in that.” Could you give examples of how you see distributed ledger technologies being helpful to both utilize the five levers for accelerated growth while also increasing resilience within societies? Javier Creus: Concerning connectedness, the internet of autonomous things will surely be a leverage to the use of distributed ledgers as it opens up a new space of possibilities and needs. The number of potentially valuable interactions augments exponentially with the number of autonomous data capturing and AI processing agents in the network. These new agents – let’s imagine a wallet equipped battery which buys, stores, uses and sells to maximize use of renewable excess energy – generate all sorts of new distributed and open assets, creating new opportunities to develop new huge inventories with little effort. Access to up to now uncategorized waste can be an inventory source as well. Identity and data self management supported by DLTs will surely empower citizens to develop new capacities and roles. We can imagine citizens with notarial and scientific credentials, or able to select under which conditions they share their data with other parties. We are already witnessing how new ecosystems are being structured among public, permissioned and private DLTs with infrastructuring players in each space. However, basic systems such as energy, mobility and housing are providing entry opportunities for new aggregators and other citizens institutions such as cooperatives. Support from communities provides resilience or even independence from commercial exchanges as in Wikipedia support by donors. Open DLTs which enable a basic right – identity or property – could potentially leverage on shared knowledge. Sebastian Klemm: Whereas we may still need growth in the poorest parts of the world, we may perhaps even need degrowth in the richest parts of the world in order to arrive at fairly distributed wealth. Recognising worldwide inequalities as well as planetary boundaries: What are your ideas for change to arrive at equitable growth? Javier Creus: I believe that distributed agency, providing all humans with the ability to exert their rights, is within reachable terms as technologies and connectedness become universally available, and thus citizens being able to locally influence their habitats. As payment systems in both Kenya and China have leapfrogged credit cards and fixed lines in very different ways, the same could happen with other rights such as relationships with the administration in Estonia. We surely need to think about growth. GDP measures production. If I clean my clothes and dry them in the sun it only counts “cleaning”, but if I use the dryer then it counts the “drying” as well – accidents make GDP grow! On the other hand, dematerialization of many activities for which demand can be potentially infinite such as education or entertainment, low cost distributed energy production and new processes that exchange more information than goods may both generate human welfare and less stress on planetary boundaries. Sebastian Klemm: The DLT4EU programme evolves around the focus areas of “Circular Economy” and “Digital Citizenship”: What characteristics of distributed ledger technologies (DLT) make them particularly suitable for meeting social and environmental challenges across Europe? Anna Higueras: The use of DLTs enable that the “3 T’s” are met: “Trust, Traceability and Transparency” – allowing for decentralized, transparent and validated data storage. These three characteristics are crucial for improving perception and levels of confidence when we speak about the use, life-cycle compliance or provenance of the resources in a circular economy, and on the way citizens can get registered, participate or understand how resources are used or how are aids distributed by public bodies, to name a few. The two areas in which DLT4EU has been focused are segments of global impact for the European agenda, and the results of the experiences are a good testbed for future developments and experiments within the public sector. Javier Creus: Tracking materials and exchanges is fundamental to the circular economy and DLTs are probably the best way to infrastructure those. Digital Citizenship is almost impossible to achieve without a solid identity system which DLTs can provide. On top of that, activities such as deliberation, participation and exchanges can be easily stated with their use. Sebastian Klemm: Which other projects have you conducted at Ideas for Change that fostered new forms of participation and value for citizens in a similar manner to DLT4EU? Anna Higueras: There are in fact several projects that we have carried out in this field. For instance, D-NOSES.EU is a project on odour pollution management, aiming to engage citizens in civic action to tackle odour pollution, by promoting engagement and participatory strategies at all levels. CITIES-HEALTH is a citizen science project on urban environment and health, assessing urban air and noise pollution, wood burning, urban design and mobility, and the link between the exposures and health impacts. WE-COUNT is a project on citizen science in mobility that aims to empower citizens to take a leading role in the production of data, evidence and knowledge around mobility in their own neighbourhoods. SalusCoop is a citizen cooperative of data for research, seeking to legitimise the right of citizens to control their own data, while facilitating the exchange of data to accelerate research and innovation in the health sector. FOODMAPPING is a pilot project that uses citizen science to map and characterise environments and eating habits. The aim of the project is to find correlations between the food supply available in different neighbourhoods and the diets and purchasing decisions of local residents. It was implemented for the first time in 3 neighbourhoods of the metropolitan area of Barcelona. DECODE is a project about increasing digital sovereignty of European citizens by enabling them to produce, access and control their data and exchange contextualised information in real-time, and in a confidential, and scalable manner. DataFutures is a series on new narratives about the transformative impact of data, launched together with El País. The BRISTOL APPROACH is a conceptual framework intended to catalyse citizen innovations to improve cities. It can be used to address a wide variety of urban challenges, ranging from environmental pollution and mobility to health concerns. Sebastian Klemm: In our preceding interview about DLT4EU, Alex D’Elia says: “The various masterclasses during the Barcelona Bootcamp in November and the mentoring sessions we have taken with some of the DLT4EU mentors were really valuable for us. But the most inspiring were for sure the moments spent together with the people from the consortium who advised and supported us during the whole process in the last six months.” What have been some of your personal pivotal moments throughout the DLT4EU programme so far? Anna Higueras: I especially enjoyed shaping and facilitating the ‘Charitable Aid Challenge‘ process: from the first brainstorming sessions with the Digital Future Society and the Spanish Red Cross, understanding what values the use of DLT can bring to the process to simplify and add transparency to the distribution and justification of the aid, until the subsequent coaching process with the venture team of Alice during the acceleration programme. It has really been of great value to understand how DLTs can help the philanthropic sector – charities, NGOs and public bodies – in the complexity of the internal justification processes that charities go through – a long and winding road that often unfolds through bespoken platforms, poorly optimized and resource-intensive – and how much they can benefit from authentication and validation systems such as the one developed by the data analytics specialists on the Alice team. Javier Creus: I remember our first working meeting among the challenge owner, the Sant Boi Municipal Council, and eReuse, the startup selected to help them retrofit and reuse municipal computers for social purposes. There was not much time to structure the pilot and everyone wanted to have as much impact as possible, so eReuse offered to add equipment coming from other donors. The municipality was at first shocked by the proposal and argued about how to proceed, but then we all agreed it was an excellent idea. This kind of mutual accommodation has been permanent along the pilots, it’s been great to experience how maximizing impact has served as a guiding principle in most decisions. Sebastian Klemm: Throughout the programme and along the bootcamps with mentoring therein: What evidence of positive impact and benefits of the DLT4EU accelerator do you see already? Javier Creus: First of all, challenge owners coming to realize their challenges can be solved by DLT technologies and motivated teams. Anna Higueras: The accelerator has initiated the experience of challenge owners from the public sector and venture teams of developers working together in a collaborative and close manner, understanding naturally its inner processes, strengths and limitations. Similar experiences can now kickstart faster and easier by applying the lessons learnt from the process. With a bit of time, the experience can be a first brick in the wall to improve trust and transparency, helping public institutions and NGOs to ensure citizen confidence. Sebastian Klemm: What is your objective beyond the programme’s winner announcements: How will you sustain your engagement beyond the final presentations at the European Commission in March 2021? Javier Creus: We have already contacted a few of the selected startups for future opportunities in other projects. We now know what they are capable of. I am sure that more opportunities will be available in the future.
<urn:uuid:beed7535-80a9-44f7-808d-ca0ffe1c7a0f>
CC-MAIN-2022-33
http://proofingfuture.eu/2021/02/03/ideas-for-change-an-interview-with-anna-higueras-and-javier-creus/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00468.warc.gz
en
0.939815
3,416
2.140625
2
There was no damage in Pingree Grove, which is about 45 miles northwest of Chicago. Some residents said the rumble felt like an 18-wheeler rolling through their living room. Others assumed a train derailed. A 3.8-magnitude quake is often felt but rarely causes damage. "We definitely woke up last night," said Bob Gehrke, farm owner. The US Geological Survey pinpoints the quake's epicenter as 3.1 miles beneath a field on Gehrke's farm. "When I woke up I heard the noise and shaking a bit but that was about it," said Gehrke. "Nothing damage-wise that I've found." They say animals sensed the quake was coming, seconds before people felt it. "I'm particularly glad that it didn't release 90 bulls to freedom," said Mike Goggin, Prairie State Select Sires. "Could've been real bad." Goggin says he slept right through the earthquake. Surveillance cameras captured a slight shutter just before 4 a.m. Wednesday. A 2-ton combine didn't move in a video, but the camera did. At Northern Illinois University, the tremor is blamed for a brief power outage that temporarily knocked computer servers offline. In the nearest town to the epicenter, tiny Pingree Grove, Mayor Clint Carey says the quake is giving residents something to talk about. "I got phone calls, email, Facebook blew up. Everyone thought snow plows ran into a neighbor's house or there was a natural gas explosion. There were a lot of theories going on," said Clint Carey, Pingree Grove mayor. "It's the biggest thing this week." Many homes in town are nearly a century old. Still, the quake caused no foundation cracks or other problems in Pingree Grove - just a lot of questions. "All of a sudden, we both sat straight up in bed and said 'what the heck was that?'" said Sandy Seyller, Pingree Grove resident. The earthquake registered 3.8 on the Richter Scale. Seismologists say it was felt across into Iowa, Wisconsin and Indiana because of the consistency of the earth's crust here in the Midwest. A similar quake in California wouldn't have reverberated as far. "It's important for us in Illinois because we don't see them very often but someone in California it's not the big one by any stretch of the imagination," said David Voorhees, Waubonsee Community College. "If It would've been a 5.9 or a 6.9 we might not have been standing here right now," said Gehrke. "Kind of funny when you find out it was right here, right by us but at the same time with what's been going in with Haiti, it gives you pause to think about that and say, wow, it's nice to be able to just laugh about that," said Beth Gehrke. According to experts, the Haiti quake was 1600 times the magnitude than the one felt in Northern Illinois. While the earthquake jolted Illinois residents, few will ever have the excitement that Rod Allen, a science teacher at Da Vinci Academy in Elgin had Wednesday. The seismograph in his classroom is the closest to the epicenter. "I even got an email from the US Geological Survey. I am closest instrument to the quake, don't have one within 100 meters," said Allen. To report to the U.S. Geological Survey where and when you may have felt the quake, or if you didn't feel it, go to earthquake.usgs.gov The New Madrid fault line runs through Illinois. In April 2008, a 5.2 earthquake hit downstate Illinois in West Salem. The epicenter of Wednesday's quake is close to a fault zone known as the Sandwich Fault Line. It's far less active and researched than the other line through southern Illinois. Still, there are a lot of century-old homes in the area, so residents were out checking foundations. It's also an area with a lot of natural gas storage facilities. Nicor hadn't reported any problems. Joanne Bergman lives in Mokena, but her daughter is not far from the epicenter. She said they both felt it. "I had just heard my husband leave for work and went back to bed trying to fall asleep for another 40 minutes," Bergman said. "All of a sudden, everything in the house started rattling. I could hear it in the kitchen." Bergman said at first she thought it was just wind, then she got a call from her daughter near DeKalb. "Within a minute my daughter called me and, 'Mom, did you feel the earth?' And I'm like, 'Yes!' Very scary, I was more rattled after talking to her. She was in bed sound asleep and keeps her clock radio on her headboard. She is a student up at DeKalb and said her chock radio started rattling, and her bed and everything," Bergman said. Bergman said her son, who slept in the basement of their Mokena home, did not feel the quake. "I woke him right away and said, 'Did you feel the earthquake?' He was like, no. He thought I was nuts," Bergman said. Bergman said the rattling lasted about four to five seconds. "The only way i can describe it is if a train was running along high speed past our house, where everything was shaking," she said. "I have this big shell on my TV in my room that we got many years ago in the Bahamas, and that was rattling. Nothing has ever made that thing rattle like that." People downtown reported feeling the quake, too. Writers and producers at ABC7 say they felt their desks rattle, and the executive producer said everything in the office swayed. "I'm hearing impaired. Something woke me up. It felt like something," said Roseanne Abrams, who lives on the 12th floor of a downtown high-rise. "I ran to the window." Abrams said the building across the street from her had recently caught fire, and she thought maybe there was another one. "I went back to bed, and it took me a while to go back to bed because something was wrong," she said. "And now I am finding out what it is." But some people arriving at Union Station in Chicago Wednesday morning didn't even know the area had experienced an earthquake. One man said he was brushing his teeth when the mirror began to shake. He said he didn't know what was going onuntil he arrived at the train station. "The front of my mirror rattled as I was brushing my teeth," said Juan Zamarripa. "I thought it was a train accident something like that." "I thought someone was plowing my front driveway. It was incredible. I was like, huh?" said Pete Smith. "It was puzzling because I felt the bed shake," said Bernie Talbert. "I thought my wife was moving around, she thought I was moving around, we thought the cat was moving around. And then she said, 'What is that?' I said, 'I bet it's an earthquake.' 'You're nuts.' When I turned on the radio this morning, I heard about it." "I was in the bed," said Ernestine McCollum. "I felt the shaking. I did not get up, and I heard the windows, you know, like shaking. I said to myself, 'Oh, it's an earthquake, it has to be.' When I turned on the TV, they confirmed it." "I was a little alarmed. I felt the bed shake, it felt like a tremor. I don't know. Then it stopped," said Priscilla Yee. "Everything was trembling. My son called me this morning, early, around 6:30. He said his young children woke up, and the 5-year-old was frightened. The house was shaking. He lives in Geneva," said Giovanna Verdecchia. Not everyone knew about the earthquake even as late as 10 a.m. "There was an earthquake?" Louis Spence-Smith said. "I was sleeping." "Is that a serious question?" asked Dan Schmieder, who was unaware of the morning quake. "I was sound asleep."
<urn:uuid:7400d1e5-af7d-4567-a7dd-8f7451684830>
CC-MAIN-2017-04
http://abc7chicago.com/archive/7268309/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282140.72/warc/CC-MAIN-20170116095122-00127-ip-10-171-10-70.ec2.internal.warc.gz
en
0.99008
1,754
1.71875
2
The independent Civil Society report on the state of race and racism in England to the United Nations, curated by the Runnymede Trust, shows that racism is systemic in England with BME groups facing disparities across health, housing, the criminal justice system, education, employment, immigration and political participation. In stark contrast, the Commission on Race and Ethnic Disparities, set up by the Government in response to the Black Lives Matter protests, denied the existence of systemic racism, saying “we no longer see a Britain where the system is deliberately rigged against ethnic minorities.” Likewise, businesses were quick to declare their support for the Black Lives Matter protests, but there are still no black CEOs in the boardrooms of FTSE 100 companies in the UK and only 13 currently report any ethnicity pay gap. Despite the many challenges, it’s important to remember the impact of Black Lives Matter as we head into Black History Month 2021, and beyond, into 2022. The UK had the largest Black Lives Matter protests in the world last summer outside the US, which quickly turned the spotlight onto historical and systemic racism in the UK. The pressure will hopefully be on institutions and businesses to take tangible action on structural racism as reports reveal the scale of the problem – from the media and football to entertainment and business. The Chartered Institute of Personnel and Development (CIPD) has called for mandatory ethnicity pay gap reporting by 2023. In August, West Yorkshire launched its Root Out Racism pledge, involving around 500 organisations and community allies across the region, with leaders saying the pledge is needed due to institutional racism in the UK. Hopefully, slowly, collectively, these kinds of acknowledgement are signs of the changes that are so long overdue. It’s been a challenging time for many Black and Brown people, with so much in the media about racism, inequality and injustice. We wanted the theme of Black History Month 2021 to focus on celebrating being Black or Brown, and to inspire and share the pride people have in their heritage and culture – in their own way, in their own words. Our Proud To Be campaign is inspired by Black Lives Matter and invites Black and Brown people of all ages throughout the UK to share what they are Proud To Be. Making Black History Month 2021 personal and unique to individuals, families and communities, focusing on how we’re all making history all the time in our own ways, as well as the contributions and achievements of Black and Brown people throughout history. By asking people to share what they are Proud To Be we can share both individual stories and the vast richness of diversity that Black and Brown people bring to the UK. Black Lives Matter means people being able to live life to the fullest without having to compromise who they are. Everyone deserves the right to be Proud To Be everything they are and want to be in life. The Proud To Be campaign will also focus on encouraging children and young people to share what they are Proud To Be. We’ve created a new resource pack for schools to integrate Black history across the whole curriculum all year round, and to support teachers and young people to talk about and understand issues of race and equality. As always, honouring our past and ancestors is important in shaping our future, but it’s also important to honour our present – and ourselves. Safiya Mawusi, who helps to organise Black Lives Matter protests in Cambridge, was inspired by Rosa Parks to tackle how her city thinks about race. Specifically, Safiya was inspired by the way Rosa Parks and others boycotted the bus system for a whole year in 1955. Knowing our past is helping us to change our future and hopefully that’s a lesson that will eventually be learnt at a systemic, institutional and structural level. I’m Proud To Be Black every single day and this Black History Month, it’s time to celebrate every single one of our stories.
<urn:uuid:097ef84f-8df4-4db0-81cc-5f9aedf12c71>
CC-MAIN-2022-33
https://www.museumand.org/2021/10/01/black-history-month-2021-lets-make-it-a-festival-of-celebration/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00067.warc.gz
en
0.958246
795
2.375
2
End pharma influence on CME, says AMA journalBMJ 2006; 332 doi: http://dx.doi.org/10.1136/bmj.332.7555.1410 (Published 15 June 2006) Cite this as: BMJ 2006;332:1410 - Janice Tanne - New York The American Medical Association's ethics journal has suggested reducing drug companies' influence on doctors' prescribing habits by stopping the companies paying for continuing medical education (CME; American Medical Association Journal of Ethics 2006;46:357-436). Such education is required in most US states and by many medical societies. The journal devoted its entire June issue to ways to reduce or manage drug company influence on doctors. In 2004, more than $2bn (£1.1bn; €1.6bn) was spent on continuing medical education. Medical communications companies and medical schools depend heavily on drug companies to develop educational programmes, say the authors, Dr Adriane Fugh-Berman, an adjunct associate professor and specialist in complementary and alternative medicine at Georgetown … Log in using your username and password Log in through your institution Register for a free trial to thebmj.com to receive unlimited access to all content on thebmj.com for 14 days. Sign up for a free trial
<urn:uuid:ad690e61-d716-47fc-a1f6-134817ec0882>
CC-MAIN-2017-04
http://www.bmj.com/content/332/7555/1410.1
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00074-ip-10-171-10-70.ec2.internal.warc.gz
en
0.917573
273
1.859375
2
Orange Shirt Day has special meaning on reserves. It’s not usually a happy celebration.* So many who suffered abuse in residential schools would rather forget the humiliation and pain that speaking Cree or any other First Nations language would incur. Only recently have many of the descendants of these survivors discovered that their grandparents suffered. So, especially on that day, Mamawi Atosketan Native School (MANS) teachers try to fill in some of the history gaps and go above and beyond their usual day-to-day incorporation of Cree language and culture. This past fall, as grade 5 teacher Suzann Self thought about Orange Shirt Day, she got an idea that’s now become part of every school day. After reading the short book I Am Not a Number with her class, Self proposed an experiment: the class would simulate the banning experience on a small scale for an extended time. Few of Self’s students spoke any Cree; what if they banned two English words a week and “forced” everyone to use the Cree words? The students were enthusiastic, and Self began researching Cree words to substitute. It was the beginning of a rewarding journey. Self discovered perspectives on the world she’d not realized until she investigated the Cree language. “The language has so much depth,” says Self. “In Cree the word for ‘child’ translates as ‘on loan from the Creator.’ Isn’t that beautiful? And so meaningful!” Students not only wanted to know more of their language but also became teachers themselves, correcting each other and Self when slips were made. As the tables turned and roles switched, Self was kindly corrected when she mispronounced a Cree word or slipped in an English word that had been banned. The language of her students came alive for all as they shared its meaning and the cultural ideas behind it. On spelling tests, the bonus point words are the Cree words — an incentive to write as well as speak their language. By being open to the experience of her students and their culture, both Self and her students are learning more in so many areas, including the priceless value of each child as a gift belonging to the Creator. * September 30 is Orange Shirt Day. It is inspired by the story of residential school survivor Phyllis Jack Webstad who, as a 6-year-old girl was gifted an orange shirt by her grandmother before being taken away to a British Columbia residential school. On the first day of class the orange shirt was confiscated and destroyed by her teacher. Orange Shirt Day acknowledges Webstad’s story as well as the colonial assimilation goals of residential schools and their lasting impact on Indigenous communities nationwide. Established in 2013, the date was selected because it was the time of year when children were taken from their homes to residential schools, and, according to the Orange Shirt Day website, “because it sets the stage for anti-racism and anti-bullying policies for the coming school year.” Orange Shirt Day is an opportunity for communities to come together, listen, and remember those who did not make it home. — Lynn McDowell is director of planned giving/philanthropy at the Alberta Conference; Mylen McDowell is a communications specialist living in Edmonton, Alberta, Canada. This article originally appeared in the January 2021 Canadian Adventist Messenger.
<urn:uuid:a00d6403-e8a8-47cd-9a83-1e0231e48405>
CC-MAIN-2022-33
https://www.nadadventist.org/news/creative-use-cree-engages-learning-mamawi-atosketan-native-school
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00073.warc.gz
en
0.977869
690
3.453125
3
|Does sugar feed cancer cells? Dear Cancer Project supporter, Lately, I have been thinking a lot about radiation, the delicate balance of life, and the connectedness of our world. I realize that there couldn't be a better time in history to be consuming a plant-based diet. We know that plants have an amazing ability to build our immunity and maybe even protect us against radiation. Perhaps most importantly, since pollutants are known to accumulate and potentially become toxic the higher up on the food chain you go, then consuming foods at the lower trophic level (plants!) reduces your exposure to environmental contaminants. Add in the cancer-fighting, health-promoting, earth-sustaining, cost-effective features of this diet, and it becomes clear that this is the direction our civilization needs to head. If you haven't given the 100 percent plant-based diet a fair chance, now is the time to try! Join the 21-Day Vegan Kickstart and read on for more Cancer Project news. Warm springtime wishes, Expanding Outreach Efforts The Cancer Project’s Food for Life Program continues to expand nationwide. This March, 16 new instructors and Educational Alliance Program (EAP) members joined the Food for Life team. The addition of these new instructors and EAP members will enable the cooking and nutrition class program to now be offered in the following new states: Delaware, Missouri, Rhode Island, Utah, and West Virginia, as well as in the cities of Ottawa, Ontario, and Waterville, Quebec in Canada. The new instructors and EAP members are eager to empower cancer survivors, friends, and family members with easy-to-implement cooking skills that turn every meal into a delicious dose of healthy nutrition. To find out if there is a class near you, please visit our class resource page. Please contact email@example.com to learn more about becoming involved with teaching the Food for Life program or to bring classes to your community. Mushrooms for Cancer Prevention and Survival For centuries, Eastern medicine has explored the health benefits of mushrooms. Today, researchers are finding that certain properties in mushrooms appear to have anticancerous effects. In 2009, a study from southeast China found that women could reduce their risk of breast cancer by consuming a small amount of mushrooms. When the women in the study included green tea, their breast cancer risk decreased even more. Intake of fresh mushrooms (greater than or equal to 10 grams per day) and dried mushrooms (greater than or equal to 4 grams per day) decreased risk by 64 percent and 47 percent, respectively. The most commonly eaten mushroom in this study was the white button mushroom; one small white button mushroom weighs 10 grams. So why mushrooms? Apparently mushrooms have multiple beneficial effects on the body that work synergistically to signal certain receptors, which then enhance the immune system. Extracts from certain species of mushrooms are now used pharmaceutically to combat diseases. Some antifungal proteins in mushrooms have been shown to inhibit enzymes that stimulate the human immunodeficiency virus (HIV), and have also shown to inhibit tumor cell proliferation. Beta-Glucans are a type of polysaccharide (long chains of glucose) found in mushrooms. These polysaccharide substances appear to stimulate the immune system. Unlike pharmaceutical drugs, mushrooms do not have to go though numerous trials in order to be found “safe.” Their ability to modulate the immune system is promising. The research is not perfect, but mushrooms (like many other plant foods) offer for a healthful option for breast cancer patients, survivors, and those looking for ways to prevent Reishi mushrooms (rarely found in nature) contain more than 400 different bioactive compounds. Similar to the phytonutrients found in brightly colored plants, mushrooms offer multiple ways to protect the body from foreign invaders. For example, they promote anti-inflammatory responses, protect from chemo and radiation therapy, stimulate antihormonal responses, regulate sleep cycle, and contain potent antioxidants. Because of the various beneficial roles mushrooms exhibit, many nutritionists encourage increased mushroom intake. Shitake, portabella, and chanterelle mushrooms are some of the better known types Wong JH, Ng TB, Cheung RC, et al. Proteins with antifungal properties and other medicinal applications from plants and mushrooms. Appl Microbiol Biotechnol. 2010;87(4):1221-1235. Ramberg JE, Nelson ED, Sinnott RA. Immunomodulatory dietary polysaccharides: a systematic review of the literature. Nutr J. 2010;9:54 Sanodiya BS, Thakur GS, Baghel RK, Prasad GB, Bisen PS. Ganoderma lucidum: a potent pharmacological macrofungus. Curr Pharm Zhang M, Huang J, Xie X, Holman CD. Dietary intakes of mushrooms and green tea combine to reduce the risk of breast cancer in Chinese women. Int J Cancer. 2009;124:1404-1408. Lull C, Wichers HJ, Savelkoul HF. Antiinflammatory and immunomodulating properties of fungal metabolites. Mediators 21-Day Vegan Kickstart PCRM’s 21-Day Vegan Kickstart began on April 4 and is designed to help you explore and experience the health benefits of a vegan diet! It’s not too late to sign up now to receive daily e-tips geared towards helping you on the path to weight loss, better health, and an overall greater well-being. This free, online 21-day program includes: celebrity coaches providing guidance and inspiration, a 21-day meal plan with delicious, easy, and satisfying recipes, weekly motivational nutrition webcasts, social support of other Kickstart participants through a community forum, and much more! What are you waiting for? Register today at 21DayKickstart.org! Easter and Passover Brunch Menu With Easter and Passover fast approaching, PCRM and The Cancer Project are overjoyed to bring you a delicious brunch menu that can be served on either occasion! Both occasions recognize food as an important part of the celebration. Whether or not you take part in Easter or Passover festivities, we have a variety of high-fiber, low-fat recipes that can be added and enjoyed with any of your meals. Preparing healthy meals together with family and friends gives everyone the opportunity to contribute and share in this special time. Take a peek at our special menu >> Honor a Someone Special with a Tribute Gift Making a donation to fight cancer is a meaningful way to honor a special person or occasion. A tribute gift to celebrate Mother’s Day, an upcoming birthday, or an important milestone in cancer recovery is a thoughtful way to mark the occasion and support the work of The Cancer Project to wipe out this disease. If you would like to make a gift in memory or in honor of a loved one, we will send a card to the family or honoree acknowledging your thoughtful donation. Click here to donate. Diet and Cancer in the News Evaluating Plant-Based Nutrition for Disease Prevention On Feb. 24, Cancer Project dietitian Joseph Gonzales, R.D., L.D., presented an evidence-based nutrition lecture, "Evaluating Plant-Based Nutrition for Disease Prevention," for McCormick & Company, Inc. Scientists and dietitians in McCormick’s Sensory Science Division gathered to learn about plant-based nutrition as they experienced a raw, vegan meal from a local caterer in Hunt Valley, Md. Attendees dined on live pizzas, healthy dips and spreads, and fresh salads with sprouted whole grains. Many of the 40 scientists were surprised that the live plant foods were flavorful and delicious. But more important than the delicious food was the peer-reviewed research accompanying their meal. Studies continue to be published touting the health benefits of plant foods. One of the world’s leading cancer organizations, the American Institute for Cancer Research, highly recommends plant foods, such as soy, broccoli, flax seeds, and whole grains, among others, for fighting cancer. Some cancers can be greatly ameliorated by plant-based diets, and the overall benefits of a vegetarian or vegan diet are tremendous. Heart disease, diabetes, obesity, arthritis, and many other common health problems can often be prevented or reversed with a healthy lifestyle. It starts with an optimal diet full of the foods scientifically proven to help fight cancer, followed by a bit of physical activity and stress reduction (such as yoga, playing an instrument, or gardening). For more information on this presentation, you may contact Joseph Gonzales at jgonzales@CancerProject.org. New Food for Life Cooking and Nutrition Classes for April See a full class schedule and to register visit here >>
<urn:uuid:d57de76d-742f-4f99-8cfa-fd40af0c33c4>
CC-MAIN-2016-44
http://support.cancerproject.org/site/MessageViewer?em_id=11881.0&dlv_id=23301
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719453.9/warc/CC-MAIN-20161020183839-00230-ip-10-171-6-4.ec2.internal.warc.gz
en
0.917072
1,897
2.59375
3
where community becomes therapy "In 1986, I arrived at the 4 Varas community (in the Pirambu favela in Fortaleza, Brazil) with my medical students from the Federal University of Ceará. A lady told us that she couldn't sleep and asked for a medicine that we didn't have. When I was going to prescribe a medication, she said she didn't even have the money to buy food for her children, let alone expensive medicines. I realized that I was acting the way I was used to acting in the hospital. The woman began to tell her story, to cry. Another came who supported her by giving her a handkerchief to dry her tears; another gave her a foot massage, another brought a cup of herbal tea, another began to share a similar personal experience. I realized then, that this woman started to be supported, that bonds of affection were created. She found what she came for; the support of the community, not my expertise. I realized that the community that has problems also has its solutions. Thus was born Integrative Community Therapy (ICT), a space for welcoming soul pain and collective suffering." - Dr. Adalberto Barreto we believe community has the power to heal Visible Hands Collaborative is the first U.S.-based organization to provide certified training in Integrative Community Therapy (ICT, also referred to as Terapia Comunitária Integrativa or TCI), a large-group dialogic therapy that facilitates community conversation and builds emotional solidarity. ICT in Action For other questions and comments email firstname.lastname@example.org
<urn:uuid:d74c0bd5-29f6-48d4-a97b-d3a3533b5e44>
CC-MAIN-2022-33
https://www.visiblehandscollaborative.org/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00669.warc.gz
en
0.977608
367
1.65625
2
Scotch Bonnet Island From WHEN CANVAS WAS KING, a soon to be published book by Robert B. Townsend The schooners and steamers travelling down the lake from Toronto to Kingston used to skirt the north shore, breaking off at Cobourg andcircumnavigating the “island county” by the lights of the Scotch Bonnet, Wicked Point (now called Salmon Point), Point Peter, and the Red Onion at South Bay, and the Ducks, Falseand Main. The two acre reef is about two miles from the mainland, where Huyck’s Point juts out and the shore gallops away east into Big Sandy Bay, and catches its breath to turn south again at Wellington. Across a short mile of shoal lies Nicholson’s Island. The Public Works report of 1852-53 stated “In Lake Ontario a lighthouse is being built on the Scotch Bonnet or Egg Island, a small low island lying southeast of Presqu’ile and in the direct line of the Mail and other vessels running down the lake from Cobourg.” The Scotch Bonnet light was set on a 54 foot high stone tower. It was burning brightly by 1856 and was finally blown out July 1st l942. The area has been a famous corner of Lake Ontario for wrecks since the loss of the government schooner Speedy in 1804. Since then it has witnessed many other shipwrecks: the Ida Walker’s and the Queen of the Lakes, and Belle Sheridan’s loss above it at Weller’s Bay; the International’s and Jessie’ and Henry Folger’s at Wicked Point below it. In its own vicinity, the schooner Blanche was lost, with Capt. Johnny Henderson and all his Cat Hollow crew in 1889. It was near here that the Ellen of Hamilton perished, drowning all hands. Back of the reef, on Huyck’s Point, the Sarah Ann Marsh frapped in chains to hold her together, drove in a December snowstorm. Her crew were cared for by the farmer’s wife on nearby Nicholson’s Island. The island is quite uninhabitable and awash in high spring water. In low water, it makes a good nesting ground for gulls. They like to hatch their eggs by the radiated heat of the sun-baked rocks. The keeper had to live on canned goods and hardtack or use a house on Nicholson’s Island, a mile away, rowing across night and morning to attend his light. There was a great succession of keepers up until 1919 when the light became an unwatched beacon and was maintained as required. It was a fixed white light in 1877 and was so for 56 years. In 1907 it was changed to “vapour lights” acetylene gas, with oil used in emergencies which sometimes occurred. A hand horn, worked by the keeper when he considered it necessary, was part of the equipment and in the days of the schooners it was a grand assistance by day and by night. The Scotch Bonnet light flashed a welcome gleam to many an anxious mariner in the old days of sail for that narrow mile of water between Nicholson’s Island and the mainland offered shelter for schooners and even for steamers against westerly gales if they had good ground tackle and were bold enough to wade through the welter of seas piling over the Bonnet light itself and back-surging from the western face of the island to leeward of it. Probably light keeper Pye’s record of using up eleven lamps in one season was due to seas and gales breaking the lighthouse windows. The Scotch Bonnet reef was too tiny and Nicholson’s was not big enough to make much of a lee but combined they broke the sea somewhat, and the man or the ship nimble enough to round up sharply in the comparative smooth of the strait between island and mainland had a chance for life if his anchors held and the wind did not shift and come too hard from the north or the south. The Scotch Bonnet light remains in service for modern mariners and those that sail in proximity will see the remnants of the crumbling stone tower on the island.
<urn:uuid:07b98cab-ac09-420a-94fe-2d08369c553e>
CC-MAIN-2017-04
http://loor.ca/lake-ontario-300/history/scotch-bonnet-island/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280761.39/warc/CC-MAIN-20170116095120-00092-ip-10-171-10-70.ec2.internal.warc.gz
en
0.971946
892
2.59375
3
The phrase, ‘A picture is worth a thousand words,’ has become a cliché of sorts in today’s Instagram-happy world where a single photo, selfie or otherwise, can be circulated among across millions around the world. However, as overwrought as its use has become today, it was only too correct when the now infamous image of a young, three-year old boy, dead and washed up on a Turkish beach, far from home or hope, went viral. The boy, Aylan Kurdi, was not the first one, nor will he be the last, to perish in the ongoing exodus of thousands as they flee violence and persecution in their native countries. Why are these people fleeing in the thousands? There are some answers but, where are the solutions? Why are supposedly-rich Gulf States like Saudi Arabia refraining from supporting these refugees? One can only hypothesize, considering they are pretty tight-lipped about the whole matter. And most importantly, why did it take the death of a young boy to trigger our conscience and our humanity? That is a question we can only ask ourselves. What is going on? It is difficult to put a finger on the exact time when the present European refugee crisis came into being. West Asia and the Middle-East has never been the safest, or even the most stable part of the world but for most of its history, the number of refugees had always been manageable. In fact for years, Europe used to pay Libya’s Muammar Qadaffi to intercept and turn back refugees fleeing to Europe on boat. But, in the absence of strong institutions after Gulf War II (‘War of Choice’) and the Arab Spring of 2011, the region descended into a spiraling chaos of violence and anarchy. In fact, the most significant institution to come out of these events was the Islamic State, and God knows that didn’t turn out too well. Today, the Islamic State has large swathes of territories in Iraq and Syria under its control, its forces on the doorsteps of both Baghdad, and more recently, Damascus. Put it simply, it is very easy to understand why the native Syrian population, 1/5th of which has already fled to Europe or neighbouring countries is having such trouble staying there, especially as they find themselves trapped between the fanatical IS and the equally ruthless pro-Assad forces. And, it’s not just Syria. Many of these refugees also come from Libya, Afghanistan, Somalia and even, Pakistan; all countries with a recent history of turbulent internal strife. The European Reaction The refugee crisis has gone on for over a year now and yet, we are no closer to find a solution to this exodus. A lot of the responsibility, or rather the blame, for this crisis lies at the footsteps of Europe and the US. As if invading another country on faulty evidence and without UN mandate was not enough, the attitude of the EU and the US over the year and a half has been nothing but callous. Even as EU leaders met in Luxembourg last week, a consensus on a uniform plan of action is yet to emerge. So, as Slovakia stands firm on accepting only Christian refugees, Hungary resolves to build a wall to stop the influx of more refugees and Great Britain stands indecisive, Greece and Italy remain overwhelmed with the thousands of such refugees who come in every day. Germany however, to its credit has been very vocal about its ability and willingness to give shelter to such refugees (To counter the Anti-Semitic exodus of the 1930’s but, fortunate all the same). The problem however is the fact that Germany is not accessible by way of the Mediterranean, or the Balkans, which means that getting to Germany, means a long transit through much of the rest of Europe. The rest of Europe on the other hand, claims to stand by the Dublin Regulation (One which Germany has temporarily suspended), an EU law which requires refugees to stay in the first EU country they arrive in until their asylum process is complete, which is why there is hardly any respite for many in Greece and Italy. In reality however, EU law has perhaps nothing to do with the present crisis but is instead, a mirror to the xenophobic and racist nature of the largely Christian-Judea Europe, a nature which is largely anti-immigrant, a wave that Donald Trump has ridden on the top of in the United States. Will the Arab World please stand up? However, as much as the blame and responsibility lies with Europe and the United States, it also lies with much of the Arab world, especially the rich Gulf States of Saudi Arabia, Kuwait and Qatar. As of now, Turkey, Lebanon and Jordan remain the only countries offering shelter to these refugees. But apart from Turkey to a certain degree, the other two are hardly stable, or even safe. Lebanon has had a history of civil war while Jordan doesn’t even have enough clean water for its own citizens. Even the UNHCR camps in these countries are sorely lacking as it reports a funding gap of over 40%, with countries like Saudi Arabia contributing less than half of what Finland has contributed. After Aylan’s death came to the fore, someone commented that the father was to blame for flirting with a greedy, dangerous life to a land so far. Dangerous perhaps, but did he have a choice? Much of the Gulf-States today, are based on the idea of tribal and ethnic unity, and the need to maintain the sanctity and homogeneity of its people. This is therefore, the main reason why the thousands who migrate to such countries, including Indian expats who provide the much needed cheap labour in these countries are never given citizenship. Citizenship comes with rights and autonomy, a political economy that the ruling elite of these states want to keep within their tribes, a fact which is why refugees are more naturally inclined to flee to the so-called land of the free, the West. For the Arab world of Saudi Arabia (especially considering its clandestine support of Sunni militants), Kuwait, Qatar, UAE and Bahrain to accuse Europe of moral bankruptcy is hypocrisy. After all, if they are so keen on lecturing the Christian world on acting very un-Christian, why are they letting their Muslim brethren flee to the land of the ‘infidels’ themselves? It is sad to realize that it took a photo of a helpless, dead kid on a beach for the world to turn its attention to the refugee crisis that has been going on for over a year. Why now, some ask. Perhaps, a dead child reflects all that is going down in this world, the loss of innocence being one of them. But, didn’t the world already know that? Wasn’t the world averse to the fact that innocents are being slaughtered by the thousands as they are gunned down, bombed, raped and drowned in the turbulent waters of the Mediterranean? The fact is, we always knew. And we did nothing. Someone famously said, “All that is necessary for the triumph of evil is that good men do nothing.” It is certainly appropriate for times like these. The world has failed Aylan, it has failed humanity. Views presented in the article are those of the author and not of ED.
<urn:uuid:4aae333a-5fd9-4720-ba31-cb3ea9686da1>
CC-MAIN-2017-04
http://economydecoded.com/2015/09/european-refugee-crisis-the-truth-of-our-failing-humanity/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00032-ip-10-171-10-70.ec2.internal.warc.gz
en
0.970741
1,497
2.171875
2
Internet Explorer continues to lose market share to competing browsers. The once dominant Netscape-killer now appears beleaguered, according to recent WebSideStory data, which says Internet Explorer’s share dropped by 1.5 per cent to 90.3 per cent, since December to Mid-January. It held 95.5 per cent in June 2004. Firefox is emerging as the clear alternative of choice, grabbing five per cent of the market, up 0.9 per cent in the same period. Others browsers also0 benefit: "Apple’s Safari and Opera grew from a little under one percent to 2.1, a 1.1 perc ent (or doubled) growth factor," reports CoolTech. FireFox uses technologies developed within Netscape/AOL since 1999; technologies devised by teenage tech wunderkind Blake Ross and esteemed developer David Hyatt. The Associated Press has an interesting story that reports that while Ross - who was just 17 - went on to develop FireFox, Hyatt moved with Apple to build Safari.
<urn:uuid:31077209-cc36-4415-9989-7f476b82668e>
CC-MAIN-2016-44
http://www.macworld.co.uk/news/mac/internet-explorer-loses-many-users-10694/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721387.11/warc/CC-MAIN-20161020183841-00448-ip-10-171-6-4.ec2.internal.warc.gz
en
0.939518
216
1.71875
2
The term “fast fashion” is poised to take on a whole new meaning, thanks to a breakthrough in three-dimensional printing that could revolutionize the way clothing and shoes are made. Researchers at Loughborough University in London, in collaboration with Thailand’s Yeh Group and an unnamed “major fashion house,” are embarking on an 18-month project to create customized garments in under 24 hours. Advances in so-called “additive manufacturing,” the industrial form of 3D printing, have made it possible to produce 3D-printed garments from polymers in a single manufacturing operation, according to Guy Bingham, senior lecturer in product and industrial design at Loughborough University. Not only does this technology have the potential to reduce waste, water, labor, and carbon emissions, he says, but it can also make bespoke apparel an affordable reality. FASHION ON DEMAND The rise of cheap and disposable clothes, while profitable for their retailers, hasn’t been kind to the planet, not to mention the people who make them. In the United States alone, consumers buy about 20 billion pieces of clothing a year—that’s roughly 68 items per person. We’re also throwing away a lot. According to the U.S. Environmental Protection Agency, Americans chuck at least 12.7 million tons of textiles into the garbage annually. While textile-recycling schemes divert some of that waste, Bingham says 3D printing can bring another solution to the table, one that reduces fashion’s footprint from the start. “With 3D printing there is no limit to what you can build and it is this design freedom which makes the technology so exciting by bringing to life what was previously considered to be impossible,” he said in a statement. “This landmark technology allows us as designers to innovate faster and create personalized, ready-to-wear fashion in a digital world with no geometrical constraints and almost zero waste material.” Three-dimensional printing could also do away with ill-fitting clothes and shoes. Customers of the future could upload body scans to online stores, for instance, and eliminate the guesswork of sizing. “Printing clothes using [additive manufacturing] will revolutionize the fashion industry worldwide by opening up digital manufacturing to the masses via online retail, bringing a much needed update to 19th century techniques and processes,” Bingham said. “This modern approach to clothing production helps meet the growing demand for personalized apparel and footwear which through 3D printing can be produced in a sustainable and ethical way.”
<urn:uuid:435a2e05-df09-4f55-a5ac-c04c283cdfbd>
CC-MAIN-2017-04
http://www.ecouterre.com/3d-printing-breakthrough-could-change-the-way-we-consume-clothing/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00237-ip-10-171-10-70.ec2.internal.warc.gz
en
0.945055
542
3.203125
3
Rapists to be treated by chemical castrationJanuary 6th, 2008 - 5:28 pm ICT by admin London, Jan 6 (ANI): British police officials have devised a new way to cure sex offenders chemical castration. In the treatment, the offenders will be given daily tablets or monthly injections that reduce male testosterone to levels found in prepubescent boys. The prisoners, who are being considered for the programme, are sent a letter disclosing the effects of the cure, as it is illegal to administer such medication forcibly. These drugs reduce levels of the male hormone testosterone. This has the effect of decreasing sexual interest and arousal. Although you can still have sex, it is much more difficult. It is possible, however, to adjust the dose to a level where you can have sex with a partner, Times Online quoted the officials, as writing in the letter. The chemical castration programme will focus on those sex offenders who have the most serious conditions of hyperarousal and intrusive sexual fantasies. An advisory document sent to probation officers said these would include prisoners prone to sexual sadism, necrophilia, voyeurism and exhibitionism. Because the treatment is voluntary, prison doctors and probation officers cannot be certain that sex offenders will continue with their treatment. Some experts strongly disagree with the use of such medication. Diane Newell, a consultant at RWA, a clinic treating sex offenders in Milton Keynes, said: Sex offending is a lifestyle problem rather than a physiological problem. It should be treated by reteaching moral boundaries and counselling rather than drugs.(ANI) Tags: advisory document, british police, chemical castration, exhibitionism, hormone testosterone, london jan, male hormone, male testosterone, milton keynes, moral boundaries, physiological problem, police officials, prepubescent boys, prison doctors, probation officers, rapists, sexual fantasies, sexual interest, sexual sadism, voyeurism
<urn:uuid:fb8beafa-7033-4bd1-b987-630773214df6>
CC-MAIN-2016-44
http://www.thaindian.com/newsportal/health/rapists-to-be-treated-by-chemical-castration_10011504.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988717963.49/warc/CC-MAIN-20161020183837-00373-ip-10-171-6-4.ec2.internal.warc.gz
en
0.932079
395
1.5
2
Want to save more cash for retirement but not sure how to get started with an effective strategy? You are not alone, because most working adults feel the same way. Recent economic downturns like soaring inflation and housing market disruptions have made it more challenging than ever to sock away money for the long haul. Is there a solution? Luckily, there are a few tactics that can increase a person's chances of initiating and slowly increasing the balance of a designated retirement account. The following suggestions can help you get priorities in order and begin saving as quickly as possible. Know Your Options Find out what kind of benefits are available to you by asking your employer about 401(k) plans, matching provisions for payroll savings accounts, and any other company-sponsored options. Many private companies still offer generous matched savings plans that are essentially free money for workers who have the discipline to set aside a percentage of their incomes. Adjust the Monthly Budget There is one simple math equation: when you reduce monthly expenses, there's more left over for other purposes, including IRAs and similar arrangements for your golden years. Of course, the trick is to figure out how to get those expenses down. For those who are carrying a balance on one or more education loans, there is plenty of potential. That's because a student loan consolidation can be an excellent, simple, and effective way to combine all the loans into a single monthly payment with potentially better terms, rates, and repayment timing. It's important to learn the ins and outs of how consolidating works by reviewing an informative guide that uses clear examples to delineate the benefits of the process. Speak with a Professional Spending money to pay for an hour session with a licensed retirement planner is a wise investment for most working adults. Unless you know the landscape well, take the time and make the investment to get solid, reliable advice that is based on your specific financial situation. Unfortunately, too many adults assume that paying an expert for financial advice is a waste of money. But if you find a competent service provider with experience in the field. Check Your Earnings Record Create an account with the SSA (Social Security Administration) in order to access your lifetime earnings record. Another advantage of having an account is that you can use the online SSA tools to see how much you need to earn between now and retirement to achieve specific monthly benefit amounts. In about 20 minutes, users can see exactly how much they have already paid into the system and choose an optimal date for beginning to receive benefits. Downsize Wherever Possible There is a lot to think about at this stage and the considerations of downsizing your home and lifestyle are no exception. Make an honest personal assessment about where you can downsize. Is it possible to sell your home and purchase a smaller one, move into a townhouse, or buy an efficient condo? Do your own more vehicles than you need? What about all that stuff stored away in the attic, basement, and garage? Can you sell some or all of it for a quick cash boost? Downsize wherever you can in order to free up monthly cash flow for long-term savings.
<urn:uuid:5d79273d-9764-4bb6-be43-20cb228a4431>
CC-MAIN-2022-33
https://www.retiredbrains.com/blog/5-retirement-tactics-for-working-people
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573667.83/warc/CC-MAIN-20220819100644-20220819130644-00077.warc.gz
en
0.953007
654
1.851563
2
Bloomberg reports: Russia’s effort to influence U.S. voters through Facebook and other social media is a “red-hot” focus of special counsel Robert Mueller’s investigation into the 2016 election and possible links to President Donald Trump’s associates, according to U.S. officials familiar with the matter. Mueller’s team of prosecutors and FBI agents is zeroing in on how Russia spread fake and damaging information through social media and is seeking additional evidence from companies like Facebook and Twitter about what happened on their networks, said one of the officials, who asked not to be identified discussing the ongoing investigation. The ability of foreign nations to use social media to manipulate and influence elections and policy is increasingly seen as the soft underbelly of international espionage, another official said, because it doesn’t involve the theft of state secrets and the U.S. doesn’t have a ready defense to prevent such attacks. Agencies including the Office of the Director of National Intelligence and the Federal Bureau of Investigation are now examining what could be done to prevent similar interference and espionage in future elections, starting with the 2018 midterm congressional vote, the official said. At the same time, Russia is ramping up its hacking operations, Director of National Intelligence Dan Coats said. [Continue reading…]
<urn:uuid:a026baa7-df8c-4050-b08c-357f6251b2c2>
CC-MAIN-2022-33
http://warincontext.org/2017/09/13/mueller-probe-has-red-hot-focus-on-social-media-officials-say/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00276.warc.gz
en
0.943801
269
1.640625
2
Here’s What The Military Is Doing To Help Hurricane Maria-Struck Puerto Rico And Virgin Islands The Defense Department has dispatched about 2,600 troops to aid Hurricane Maria victims in the U.S. Virgin Islands and in... The Defense Department has dispatched about 2,600 troops to aid Hurricane Maria victims in the U.S. Virgin Islands and in Puerto Rico, where access to power and communications remained severely limited five days after the Category 4 storm struck the U.S. territory. The military has focused primarily on conducting search and rescue operations, delivering life-sustaining supplies and providing generators and fuel to power critical infrastructure such as water treatment facilities and hospitals, Army Col. Rob Manning, a Pentagon spokesman, said Monday. Air Force Senior Airman Alexander Cole, left, and Master Sgt. James Jones unload a water pallet from a C-17 Globemaster III aircraft on St. Croix in the U.S. Virgin Islands, Sept. 23, 2017, while supporting Hurricane Maria relief efforts.U.S. Air Force photo Military units were also conducting route and airfield clearance in Puerto Rico, Manning said. Marines and sailors from the USS Kearsarge, a Wasp-class amphibious assault ship now in the Caribbean Sea, were deployed Sunday on the island for the mission. Meanwhile, Puerto Rico National Guard members were conducting similar clearance operations while also helping evacuate victims and installing temporary communications infrastructure. Helicopter-borne troops from the Kearsarge have conducted eight medical evacuation missions this week and delivered about 22,200 pounds of supplies and cargo to Puerto Rico and the U.S. Virgin Islands, Manning said. The Kearsarge was initially deployed to respond to Hurricane Harvey when the storm struck the Texas coast in late August. The ship has since been used to respond to Hurricane Irma and Maria. Citizen-Soldiers of the Puerto Rico National Guard patrol one of the main highway of the metropolitan area, affected by the flood after the Hurricane Maria.DoD photo The Pentagon on Monday also deployed eight UH-60 Black Hawk helicopters from Fort Campbell in Kentucky to San Juan to help officials in Puerto Rico distribute goods across the island, Manning said. Officials have estimated it will be months before power is restored to some parts of the island that is home to 3.4 million people. Army Corps of Engineers personnel on Monday were helping inspect the Guajataca Dam, a critical levee in Puerto Rico’s northwest corner that is in danger of breaking, Manning said. Puerto Rico Gov. Ricardo Rosselló on Friday ordered 70,000 inhabitants near the dam to evacuate. The military has pledged to provide as much help as the federal government asks of it in response to Maria and the two earlier storms that ravaged parts of Texas, Louisiana, Florida and the Caribbean. U.S. Marines with the 26th Marine Expeditionary Unit (MEU), exit U.S. Navy Landing Craft, Utility 1654 to assist in support relief efforts for victims of Hurricane Maria in Ceiba, Puerto Rico, Sept. 25, 2017.U.S. Marine Corps photo Thousands of U.S. troops remain committed to operations in Texas and Florida in response to Harvey and Irma, but the relief efforts have not stretched the Pentagon too thin, Manning said Monday. “We have the capability to do exactly what we’re doing, and we’re going to do all we can for the people of Puerto Rico and the Caribbean in the wake of these disastrous storms,” he said. “This is a long-term effort. It’s a marathon, not a sprint, and will continue to support them as long as support is needed.” ©2017 the Stars and Stripes. Distributed by Tribune Content Agency, LLC.
<urn:uuid:1ac96606-dd81-4ec4-8107-cab6fc77b846>
CC-MAIN-2022-33
https://taskandpurpose.com/news/military-puerto-rico-virgin-islands-hurricane/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00479.warc.gz
en
0.945812
784
1.992188
2
NLSR - Named Data Link State Routing Protocol NLSR is a routing protocol in NDN that populates NDN’s Routing Information Base. NLSR will continue to evolve alongside the Named Data Networking protocol. NLSR is an open and free software package licensed under the GPL 3.0 license and free to all Internet users and developers. For more information about the licensing details and limitations, refer to COPYING.md. NLSR is developed by the members of the NSF-sponsored NDN project team. For more details, please refer to AUTHORS.md. Bug reports and feedback are highly appreciated and can be made through the NLSR Wiki. The main design goal of NLSR is to provide a routing protocol to populate NDN’s FIB. NLSR calculates the routing table using link-state or hyperbolic routing and produces multiple faces for each reachable name prefix in a single authoritative domain. NLSR will continue to evolve over time to include neighbor discovery and to become a full fledged inter-domain routing protocol for NDN. The protocol design is presented in full detail in the NLSR Paper.
<urn:uuid:c6c8093e-6219-40d3-80fa-d312b040823e>
CC-MAIN-2017-04
http://named-data.net/doc/NLSR/current/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00350-ip-10-171-10-70.ec2.internal.warc.gz
en
0.875027
261
1.671875
2
例13.Michael’s new house is like a huge palace, ______with his old one. A. comparing B. compares C. to compare D. compared 【解析】“和……相比较”结构为be compared with,现在做句子的状语,所以只保留非谓语动词,把动词be去掉,答案为D。 例14._______with a difficult situation, Arnold decided to ask his boss for advice. A. To face B. Having faced C. Faced D. Facing 【解析】“面对”结构为be faced with, 现在做句子的状语,所以只保留非谓语动词,把动词be去掉,答案为C。
<urn:uuid:50d1f033-7968-4ba7-8a65-040776161ba6>
CC-MAIN-2022-33
http://m.hteacher.net/article/article.php?id=312231
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00466.warc.gz
en
0.738833
343
2.796875
3
9 Answers | Add Yours I like the idea that it attempts to explain the larger, more complex issues of our society, because only by understanding them can we begin to address them. However, I do think many people take it as a science, when all it can really do is propose theories and models for us to work with. Its lack of exactitude as mentioned by others is clearly a problem of social psychology. Also a huge problem develops from what the "conventional wisdom" of a culture is to begin with since this often becomes the measuring rod for all other behaviors, etc. When Darwinism dominated the thinking, for instance, data was interpreted with this theory exerting an influence. Nowadays with the "everyone is beautiful and meaningful in his own way" thinking, there are other dangers to interpretation of data. I think that social psychology seeks to explain human nature, which is difficult to do. Any kind of social science is difficult to use to achieve certainty. People simply cannot be explained so precisely. However, the nature of the exploration is sometimes just as important. Studies can get a dialogue going, and get us thinking. The primary down side to social psychology, in my opinion, is the same disadvantage of psychology in general. Theory in psychology is an attempt to put an artificial construct on the messiness of human behavior, whether it be the individual alone or the individual in a social context. People seem to have a tendency to lock themselves in to one or a few constructs, and this is like those six blind men and the elephant. I love social psychology because it gives insight into the minds of people, cultures, and society at large. Without this insight, I feel like some people would fail to understand and appreciate those different from themselves. ON the other hand, I dislike social psychology because some people may tend to stereotype others based upon social "knowns." Social psychology (for my own benefit) is: ...a branch of psychology that studies individuals in the social context. In other words, it is the study of how and why people think, feel, and do the things they do depending upon the situation they are in. This is an enormously important branch of this science in that problems that are affecting a segment of the population will generally affect an entire population, its effects far-reaching. What I think I like about it is that it provides those in need with a "fighting chance" at success in life. Everyone needs a foundation on which to build a life. The stronger the foundation, the better the life. Perhaps what concerns me most is that society is so overridden with difficulties that I find it impossible to see not an end, but comprehensive programs based on social psychology to meet the needs of those struggling. There will always be problems, but when will be ever have enough money from the government and private donors to meet the enormous need? And personally, I could not do this kind of work, though I think it would be so fulfilling, but I think I would take too much to heart, take problems home with me, and become disenchanted or completely burnt out: there is not enough support for programs in this area. I agree with the previous post in theory. The danger, in my opinion, is that social psychology is far from an exact science. By skewing data or adjusting sample groups or in other ways manipulating the observations and conclusions, social psychology can be made to support almost any interpretation or conclusion about most topics. This can lead to individuals selecting the study and results that support their particular philosophy or position about a given question or situation and proclaiming that this "proves they are right." It's much too easy to take information out of context or to omit parts that don't fit your perceptions - even if those parts are just as legitimate as the parts you are emphasizing. I like the fact that social psychology looks at how people are influenced in social situations. I see kids subjected to all kinds of influences as a high school teacher, and anything that helps explain how these influences work is good to know. The problem begins with the term. "Psychology" implies the study of the human mind, but "social" moves the soft science outside into so many other battlefields--economies, geographies, climates, etc--so that the human choice factors are adumbrated by forces outside individual control. On the other hand, social psychology is able to deal with such group psychologies as cults, ethnicities, rebellious personalities, criminality, regional influences, and belief systems. How and why the individual behaves inside a society is a valuable aspect of the discipline. We’ve answered 319,201 questions. We can answer yours, too.Ask a question
<urn:uuid:88f8f213-b291-46a5-bd57-84c52611a18e>
CC-MAIN-2017-04
https://www.enotes.com/homework-help/what-do-you-like-dislike-about-social-psychol-407556
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00549-ip-10-171-10-70.ec2.internal.warc.gz
en
0.961981
961
2.296875
2
Wildlife movement solutions What are Wildlife Movement Solutions? Wildlife Movement Solutions (WMS) are wildlife crossing infrastructure. They are installed where roads meet biodiversity corridors. WMS provide native wildlife with a safer transport path between the City’s green space. They also help to improve safety for motorists by reducing the likelihood of a vehicle collision with an animal. Some examples of this infrastructure include: - fauna exclusion fencing - culvert underpasses - land-bridge overpasses - rope bridges - virtual fences Signs are also a form of WMS. Wildlife warning signs may inform the driver to slow down and travel at the speed limit. They may also raise driver awareness to the presence of wildlife in an area. Wildlife-Vehicle Collision Hot Spots To make sure we can deliver WMS at critical locations across the city, a ‘hot spots’ map has been developed. The map identifies areas across the city for focused on-ground action. The hot spots have been identified by analysing and mapping a range of data including: - road attributes, like road width, corners etc. - speed limits - connections to biodiversity corridors - proximity to wildlife habitat - species distribution records - existing road kill data. The map gives priority to key species affected by vehicle strikes. These include the koala, eastern grey kangaroo and red-necked wallaby. The mapping is reviewed and updated as more data becomes available. You can download the Priority species wildlife - vehicle collision hot spots map (PDF 417). The following roads are identified as hotspots on the map: - Springwood Road, Rochedale South (Locally controlled road) - Exilis Street, Springwood (Locally controlled road) - Loganlea Road, Meadowbrook (Locally controlled road) - California Creek Road, Cornubia (Locally controlled road) - Mount Cotton Road, Cornubia (State controlled road) - Beenleigh- Redland Bay Road (State controlled road) - Mount Lindsay Highway Service Road (ML5), Boronia Heights - Crest Road, Greenbank (Locally controlled road) - Park Ridge Road, Park Ridge (Locally controlled road) - Chambers Flat Road, Logan Reserve (Locally controlled road) - Gardiner Road, Holmview (Locally controlled road) - Goodna Road, Greenbank (Locally controlled road) - New Beith Road, Greenbank (Locally controlled road) - Middle Road, Greenbank (Locally controlled road) - Rosia Road, Park Ridge (Locally controlled road) - Crowson Lane, North Maclean (Locally controlled road) - Waterford Tamborine Road, Logan Village (State controlled road) - Camp Cable Road, Jimboomba (State controlled road) - Cusack Lane, Glen Logan (Locally controlled road) - Kurrajong Road, Jimboomba (Locally controlled road) - Mundoolun Road, Jimboomba (Locally controlled road). What is Council doing? The delivery and improvement of WMS is part of our commitment to a green city. Several trials are underway to facilitate the use of new types of WMS infrastructure. Wildlife awareness vehicle activated sign These are solar-powered radar signs. They display the drivers speed and customised wildlife warning image or message as the driver approaches the sign. The signs are rotated to reduce driver fatigue. A trial of this infrastructure will occur between January and December 2022. Wildlife virtual fence Roadside devices that face away from the road. The devices are activated by approaching headlights. They emit a sound and light stimulus that alert animals as a car approaches along the road, forming a virtual fence. Locations of virtual fences: Park Ridge Road and Rosia Road in Park Ridge and Cusack Lane and Henderson Road in Glenlogan. Wildlife movement awareness campaign Spring is breeding season for many wild animals. This campaign aims to raise driver awareness of increased wildlife movement during spring. Actions include roadside banners and other temporary signage, radio advertisements, social media posts, media releases and workshops / events. Actions are delivered city wide. Koala breeding season banners Koala breeding season is between July to January. These roadside banners alert drivers to “slow down, look out”. They are installed at key locations across the city. The banners are installed at locations for a short period of time and then moved to new locations to increase coverage and reduce message fatigue. The delivery of suitable on-ground WMS is part of the planning and designing of all local new roads and road upgrades. The Department of Transport and Main Roads have developed Guidelines for WMS. To learn more about the guidelines please visit Fauna management (Department of Transport and Main Roads) (tmr.qld.gov.au). During the development assessment process opportunities for WMS are also investigated. How You Can Help You can help keep our wildlife safe by: - slowing down in the signed areas and the identified hotspot areas mentioned above. - being vigilant of wildlife on our roads, particularly at dusk and dawn. Be careful around corners, crests and in areas with roadside vegetation. If you see wildlife on the road at night slow down, sound your horn and dim your lights. - reporting all wildlife sightings, including deceased animals, see Report wildlife sightings - if you do hit an animal on our roads, immediately call RSPCA Ambulance on 1300 ANIMAL or Wildcare on 07 5527 2444. The sooner help is called, the greater chance of the animal surviving. - tell your neighbours when you spot a koala in your street or suburb or have noticed a section of road where wildlife regularly cross, to help spread awareness in your community. Make your backyard wildlife friendly WMS aren’t only about helping wildlife move across roads. Wildlife also needs to be able to move through other areas of the city, including backyards. To find out more about how to make your yard wildlife safe see Wildlife safe backyards
<urn:uuid:c45e1243-ee7c-494c-a59a-327eedb50743>
CC-MAIN-2022-33
https://www.logan.qld.gov.au/wildlife-movement-solutions
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00465.warc.gz
en
0.940273
1,273
2.453125
2
Bright, clear photographs and design offer an unfussy look at anatomy for very young readers and listeners. Full-color photographs of children accompany a brief text that invites readers to think about how they accomplish everyday activities: “How do you kick a ball, jump rope, blow up a balloon, digest food, read a book, or ride a bike?” Overlay drawings of body systems—skeletal, muscular, nervous, respiratory, circulatory, digestive—offer a peek inside, and a longer explanation at the end of the book reinforces the information. A diagram of the airways and lungs is superimposed on the photograph of a girl blowing up a balloon, which becomes a cross section of an eye in another photograph. The explanation for each function is very brief, really just providing the location and generalized way that it contributes to the body, but it’s enough to be a starting point for more learning and certainly for an appreciation of the complexity right at hand. Brief definitions of the five senses, a longer explanation for the function of skin and hair, and a glossary of 14 body terms and text elaborating on body systems make up the backmatter. Very simple, accessible and appealing as a starting point for human-science learning. (Informational picture book. 3-6)
<urn:uuid:088cc8dd-4c68-480e-a050-9a4211db0358>
CC-MAIN-2017-04
https://www.kirkusreviews.com/book-reviews/shelley-rotner/body-actions/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00140-ip-10-171-10-70.ec2.internal.warc.gz
en
0.904078
266
3.59375
4
Career and Education Opportunities for News Analysts in Birmingham, Alabama News analysts can find both educational opportunities and jobs in the Birmingham, Alabama area. The national trend for news analysts sees this job pool growing by about 4.1% over the next eight years. In general, news analysts analyze, interpret, and broadcast news received from various sources. News analysts earn about $24 per hour or $51,810 yearly on average in Alabama and about $24 per hour or $51,260 annually on average nationally. Earnings for news analysts are better than earnings in the general category of Journalism in Alabama and better than general Journalism category earnings nationally. Jobs in this field include: sports director, sports analyst, and television reporter . The Birmingham area is home to fifteen schools of higher education, including two within twenty-five miles of Birmingham where you can get a degree as a news analyst. News analysts usually hold a Bachelor's degree, so you can expect to spend about four years training to become a news analyst if you already have a high school diploma. CAREER DESCRIPTION: News Analyst In general, news analysts analyze, interpret, and broadcast news received from various sources. News analysts analyze and interpret news and data received from various sources so as to be able to broadcast the data. They also examine news items of local and international significance in order to establish topics to address, or obtain assignments from editorial staff members. Equally important, news analysts have to edit news material to insure that it fits within available time or space. They are often called upon to write commentaries or scripts, using computers. They are expected to gather data and design perspectives about news subjects through research and experience. Finally, news analysts decide on material most pertinent to presentation, and organize this material into appropriate formats. Every day, news analysts are expected to be able to speak clearly. They need to articulate ideas and problems. It is also important that they listen to and understand others in meetings. It is important for news analysts to present news stories, and introduce in-depth videotaped segments or live transmissions from on-the-scene reporters. They are often called upon to direct and serve as an anchor on news broadcast programs. They also decide on material most pertinent to presentation, and organize this material into appropriate formats. Somewhat less frequently, news analysts are also expected to analyze and interpret news and data received from various sources so as to be able to broadcast the data. And finally, they sometimes have to gather data and design perspectives about news subjects through research and experience. Like many other jobs, news analysts must be thorough and dependable and be able to deal with stress and deal with situations calmly. Similar jobs with educational opportunities in Birmingham include: - Editorial Specialist. Perform variety of editorial duties, such as laying out, indexing, and revising content of written materials, in preparation for final publication. - Public Address Announcer. Make announcements over loud speaker at sporting or other public events. May act as master of ceremonies or disc jockey at weddings, parties, or other gathering places. - Radio and Television Announcer. Talk on radio or television. May interview guests, act as master of ceremonies, read news flashes, identify station by giving call letters, or announce song title and artist. - Reporter. Collect and analyze facts about newsworthy events by interview, investigation, or observation. Report and write stories for newspaper, news magazine, or television. - Technical Writer. Write technical materials, such as equipment manuals, appendices, or operating and maintenance instructions. May assist in layout work. - Writer. Create original written works. EDUCATIONAL OPPORTUNITIES: News Analyst Training Samford University - Birmingham, AL Samford University, 800 Lakeshore Drive, Birmingham, AL 35229-2240. Samford University is a small university located in Birmingham, Alabama. It is a private not-for-profit school with primarily 4-year or above programs. It has 4,469 students and an admission rate of 89%. Samford University has a bachelor's degree program in Journalism which graduated one student in 2008. University of Montevallo - Montevallo, AL University of Montevallo, Station 6001, Montevallo, AL 35115-6000. University of Montevallo is a small university located in Montevallo, Alabama. It is a public school with primarily 4-year or above programs. It has 3,030 students and an admission rate of 78%. University of Montevallo has a bachelor's degree program in Radio and Television which graduated twenty students in 2008. LOCATION INFORMATION: Birmingham, Alabama Birmingham is located in Jefferson County, Alabama. It has a population of over 228,798, which has shrunk by 5.8% over the last ten years. The cost of living index in Birmingham, 81, is well below the national average. New single-family homes in Birmingham cost $187,300 on average, which is well above the state average. In 2008, one hundred thirty-two new homes were built in Birmingham, down from two hundred thirty-two the previous year. The top three industries for women in Birmingham are health care, educational services, and finance and insurance. For men, it is construction, accommodation and food services, and health care. The average travel time to work is about 24 minutes. More than 18.5% of Birmingham residents have a bachelor's degree, which is lower than the state average. The percentage of residents with a graduate degree, 6.6%, is lower than the state average. The unemployment rate in Birmingham is 12.5%, which is greater than Alabama's average of 10.7%. The percentage of Birmingham residents that are affiliated with a religious congregation, 60.1%, is more than both the national and state average. Williams Chapel Christian Methodist Episcopal Church, Westminister Presbyterian Church and West End Methodist Church are all churches located in Birmingham. The most common religious groups are the Southern Baptist Convention, the United Methodist Church and the Catholic Church. Birmingham is home to the Mineral Park Municipal Golf Course and the Cooper Green Golf Course as well as Avondale Mills Park and Smithfield Historic District. Shopping malls in the area include Acipco Shopping Center, Altadena Square Shopping Center and Parkway East Huffman Shopping Center. Visitors to Birmingham can choose from Marriott Hotel Birmingham, Rime Garden Extended Stay Suites and Studioplus for temporary stays in the area.
<urn:uuid:44a1927e-751f-4d2b-91e9-b3088db3a1a6>
CC-MAIN-2017-04
http://www.careeroverview.com/usa/alabama/birmingham/art-design-entertainment-and-sports/journalism/news-analyst/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00190-ip-10-171-10-70.ec2.internal.warc.gz
en
0.948705
1,326
2
2
As one of the UK’s leading providers of health and safety training, we offer a comprehensive range of courses from the major providers. This includes the IOSH Managing Safely Course developed and certificated by IOSH. What is IOSH? IOSH stands for the Institution of Occupational Safety and Health. It is internationally respected as the world’s most prominent membership organisation for health and safety professionals, and has 47,000 members across 130 countries. In 2017, more than 179,000 people attended more than 15,000 IOSH courses in 74 countries. However, providing professional development qualifications is only one aspect of what IOSH does. It also aims to raise and maintain standards, acting as a leading worldwide voice for the profession. Activities include promoting a code of conduct, as well as campaigning on safety and health issues that affect millions of lives. IOSH is committed to ensuring that workplaces and working practices are safe, healthy, and sustainable globally. What is the IOSH Managing Safely Course? IOSH Managing Safely is the most popular IOSH course both nationally and internationally. We offer remote learning, classroom and in-house training options, with classroom taking three days to complete. Designed for employees at management level, it provides a more in-depth understanding of health and safety issues required by employees with supervisory responsibilities. Why choose an IOSH course? IOSH has been providing health and safety courses and qualifications since its formation in 1945. In that time, it has developed a distinctive and well-rounded approach to training. Although they differ in many ways, all the IOSH courses we provide share some common features: - Each IOSH course provides essential insights for candidates, with both written and practical assessments. - IOSH courses also offer practical tools that enable individuals and organisations to create safer, healthier working environments – helping employers to minimise sickness absence, improve productivity, and deliver a variety of positive business benefits. How does IOSH membership work? Gaining an IOSH qualification does not automatically make you a member, but it does make you eligible to join. Becoming an IOSH member can make you more attractive to employers, so it is well worth considering if you have ambitions in the health and safety sector. As your career progresses, you can move up the IOSH membership ladder, which has six levels: - Affiliate Membership, open to everyone who pays the membership fee. - Associate Membership (AIOSH), open to anyone who has completed a diploma-level health and safety qualification. - Technical Membership (TechIOSH), mainly for employees who work full or part-time in a health and safety role, and are participating in a continuous professional development (CPD) programme. - Graduate Membership (GradIOSH), open to those who have completed an IOSH-accredited degree-level qualification. - Chartered Membership (CMIOSH), considered profession’s gold standard. - Chartered Fellow, recognised as the pinnacle of the health and safety profession. How Can I find out more information or book a place on a course? To book a course, or to ask for advice about our courses, contact Stuart using any of the following methods: Tel: 07841 023522 Dorset Health and Safety Limited – ELCAS Provider Number 8616
<urn:uuid:b591de79-c230-48fc-8351-a53631a6e3d1>
CC-MAIN-2022-33
https://pathfinderinternational.co.uk/what-is-iosh-and-what-is-the-managing-safely-course/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00474.warc.gz
en
0.946532
697
1.945313
2
Paul Betts. Within Walls: Private Life in the German Democratic Republic. Oxford: Oxford University Press, 2010. xi + 321 pp. $65.00 (cloth), ISBN 978-0-19-920884-5. Reviewed by Donna Harsch (Carnegie Mellon University) Published on H-German (June, 2013) Commissioned by Chad Ross All in the Family In her riveting memoir of growing up in the GDR, Marion Brasch recounts that her father reported her brother (the soon-to-be-famous) Thomas Brasch to the Socialist Unity Party (SED) after Thomas distributed leaflets against the Warsaw Pact's invasion of Czechoslovakia in 1968. The harrowing conflict between a rigid, dedicated communist father and a rebellious, idiosyncratic son is the central, but far from only, example in this moving narrative of the unhappy interplay between ideological commitment to a controlling state and the psychological dynamics of a dysfunctional family. Brasch lays bare the story of a socially isolated and gradually disintegrating family whose members continued to believe in the promise of communal society even as some of them defiantly rejected real, existing socialism. The Brasch narrative encapsulates an extreme instance of the paradoxes that entangled the relationship between the private lives of East Germans and the public claims of the East German party/state. Paul Betts's highly original study of the clash, divergence, and coexistence of public and private, state and individual, political and personal in East Germany explores and analyzes these apparent contradictions across a variety of domains and the span of the GDR's existence. The socialist contradiction in relations between the private and public arose out of the gap between state socialism's promise (or threat--depending on one's point of view) to "communalize the private" and its failure to do that (p. 3). The private sphere continued to function essentially as under capitalism, a fundamental inconsistency between intent and reality in East German socialism. Yet, as Betts reminds us in vivid chapters on the Stasi's informant system and on harassment of Christians, the state constantly violated privacy. Indeed, it heavily intervened in the private sphere but mainly in the form of suppression, blackmail, and, above all, surveillance. Rather than make the private social, the SED undermined private integrity to further its main priority: securing the public realm. Ironically, the "sham existence" of the public sphere, Betts concludes, had the effect on East Germans of investing the basically intact private sphere with more reality than the public arena and encouraging them to be active in the realm of private life. "Private life--generally associated with liberal society--assumed," he argues, "its most political power and personal value under authoritarian regimes" (p. 3). This "power" emerged in the early 1970s. With shorter workdays as well as more and better (if still very limited) consumer choices, East Germans of the early Honecker era could hope to create a socialist good life--in private. In arguing that a socialist private sphere came into its own in the Honecker years, Betts's interpretation overlaps heavily with the concept of the "niche society" put forward by Günter Gaus. Betts qualifies Gaus's theory, however. The niche society, he argues, represented neither an absolute nor an apolitical retreat into private life. Rather, it represented a revised social contract between party and citizen: the SED recognized the legitimacy of the private sphere, while (many) individual citizens recognized the legitimacy of socialist rights. In thousands of civil suits and hundreds of thousands of letters of complaint, East Germans actively deployed the language of socialist rights in order to defend and even expand their private space. They appealed to the state to enforce socialist justice and, thus, the state came to act as "both the foe and the guardian of the private sphere." The state "listened in" on private citizens but also "listened to" them as long as citizens spoke as individuals, not organized interests, and used official and largely unpublicized channels of complaint (p. 15). Betts develops and supports this elegant thesis in seven topical chapters that also track the emergence of a socialist private sphere over time. He does not claim to cover all aspects of private life in the GDR but describes his study as "experimental in theme and approach" (p. 16). His primary sources are drawn from a range of state and non-state archives; notes refer mainly to state-generated documents but also to private/personal papers. He took good advantage of working on a topic in contemporary history: he conducted interviews with ten people; Angela Brock conducted twenty additional interviews; and he received thirty written responses to a questionnaire about private life. As Betts generously acknowledges in the text and endnotes, four of his topics have been well covered in the secondary literature on the GDR that has poured forth since 1990: Stasi monitoring of people's intimate lives; state harassment of committed Christians and the emergence of a Christian subculture; the state regulation and popular practice of marital dissolution; and the ever-expanding system of petitions of complaint that the state allowed and, from the 1960s, regularized and even touted. Betts's contribution to the literature is to highlight privacy issues and to explore the complex ways in which both state authorities and ordinary individuals refined and even redefined their understanding of private rights and individual needs in response to state intrusion into private affairs, on one side, and people's efforts to evade intrusion, on the other. The theme of Stasi spying brings forth, not surprisingly, the most bizarre evidence of the entanglement of private and state interests, individualistic behavior and state control. In the 1970s and 1980s, the Stasi devoted considerable resources to the study of individual, especially behavioral, psychology in order to help it recruit and train effective unofficial collaborators in its effort to shore up a collectivist state. Its activities had chilling consequences and yet also unintended ones. Denunciation, Betts argues, offered a peculiar type of agency to individuals who had scores to settle and could also use their information to clinch private bargains with the Stasi. The aim of breaking up families, he suggests, often backfired: some families drew closer together (although the case of the Brasch family suggests that denunciation could set off powerfully disruptive reverberations). Betts enters considerably less well-charted waters in his very fine chapters on civil disputes between citizens; interior design; and the photography of domestic life. In his most social-historical chapter, Betts makes a convincing argument that East Berliners had a highly developed sense of self, privacy, and personal integrity, on the one hand, and harbored strong convictions about the state's willingness to help them protect their private rights, on the other. The evidence consists of court cases brought by Berliners concerning small property claims, violations of noise ordinances in residential housing, and, especially fascinating and unexpected, insults and defamation. The chapter "Picturing Privacy," showcases Betts's skills as a cultural historian. Here, he looks at the evolving official, popular, and artistic sense of the family and individual through the eyes of photographers, both state-sanctioned and (semi-)dissident and/or avant garde, by analyzing the portrayal of individuals and families in public/outdoor spaces as well as in the home. Over time, the SED accepted private life as a "major theme of East German art" as the party came to recognize the private sphere as "a--if not perhaps the--key site for the development of the socialist personality" (p. 207). His chapter on interior design applies cultural and discourse analysis to the domestic material culture of the GDR and, especially, the shift from the "socialist Biedermeier" of the early 1950s to the "socialist modern" that emerged in the 1960s. The early era was characterized by Stalin-inspired attacks on bourgeois formalism as well as by a clear empathy for the classically bourgeois conception of the home as a "repose" free of "technology, production, and rationalization" (p. 133). The socialist modern was, in contrast, highly influenced by functionalism and characterized by explicit incorporation of technology and rationalization into the home. In neither era did designers conceive of an interior that was truly socialized--not even in the form of communal living/dining areas combined with private sleeping quarters--but, Betts argues, the socialist modern was more, and quite openly, predicated on satisfying private needs and desires. Betts follows the various strands that contributed to this shift--Soviet influences, economic exigencies, SED leaders' petite-bourgeois idea of the socialist home, consumer tastes elicited through market research, the needs of employed wives/mothers, and competition with Western trends. In a discerning comparative aside, he notes that "both Germanies shared a common perception about the elective affinity of traditional family and domestic modernity as a key hallmark of post-fascist culture" (p. 135). Thus, he suggests that the significance and form of private life in East Germany were influenced both by German history and a wider postwar elevation of the family and the modern, well-outfitted, comfortable private space of the home. Betts's beautifully written book both complicates and challenges Hannah Arendt's argument that "totalitarian domination ... destroys private life as well [as the public realm]" (p. 7). As he demonstrates so well, destruction did not occur in the most obvious way suggested by Arendt's words: private life did not wither away. In fact, it took on great importance for East Germans. Yet the exigencies of real, existing socialism certainly distorted and often poisoned private life, even when the state did not actively use informants to exploit intimate tensions. The lack of a civil society closed off a potential escape from the inevitable stresses, diverse dissatisfactions, and boring interludes of private life. The extent, rhetoric, and type of disputes between neighbors, spouses, and other constellations of individuals or families were shaped, Betts suggests, in interaction with the socialist state and the absent public sphere. Private disputes about "honor," petty property, and the everyday disturbances of urban living took on considerable significance and were taken directly to the party/state and its institutions for adjudication and satisfaction. More subtly, the yawning gap between lofty ideals and constrained reality gave a characteristically socialist bent to generational and marital struggles inside the family--as suggested not only by Brasch's family narrative but also by Maxim Leo's memoir and Eugen Ruge's outstanding autobiographical novel about his communist family. Not only political disappointment but also psychological pain was denied and repressed. Thus, life "within walls" became unsatisfying even for many of socialism's most committed advocates--and, especially, for their children and grandchildren. Betts offers a convincing interpretation of how these and other private concerns--from the material to the spiritual, from the petty to the profound--gradually undermined the SED's mission of public control and so contributed to the collapse of communism in 1989. . Marion Brasch, Ab jetzt ist Ruhe. Roman meiner fabelhaften Familie (Frankfurt am Main: S. Fischer, 2012). . The direct consequences of denunciation and, above all, its ripple and boomerang effects were, of course, much more contained and infinitely less deadly than in the USSR during the Terror. See, e.g., Wendy Goldman, Inventing the Enemy: Denunciation and Terror in Stalin's Russia (Cambridge: Cambridge University Press, 2011). . Here he builds on the important work of the legal historian Inga Markovits. See, especially, Inga Markovits, Justice in Lüritz: Experiencing Socialist Law in East Germany (Princeton, NJ: Princeton University Press, 2010). . A recently published book of "everyday" photography demonstrates some of the shift in topic and perspective that Betts analyzes: Manfred Beier, Alltag in der DDR: So haben wir gelebt, ed. Nils Beier (Cologne: Fackelträger, 2010). . Maxim Leo, Haltet euer Herz bereit: Eine ostdeutsche Familiengeschichte (Munich: Heyne 2011); Eugen Ruge, In Zeiten des abnehmenden Lichts: Roman einer Familie (Reinbek bei Hamburg: Rowohlt, 2011). If there is additional discussion of this review, you may access it through the network, at: https://networks.h-net.org/h-german. Donna Harsch. Review of Betts, Paul, Within Walls: Private Life in the German Democratic Republic. H-German, H-Net Reviews. |This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License.|
<urn:uuid:2f36bf08-a464-43f1-9538-8dee33f3a87e>
CC-MAIN-2017-04
http://www.h-net.org/reviews/showrev.php?id=36433
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00163-ip-10-171-10-70.ec2.internal.warc.gz
en
0.940419
2,683
2.265625
2
Send the link below via email or IMCopy Present to your audienceStart remote presentation - Invited audience members will follow you as you navigate and present - People invited to a presentation do not need a Prezi account - This link expires 10 minutes after you close the presentation - A maximum of 30 users can follow your presentation - Learn more about this feature in our knowledge base article Do you really want to delete this prezi? Neither you, nor the coeditors you shared it with will be able to recover it again. Make your likes visible on Facebook? Connect your Facebook account to Prezi and let your likes appear on your timeline. You can change this under Settings & Account at any time. La guerra civil de Guatemala y El genocidio guatemalteco Transcript of La guerra civil de Guatemala y El genocidio guatemalteco Prize en 1992. Documentación del testigo #1: 'I was 10 years old. The patrollers pushed me to the ground with some of the other children and we were told to stay there and keep our faces down. I tried to look up and saw my mother and sister in line with the other women. One by one they disappeared over the brow of a hill, and I could hear their screams. I could see my mother and sister approaching that brow. I was kicked and told to keep my head down. When I looked up again, over to the line of women, my mother and sister were no longer there. For two years a patroller kept me prisoner, but then I escaped.' #2: 'The United States did not bear direct responsibility for any act of genocide, the Commission said. However, its government had known what was going on in the Guatemalan countryside. It had not raised any objections and had continued to support the Guatemalan army. In that sense, the United States was implicated. As for American businesses, the Guatemalan subsidiary of Coca-Cola had mercilessly pursued the trade union movement for years, and a dozen union leaders had been killed. The Commission said that the truth had been told in its report with the purpose of improving the condition of the peoples of Guatemala. Individuals and groups had the right to know who was responsible. While the Commission was not allowed to name perpetrators or attribute responsibility, the report indicates times and names institutions. People could deduce who was in charge. Everyone knew who had been President and Chief of Staff of the army in 1982 and 1983. If the perpetrators were brought to trial, it would be through the Ministry of Justice. People had every right to bring the accused to justice, the Commissioner stressed.' ¿preguntas?
<urn:uuid:888827ad-39dc-4351-abc1-fb687c5f1af0>
CC-MAIN-2017-04
https://prezi.com/dhcvkwdev0wu/la-guerra-civil-de-guatemala-y-el-genocidio-guatemalteco/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00088-ip-10-171-10-70.ec2.internal.warc.gz
en
0.976818
557
1.875
2
There was a time when I thought electric vehicles (EV’s) would be nothing more than a passing phase. With range (travel distance), price and lack of infrastructure (charging points) being major issues, I genuinely thought they would rapidly fade away and be nothing more than a distant memory as we all revert to the trusty old internal combustion engine. Recent news though has seemingly proved me very wrong indeed. Strong increase of electric vehicles Only a matter of weeks ago, France announced the total ban of fossil fuel vehicles in 2040 with the UK quickly following suit by declaring all new vehicles sold from 2040 must be alternatively fuelled. China now sells more EV’s than the USA and although it only accounts for a little more than 1% of all newly registered vehicles (2016), it still shows a marked increase on recent years. Volvo have also announced that from 2019 all cars it makes will be either electric or hybrid. It is clear to me that the world has started to change. Little more risk So, the likelihood of encountering EV’s during operational incidents will increase exponentially in the coming years. Regular readers of my blogs will know that I do not promote an alarmist approach and seek to empower rescuers at every opportunity. I still believe that providing EV’s are dealt with in a safe methodical way, they will continue to pose little more risk than conventional vehicles. Remember that there has still been no reported incidents of emergency responders being injured by EV’s during extrication so all risks must be kept in context. Approach to electric vehicles The shutdown method hasn’t really changed a great deal with the general approach being; - Turn off ignition and remove keys - Chock wheels - Put gear into ‘Park’ - Isolate 12v battery (thus isolating airbag/SRS systems - Remove selected fuses - Remove Service Plug** **Alternatives to removing service plug include e.g. some Tesla models requiring the cutting of the ‘First Responder Loop’. Click here for more information (TESLA S Emergency Response Guide). In relation to Tesla S In addition to the above (and once again in relation to Tesla Model S) there are other vehicle anatomy considerations provided by the manufacturer. In the event of power isolation, mechanical access can be gained to the hood and to the rear doors by use of strategically placed levers. To manually open the hood the rescuer must pull the release cables located in the front wheel arch liners. First, operating the primary lever located in the right-hand wheel well and then the secondary lever located in the left-hand wheel well. To access these levers, the wheel arch liners must be removed (see below) The rear doors can be accessed by folding back the edge of the carpet below the rear seats to access the mechanical release cables. Pull the release cables towards the centre of the vehicle (see below). Tesla S release cables In my opinion, the last year or two has marked the biggest shift in vehicle technology and anatomy in over two decades. It feels like we are entering a new era in vehicle design, especially when we take a close look at manufacturers like TESLA who seem to be pushing the envelope. The next few years will be very interesting and maybe we do have to consider adopting more than a generic safe approach (something I have always advocated) and we will simply have to have a wider understanding of each individual vehicle design; something which will test the most experienced rescuer. Whatever the future holds it looks like it will be battery powered; something I genuinely never thought I would see.
<urn:uuid:007d4c17-5cdd-4e4d-a7e7-2063f7f6dc7a>
CC-MAIN-2022-33
https://www.fireproductsearch.com/electric-vehicles-emergency-incidents/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00066.warc.gz
en
0.956342
753
2.21875
2
Application and Extension The doctrine was not ratified by any congressional legislation; it did not obtain a place in international law, and the term Monroe Doctrine did not come into general circulation until the 1850s. Yet the doctrine became important in American policy, particularly when President Polk reasserted its ideas in 1845 and 1848 with respect to British claims in Oregon, British and French intrigues to prevent the U.S. annexation of Texas, and the aspirations of European nations in Yucatán. The strained relations with Great Britain concerning its sovereignty over several areas in Central America in the 1850s renewed U.S. interest in the doctrine; Great Britain specifically denied its validity. During the Civil War, the doctrine was invoked unsuccessfully after Spain's reacquisition of the Dominican Republic (formerly Santo Domingo). It was also used, somewhat more effectively, to bring pressure on the French government to withdraw support from Maximilian, who had established an empire in Mexico under French auspices. Under President Grant and his successors the doctrine was expanded. The principle that no territory in the Western Hemisphere could be transferred from one European power to another became part of the Monroe Doctrine. As U.S. imperialistic tendencies grew, the Monroe Doctrine came to be associated not only with the exclusion of European (now extended to mean all non-American) powers from the Americas, but also with the possible extension of U.S. hegemony in the area. This condition explains why the Monroe Doctrine, although it was not formally used to justify American intervention, was viewed with suspicion and dislike by Latin American nations. In 1895, President Cleveland, in a new extension of the Monroe Doctrine, demanded that Great Britain submit to arbitration a boundary dispute between British Guiana (now Guyana) and Venezuela (see Venezuela Boundary Dispute). Following the Venezuela Claims question, Theodore Roosevelt expounded (1904) what came to be known as the Roosevelt corollary to the Monroe Doctrine; he stated that continued misconduct or disturbance in a Latin American country might force the United States to intervene in order to prevent European intervention. This frankly imperialistic interpretation met much resistance in Latin America but was used extensively during the administrations of Presidents Taft and Wilson to justify intervention in the Caribbean area. The Monroe Doctrine was so deeply embedded in U.S. foreign policy by the end of World War I that Woodrow Wilson asked for a special exception for it in the Covenant of the League of Nations in 1919. By the end of the next decade the doctrine had become much less important, and its imperialistic aspects were being played down in an effort to foster better relations with Latin America. In the Clark memorandum of Dec., 1928, the U.S. State Department repudiated the Roosevelt corollary. Under President Franklin Delano Roosevelt, the doctrine was redefined as a multilateral undertaking to be applied by all the nations of the hemisphere acting together, and emphasis was placed on Pan-Americanism. Nevertheless, in the 1950s and 60s the specter of unilateral intervention in Latin America was again raised, especially by the involvement of the United States with developments in Guatemala, Cuba, and the Dominican Republic. For the most part, however, the United States has continued to support hemispheric cooperation within the framework of the Organization of American States. The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved. See more Encyclopedia articles on: U.S. History
<urn:uuid:d5b66f67-a445-4779-8351-0dad711553eb>
CC-MAIN-2016-44
http://www.infoplease.com/encyclopedia/history/monroe-doctrine-application-extension.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719843.44/warc/CC-MAIN-20161020183839-00292-ip-10-171-6-4.ec2.internal.warc.gz
en
0.956177
704
4.3125
4
Frank Buckles, the United States' last surviving World War I veteran, died Sunday at his home in West Virginia. He was 110, and said not long ago that he wanted people to remember him as "the last torchbearer" of the more than 4.7 million people who joined the U.S. military in 1917-1918. Those who know his story likely will do so. After several rejections, Buckles succeeded in enlisting in the Army when he was 16 1/2. What was the hurry?, he was asked. "A boy of (that age), he's not afraid of anything. He wants to get in there," he said. Buckles served overseas, mainly as a driver and clerk. After the armistice, he remained in Europe to help repatriate prisoners of war to Germany. He returned to the United States in 1920 to resume civilian life. He found his calling in the shipping industry. That led him to involvement in World War II. While in the Philippines on business in 1941, Buckles was captured by the Japanese. He spent over three years in prison camps. "I was never actually looking for adventure," Buckles recalled. "It just came to me." In recent years, Buckles traveled to Washington to serve as grand marshal of the national Memorial Day parade and to urge creation of a World War I memorial on the National Mall. The old soldier viewed that campaign as his last mission. He asked about progress on the project weekly, a family spokesman said. The memorial merits completion. Buckles and the millions of other Americans who served in World War I deserve as much. There are no French or German veterans of World War I alive. Indeed, there are only two remaining surviving veterans of World War I. Both are British. Claude Choules, 109, now lives in Australia and said it was an "honor" to be the last British man standing. He enlisted in the Royal Navy at 15, served on the battleship HMS Revenge and witnessed the German Imperial Navy's 1918 surrender. Florence Green, 110, is the world's last surviving female veteran of World War I. She joined the newly founded Women's Royal Air Force in 1918, and she served as a waitress. She is one of the 10 oldest people in Britain, where she still lives. Her wit remains intact. When asked what it felt like to turn 110, she said, "It's not much different to being 109." Buckles' death and his burial later this week at Arlington National Cemetery closes an important chapter in the nation's history. The Army veteran, serial number 15577, was the last living link to those who wore the nation's uniform in what subsequent events proved to be the incorrectly named "War to End all Wars." His passing is truly the end of an era.
<urn:uuid:4147546c-891d-4b18-877e-c7b650e45279>
CC-MAIN-2017-04
http://www.timesfreepress.com/news/opinion/times/story/2011/mar/01/last-torchbearer-wwi-dies/43614/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00143-ip-10-171-10-70.ec2.internal.warc.gz
en
0.983831
580
2.421875
2
Up until the mid 1950s psychiatrists had very few pharmacological tools in their arsenal. It was in 1955, Dr. Leo Sternbach synthesized a new type of mild sedative, called a “benzodiazepine” (Shorter, 2013). This new drug was designed to reduce the activity of nerves in the brain and spinal cord, in order to treat insomnia, anxiety, and psychosis (Harvard Health Publishing, 2020). Today benzodiazepines, like Xanax and Valium, have made their way into our cultural zeitgeist as both a helpful reprieve and a drug of abuse. Today we are going to break down “Benzos!” As we have discussed in previous articles, neurons release neurotransmitters (like serotonin and dopamine) to send signals across the synapse (space between 2 neurons) to reach a target neuron. While we often talk about how these signals can activate neurons, it is important to understand that they can also inhibit them! In the nervous system, Gamma Aminobutyric Acid, commonly called GABA, is the most commonly used inhibitory neurotransmitter (Boonstra et al., 2015). Benzodiazepines reduce activity in the brain and spinal cord by increasing the effectiveness of GABA, leading to more inhibition of neurons. Essentially, the benzodiazepine molecules will bind to the same receptors that GABA normally binds to. In doing this, the benzodiazepine causes the receptor to become more sensitive to GABA, allowing it to activate from less GABA (Campo-Soria, Chang, & Weiss, 2006). Benzos have become an incredibly effective tool for treating insomnia and anxiety, however, this comes at a price. Benzos are meant to be used for short-term periods of time, as they are relatively addictive (Britannica, 2021). We would like to remind you that drugs we take modify our nervous systems in significant ways. It is for this reason that we encourage people to work with a psychiatrist if you employ pharmacological help. These doctors are trained to know the ins and outs of these medications and can help you find meaningful, and safe treatments!
<urn:uuid:d9352f29-8bd6-4fdc-80b5-6a2cdcdc44b3>
CC-MAIN-2022-33
https://www.bialikbreakdown.com/articles/drug-deep-dives-benzodiazepines
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570767.11/warc/CC-MAIN-20220808061828-20220808091828-00478.warc.gz
en
0.950064
436
3.375
3
Measures of Counteracting Domestic Violence Committed by Children: Problematic Aspects The problem of domestic violence is quite urgent in our country. Domestic violence is a heavy burden both for the victim and for society in the whole. Typically, the most vulnerable family members who suffer from domestic violence are women, children and the elderly, and the perpetrators are most often men. But a child can also commit domestic violence, as evidenced by the legal definition of the term of “a child- abuser”. However, this phenomenon is insufficiently studied and is rarely discussed by Ukrainian scholars. The purpose of this article is to study measures to combat domestic violence committed by children by analyzing the current legislation of Ukraine in the field of preventing and combating domestic violence and gender-based violence. The author has analyzed the definition of the term of “a child-abuser” enshrined in the law. On this basis it has been concluded that a child of any age can be an abuser. It has been established that children most often commit domestic violence in psychological, physical and economic forms. The emphasis has been placed on the inexpediency of bringing parents or persons replacing them to administrative liability under Part 3 of the Art. 184 of the Code of Ukraine on Administrative Offenses in cases, when their child, who has not reached the age of administrative liability, is the offender, and his victim is a father (mother) or a person who replaces them. The author has analyzed the algorithm of actions, according to which the police now act in case of detection of facts of domestic violence by a child under the age of sixteen. It has been found out that the legislation does not set the age from which such a special measure to combat domestic violence is allowed to be taken as an urgent prohibition, which is the basis for taking a child-abuser for preventive registration by juvenile prevention units. It has been noted that the settlement of this issue will allow us to make informed decisions on the registration or non-registration of a child-abuser who has not reached the age of sixteen and has committed domestic violence against parents, which will further affect the determination of the subject of individual prevention. Pasichnichenko A.V. and Kovalevska N.V., 2016. Child aggression: manifestations and causes [Dytiacha ahresyvnist: proiavy ta prychyny]. Innovatsiinyi potentsial profesiinoi pidhotovky maibutnikh fakhivtsiv pochatkovoi i doshkilnoi osvity, Iss. 3, pp. 200-209. Yurkiv Ya.I., 2013. The essence and content of the social phenomenon “domestic violence” [Sutnist ta zmist sotsialnoho fenomenu “nasylstvo v simi”]. Naukovij vìsnik Užgorodsʹkogo nacìonalʹnogo unìversitetu – Uzhhorod National University Herald, [online] Іss. 27, pp. 234-237. Available at https://dspace.uzhnu.edu.ua/jspui/handle/lib/1910 [Accessed 18 December 2020]. Bakhaieva A.S., 2020. On discharging the urgent prohibitive order [Shchodo pytannia vynesennia terminovoho zaboronnoho prypysu]. In: Kharkiv National University of Internal Affairs et al. The Path to Success and Prospects for Development (to the 26th anniversary of the founding of Kharkiv National University of Internal Affairs) [Shliah uspihu i perspektyvy rozvytku (do 26 richnytsi zasnuvannia Kharkivskoho natsionalnoho universytetu vnutrishnikh sprav). Kharkiv, 20 November. Kharkiv: Kharkivskyi natsionalnyi universytet vnutrishnikh sprav. Copyright (c) 2020 A. S. Bakhaieva This work is licensed under a Creative Commons Attribution 4.0 International License.
<urn:uuid:02db1bd9-4ca8-4dc7-84ee-ddf17262992e>
CC-MAIN-2022-33
http://visnyk.univd.edu.ua/index.php/VNUAF/article/view/338
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00069.warc.gz
en
0.902994
894
2.625
3
Spaghetti with Lobster Sauce Recipe by Tim Lane For years, Tim supervised the food preparation for the Essex Firemen’s annual spaghetti suppers. But while ladle and spoon were essential to its making, his much-praised sauce owed even more to the existence of the fork. It all began with the tomato, of course, which arrived in Italy in the mid-1500s and took a good century to make its way into a sauce. Surprisingly, it then took another hundred years before tomato sauce found its way onto a plate of spaghetti, which had been eaten with one’s fingers since its creation in 12th-century Sicily. Uncommon in Europe, where the Vatican had derided its usage, it was only when Italian nobility discovered how well a fork could twirl spaghetti that it gradually became accepted in certain circles. Because it also enabled one to eat and keep one’s fingers clean, the fork triggered the invention of spaghetti sauce, which led to the fork’s acceptance by Italy’s common classes, and its eventual usage throughout the Western Hemisphere in the 18th century. This included the hardy souls manning the bucket brigades of Chebacco Parish, now known as Essex, where Tim Lane, who worked out in front of the Restaurant selling lobsters as a teen, now presents this recipe in the finest spaghetti tradition of cause and delicious effect. Spaghetti with Lobster Ingredients 1 tablespoon garlic, chopped 1 tablespoon fresh basil, chopped 2 tablespoons extra-virgin olive oil 1 28-ounce can Pinecone whole tomatoes (or your favorite brand) 5 1¼-pound lobsters Pasta of choice (1 pound) How to Make Spaghetti with Lobster Sauce In a large skillet, preheat olive oil, and sauté garlic and basil until wilted. Add the tomatoes and simmer slowly for an hour. Break apart the tails and claws of the lobsters, keeping the lobster meat in the shells. Add to the tomato mixture and cook slowly for 2 hours. Cook the pasta separately and drain. Pour the tomato sauce and lobster (still in the shell) over the pasta. Serves 5. After enjoying your spaghetti with lobster sauce dish with your family and friends, check out our new cookbook with additional recipes!
<urn:uuid:9a19e681-bd79-4f02-a304-8a91a64b055a>
CC-MAIN-2022-33
https://www.woodmans.com/blog/recipes/spaghetti-with-lobster-sauce/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00673.warc.gz
en
0.961436
472
1.796875
2
Janice Peterson: Thomas Jefferson's garden is a sight to behold Last summer my husband and I spent a long weekend in Virginia to visit Monticello, home of Thomas Jefferson. Specifically we went to see the kitchen garden. The previous winter I had read “A Rich Spot of Earth” by Peter Hatch, former Director of Gardens at Monticello, which describes the renovation and history of Jefferson's garden. I must have driven my husband nuts because he eventually decided we needed to see Monticello for ourselves. Even after Thomas Jefferson served as our third president he listed his occupation as “farmer”, the vocation he most identified with. At a time when most colonists had typical English-style gardens (i.e. lots of root crops) Jefferson was experimenting with new and wondrous vegetables such as tomatoes, eggplant, okra, lima beans, and peppers. He even grew plants that were brought back from the Lewis and Clark Expedition. My husband and I signed up for the “Revolutionary Garden Tour” at Monticello. The $42 price tag gave us a two-hour guided tour of Jefferson's amazing 1000 foot long terraced vegetable garden, a meet and greet with the head gardener, vegetable tasting, a house tour and time to wander the grounds on our own. The gardens are planted with authentic varieties from Jefferson's time. Our guide was fantastic and I was in total geek-mode as I tried to absorb it all. Apparently Thomas Jefferson never met a vegetable he didn't like. He eventually grew over 330 different vegetable and herb varieties. He adored salads. He even grew sesame for oil to make his own salad dressing. He once said, “I have lived temperately, eating little animal food, and that … as a condiment for the vegetables which constitute my principal diet”. He divided his garden into 24 rectangles and originally organized them into sections labelled “fruits”, “roots” and “leaves” depending on the plant part that was eaten, a fussy arrangement he later abandoned. Jefferson embraced the concept of ferme ornée, an ornamental farm that was both beautiful and productive. He often planted vegetables near each other in order to make attractive compositions, like bordering tomatoes plants with okra, planting alternating rows of white, purple and green broccoli, and planting arbors with scarlet runner bean. The reconstruction of the Monticello vegetable garden is amazing and well worth the trip out to Virginia. Then again, what if a Jefferson-inspired garden could be created right here in Janesville—one that demonstrated his love of gardening, his awe of nature and his willingness to experiment with new and unusual plants? More on that later! Janice Peterson has worked as a grounds horticulturist at Rotary Botanical Gardens in Janesville since 2002. She is a master gardener with the Rock Prairie Master Gardener Association. Though her education is in plant science, she considers her love of gardening and strong back to be her true qualifications. Janice is a community blogger and is not a part of The Gazette staff. Her opinion is not necessarily that of The Gazette staff or management.
<urn:uuid:8121925b-5ca2-4c5e-9480-4732bf8a4ce6>
CC-MAIN-2016-44
http://www.gazettextra.com/article/20140520/BLOGS/140519761
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721141.89/warc/CC-MAIN-20161020183841-00416-ip-10-171-6-4.ec2.internal.warc.gz
en
0.969555
659
1.875
2
Modern Slavery Exposed In Big Tech Supply Chains Australia’s Modern Slavery Act has brought to light human rights violations hidden within the supply chains of big tech companies operating within the country. For example, tech giants Apple and Microsoft reported over 50 suppliers who did not meet compliance standards, while Amazon cited the discovery of human rights violations in 10% of their supplier base. These findings are hardly surprising, given that big tech companies have complex, global supply chains and direct connections to high-risk industries like mineral sourcing, metal refining, and electronics manufacturing. However, Australia’s ground-breaking act has brought greater transparency to the issue, obliging big tech to report findings and take more responsibility for their suppliers’ actions. This article explores modern slavery in the technology industry and steps big tech companies take to manage this risk. Modern slavery challenges for Big Tech firms Technology companies cite three significant challenges in slavery risk management. Debt bonded labour Debt-bonded labour is a form of modern slavery that occurs when a person is forced to work to repay a debt or other obligation. It can also involve withholding personal identity documents, making it impossible for the person to leave their job. Sometimes debt is incurred to get the job itself. For instance, unscrupulous recruiters charge an exorbitant “fee” to assist rural workers in finding jobs in urban areas or migrant workers to find a job in another country. Since most workers cannot afford to pay this fee, it is placed as a debt on them that they have to pay off once they get the job. The risk of debt bondage is higher among certain groups, such as: · Foreign and domestic migrant workers · Agency, contract, or temporary workers · Young or student workers · Vulnerable populations like refugees Big tech companies often have suppliers operating in countries associated with a higher risk for debt bonded labour, such as countries with weak labour law enforcement, large populations of migrant workers, or well-documented cases of modern slavery. Doing business with suppliers in these countries necessitates additional due diligence to ensure workers are safe. Forced labour is labour where workers are not compensated at fair market rates. This includes all types of labour such as indentured labour, prison labour, child labour and labour that forces hazardous conditions on workers. The term also incorporates risk of human trafficking and involuntary labour through force, threat, or fraudulent claims. For example, unscrupulous employers may coerce workers into working long hours by withholding employee identity or immigration papers (like passports, drivers’ licenses, or work permits), or confiscating, concealing, destroying, or otherwise restricting workers’ access to such documents. A cycle of fear, deception, and exploitation exacerbates matters, making it difficult for tech companies to detect when workers are being forced into labour. Labour agents frequently underreport or misrepresent employment contracts to conceal unethical practices, and workers are often afraid to make a report. As a result, tech companies have to implement several mechanisms across all levels of their supply chain to detect and respond swiftly to forced labour reports. Conflict mineral sourcing Conflict minerals are minerals that have been sourced from politically unstable areas. In such regions, the minerals trade is often used to fuel forced labour, support corruption and money laundering, finance armed groups, and fund other human rights abuses. A very high-risk area for the tech industry is the sourcing of tin, tantalum, tungsten, and gold (called 3TG minerals) because they are commonly used in all electronic devices. There are several points in the 3TG minerals and metals supply chain, such as refining, extraction, and transportation, where money from the sale goes to armed criminals. As a result, big tech companies can inadvertently support the perpetuation of armed conflict, violence and human rights abuses in weak or unstable countries. Hence they have to conduct robust due diligence on the source and custody chain of minerals in their global supply chain. Steps for risk mitigation All the major big tech companies reported several actions that they are currently taking to mitigate the modern slavery risk in their supply chain. These actions can be grouped as follows. Microsoft, Apple, Facebook and Amazon all employ third-party auditors to regularly review the employment practices of their current suppliers. During this verification process, auditors examine documentation, visit production lines, dorms, canteens, and waste storage facilities, and conduct face-to-face interviews. For instance, Apple reported interviewing over 57,000 supply chain workers, and over 34,000 follow-up phone calls were made to verify zero retaliation against those workers for participating in assessment interviews. If audits detect nonconformances in the supply chain, big tech companies report working closely with suppliers to develop corrective action plans and resolve detected issues. Suppliers are required to implement corrective and preventative actions for all detected audit findings within specific deadlines. Failure to do can lead to termination of the relationship. For example, in 2019, Amazon’s audit revealed recruitment fee payments and passport retention issues with one supplier. Ultimately, the investigation resulted in the termination of the relationship due to the unwillingness of the supplier to engage in necessary remediation. Responsible sourcing of materials The big tech companies have implemented a code of conduct that requires their suppliers to source materials responsibly. Suppliers are also required to apply these requirements to their sub-contractors, third-party recruitment agencies, next-tier suppliers, and through all levels of the supply chain. For example, since 2009, Apple has directed the removal of 146 3TG smelters and refiners who did not meet Apple’s requirements for the responsible sourcing of minerals. In 2019, Microsoft expanded its work with NGO partner Pact in an effort to eradicate child labour in the mineral supply chain. Positive results have included identifying and rehabilitating 2,000 children working in mine sites. Even though large technology companies face several challenges in eradicating modern slavery from their supply chains, they all report an ongoing commitment to doing so. To ensure that their policies and programs incorporate internationally recognized human rights standards, they engage with industry and multi-stakeholder organizations for training and other modern slavery initiatives. They also form strategic partnerships with grassroots organizations to provide immediate, direct support to potential victims. Mandatory reporting demands by governments and investors will continue to drive more and more companies to take concrete action.
<urn:uuid:e80e8c41-f694-4bb1-9624-8baf4b422f72>
CC-MAIN-2022-33
https://informed365.com/modern-slavery-exposed-in-big-tech-supply-chains/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571234.82/warc/CC-MAIN-20220811042804-20220811072804-00073.warc.gz
en
0.94594
1,325
2.734375
3
Do-it-yourself projects and plans for anyone who can swing a hammer. Read Part 1 of this series of a general materials list for this project. Read Part 2 with help in designing and planning a pallet guitar project. Tools for Installing a Guitar Sound Chamber You will need a few basic tools to do this build:• A plunge router, this is used to create the cavities. • A rotary tool • An orbital jig saw Making a Plan for the Inner-Workings This post is done on a very cold day here in Wisconsin, -20 degrees. Too cold to be outside. Besides, this is much more fun. Anyway, below you will notice a horizontal cross section of the guitar. Imagine the top cut off. This shows, I hope, the routed out areas that make up the sound chamber, pick-up pockets, and control panel - brown in color. The brown hatched areas are the built-up sides. These are, for the most part, free hand drawings, so bear with me. I draw these again to actual size to avoid transposing measurements, I’m Irish, old and simple, need all the help I can get. Here goes. Again maintain that center line. If you look close you can see it on my plan. Applying the Plan to the Material or "Field Engineer” If It Is Wrong Once you have developed the plan you are hap! hap! happy with, cut out around the outer perimeter of the drawing, lay out on the block of wood material selected for the body with neck attached, and trace. Don’t cut out the shape until you have routed out the inside cavities with the router. Once the routing has been complete, cut out the perimeter “shape of the guitar." This is where the jig saw comes in handy. Now the body and the neck should be one piece and in a rough form. Using the rotary tool, clean up any rough areas. I use copper foil for all my shielding. You might say, “what in the heck is shielding and why?" Without proper shielding, the pick-ups, potentiometers “pots” and input jacks would pick up outside humming noises, even hum-bucking pick-ups don’t always stop all noises. I save as much copper flashing material as possible for this use. If purchasing is the only source, hobby/craft stores carry copper foil by the roll or sheet. I use latex-based contact adhesive to adhere the shielding material to the cavity base and sides. Got to think (environment) sometimes. If you want, you can substitute magnetic chalk-board paint for copper shielding, this works, but is not quite as effective as copper. Remember, all cavities should be shielded, except for sound cavities. I know this may be hard to understand without progressive images. I didn’t start taking image shots till later builds. Feel free to contact me with questions. We used to make what we thought was music with very rough instruments: stump fiddle, wash tub base and drum, four string guitar and harmonica. Not in tune, but fun. We didn’t consider ourselves poor, just resourceful. Doesn’t take much to make me happy. Did I mention I’m a simple, poor Irishman? Electronics: Fun Stuff Now we get into the electronics. I made up my harness outside the guitar, this way I can take time soldering and will be able to test the components before installation. I used all reclaimed pieces, pots, input, pickups, and any switches needed. You will need the following equipment. Various electronic component diagrams are available for free on the internet. Just search "guitar electronics." Many diagrams will show up. To start with, select one that is basic. I use all passive systems, meaning no pre-amps or batteries are needed, must keep that carbon foot-print as small as possible. Needed Equipment:• soldering gun • cordless drill, I'll explain this later • wire stripper • assorted pliers Follow the diagram very closely as to where the wires are located. I label all components, and use colored wire. You will notice some pick-ups have 4 wires and some 2. I make most of mine 2 wire applications, again, I’m a simple Irishman. Now we are ready to test. This is where the cordless drill is handy. I use an amp, cordless drill, and a multimeter for testing. Follow this procedure and things should go well. 1. Solder following the diagram. 2. Test connections using the multi-meter set on ohms to check continuity. 3. Plug your jack cord, one end into the input of your harness, the other into a small guitar amp. 4. Turn the amp on with volume about half, crank the volume and tone pots all the way up. 5. Using your cordless drill, hold it near the pick-ups, you should hear an amplified version of the drill. Happy thoughts, thanks. All MOTHER EARTH NEWS community bloggers have agreed to follow our Blogging Best Practices, and they are responsible for the accuracy of their posts. To learn more about the author of this post, click on the byline link at the top of the page.
<urn:uuid:c8f838b3-2477-4091-b662-d507144a0cfe>
CC-MAIN-2017-04
http://www.motherearthnews.com/diy/pallet-guitar-part-3-sound-chambers-zbcz1502
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00190-ip-10-171-10-70.ec2.internal.warc.gz
en
0.919304
1,119
2.28125
2
I guess it all goes to "Who do you believe?" Some industry council study that says everything is fine. Or some researcher. It's just like an old milk debate. Milk good for kids. Not so good for adults. Whole milk is definitely a no-no for adults. I stick with non-fat myself. But the thing about milk for adults is that it supposedly washes away calcium in women. Caffeine is said to have addictive qualities. Don't know if I'm going through the withdrawals, being a few months without, now. might state the subtly obvious: We love the rich aroma and the taste of coffee, and we do like something hot in the morning. But we are not fooling anyone. What we want is the buzz, that is, the caffeine. “Do you know that many people cannot do without taking at least one cup of coffee or tea a day? It has become the accepted, somewhat joked about, addiction. Of course everyone has different reactions, but the article says -- Other effects of caffeine on the body includes; stomach irritation, interference with proper digestion and a constricting effects on blood vessels. Caffeinated drinks can also stimulate the stomach to excrete excessive acid, which may later aggravates ulcer. I'm hypocondriatic enough to believe that it did start to mess up my digestion a bit. That and heartburn.
<urn:uuid:1534cb3c-20c9-434f-b9d9-2bdfec488f49>
CC-MAIN-2016-44
http://tvnewslies.org/forum/viewtopic.php?p=38241
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719286.6/warc/CC-MAIN-20161020183839-00499-ip-10-171-6-4.ec2.internal.warc.gz
en
0.964145
290
1.835938
2
(Last date : 26 August 2016) Being recruited in the police is always considered to be a respectful job since the early days. That is why when, there is a new recruitment is being published related to the Police recruitment, each and every youngster rushes to apply for this particular job. If you have completed your 10+2/ Intermediates or any equivalent education, then you also have the golden chance to be a part of this department. Here we will help you to get the detailed information about Punjab Police recruitment through which you can easily apply for your desired post online as most people often face difficulties during applying through online mode. So each and every candidate is requested to go through this article thoroughly or else you may fail to learn about the necessary factors to fill up the application form. Constable recruitment of Punjab Police: Recently Punjab police department has published an advertisement for Punjab Police Recruitment. It is believed to be a superb opportunity especially for those, who are eagerly seeking for a government job. Interested candidates should apply for this job as early as possible. They will have to fill up form through online mode with required details and submit the form before the due date of accepting i.e. 21-06-2016. Now, let’s have a look at the eligibility criteria of this particular recruitment that is surely an essential part to be known properly by every candidate before going further. It will offer you a complete idea whether you are eligible for the post or not. Punjab Police Recruitment 2016 details: - Name of the Organization: Punjab Police department. - Number of Posts: 7645 - Name of the Post: Constable (Male and female). - Male Constable: 6252 posts. - Female Constable: 1164 posts. - Pay Scale: Rs 10000/- to 34800/- - Website for applying online: www.punjabpolice.gov.in - Starting date of applying online: 31-05-2016 - Last date of applying online: 26-06-2016 Eligibility Criteria for Punjab Police Posts: Nationality: Candidates should be a citizen of India. Educational Qualification: Aspirants who have 10+2 or its equivalent degree from any recognized university or education board are eligible enough to apply for this job. Age limit: As on 1st January the minimum age for the recruitment of the post of constable (both female and male) should be 18 years and maximum age of the candidate should be 28 years. Age Relaxation: Candidates who belong to Schedule Castes (SC)/ Schedule Tribes (ST) and Other Backward Classes (OBC) would be entitled to the relaxation in the upper age to an extent of 5 years above. Ex- Serviceman: Those who belong to the category of ex- servicemen shall be provided relaxation in upper age limit by 3 years above and the number of years of the service. Physical Standards: Height- 5’3” for the female candidates and 5’7” for the male. - For General Category: Rs 400/- - For SC/ ST/ OBC: Rs 100/- - For Ex- Servicemen: Rs 0/- Deposit of Application Fees: The candidates can deposit the application fee by the online mode in the time of filling up the application form. - Credit/ Debit card payment. - Net banking and - Offline payment with the help of Challan: - Police SAANJH Kendras. - HDFC Bank Note: Under any circumstances once deposited application form fees shall not be refunded. Procedure of Selection: - Physical Efficiency Test - Physical Measurement - Written Test - Merit Basic Syllabus for the post of constable in Punjab Police Department: The main subjects that are added in written examination are given below. - General Knowledge - Geography and culture - History of Punjab How to Apply Online: - First, log on to Punjab police’s official website www.punjabpolice.gov.in. - Now candidates will have to search link related to the online application and click on that link. Read carefully all the instructions. - Now start filling up the application form. Provide all needed information correctly such as Name, Age Limit, Father Name, Educational Qualification, Address etc. - Upload your Scanned Signature and Photograph and submit. - After submitting, you will have to take a printout or hard copy of submitted recruitment application form for future references. Hope this article has given you what you are looking for. Wish you good luck for your coming future examination. Punjab Police SI & Constable Vacancy Details Authority : Punjab Police Department Website : www.punjabpolice.gov.in No. of Posts : 6435 Police Constable and SI Posts Mode of Application : Online. Job Category : State Government Jobs. Job Location : Punjab. Vacancy Details : - Constable (Male) : 4000 - Constable (Female) : 2000 - SI : 435 - For Sub Inspector: Candidates must be a Graduate in any stream from recognized university or board. - For Constable: Applicants must pass 12th class or equivalent from Punjab school board. Age Limit for Punjab Police SI Jobs - Minimum Age: 18 years. - Maximum Age: 25 years. - Physical Test. - Written Test. For Sub Inspector : Rs 9,300/- to 34,800/- with Grade Pay of Rs 4,200/- per month. For Constable : Rs 5,200/- to 20,200/- with Grade Pay of Rs 1900/- per month. |Starting date for filling online application||02.05.2016.| |Closing date for submission of the online application||30.05.2016.| For more info, please go to www.punjabpolice.gov.in
<urn:uuid:8447008c-d10b-425a-9948-f58f416286a0>
CC-MAIN-2017-04
http://www.alltechguide.net/punjab-police-recruitment-333725.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280718.7/warc/CC-MAIN-20170116095120-00404-ip-10-171-10-70.ec2.internal.warc.gz
en
0.879103
1,239
1.515625
2
J.K. Rowling took to Twitter Saturday evening to respond to accusations that she harbors transphobic beliefs. She didn’t help her case. “If sex isn’t real, there’s no same-sex attraction. If sex isn’t real, the lived reality of women globally is erased,” Rowling said as part of a series of tweets. “I know and love trans people, but erasing the concept of sex removes the ability of many to meaningfully discuss their lives. It isn’t hate to speak the truth.” Rowling’s comments came nearly six months after she tweeted in support of Maya Forstater, a woman who lost her job after allegedly making transphobic comments. Many decried that tweet, calling it hurtful, painful and disappointing. Rowling spent the majority of 2019 staying out of the social media world but returned earlier this year in the wake of the COVID-19 pandemic, though she remained tight-lipped about criticisms of transphobia. Saturday’s tweets started with a response to an opinion piece published on devex.com, which made reference to “people who menstruate.” “I’m sure there used to be a word for those people,” Rowling tweeted. “Someone help me out. Wumben? Wimpund? Woomud?” She continued to defend her statements in the hour following her initial tweets. “The idea that women like me, who’ve been empathetic to trans people for decades, feeling kinship because they’re vulnerable in the same way as women – ie, to male violence – ‘hate’ trans people because they think sex is real and has lived consequences – is a nonsense,” she tweeted. “I respect every trans person’s right to live any way that feels authentic and comfortable to them. I’d march with you if you were discriminated against on the basis of being trans. At the same time, my life has been shaped by being female. I do not believe it’s hateful to say so.” Social media users, including many current and former Harry Potter fans, overwhelmingly condemned her comments. “I assure you, they do not love you back,” actress Mara Wilson wrote in response to Rowling saying, “I know and love trans people.” “Authors in kid-lit are having a nuanced conversation about pay disparity in publishing and somehow it summoned J.K. Rowling and her fierce need to disappoint us,” author Eric Smith wrote. Rowling’s tweets coincided with an online discussion about publishing among authors of color, amid days of protests for justice against racism and police brutality in America and around the world.
<urn:uuid:6db649f5-6703-44c9-a454-bcb835f3cf9d>
CC-MAIN-2022-33
https://bookstacked.com/popular/jk-rowling/j-k-rowling-finally-responds-to-accusations-of-transphobia/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00468.warc.gz
en
0.961154
595
1.75
2
Measuring the brain activity of healthy, older adults while they walk and talk at the same time may help predict their risk of falls later, according to a study published in the December 7, 2016, online issue of Neurology®, the medical journal of the American Academy of Neurology. “In older people who had no signs of disease that would make them prone to falls, higher levels of activity in the front of the brain, called the prefrontal cortex, were associated with a higher risk of falls later in life,” said study author Joe Verghese, MBBS, MS of the Albert Einstein College of Medicine in the Bronx, NY, and Fellow of the American Academy of Neurology. “This suggests that these people were increasing their activation of brain cells or using different parts of the brain to compensate for subtle changes in brain functioning.” The prefrontal cortex is the area of the brain where goal setting and decision-making takes place. For the study, researchers looked at 166 people with an average age of 75 who had no disabilities, dementia or problems with walking. They then used brain imaging to measure changes in oxygen in the blood in the front of the brain as each person walked, recited alternate letters of the alphabet and then did both tasks at the same time. Researchers then interviewed participants every two to three months over the next four years to see if they had fallen. Over that time, 71 people in the study reported 116 falls; 34 people fell more than once. Most falls were mild with only 5 percent resulting in fractures. The study found higher levels of brain activity while both walking and talking were associated with falls, with each incremental increase of brain activity associated with a 32 percent increased risk of falls. Such an association was not found when looking at brain activity levels during just walking or talking. The speed of the walking and naming letters did not help predict who was more likely to fall. The relationship between brain activity and falls risk was the same after researchers accounted for other factors that could affect a person’s risk of falling, such as slow walking speed, frailty and previous falls. “These findings suggest that there may be changes in brain activity before physical symptoms like unusual gait appear in people who are more prone to falls later,” said Verghese. “More research needs to be done to look at how brain and nerve diseases associated with falls impact brain activity in their earliest phases. We also know there are other areas of the brain which may play a role in increasing fall risk, so those too should be studied.”
<urn:uuid:75dd96f6-a4c4-4804-9934-a56d9afe3093>
CC-MAIN-2022-33
https://www.psypost.org/2016/12/brain-activity-may-predict-risk-falls-older-people-46357
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00074.warc.gz
en
0.974917
528
3.453125
3
Exploratory Essay SampleThe Talent Myth Are smart people overrated? Five years ago, several executives at McKinsey & Company, America's largest and most prestigious management-consulting firm, launched what they called the War for Talent. Thousands of questionnaires were set to managers across the country. Eighteen companies were single out for special attention, and the consultants spent up to three days at each firm, interviewing everyone from the C.E.O. down to the human-resources staff. McKinsey wanted to document how the top-performing companies in America differed from other firms in the way they handle matters like hiring and promotion. But, as the consultants sifted through the piles of reports and questionnaires and interview transcripts, they grew convinced that the difference between winners and losers was more profound than they had realized. "We looked at one another and suddenly the light bulb blinked on," the three consultants who headed the project�Ed Michaels, Helen Handfield-Jones, and Beth Axelrod write in their new book, also called the "The War for Talent." The very best companies, they conclude, had leaders who were obsessed with the talent issue. They recruited ceaselessly, finding and hiring as many top performers as possible. They singled out and segregated their stars, rewarding them disproportionately, and pushing them into ever more senior positions. "Bet on the natural athletes, the ones with the strongest intrinsic skills," the authors approvingly quote one senior General Electric executive as saying. "Don't be afraid to promote stars without specifically relevant experience, seemingly over their heads." Success in the modern economy, according to Michaels, Handfield-Jones, and Axelrod, requires "the talent mind-set": the "deep-seated belief that having better talent at all levels is how you outperform your competitors." This "talent mind-set" is the new orthodoxy of American management. It is the intellectual justification for why such a high premium is placed on degrees from first-tier business schools, and why the compensation packages for top executives have be- come so lavish. In the modern cor- poration, the system is considered only as strong as its stars, and, in the past few years, this message has been preached by consultants and manage- ment gurus all over the world. None, however, have spread the word quite so ardently as McKinsey, and, of all its clients, one firm took the talent mind-setclosest to heart. It was a company where McKinsey conducted twenty separate projects, where McKinsey's billings topped ten million dollars a year, where a McKinsey director regularly attended board meetings, and where the C.E.O. himself was a former McKinsey partner. The company, of course, was Enron. The Enron scandal is now almost a year old. The reputations of Jeffrey Skilling Kenneth Lay, the company�s two top executives, have been destroyed. Arthur Andersen, Enron's auditor, has been all but driven out of business, and now investigators have turned their attention to Enron's investment bankers. The one Enron partner that has escaped largely unscathed is McKinsey, which is odd, given that it essentially created the blueprint for the Enron culture. Enron was the ultimate "talent" company. When Skilling started the corporate division known as Enron Capital and Trade, in 1990, he "decided to bring in a steady stream of the very best college and M.B.A. graduates he could find to stock the company with talent," Michaels, Handfield-Jones, and Axelrod tell us. During the nineties, Enron was brining in two hundred and fifty newly minted M.B.A.s a year. "We had these things called Super Saturday," one former Enron manager recalls. "I'd interview some of these guys who were fresh out of Harvard, and these kids could blow me out of the water. They knew things I'd never heard of." Once at Enron, the top performers were rewarded inordinately, and promoted without regard for seniority or experience. Enron was a start system. "The only thing that differentiates Enron from our competitors is our people, our talent," Lay, Enron's former chairman and C.E.O., told the McKinsey consultants when they came to the company's headquarters, in Houston. Or, as another senior Enron executive put it to Richard Foster, a McKinsey partner who celebrated Enron in his 2001 book,"Creative Destruction," "We hire very smart people and we pay them more than they think they are worth." The management of Enron, in other words, did exactly what the consultants at McKinsey said that companies ought to do in order to succeed in the modern economy. It hired and rewarded the very best and the very brightest and it is now in bankruptcy. The reasons for its collapse are complex, needless to say. But what if Enron failed not in spite of its talent mind-set but because of it? What if smart people are overrated? Custom Written Paper: Need a unique paper? Place your paper request and let our professional writers to complete it.
<urn:uuid:75cc73f7-47c1-4988-b6b7-14772f05e58a>
CC-MAIN-2017-04
https://www.solidessay.com/howto/sample-19-Exploratory-Essay.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00359-ip-10-171-10-70.ec2.internal.warc.gz
en
0.979373
1,063
2.078125
2
Press esc to close Press esc to close Fill out your contact details below and our training experts will be in touch. If you wish to make any changes to your course, please log a ticket and choose the category ‘booking change’ Back to Course Information Module 1: Introduction Module 2: Basic Teaching skills Module 3: Roles and Responsibilities of an Online Tutor Module 4: Types, Skills and Qualifications Module5: Tools of the Trade In this Online Teacher Masterclass course, there are no formal prerequisites. This Online Teacher Masterclass course is designed for anyone willing, but, it is much more beneficial for: Teaching is a very dynamic stream with frequent pedagogical and technical advances, and this allows professional development which is a continuous, life-long process. A teacher affects numerous young minds; the teacher will typically design the malleable young minds in any shape. The young children see teachers as role models, and several times they can be seen imitating their teacher while playing. These days online tutoring has become a highly profitable job choice. When students need to improve their school curriculum, require assistance with assignments, study for challenging tests, review selected lessons or enhance their learning in the classroom, tutors come into the frame, and they focus on online tutoring resources to save time and travel. Online tutoring is booming, and students around the world depend upon it in some or other way. The main aim of this 1-day Online Teacher Masterclass training is to train the teachers with techniques and methods of online teaching for both student-oriented and teacher-oriented courses in virtual learning environment. The course concentrates on the demands of the asynchronous environments and how this is different from face-to-face teaching. In addition to this, the course provides various ways in which allows synchronous tools to be used for teaching face to face online. This course provides personal and professional training to teachers in the most efficient way. This training will cover various key concepts, such as: At the end of this training, delegates will gain an understanding of making their sessions more engaging. Delegates will also attain knowledge of basic Tutoring Skills and different types of tutoring methods. Why choose us Our easy to use Virtual platform allows you to sit the course from home with a live instructor. You will follow the same schedule as the classroom course, and will be able to interact with the trainer and other delegates. Our fully interactive online training platform is compatible across all devices and can be accessed from anywhere, at any time. All our online courses come with a standard 90 days access that can be extended upon request. Our expert trainers are constantly on hand to help you with any questions which may arise. Course was run very smoothly, Richard our trainer was extremely knowledgeable and delivered the course in a succinct fashion with a twist of humour thrown in. The course was great and the so was the trainer - brilliantly delivered and I would certainly recommend this course to my colleagues. Thanks to Richard for a great course and delivering it a tough environment virtually. Richard was very knowledgeable and explained well You won't find better value in the marketplace. If you do find a lower price, we will beat it. Flexible delivery methods are available depending on your learning style. Resources are included for a comprehensive learning experience. "Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam" Joshua Davies, Thames Water
<urn:uuid:bc088ad1-ce4d-4bfb-9f31-0d58320834a7>
CC-MAIN-2022-33
https://www.theknowledgeacademy.com/us/courses/virtual-online-job-roles-training/online-teacher-masterclass/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00477.warc.gz
en
0.942776
752
2.15625
2
What Is Woodworking? Woodworking implies a great deal of points, but below’s reasonably monotonous meaning I created that most hobbyists will probably agree with Woodworking is a productive craft that involves cutting, shaping, as well as joining wood to produce decorative and/or valuable bathroom medicine cabinet woodworking plans things. There is nothing literally requiring about woodworking as well as you can develop at your very own pace. The standard ideas are simple to learn, yet it’s a leisure activity that will constantly continue to be fresh and challenging as your abilities evolve. If you like analytical, you will love woodworking. I’ve gone to this for over 40 years and face new challenges with every project I construct. It belongs to the process. It’s also awarding to create truly trendy stuff for your residence utilizing your hands and brain. Generally, woodworking is an extremely singular experience: if you are a little bit withdrawn and also love tackling jobs from beginning to end, you will certainly enjoy woodworking. Who Are Woodworkers? There utilized to be 2 stereotypes of woodworkers. The cranky store instructor that educated an actually dull course to kids who didn’t wish to exist, as well as the retired grandfather that puttered around in his garage with a great deal of time to develop a periodic birdhouse. Fortunately, those stereotypes are no longer real. There is even more variety in woodworking currently than ever before, thanks to online neighborhoods and the affordability of devices and products. In the past ten years there has been a significant increase in 2 groups of people making woodworking a leisure activity. First, females. It wasn’t that long ago when a women woodworker was unusual. Today, females woodworkers are widespread. There is absolutely nothing regarding woodworking that anyone can not do. The second significant demographic spike has actually been among millennials, people in their 20s as well as 30s. I speak with people all the time who operate in silicon valley or just have some kind of office work as well as feel the need to make points with their hands. What’s The Difference Between A “Maker” And Also A “WoodWorker”? A maker is a relatively new term that has emerged in the past years or so. It’s an all-encompassing term for people who like to meddle different crafts. This could imply a little woodworking, metalworking, epoxying, concreting, computer system programming, electronic devices, 3D printing, baking, stitching, knitting, fashion jewelry production, sculpting, porcelains, robotics, also having fun with Legos. So essentially, we are all makers. A woodworker is a maker who is mainly curious about finding out and also improving the craft of developing points out of wood. Occasionally we bring various other materials into our tasks, however the emphasis is on the timber. It’s an economical, timeless material that’s very easy to construct with. Ted’s 16,000 Woodworking Plans I’ve had my eye on Ted’s 16,000 woodworking plans for time. It appeared as well great to be true. Despite the fact that I’m not a devoted woodworker, I figured if I made one or a few of the tasks from the kit it would certainly be money well invested. My interest obtained the best of me. I bit the bullet and also bought it. They supply a refund so I figured if it was absolutely worthless I could request my money back. Is is as well excellent to be real? Not really. It’s pretty good. It’s not excellent, however it’s great. A few of the plans are so negative but are included just to increase the sales pitch of “16,000” strategies. And afterwards a few of the strategies are great. Some are fine. I’m not amazed it’s not excellent. It’s a huge collection and also mishmash of different prepare for all type of products. Here’s the way of thinking you must have if you buy Ted’s Woodworking. Approve the truth you will not like every plan. As a matter of fact, approve you will probably not do 90% or even more of them for any variety of factors such as the plans misbehave and/or they aren’t projects you desire to construct. BUT, minority plans that you do like and that are decent top quality, if you build them, will be make the expense of this digital collection of woodworking strategies worth it. Who should get Ted’s Woodworking? This is for people who such as do it yourself tasks. A lot of the plans are classified “novice”, “intermediate” or “innovative” which is practical. Even if you have actually never ever built anything or done any kind of woodworking, this is a pretty good set of strategies to get going with since there are beginner jobs consisted of. You can build all type of things for your house. See the checklist of plan categories listed below. At the end of the day, if you do the weird do it yourself job or meddle woodworking, this is a decent set of strategies to have in your supply. About the Product I have not counted to see if there are 16,000 strategies, but I validate there are a great deal of them. The good news is they are well arranged so you can discover exactly what you’re searching for. Ted’s Woodworking is delivered as a PDF download. It’s actually a series of PDF downloads (see plan classifications above). Nevertheless, you can likewise buy the DVD edition however it costs an extra $19.95 (I didn’t pay $19.95 for the DVD variation). Some wonderful woodworking strategies: Clearly if a strategy is something you wish to build and the strategy is described enough so that you can complete the task it’s great. Nonetheless, some of the jobs are old and also the plans are poor quality … so bad you’ll probably just ignore them. On the PLUS side, there are many exceptional projects worth building. For instance, the loft space bed plan above is outstanding (one of lots of). Well Organized: I was soothed after getting Ted’s Woodworking that I really did not have to sift via thousands of PDF pages. Rather, Ted at least place some initiative into arranging the strategies in numerous categories. This made finding some suitable strategies extremely simple. In fact, the participants’ location is actually easy to use and also well organized. Good value for money: One or two finished projects from this product makes it worth the money. I have no doubt I’ll get my cash’s worth in the future as well as I’ve yet to look into each and every single plan included. I’ve located enough quality tasks that I’m satisfied with the product value offered it’s relatively inexpensive. Expense: It’s not very pricey. Since it’s a digital download, you do not have to spend for a costly book, which is wonderful. Motivation: One benefit of there being numerous plans is merely by brushing through the plans I generated brand-new task ideas I had not thought about previously. Some dreadful plans: Sadly a few of the strategies are terrible which suggests you have to invest some time filtering through the negative plans. I would prefer an item with fewer strategies with each one be excellent quality. Woodworking Video clips: These are a joke. Thankfully it’s simply a bonus offer so I really did not care. I believe these compromise the item. The videos are largely from YouTube. Ted just combed through YouTube trying to find woodworking videos as well as put them in the members’ area. I had a look at a few of the video clips and also they weren’t worth enjoying. On the whole, I’m pleased. I discovered a number of jobs worth doing and also the plans were sufficiently described that I ‘d have the ability to build them. It’s a great supply to have on hand even though I have no immediate requirement. If ever before I desire to construct something, I have a good set of strategies to have a look at.
<urn:uuid:b5b0d9ca-2622-4c8a-96b3-56ee73949e6f>
CC-MAIN-2022-33
https://www.redfoxcountryinn.com/bathroom-medicine-cabinet-woodworking-plans/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00475.warc.gz
en
0.965722
1,780
2.75
3
These modern farming systems are advantageous in that they conserve water and minimize use of pesticides on plants. They are also environment friendly and inclined to organic farming and the resulting produce is low in agrochemicals residue, healthy to consume and fetches better prices in the market. These systems are vital for addressing most of the current global challenges of the agriculture industry The word hydroponics is derived from two Greek words hydro and ponos which means labour. Rather than growing plants in the soil media, hydroponics involves growing plants in a nutrient-rich solution. In hydroponics the growing medium is a pH adjusted water solution. The plants nutrients dissolved in the water and are absorbed easily by the plants. According to proven research findings, plants roots absorb nutrients easier when dissolved in water than when in the soil. In some cases inert media are used to hold the roots e.g. sand, gravel, perlite, vermiculite, rockwool, coir, coconut husks, sawdust and peatmos .Hydroponics method of farming is economical in that it requires reduced water, reduced fertilizer and pesticides leading to consumer friendly produce with minimal chemical residue levels, which commands better market prices. Furthermore hydroponics requires minimal space and can be easily practiced in urban areas. Hydroponics system therefore addresses food security by providing affordable, locally-grown vegetables. For small holders with limited land, the modern system is ideal. Hydroponics system is not only low cost and easy to use, but can be optimized for high yields using minimal resources. Furthermore pests and diseases are easy to control without the use of pesticides, crops are easier to harvest, there’s no nutrients leaching, and the water can be reused. quaponics is similar to hydroponics the difference being growing of plants is combined with fish farming. The fish’s waste provides rich organic manure to the plants which in turn provides oxygen for the fish, a typical symbiotic relationship. In ancient Last but not least aeroponics is growing of plants in the air in which case the roots are suspended in a closed space and sprayed with a nutrient rich solution and then left to grow in no medium. It saves a lot of water in addition to easy control of pests and diseases. This leads to healthy organic produce.For more information read the following links
<urn:uuid:da6d6652-eb5c-432e-80b1-fa7c4ec7971e>
CC-MAIN-2016-44
http://yagrein.blogspot.com/2012/05/hydroponics-aquaponics-aeroponics.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718957.31/warc/CC-MAIN-20161020183838-00435-ip-10-171-6-4.ec2.internal.warc.gz
en
0.929162
476
3.15625
3
Sweet Potato Mashers I adapted this recipe for mashed sweet potatoes from one of my cooking magazines. It’s pretty straight forward for any mashed potato dish except for the addition of an Anaheim pepper to spice it up a little. This variety of pepper is a milder variety of the New Mexico chili pepper and can range in heat from medium to medium-hot or 500 to 2,500 on the Scoville scale. If you want to really spice up this dish, you could try substituting a hotter variety of pepper like jalapenos. This pepper received its name from a farmer by the name of Emilio Ortega who brought the seeds from New Mexico to Anaheim, California way back in 1894. You may also see it in the markets as Magdalena or California chile. A Couple of Changes The original recipe has you seed and thinly slice the Anaheim chile before adding to the mashed sweet potatoes. I found the peppers were too big and their taste overwhelming the sweet flavors of the potatoes. As you take a bite of potatoes, you’re met with a firm chunk of pepper. I suggest you mince the pepper into tiny bits so it incorporates nicely in the potatoes and doesn’t overpower them. I’m also thinking of roasting the pepper first before mincing. This will make them a little sweeter and softer and make a better match with the sweet potatoes. Sweet Potatoes Are Not Your Everyday Potato Did you know that sweet potatoes and regular potatoes are completely unrelated because they come from different “families”? Yes, they bother are both called potato, they both are tubers, they both go back thousands of years and they both originated in Central and South America but they are very much different. The everyday potato is in the Solanaceae family with other “nightshade” plants like peppers, tomatoes and eggplant. The sweet potato is in the Convolvulaceae family along with morning glory and bindweed. The leaves of the Solanaceae family can be poisonous while the leaves in the Convolvulaceae family are eatable.
<urn:uuid:0bc0bd31-7e84-4f3d-8885-c56c6fa4a1a4>
CC-MAIN-2017-04
http://www.reluctantgourmet.com/spicy-mashed-sweet-potato-recipe/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00563-ip-10-171-10-70.ec2.internal.warc.gz
en
0.946919
441
2.171875
2
On the heels of heightened awareness of illegal immigrant children being separated from their parents at the border, US Sen. Ted Cruz introduced legislation that would keep families together while also providing for enhanced border security. Due to a decades-old court settlement which bars the US government from jailing illegal immigrant children, families crossing the border illegally and claiming to seek asylum status were often released into the country while their cases were pursued. That policy came to be known as “catch and release” and encouraged those seeking to enter the country illegally to bring children with them and to falsely claim for asylum in order to exploit the loophole in immigration law. US Attorney General Jeff Sessions, who worked with the Department of Homeland Security to begin holding parents and children separately in order to curtail further illegal immigration, noted that the practice had encouraged further illegal immigration involving children, which often leads to their harm, rape, or even death during dangerous, illegal border crossings. “Word got out about this loophole and the results were predictable,” Sessions told the Wall Street Journal. The situation has led to a political standoff between the Trump administration, which has asked Congress for a legislative solution to end the practice and clear the bloated asylum backlog, and Democrats who have sought to exploit the tragedy for political leverage to fight against border security funding and the construction of Trump’s proposed border wall. In light of the difficult situation, US Sen. Ted Cruz has introduced the Protect Kids and Parents Act, legislation which provides for families to remain together and receive an expedited review of their request for asylum status. “All Americans are rightly horrified by the images we are seeing on the news, children in tears pulled away from their mothers and fathers,” said Cruz. “This must stop. Now. We can end this crisis by passing the legislation I am introducing this week.” “The answer is not what congressional Democrats are proposing: simply releasing illegal aliens and returning to the failed policy of ‘catch and release.’ Rather, we should fix the backlog in immigration cases, remove the legal barriers to swift processing, and resolve asylum cases on an expedited basis,” he added. Cruz’s legislation, as filed, would do the following: - Double the number of federal immigration judges, from roughly 375 to 750. - Authorize new temporary shelters, with accommodations to keep families together. - Mandate that illegal immigrant families must be kept together, absent aggravated criminal conduct or threat of harm to the children. - Provide for expedited processing and review of asylum cases, so that—within 14 days—those who meet the legal standards will be granted asylum, and those who do not will be immediately returned to their home countries. Cruz should be commended for crafting a fix that protects families—even those of illegal immigrants—while also protecting the interests of American citizens and the rule of law.
<urn:uuid:758f6e6e-5b9a-4aaf-8d9f-69daa00cc5e4>
CC-MAIN-2022-33
https://texasscorecard.com/uncategorized/cruz-protect-families-end-catch-and-release/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00470.warc.gz
en
0.967254
593
2.25
2
DeviceNet has become international de facto networks for simplifying wiring and promoting device standardization and modularization, and OMRON provides a wide range of Master and Slave Devices for the DeviceNet, CompoBus/S and other networks. sensor level information visible and solves issues at manufacturing sites Industrial open-network EtherNet/IP products with control protocols based on standard Ethernet technology. EtherCAT is a high-performance field network able to connect drive devices, intelligent sensors and I/O devices using Ethernet technologies CompoNet is a global multi-vendor open network that achieves high-speed data communications. DeviceNet is applied in IEC international standards and more than 800 companies provide DeviceNet products, making DeviceNet a highly dependable field network alternative. The CompoBus/S High-speed Field Network is ideal for reducing component wiring. Both standard cabtyre cable and special flat cable can be used.
<urn:uuid:b1f70dbc-bade-4c20-ac42-9e51b5f94be1>
CC-MAIN-2017-04
http://www.ia.omron.com/products/category/automation-systems/networks/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00288-ip-10-171-10-70.ec2.internal.warc.gz
en
0.866614
193
1.890625
2
Sign Up To Join The Hydrogen Revolution Today And Receive Exclusive Investment Opportunities. Global hydrogen demand is expected to grow significantly in the coming years. Looking at the 2020 to 2025 period, the hydrogen market is projected to grow at an average CAGR of 9.2%. This means a market increase of US$71 billion, from US$130 billion in 2020 to US$201 billion in 2025. In the same period, the Asia Pacific hydrogen market is expected to grow at a CAGR of 10%. The market is currently worth US$93 billion and is a key focus for Australia along with its western partners. The growth in hydrogen demand and generation is predominantly driven by the increasing global push for clean energy, the need to minimise greenhouse gas emissions, long term power storage, mobile energy generation, and the rising use of hydrogen fuel cell vehicles and aircrafts. Australia is well placed to become a significant player in the Asia Pacific region and provide quality hydrogen to meet increasing demand. This is due to a combination of drivers, such as the rising demand in the region and geographic proximity to a high growth market. For this reason, we can expect to see the development of countless green hydrogen companies in Australia a nd across the world. With the commitment to full decarbonisation by 2050, among Australia’s western trade partners, hydrogen is predicted to become a leader in the global energy market. Australia is well placed to capitalise on the forecasted growth in the hydrogen market. Known for exporting high-quality resources, Australia is set to become a leader in green hydrogen production for buyers in the Asia Pacific and in a global context. To support the emerging hydrogen export industry, the Australian Commonwealth has developed a National Hydrogen Strategy. The strategy provides a roadmap to capitalise on the potential of this growing market. Key opportunities outlined in the document have been categorised into domestic and international exports It’s been estimated by multinational American engineering firm, AECOM, that the average cost of electricity produced by diesel generators in regional and remote communities is AU$450 per MWh. Using hydrogen this can be reduced to approximately AU$100 per MWh. That is a significant saving and an early opportunity for hydrogen to enter the market. Hydrogen can also replace another non-renewable resource – natural gas. Syngas is an extremely rich form of hydrogen that can easily be used in place of natural gas while also being more cost-effective. Experts estimate the syngas market will be worth US$66.5 billion by 2027. Hydrogen vehicles were launched to the market a few years ago, however, uptake has been limited for a variety of reasons. With the most recent push towards decarbonisation and big names such as Toyota and Hyundai investing in refuelling stations, it is expected that hydrogen vehicles will be normalised in the near future. Hydrogen production in Australia is expected to generate over AU$10 billion for the local economy by 2040. This is driven by high demand from large trading partners such as Germany, Japan, United Kingdom, South Korea, Italy, France and China. According to the CSIRO, Australia is expected to export significant amounts of hydrogen to South Korea, China, Japan and Singapore. Hydrogen demand from these trade partners alone will be approximately 3.8 million tonnes by 2030. Japan is predicted to be importing up to 10 megatonnes per year by 2050. Sign up to receive exclusive investment opportunities, free educational resources and the latest news on the green hydrogen space.
<urn:uuid:8981d512-46ee-4160-a475-b528097dd5b3>
CC-MAIN-2022-33
https://aviationh2.com.au/global-hydrogen-demand/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00070.warc.gz
en
0.945286
724
1.601563
2
Three young people have been killed in balcony falls while on holiday this year while ten others have been seriously injured. The figures released by the Foreign and Commonwealth Office (FCO) and ABTA (The Travel Association) form part of a campaign to help prevent young people from having accidents on balconies at popular holiday resorts. In April, 28-year-old British tourist Benjamin Harper, from Twickenham, south-west London, fell to his death at the four-star Sol Antillas hotel in Magaluf, Majorca. It is believed that the roofer had gone out on to the balcony for a cigarette before leaning over and falling to his death while on a stag do. A month later British tourist Charlotte Faris, 23, also plunged to her death during the early hours of the morning in Magaluf. The holidaymaker from Stevenage, Hertfordshire, had checked into the Teix Hotel just hours earlier, according to reports. In Majorca and Ibiza there have been nine cases this year - already matching figures for 2011 - despite it only being half way through the season, and FCO spokesman said. Most incidents have involved people aged between 18 and 35 with alcohol often playing a part, he added. Paul Abrey, Consul in the Balearics, said: "We've already seen some tragic cases this summer which have had devastating consequences for the individuals and families concerned. "This year there's been a particular spike early on in the holiday season with figures already matching last years. Some people have fallen whilst climbing to a friend's apartment, others have simply lost their footing after a few too many drinks and a few have deliberately jumped off aiming for the pool below. "It should go without saying these practices are extremely dangerous and can cost them their life or leave them permanently disabled. "Many young people also arrive without travel insurance. The FCO can't pay medical bills and holidaymakers may end up paying out thousands for medical bills and flights back to the UK. ABTA predicts about three million young holidaymakers will head abroad this summer with Spain, Greece and Turkey favourite destinations. Young people travelling out to resorts will be handed leaflets which include the story of Jake Evans, 18, from Liverpool, who narrowly survived a fall from a seventh floor balcony last year after a few too many drinks, the FCO spokesman said. Jake also tells his story in a video, which can be viewed on the FCO's website and on YouTube, in an attempt to get young people to think twice before they engage in risky behaviours. Nikki White, ABTA head of destinations and sustainability, said: "Each year too many young people are permanently injured or worse because they've tried to climb over or dive off their hotel balcony. "ABTA, the Foreign Office and tourist authorities are all working together to help raise awareness of the dangers and prevent these incidents. The after-effects are often made even worse through holidaymakers travelling uninsured and parents having to raise large amounts of money to get their children home. "Our advice aims to help holidaymakers to use their balconies safely and prevent more of these tragic and avoidable incidents." Mr Evans told ITV1's Daybreak that he was lucky to be alive after receiving multiple injuries during his fall last year and warned people to drink responsibly. He said: "I was on a balcony with a couple of friends and I did the balcony step down and I asked a guy off the balcony below to throw me a lighter. "I was quite drunk, I tried to grab the lighter and I went over head-first. I woke up on a sun lounger, which actually saved my life." Mr Evans suffered a fractured skull, split both his eyelids open, had a cut to his face and smashed his teeth through his lip, as well as snapping his wrist and fingers, suffering leg damage and seriously injuring his back. His mother and grandmother did not think he would make it home alive, the programme heard. Mr Evans said: "It just makes me think how lucky I am to be alive. I should not really be here. "No one wants to put their family or anyone they love through anything like that. It's hard to think about." Abta spokeswoman Gillian Edwards told the programme: "Jake is one of the lucky ones because we have had three deaths so far this year. "Most have involved alcohol, or even drugs, and it's really tragic because it's simply down to behaviour on the balconies. These accidents are usually avoidable if people just act with caution." She said people could avoid putting themselves in danger by not passing objects to each other, not jumping from balcony to balcony to visit friends, and not jumping from a balcony into a swimming pool. Mr Evans added: "If you are going to go out and drink on balconies, do not forget you may be 50, 100, 200ft up and if you do fall, you are probably not going to survive. "Just drink responsibly. Do not be acting about on a balcony, do not be hanging off it, swinging off it, climbing and jumping into pools because this is what can happen. I am one of the lucky ones." - More about: - Foreign And Commonwealth Office
<urn:uuid:0edcf5cf-430e-43f1-a321-6d23b0949e1e>
CC-MAIN-2017-04
http://www.independent.co.uk/news/uk/home-news/campaign-highlights-hotel-balcony-dangers-8049700.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00439-ip-10-171-10-70.ec2.internal.warc.gz
en
0.978311
1,088
1.679688
2
DK Readers L1: A Trip to the Dentist (DK Children, March 20, 2006) A Level 1 DK Reader that accurately portrays a trip to the dentist, perfect for young children who are just learning to read.Sarah, Josh, and Rabbit are off to the dentist. Join them as they discover how to keep their teeth clean and bright in DK Readers: A Trip to The Dentist (Level 1: Beginning to Read).Perfect for 3–5 year olds learning to read, Level 1 titles contain short, simple sentences with an emphasis on frequently used words. Stunning photographic images with labels provide visual clues to introduce and reinforce vocabulary.About the series: Stunning photographs combine with lively illustrations and engaging, age-appropriate stories in DK Readers, a multilevel reading program guaranteed to capture children's interest while developing their reading skills and general knowledge.
<urn:uuid:2c6218a1-1c86-4920-b0e0-882e1c536421>
CC-MAIN-2022-33
https://readu.io/book/?series=Blastoff%20Readers.%20Level%201&page=9
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00475.warc.gz
en
0.920823
184
2.6875
3
Jul 06, 2020 · Once the boot process finishes, your Mac will display the OS X utility window. Before we can clean install OS X El Capitan, we must first erase the current startup drive that holds the older version of OS X. Select the Disk Utility option, then select Continue. 1. After downloading Lion you must first save the Install Mac OS X Lion application. After Lion downloads DO NOT click on the Install button. Go to your Applications folder and make a copy of the Lion installer. Move the copy into your Downloads folder. Now you can click on the Install button. Feb 27, 2016 · After reinstalling macOS in Internet Recovery Mode, use the Mac App Store’s Updates tab to upgrade your operating system to the most recent macOS version available. Some older Macs with OS X Snow Leopard may be able to use Internet Recovery Mode after installing OS X Lion or later, and a firmware update . 691 5088 A,Power Mac G5. Mac OS X Install Disc 2. Disc v1.1 2004 (DVD) The steps to install on macOS 10.15 (Catalina) and later, are slightly different that for earlier versions of macOS. We have created two videos that show the installation steps. Either watch the videos, or follow the steps below. macOS Catalina This video shows how to install your McAfee software on macOS Catalina or later: Internet Explorer 11 is the latest web browser from Microsoft for Windows computers, but those who use OS X on a Mac won’t be able to use it! However, if you want to download Internet Explorer for Mac , then there’s a an easy and effective way to do just that in a few steps. Click Install Software. Once the installation is complete, click Close. Zoom application permissions. Due to increased security and permissions with Mac OS 10.14 Mojave and 10.15 Catalina, you will be prompted to authorize the Zoom Desktop Client to use the microphone, camera, and on Mac OS 10.15 Catalina, screen recording. Install macOS/X directly from the internet Some of us encounter that moment in our macOSx86 journey when we want to install macOS without any macOS access or just too lazy and to setup all that crap that needs space and whatnot, and thankfully there is a simple solution that is already available on real macs which is Internet Recovery. Dec 01, 2015 · Mac Secret Trick - How to Clone Mac Hard Drive with Disk Utility HDD SDD MacBook Pro iMac 2010-2019 - Duration: 10:09. Gunner Tierno x Yeezy God 358,990 views 10:09 Jul 18, 2013 · New Mac systems built in 2010 and later support an Internet Recovery mode, which can be used to download the boot image generally stored on the OS X Recovery partition so you can run diagnostics. 4) Power on your Mac. Hold the Apple Key and R key until you hear the chime noise. Once heard, it will start the OS X in Recovery Mode. 5) The final step has you tapping the ‘Install Mac OS X’ and Continue in the OS X utilities section of the screen in order to start the installation process. Oct 07, 2019 · Power your Mac back on and hold down the Command + Option + R keys until you see a spinning globe on the display. Step 3. Connect to the internet using WiFi if you aren't already.
<urn:uuid:afab4f76-ac25-492d-93ba-1c51afef63c6>
CC-MAIN-2022-33
https://evpnbohe.web.app/eastes41877xi/install-mac-os-x-from-internet-108.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00668.warc.gz
en
0.829538
696
1.664063
2
The buying and selling online world is constantly changing. Social commerce refers to the active use of social media to successfully facilitate e-commerce transactions. What then is the difference between e-commerce and social commerce? Ecommerce, in traditional terms, was set up to take place on the brand’s website. Shopify is an example of a platform that makes the sale of goods possible. Many brands have been using social media for a long time to seek potential customers, but the whole idea was to attract the customers to the said brand’s website where the purchases could be made. Social commerce is therefore a subset of e-commerce. It gives customers the chance to purchase within the social media platform directly without having to go to the website. Some tactics that your business can use today for social commerce success are: 1. Slightly lowering your items’ price for better social sales If you are dealing with high-end apparel or luxury goods, you are probably not going to have the same experience with social media that the lower-priced retailers will have. This generally cuts across all categories in e-commerce, the products that are priced lower simply perform better. Below is the average of orders in different regions in the world: Some reasons why lower-priced items have higher sales is the desire of buyers to try on products before they buy them, especially if the product is expensive. If they are not satisfied through online buying. Another reason would be the fact that social media is thought of as a place people make impulsive purchases and not intentional shopping. For those that sell a variety of products with different price ranges, it is advisable to make sure you use your ad spend for the products with lower prices. 2. Creating an automated bot checkout We have moved away from the days when shoppers were guided around stores by real-life sales reps. Buying via social media does not entail such an experience unless the brand puts into action an automated bot checkout. Although it still is a somewhat new technology, chatbots allow you to create your personalized set of conversational questions that are in direct relation to the products being sold. This allows the customer to fully engage with the bot while shopping the same way they would with a salesperson. It is said that with the use of AI, retailers will be able to save approximately $340 billion each year by the year 2022. However, using such tools could have you way more as a retailer. 3. Integration of social commerce into your existing e-commerce platform The integration of data across social platforms is simple. This is why roughly 51% of marketers have it done. If your business routinely changes the catalog or updates it, it is only wise to make sure that the changes are synced across the social platforms on which the business is. 4. Partnering up with influencers to boost your social commerce sales Influencer marketing has been a used concept for a long time now, and it is probably not going anywhere anytime soon. Influencers can use tags on Instagram that are shoppable and with that push buyers to your store thus promotion of products directly is made much easier and faster. For a customer, this creates a smooth and seamless experience. They see an influencer’s story promoting a product, they click through and make the decision to make the purchase. Your opportunity to continually expand your social media reach is huge as many people all over the world follow influencers on any given social media channel. Social commerce is easy and popular and that leaves you as a retailer with the real question; Will you jump on board and be the next John Lawson in terms of success or wait until you fall behind?
<urn:uuid:b736e5ef-0112-456e-9c32-34caccb01ed4>
CC-MAIN-2022-33
http://magnews24.com/news/social-commerce-tactics-your-business-can-use-today-from-ecommerce-entrepreneur-john-lawson/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00670.warc.gz
en
0.953902
756
2.21875
2
Would You Sleep Where Slaves Once Lived? Corley, who has renovated other historic sites, including the Lemmon Hill Plantation and Corley Hall Plantation, is planning to turn the long-empty, boarded-up structures in Anderson, South Carolina into an apartment complex. The Palmetto Trust for Historic Preservation purchased the structures in 2009 and prevented them from being destroyed; its director says that they are the “last-known slave cabins in the upstate.” Corley is now under contract to buy the buildings and turn them into rental units. Bobby Baxter, who has lived near the site of the slave cabins since the early 1960s and seen them deteriorate year after year, welcomes Corley’s plans. “It’s important to keep the squatters out of here,” he says. Commenting on how “well-built” the slave cabins were, Corley says he hopes “to save [them] in as pure a form as we can save.” Renovating the cabins could cost from $50,000 to $100,000, he estimates. If Corley proceeds with his plans, it will not be the first time that a site where slaves lived — a building of deep historical significant about a not-too-distant and dark period of America’s past — has been renovated and then used in ways that would have been unthinkable. A number of former slave quarters in Kentucky, Louisiana, Mississippi and North Carolina have been turned into bed and breakfasts. At B&W Courtyards Bed and Breakfast in New Orleans, a slave cabin has been converted into a “Barbados-style beach house.” At the Boxley Bed and Breakfast in Madison, North Carolina, guests have a choice of sleeping in the inn’s main house or in a cottage where slaves once lived. The Prospect Hill Plantation Inn in Charlottesville, Virginia offers guests a number of sleeping options, from the 1740s overseer’s cottage to the the 1790 slave quarters to “Sanco Pansy’s cottage, originally the residence of a former slave.” One manager of one of these converted properties in Louisiana describes them as “buildings with some history”; he also notes that the bed and breakfast is “not responsible for the history. The history’s there … Either you live with your past or you destroy it.” Developer Corley makes a similar argument, saying that he does recognize that slavery is “such a part of American history” while still making his plansto convert the South Carolina slave quarters into apartments. Angela da Silva of the National Black Tourism Network counters that converting former slave quarters into bed and breakfasts — into vacation lodgings — is “truly whitewashing slavery.” Turning former slave cabins into apartments that people would actually live in full-time raises a number of ethical issues. More than a few of us (I’ll include myself) would not care to sleep, much less live, in a place where people once lived as slaves. Certainly it is important to preserve historic structures and learn the full story about this country’s past. In 2010, residents of Greenville, South Carolina rehabilitated a slave cabin from the 1840s. The cabin had been threatened with demolition in the face of a housing development; residents rallied to disassemble the structure and move it to the Living History Farm at Roper Mountain Science Center, which is owned by the Greenville County Schools. The reconstructed cabin now serves a valuable role, to teach children about the United State’s past and the importance of historic preservation. In April, a $10 million gift to the Thomas Jefferson Foundation donated funds to restore slave quarters at Jefferson’s Monticello plantation. At least two log buildings on Mulberry Row will be rebuilt. One is thought to have housed relatives of Sally Hemings, who is believed to have had at least six children fathered by Jefferson. As senior curator Susan Stein says, “By bringing back the place, we bring back the people, and we’re able to put a face on slavery. It’s actually the lives of people.” Homes where slaves once lived have an important story to tell about America’s past. Is it right for commercial interests — bed and breakfast proprietors, real estate developers — to be profiting from sites where slaves formerly resided? Does converting them for such uses amount to yet another example of the legacy of racism in the United States? Photo via Thinkstock
<urn:uuid:1064da75-90b4-43c5-bc6e-9f93dfefb94d>
CC-MAIN-2017-04
http://www.care2.com/causes/would-you-sleep-where-slaves-once-lived.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00534-ip-10-171-10-70.ec2.internal.warc.gz
en
0.962133
964
2.96875
3
PATH FRAME INDUSTRIES WPC Material Composition Principle WPC (wood and plastic composite) is a new green material that can be recycled. It is made from a unique combination of wood fiber and plastic through large-scale extrusion. It has the characters of wood’s workability, plastic’s diversity and flexibility. It is widely used in many areas. It offers the best advantages of plastic and wood. The plastic shields the wood from deformation, crack, moisture and insect damage and the wood projects the plastic from aging & heat-labile. Features of WPC Frames The Merit of WPC Frames 1. Can be cleaned by water. 2. Antibacterial & alkali resistance. 3. With good surface flatness, high strength, no buckling deformation. 4. Cold and hot resistant, anti-aging. 5. No formaldehyde, ammonia, benzene and other decorative pollution. It is recyclable and truly green product. *HOLLOW WPC FRAME WITH USING 100% VIRGIN POLYMERS Available Frames : |Section Sizes||150 x 45mm||Double Rebate| |Section Sizes||100 x 45mm||Single Rebate| |Section Sizes||75 x 38mm||Single Rebate| |Architrave||45 x 18mm||Front| |Architrave||30 x 12mm||Rear| |Test||Test Method||Result Obtained| |Flammabiity||UL-94||Match With V0| |Hardness (Shore D)||ASTM D 2240||62| |Material Density||IS 2380 (Part-3)||990kg/m3| |Water Absorption||IS 2380 (Part-16)||0.26%| *All test results are from CIPET
<urn:uuid:31066bec-efab-46e0-b9e7-13d80875318e>
CC-MAIN-2022-33
http://swp.net.in/path-frame-industries/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00273.warc.gz
en
0.812642
409
2.203125
2
1 Section of Neurology, Psychiatry and Sensory Sciences, Department of Clinical Medicine, Faculty of Health and Medical Sciences, Københavns Universitet2 Graduate School of Health and Medical Sciences, Faculty of Health and Medical Sciences, Københavns Universitet3 unknown4 Department of Clinical Medicine, Department of Clinical Medicine, Faculty of Health and Medical Sciences, Københavns Universitet5 Graduate School of Health and Medical Sciences, Faculty of Health and Medical Sciences, Københavns Universitet6 Department of Clinical Medicine, Department of Clinical Medicine, Faculty of Health and Medical Sciences, Københavns Universitet Background: Numerous studies have demonstrated sensory gating deficits in schizophrenia. However, only a few longitudinal studies report on the effects of antipsychotic treatment on sensory gating deficits and their results are inconsistent. In the present study, P50 suppression and its neural generators were investigated in antipsychotic-naïve first-episode patients with schizophrenia before and after 6 months of treatment with quetiapine. Methods: Thirty-four antipsychotic-naïve first-episode schizophrenia patients and age and gender matched healthy controls were tested in an auditory sensory gating paradigm at baseline and after 6 months. During this period, the patients were treated with quetiapine, while controls received no treatment. Sixteen patients completed the study. Results: Patients showed significant reduced P50 suppression compared with controls at baseline but not at follow-up. Furthermore, a significant positive correlation between baseline P50 suppression and dose of quetiapine at follow-up was found. P50 suppression in patients receiving above median dosages of quetiapine increased significantly from baseline to follow-up. At baseline, a frontocentral source was significantly more active in patients than in controls at the time of the testing stimulus. Conclusions: The present findings suggest that P50 suppression deficits are already present at an early stage of schizophrenia. Furthermore, particularly those patients with more severe gating deficits appeared to need higher dosages of quetiapine, although their clinical symptoms did not seem to indicate this. Quetiapine treatment significantly improved these gating deficits. Furthermore, a frontocentral source in the brain appeared to be involved in the deficient P50 gating of the patients. Schizophrenia Bulletin, 2013, Vol 39(2), p. 472-80
<urn:uuid:aa635601-5b75-460c-a5a0-641fb555e28e>
CC-MAIN-2016-44
http://www.forskningsdatabasen.dk/catalog/236302448
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719286.6/warc/CC-MAIN-20161020183839-00499-ip-10-171-6-4.ec2.internal.warc.gz
en
0.921725
499
1.703125
2
Water Treatment Plant No. 2 is located in Fremont near the intersection of Mission Boulevard and Interstate 680. The plant has a capacity of 28 million gallons per day and includes a hydroelectric generation facility that generates electricity from the incoming raw water. After emerging from the hydroelectric facility, raw water flows through pre-ozonation, flash mix, and hydraulic flocculation. A view of Water Treatment Plant No. 2 from the east shows more of the plant than is visible from Mission Boulevard. The tile roof at the left of the photo is the administration building. In the center of the photo the sedimentation basins can be seen. The tile roof towards the right of the photo is the solids handling building which contains two filter presses. To the right of this building, one of the solids thickening basins is barely visible above the hill. WTP No. 2 also processes sludge from the Mission San Jose Water Treatment Plant located about a mile up the hill. The author was responsible for civil site design, yard piping design and participated in other areas of plant design including pump selection, piping layout and equipment layout. In addition, the author reviewed shop drawings, answered requests for information (RFIs) from the contractor, and performed other construction management tasks. Thomas Brightbill is a Bay Area civil engineer with experience in water, wastewater, stormwater, and public finance projects.
<urn:uuid:9d18ceaa-bd4a-4411-8e94-c1331d3a6880>
CC-MAIN-2022-33
http://www.brightbill.net/civil-notes/2011/01/acwd-wtp2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00078.warc.gz
en
0.957647
282
2.40625
2
Browse by author Lookup NU author(s): Tahani Al-Mhana, Dr Bashar Zahawi, Professor Volker Pickert Full text for this publication is not currently held within this repository. Alternative links are provided below where available. © 2014 IEEE.Wave energy converters generally suffer from a low operating power factor due to the nature of the long wavelength water wave and the inductance of the electrical generator employed in the conversion process. A Forced Commutated Series Capacitor (FCSC) converter can be connected between the generator and the load circuit to prevent power factor degradation. This paper describes the effectiveness of a new FCSC control strategy developed for operation at low and variable frequencies corresponding to the nature of the water waves. Simulation results show that the proposed symmetrical duty cycle control strategy is capable of maintaining almost unity power factor over the required frequency range. Author(s): Al-Mhana T, Zahawi B, Pickert V Publication type: Conference Proceedings (inc. Abstract) Publication status: Published Conference Name: 2014 9th International Symposium on Communication Systems, Networks and Digital Signal Processing, CSNDSP 2014 Year of Conference: 2014 Online publication date: 16/10/2014 Acceptance date: 01/01/1900 Publisher: Institute of Electrical and Electronics Engineers Inc. Library holdings: Search Newcastle University Library for this item
<urn:uuid:b85e1974-50c0-410e-8daf-ac8627cb0084>
CC-MAIN-2022-33
https://eprints.ncl.ac.uk/234119
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00477.warc.gz
en
0.801166
347
1.976563
2
Larry在咖啡馆里碰见了李华。他们会用到两个常用语:take someone under your wing和take someone for a ride. (Sound of caf□door opening - chimes) Larry: Hey, there you are, Lihua. LH: (Sounding tired) Oh, hi Larry. Larry: I haven't seen you since last weekend. What have you been up to? Don't tell me you're having midterms already. LH: 我连看书的时间都没有! 尽忙着照顾我表妹了。她从中国来美国上高中,初来乍到,什么都不会,所以我这两天一直在帮她安顿。 Larry: I'm sure it's a very tough transition for both of you. But, it's so nice of you to take her under your wing. LH: "Take her under my wing"? 这是什么意思? Larry: To take someone under your wing means to give them a great deal of personal guidance and protection while they are learning something of which you have experience. LH: 我明白了, to take someone under your wing,就是指导、保护和照料某人。我现在就是这样像母鸡带小鸡一样照顾着我表妹呢! Larry: It takes time to learn how to cope with living in a totally new environment - it's only natural to need a little bit of help at first. As a matter of fact, I can remember a time not so long ago when I took a certain confused girl from China under my own wing... LH: 你说你也曾这样帮助过一个女孩? 你不是在说我吧?Larry, 虽然你给了我很多帮助,但这和我给我表妹的帮助是不同的。我要是不在她身边,她连出门买吃的都不敢! Larry: But Lihua, you couldn't buy groceries on your own either when you first moved here. One time at the grocery store, your bill came to $7.50 and you pulled out a dollar bill, asking me if it was enough! LH: Haha, 这个我记得。刚到美国时,每次需要跟美国人打交道我都会非常紧张,就算不说英语,还是觉得很恐怖。 Larry: Luckily, I was there to take you under my wing while you got used to living in the United States - just like how you're taking your cousin under your wing now! LH: 哈,看来我们都是好心人! 最近我在帮我表妹找房子。她以前的房东欺负她是新来的,把房租提高了两倍!我表妹已经傻呼呼地交了一个月的钱! Larry: Yeah, you have to be really careful. It sounds like that landlord was taking your cousin for a ride. LH: Taking her for a ride? 开车带她出去?那个房东可没这么好心! Larry: Um, I mean "taking her for a ride" as in, taking advantage of her situation - playing a trick on her for his own benefit. LH: 哦! 原来to take someone for a ride还有欺负人,宰人的意思! Larry: Yea, that's right. For example, when I went to New York City, my cab driver noticed that I had never been to New York before, and so he took a longer route to my hotel in order to run up my bill. This is a classic case of "taking someone for a ride." Larry: Unfortunately, some people will take advantage of other people like that. LH: Larry, 咱们是愿意take others under our wings, 不遗余力地帮助别人,可这个房东和那个出租司机却会take people for a ride, 占别人便宜。所以这两个说法的意思正好相反嘛! Larry: Yea, you could think of it like that. So, it's a great thing that you are taking your cousin under your wing! Otherwise, it would be easy for people to take her for a ride. Larry: I'm sure your cousin is a smart girl. Before you know it, she'll be just as capable to live on her own in the United States as you are - and you won't have to worry about people trying to take her for a ride. LH: (叹气) 不过,在她完全自立前,我可有的忙了,估计不能常和你见面了! Larry: That's OK. Taking someone under your wing is a quite a full-time job! 今天李华学了两个常用语。一个是to take someone under your wing,意思是“照顾和帮助某人”。另一个是to take someone for a ride,意思是“占人便宜,欺负人”。
<urn:uuid:c55d5441-e7c6-4540-a68f-5033570bb4fe>
CC-MAIN-2016-44
http://www.voachinese.com/a/pa374/1204535.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719079.39/warc/CC-MAIN-20161020183839-00033-ip-10-171-6-4.ec2.internal.warc.gz
en
0.902654
1,640
1.8125
2
Surfing around the bookstores this morning I see that the much-anticipated Ant Ecology book is out. At $129.00 it’s not something the casual reader is liable to pick up. Nonetheless, Ant Ecology is a beautiful volume reviewing the state of the field, and scientists who work on ants should probably own a copy. Or at least get one on time-share. The book is a collection of 16 chapters edited by Lori Lach, Kate Parr, and Kirsti Abbott. There’s a mellifluous forward by Ed Wilson, but then, most ant books have a mellifluous forward by Ed Wilson. Ant Ecology‘s real strength is that each chapter is written by researchers actively working on their chosen topics. Thus, the full volume is a collaboration across the leading edge of myrmecology, and the perspectives they offer are a glimpse into the burning scientific questions of the day from the mouths of the very people working hard at answering them. Among others, Brian Fisher covers ant biogeography, Christian Peeters does ant life history, and Anna Dornhaus & Scott Powell write about ant foraging strategies. As a teaser, Amazon previews part of Phil Ward’s chapter on systematics here. I’m still only a couple chapters in, so that’s all the detail you get for now. disclaimer: You probably shouldn’t trust me for an unbiased review. I provided most of the book’s images, and many of the authors are friends of mine. Plus the editors- bless them- sent along some simply lovely ant attire as thanks for the images (I’ll post photos shortly…)
<urn:uuid:37487e95-cecf-445d-9c4e-7343e65225c6>
CC-MAIN-2017-04
http://www.myrmecos.net/2010/01/17/ant-ecology-now-available/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280761.39/warc/CC-MAIN-20170116095120-00096-ip-10-171-10-70.ec2.internal.warc.gz
en
0.92661
346
1.703125
2
Defending Pyramid’s Design¶ From time to time, challenges to various aspects of Pyramid design are lodged. To give context to discussions that follow, we detail some of the design decisions and trade-offs here. In some cases, we acknowledge that the framework can be made better and we describe future steps which will be taken to improve it; in some cases we just file the challenge as noted, as obviously you can’t please everyone all of the time. Pyramid Provides More Than One Way to Do It¶ A canon of Python popular culture is “TIOOWTDI” (“there is only one way to do it”, a slighting, tongue-in-cheek reference to Perl’s “TIMTOWTDI”, which is an acronym for “there is more than one way to do it”). Pyramid is, for better or worse, a “TIMTOWTDI” system. For example, it includes more than one way to resolve a URL to a view callable: via url dispatch or traversal. Multiple methods of configuration exist: imperative configuration, configuration decoration, and ZCML (optionally via pyramid_zcml). It works with multiple different kinds of persistence and templating systems. And so on. However, the existence of most of these overlapping ways to do things are not without reason and purpose: we have a number of audiences to serve, and we believe that TIMTOWTI at the web framework level actually prevents a much more insidious and harmful set of duplication at higher levels in the Python web community. Pyramid began its life as repoze.bfg, written by a team of people with many years of prior Zope experience. The idea of traversal and the way view lookup works was stolen entirely from Zope. The authorization subsystem provided by Pyramid is a derivative of Zope’s. The idea that an application can be extended without forking is also a Zope derivative. Implementations of these features were required to allow the Pyramid authors to build the bread-and-butter CMS-type systems for customers in the way they were accustomed to building them. No other system save Zope itself had such features. And Zope itself was beginning to show signs of its age. We were becoming hampered by consequences of its early design mistakes. Zope’s lack of documentation was also difficult to work around: it was hard to hire smart people to work on Zope applications, because there was no comprehensive documentation set to point them at which explained “it all” in one consumble place, and it was too large and self-inconsistent to document repoze.bfg went under development, its authors obviously looked around for other frameworks that fit the bill. But no non-Zope framework did. So we embarked on building As the result of our research, however, it became apparent that, despite the fact that no one framework had all the features we required, lots of existing frameworks had good, and sometimes very compelling ideas. In particular, URL dispatch is a more direct mechanism to map URLs to code. So although we couldn’t find a framework save for Zope that fit our needs, and while we incorporated a lot of Zope ideas into BFG, we also emulated the features we found compelling in other frameworks (such as url dispatch). After the initial public release of BFG, as time went on, features were added to support people allergic to various Zope-isms in the system, such as the ability to configure the application using imperative configuration and configuration decoration rather than solely using ZCML, and the elimination of the required use of interface objects. It soon became clear that we had a system that was very generic, and was beginning to appeal to non-Zope users as well as ex-Zope users. As the result of this generalization, it became obvious BFG shared 90% of its featureset with the featureset of Pylons 1, and thus had a very similar target market. Because they were so similar, choosing between the two systems was an exercise in frustration for an otherwise non-partisan developer. It was also strange for the Pylons and BFG development communities to be in competition for the same set of users, given how similar the two frameworks were. So the Pylons and BFG teams began to work together to form a plan to merge. The features missing from BFG (notably view handler classes, flash messaging, and other minor missing bits), were added, to provide familiarity to ex-Pylons users. The result is Pyramid. The Python web framework space is currently notoriously balkanized. We’re truly hoping that the amalgamation of components in Pyramid will appeal to at least two currently very distinct sets of users: Pylons and BFG users. By unifying the best concepts from Pylons and BFG into a single codebase and leaving the bad concepts from their ancestors behind, we’ll be able to consolidate our efforts better, share more code, and promote our efforts as a unit rather than competing pointlessly. We hope to be able to shortcut the pack mentality which results in a much larger duplication of effort, represented by competing but incredibly similar applications and libraries, each built upon a specific low level stack that is incompatible with the other. We’ll also shrink the choice of credible Python web frameworks down by at least one. We’re also hoping to attract users from other communities (such as Zope’s and TurboGears’) by providing the features they require, while allowing enough flexibility to do things in a familiar fashion. Some overlap of functionality to achieve these goals is expected and unavoidable, at least if we aim to prevent pointless duplication at higher levels. If we’ve done our job well enough, the various audiences will be able to coexist and cooperate rather than firing at each other across some imaginary web framework DMZ. Pyramid Uses A Zope Component Architecture (“ZCA”) Registry¶ Pyramid uses a Zope Component Architecture (ZCA) “component registry” as its application registry under the hood. This is a point of some contention. Pyramid is of a Zope pedigree, so it was natural for its developers to use a ZCA registry at its inception. However, we understand that using a ZCA registry has issues and consequences, which we’ve attempted to address as best we can. Here’s an introspection about Pyramid use of a ZCA registry, and the trade-offs its usage involves. The global API that may be used to access data in a ZCA component registry is not particularly pretty or intuitive, and sometimes it’s just plain obtuse. Likewise, the conceptual load on a casual source code reader of code that uses the ZCA global API is somewhat high. Consider a ZCA neophyte reading the code that performs a typical “unnamed utility” lookup using the zope.component.getUtility() global API: 1 2 3 from pyramid.interfaces import ISettings from zope.component import getUtility settings = getUtility(ISettings) After this code runs, settings will be a Python dictionary. But it’s unlikely that any civilian would know that just by reading the code. There are a number of comprehension issues with the bit of code above that are First, what’s a “utility”? Well, for the purposes of this discussion, and for the purpose of the code above, it’s just not very important. If you really want to know, you can read this. However, still, readers of such code need to understand the concept in order to parse it. This is problem number one. Second, what’s this ISettings thing? It’s an interface. Is that important here? Not really, we’re just using it as a key for some lookup based on its identity as a marker: it represents an object that has the dictionary API, but that’s not very important in this context. That’s problem number two. Third of all, what does the getUtility function do? It’s performing a lookup for the ISettings “utility” that should return.. well, a utility. Note how we’ve already built up a dependency on the understanding of an interface and the concept of “utility” to answer this question: a bad sign so far. Note also that the answer is circular, a really bad sign. Fourth, where does getUtility look to get the data? Well, the “component registry” of course. What’s a component registry? Problem number four. Fifth, assuming you buy that there’s some magical registry hanging around, where is this registry? Homina homina... “around”? That’s sort of the best answer in this context (a more specific answer would require knowledge of internals). Can there be more than one registry? Yes. So which registry does it find the registration in? Well, the “current” registry of course. In terms of Pyramid, the current registry is a thread local variable. Using an API that consults a thread local makes understanding how it works non-local. You’ve now bought in to the fact that there’s a registry that is just hanging around. But how does the registry get populated? Why, via code that calls config.add_view. In this particular case, however, the ISettings is made by the framework itself under the hood: it’s not present in any user configuration. This is extremely hard to comprehend. Problem number six. Clearly there’s some amount of cognitive load here that needs to be borne by a reader of code that extends the Pyramid framework due to its use of the ZCA, even if he or she is already an expert Python programmer and whom is an expert in the domain of web applications. This is suboptimal. First, the primary amelioration: Pyramid does not expect application developers to understand ZCA concepts or any of its APIs. If an application developer needs to understand a ZCA concept or API during the creation of a Pyramid application, we’ve failed on some axis. Instead, the framework hides the presence of the ZCA registry behind special-purpose API functions that do use ZCA APIs. Take for example the pyramid.security.authenticated_userid function, which returns the userid present in the current request or None if no userid is present in the current request. The application developer calls it like so: from pyramid.security import authenticated_userid userid = authenticated_userid(request) He now has the current user id. Under its hood however, the implementation of 1 2 3 4 5 6 7 8 9 10 def authenticated_userid(request): """ Return the userid of the currently authenticated user or ``None`` if there is no authentication policy in effect or there is no currently authenticated user. """ registry = request.registry # the ZCA component registry policy = registry.queryUtility(IAuthenticationPolicy) if policy is None: return None return policy.authenticated_userid(request) Using such wrappers, we strive to always hide the ZCA API from application developers. Application developers should just never know about the ZCA API: they should call a Python function with some object germane to the domain as an argument, and it should return a result. A corollary that follows is that any reader of an application that has been written using Pyramid needn’t understand the ZCA API either. Hiding the ZCA API from application developers and code readers is a form of enhancing domain specificity. No application developer wants to need to understand the small, detailed mechanics of how a web framework does its thing. People want to deal in concepts that are closer to the domain they’re working in: for example, web developers want to know about users, not utilities. Pyramid uses the ZCA as an implementation detail, not as a feature which is exposed to end users. However, unlike application developers, framework developers, including people who want to override Pyramid functionality via preordained framework plugpoints like traversal or view lookup must understand the ZCA registry API. Pyramid framework developers were so concerned about conceptual load issues of the ZCA registry API for framework developers that a replacement repoze.component was actually developed. Though this package has a registry implementation which is fully functional and well-tested, and its API is much nicer than the ZCA registry API, work on it was largely abandoned and it is not used in Pyramid. We continued to use a ZCA registry within Pyramid because it ultimately proved a better fit. We continued using ZCA registry rather than disusing it in favor of using the registry implementation in repoze.component largely because the ZCA concept of interfaces provides for use of an interface hierarchy, which is useful in a lot of scenarios (such as context type inheritance). Coming up with a marker type that was something like an interface that allowed for this functionality seemed like it was just reinventing the wheel. Making framework developers and extenders understand the ZCA registry API is a trade-off. We (the Pyramid developers) like the features that the ZCA registry gives us, and we have long-ago borne the weight of understanding what it does and how it works. The authors of Pyramid understand the ZCA deeply and can read code that uses it as easily as any other code. But we recognize that developers who might want to extend the framework are not as comfortable with the ZCA registry API as the original developers are with it. So, for the purposes of being kind to third-party Pyramid framework developers in, we’ve drawn some lines in the sand. In all core code, We’ve made use of ZCA global API functions such as zope.component.getAdapter the exception instead of the rule. So instead of: 1 2 3 from pyramid.interfaces import IAuthenticationPolicy from zope.component import getUtility policy = getUtility(IAuthenticationPolicy) Pyramid code will usually do: 1 2 3 4 from pyramid.interfaces import IAuthenticationPolicy from pyramid.threadlocal import get_current_registry registry = get_current_registry() policy = registry.getUtility(IAuthenticationPolicy) While the latter is more verbose, it also arguably makes it more obvious what’s going on. All of the Pyramid core code uses this pattern rather than the ZCA global API. Here are the main rationales involved in the Pyramid decision to use the ZCA registry: - History. A nontrivial part of the answer to this question is “history”. Much of the design of Pyramid is stolen directly from Zope. Zope uses the ZCA registry to do a number of tricks. Pyramid mimics these tricks, and, because the ZCA registry works well for that set of tricks, Pyramid uses it for the same purposes. For example, the way that Pyramid maps a request to a view callable using traversal is lifted almost entirely from Zope. The ZCA registry plays an important role in the particulars of how this request to view mapping is done. - Features. The ZCA component registry essentially provides what can be considered something like a superdictionary, which allows for more complex lookups than retrieving a value based on a single key. Some of this lookup capability is very useful for end users, such as being able to register a view that is only found when the context is some class of object, or when the context implements some interface. - Singularity. There’s only one place where “application configuration” lives in a Pyramid application: in a component registry. The component registry answers questions made to it by the framework at runtime based on the configuration of an application. Note: “an application” is not the same as “a process”, multiple independently configured copies of the same Pyramid application are capable of running in the same process space. - Composability. A ZCA component registry can be populated imperatively, or there’s an existing mechanism to populate a registry via the use of a configuration file (ZCML, via the optional pyramid_zcml package). We didn’t need to write a frontend from scratch to make use of configuration-file-driven registry population. - Pluggability. Use of the ZCA registry allows for framework extensibility via a well-defined and widely understood plugin architecture. As long as framework developers and extenders understand the ZCA registry, it’s possible to extend Pyramid almost arbitrarily. For example, it’s relatively easy to build a directive that registers several views all at once, allowing app developers to use that directive as a “macro” in code that they write. This is somewhat of a differentiating feature from other (non-Zope) frameworks. - Testability. Judicious use of the ZCA registry in framework code makes testing that code slightly easier. Instead of using monkeypatching or other facilities to register mock objects for testing, we inject dependencies via ZCA registrations and then use lookups in the code find our mock objects. - Speed. The ZCA registry is very fast for a specific set of complex lookup scenarios that Pyramid uses, having been optimized through the years for just these purposes. The ZCA registry contains optional C code for this purpose which demonstrably has no (or very few) bugs. - Ecosystem. Many existing Zope packages can be used in Pyramid with few (or no) changes due to our use of the ZCA registry. If you only develop applications using Pyramid, there’s not much to complain about here. You just should never need to understand the ZCA registry API: use documented Pyramid APIs instead. However, you may be an application developer who doesn’t read API documentation because it’s unmanly. Instead you read the raw source code, and because you haven’t read the documentation, you don’t know what functions, classes, and methods even form the Pyramid API. As a result, you’ve now written code that uses internals and you’ve painted yourself into a conceptual corner as a result of needing to wrestle with some ZCA-using implementation detail. If this is you, it’s extremely hard to have a lot of sympathy for you. You’ll either need to get familiar with how we’re using the ZCA registry or you’ll need to use only the documented APIs; that’s why we document them as APIs. If you extend or develop Pyramid (create new directives, use some of the more obscure hooks as described in Using Hooks, or work on the Pyramid core code), you will be faced with needing to understand at least some ZCA concepts. In some places it’s used unabashedly, and will be forever. We know it’s quirky, but it’s also useful and fundamentally understandable if you take the time to do some reading about it. Pyramid Uses Interfaces Too Liberally¶ In this TOPP Engineering blog entry, Ian Bicking asserts that the way repoze.bfg used a Zope interface to represent an HTTP request method added too much indirection for not enough gain. We agreed in general, and for this reason, 1.1 (and subsequent versions including Pyramid 1.0+) added view predicate and route predicate modifiers to view configuration. Predicates are request-specific (or context -specific) matching narrowers which don’t use interfaces. Instead, each predicate uses a domain-specific string as a match value. For example, to write a view configuration which matches only requests with POST HTTP request method, you might write a decorator which mentioned the 1 2 3 4 from pyramid.view import view_config @view_config(name='post_view', request_method='POST', renderer='json') def post_view(request): return 'POSTed' You might further narrow the matching scenario by adding an predicate that narrows matching to something that accepts a JSON response: 1 2 3 4 5 from pyramid.view import view_config @view_config(name='post_view', request_method='POST', accept='application/json', renderer='json') def post_view(request): return 'POSTed' Such a view would only match when the request indicated that HTTP request POST and that the remote user agent passed application/json (or, for that matter, application/*) in its Accept request header. Under the hood, these features make no use of interfaces. Many prebaked predicates exist. However, use of only prebaked predicates, however, doesn’t entirely meet Ian’s criterion. He would like to be able to match a request using a lambda or another function which interrogates the request imperatively. In repoze.bfg version 1.2, we acommodate this by allowing people to define custom view predicates: 1 2 3 4 5 6 7 8 9 from pyramid.view import view_config from pyramid.response import Response def subpath(context, request): return request.subpath and request.subpath == 'abc' @view_config(custom_predicates=(subpath,)) def aview(request): return Response('OK') The above view will only match when the first element of the request’s Pyramid “Encourages Use of ZCML”¶ It doesn’t. In Pyramid 1.0, ZCML doesn’t ship as part of the core; instead it ships in the pyramid_zcml add-on package, which is completely optional. No ZCML is required at all to use Pyramid, nor any other sort of frameworky declarative frontend to application configuration. Pyramid Uses “Model” To Represent A Node In The Graph of Objects Traversed¶ repoze.bfg documentation used to refer to the graph being traversed when traversal is used as a “model graph”. A terminology overlap confused people who wrote applications that always use ORM packages such as SQLAlchemy, which has a different notion of the definition of a “model”. As a result, in Pyramid 1.0a7, the tree of objects traversed is now renamed to resource tree and its components are now named resource objects. Associated APIs have been changed. This hopefully alleviates the terminology confusion caused by overriding the term “model”. Pyramid Does Traversal, And I Don’t Like Traversal¶ In Pyramid, traversal is the act of resolving a URL path to a resource object in a resource tree. Some people are uncomfortable with this notion, and believe it is wrong. Thankfully, if you use Pyramid, and you don’t want to model your application in terms of a resource tree, you needn’t use it at all. Instead, use URL dispatch to map URL paths to views. The idea that some folks believe traversal is unilaterally wrong is understandable. The people who believe it is wrong almost invariably have all of their data in a relational database. Relational databases aren’t naturally hierarchical, so traversing one like a tree is not possible. However, folks who deem traversal unilaterally wrong are neglecting to take into account that many persistence mechanisms are hierarchical. Examples include a filesystem, an LDAP database, a ZODB (or another type of graph) database, an XML document, and the Python module namespace. It is often convenient to model the frontend to a hierarchical data store as a graph, using traversal to apply views to objects that either are the resources in the tree being traversed (such as in the case of ZODB) or at least ones which stand in for them (such as in the case of wrappers for files from the filesystem). Also, many website structures are naturally hierarchical, even if the data which drives them isn’t. For example, newspaper websites are often extremely hierarchical: sections within sections within sections, ad infinitum. If you want your URLs to indicate this structure, and the structure is indefinite (the number of nested sections can be “N” instead of some fixed number), a resource tree is an excellent way to model this, even if the backend is a relational database. In this situation, the resource tree a just a site structure. Traversal also offers better composability of applications than URL dispatch, because it doesn’t rely on a fixed ordering of URL matching. You can compose a set of disparate functionality (and add to it later) around a mapping of view to resource more predictably than trying to get the right ordering of URL pattern matching. But the point is ultimately moot. If you don’t want to use traversal, you needn’t. Use URL dispatch instead. Pyramid Does URL Dispatch, And I Don’t Like URL Dispatch¶ In Pyramid, url dispatch is the act of resolving a URL path to a view callable by performing pattern matching against some set of ordered route definitions. The route definitions are examined in order: the first pattern which matches is used to associate the URL with a view callable. Some people are uncomfortable with this notion, and believe it is wrong. These are usually people who are steeped deeply in Zope. Zope does not provide any mechanism except traversal to map code to URLs. This is mainly because Zope effectively requires use of ZODB, which is a hierarchical object store. Zope also supports relational databases, but typically the code that calls into the database lives somewhere in the ZODB object graph (or at least is a view related to a node in the object graph), and traversal is required to reach this code. I’ll argue that URL dispatch is ultimately useful, even if you want to use traversal as well. You can actually combine URL dispatch and traversal in Pyramid (see Combining Traversal and URL Dispatch). One example of such a usage: if you want to emulate something like Zope 2’s “Zope Management Interface” UI on top of your object graph (or any administrative interface), you can register a route like config.add_route('manage', '/manage/*traverse') and then associate “management” views in your code by using the argument to a route_name='manage'). If you wire things up this way someone then walks up to for example, /manage/ob1/ob2, they might be presented with a management interface, but walking up to /ob1/ob2 would present them with the default object view. There are other tricks you can pull in these hybrid configurations if you’re clever (and maybe masochistic) too. Also, if you are a URL dispatch hater, if you should ever be asked to write an application that must use some legacy relational database structure, you might find that using URL dispatch comes in handy for one-off associations between views and URL paths. Sometimes it’s just pointless to add a node to the object graph that effectively represents the entry point for some bit of code. You can just use a route and be done with it. If a route matches, a view associated with the route will be called; if no route matches, Pyramid falls back to using traversal. But the point is ultimately moot. If you use Pyramid, and you really don’t want to use URL dispatch, you needn’t use it at all. Instead, use traversal exclusively to map URL paths to views, just like you do in Zope. Pyramid Views Do Not Accept Arbitrary Keyword Arguments¶ Many web frameworks (Zope, TurboGears, Pylons 1.X, Django) allow for their variant of a view callable to accept arbitrary keyword or positional arguments, which are filled in using values present in the request.GET dictionaries or by values present in the route match dictionary. For example, a Django view will accept positional arguments which match information in an associated “urlconf” such as def aview(request, poll_id): return HttpResponse(poll_id) Zope, likewise allows you to add arbitrary keyword and positional arguments to any method of a resource object found via traversal: 1 2 3 4 5 from persistent import Persistent class MyZopeObject(Persistent): def aview(self, a, b, c=None): return '%s %s %c' % (a, b, c) When this method is called as the result of being the published callable, the Zope request object’s GET and POST namespaces are searched for keys which match the names of the positional and keyword arguments in the request, and the method is called (if possible) with its argument list filled with values mentioned therein. TurboGears and Pylons 1.X operate similarly. Out of the box, Pyramid is configured to have none of these features. pyramid view callables always accept only no other arguments. The rationale: this argument specification matching done aggressively can be costly, and Pyramid has performance as one of its main goals, so we’ve decided to make people, by default, obtain information by interrogating the request object within the view callable body instead of providing magic to do unpacking into the view argument list. However, as of Pyramid 1.0a9, user code can influence the way view callables are expected to be called, making it possible to compose a system out of view callables which are called with arbitrary arguments. See Using a View Mapper. Pyramid Provides Too Few “Rails”¶ By design, Pyramid is not a particularly opinionated web framework. It has a relatively parsimonious feature set. It contains no built in ORM nor any particular database bindings. It contains no form generation framework. It has no administrative web user interface. It has no built in text indexing. It does not dictate how you arrange your code. Such opinionated functionality exists in applications and frameworks built on top of Pyramid. It’s intended that higher-level systems emerge built using Pyramid as a base. See also Pyramid Applications are Extensible; I Don’t Believe In Application Extensibility. Pyramid Provides Too Many “Rails”¶ Pyramid provides some features that other web frameworks do not. These are features meant for use cases that might not make sense to you if you’re building a simple bespoke web application: - An optional way to map URLs to code using traversal which implies a walk of a resource tree. - The ability to aggregate Pyramid application configuration from multiple - View and subscriber registrations made using interface objects instead of class objects (e.g. Using Resource Interfaces In View Configuration). - A declarative authorization system. - Multiple separate I18N translation string factories, each of which can name its own domain. These features are important to the authors of Pyramid. The Pyramid authors are often commissioned to build CMS-style applications. Such applications are often frameworky because they have more than one deployment. Each deployment requires a slightly different composition of sub-applications, and the framework and sub-applications often need to be extensible. Because the application has more than one deployment, pluggability and extensibility is important, as maintaining multiple forks of the application, one per deployment, is extremely undesirable. Because it’s easier to extend a system that uses traversal from the outside than it is to do the same in a system that uses URL dispatch, each deployment uses a resource tree composed of a persistent tree of domain model objects, and uses traversal to map view callable code to resources in the tree. The resource tree contains very granular security declarations, as resources are owned and accessible by different sets of users. Interfaces are used to make unit testing and implementation substitutability easier. In a bespoke web application, usually there’s a single canonical deployment, and therefore no possibility of multiple code forks. Extensibility is not required; the code is just changed in-place. Security requirements are often less granular. Using the features listed above will often be overkill for such an application. If you don’t like these features, it doesn’t mean you can’t or shouldn’t use Pyramid. They are all optional, and a lot of time has been spent making sure you don’t need to know about them up-front. You can build “Pylons-1.X-style” applications using Pyramid that are purely bespoke by ignoring the features above. You may find these features handy later after building a bespoke web application that suddenly becomes popular and requires extensibility because it must be deployed in multiple locations. Pyramid Is Too Big¶ “The Pyramid compressed tarball is almost 2MB. It must be enormous!” No. We just ship it with test code and helper templates. Here’s a breakdown of what’s included in subdirectories of the package tree: pyramid/ (except for pyramd/tests and pyramid/paster_templates) The actual Pyramid runtime code is about 10% of the total size of the tarball omitting docs, helper templates used for package generation, and test code. Of the approximately 19K lines of Python code in the package, the code that actually has a chance of executing during normal operation, excluding tests and paster template Python files, accounts for approximately 5K lines of Python code. This is comparable to Pylons 1.X, which ships with a little over 2K lines of Python code, excluding tests. Pyramid Has Too Many Dependencies¶ This is true. At the time of this writing, the total number of Python package distributions that Pyramid depends upon transitively is 15 if you use Python 2.7, or 17 if you use Python 2.5 or 2.6. This is a lot more than zero package distribution dependencies: a metric which various Python microframeworks and Django boast. zope.component, package on which Pyramid depends has transitive dependencies on several other packages ( zope.interface). Pyramid also has its own direct dependencies, such as PasteDeploy, Chameleon, Mako, WebOb, zope.deprecation and some of these in turn have their own transitive We try not to reinvent too many wheels (at least the ones that don’t need reinventing), and this comes at the cost of some number of dependencies. However, “number of package distributions” is just not a terribly great metric to measure complexity. For example, the distribution on which Pyramid depends has a grand total of four lines of runtime code. In the meantime, Pyramid has a number of package distribution dependencies comparable to similarly-targeted frameworks such as Pylons 1.X. It may be in the future that we shed more dependencies as the result of a port to Python 3 (the less code we need to port, the better). In the future, we may also move templating system dependencies out of the core and place them in add-on packages, to be included by developers instead of by the framework. This would reduce the number of core dependencies by about five. Pyramid “Cheats” To Obtain Speed¶ Complaints have been lodged by other web framework authors at various times that Pyramid “cheats” to gain performance. One claimed cheating mechanism is our use (transitively) of the C extensions provided by zope.interface to do fast lookups. Another claimed cheating mechanism is the religious avoidance of extraneous function calls. If there’s such a thing as cheating to get better performance, we want to cheat as much as possible. We optimize Pyramid aggressively. This comes at a cost: the core code has sections that could be expressed more readably. As an amelioration, we’ve commented these sections liberally. Pyramid Gets Its Terminology Wrong (“MVC”)¶ “I’m a MVC web framework user, and I’m confused. Pyramid calls the controller a view! And it doesn’t have any controllers.” If you are in this camp, you might have come to expect things about how your existing “MVC” framework uses its terminology. For example, you probably expect that models are ORM models, controllers are classes that have methods that map to URLs, and views are templates. Pyramid indeed has each of these concepts, and each probably works almost exactly like your existing “MVC” web framework. We just don’t use the MVC terminology, as we can’t square its usage in the web framework space with historical reality. People very much want to give web applications the same properties as common desktop GUI platforms by using similar terminology, and to provide some frame of reference for how various components in the common web framework might hang together. But in the opinion of the author, “MVC” doesn’t match the web very well in general. Quoting from the Model-View-Controller Wikipedia entry: Though MVC comes in different flavors, control flow is generally as follows: The user interacts with the user interface in some way (for example, presses a mouse button). The controller handles the input event from the user interface, often via a registered handler or callback and converts the event into appropriate user action, understandable for the model. The controller notifies the model of the user action, possibly resulting in a change in the model's state. (For example, the controller updates the user's shopping cart.) A view queries the model in order to generate an appropriate user interface (for example, the view lists the shopping cart's contents). Note that the view gets its own data from the model. The controller may (in some implementations) issue a general instruction to the view to render itself. In others, the view is automatically notified by the model of changes in state (Observer) which require a screen update. The user interface waits for further user interactions, which restarts the cycle. To the author, it seems as if someone edited this Wikipedia definition, tortuously couching concepts in the most generic terms possible in order to account for the use of the term “MVC” by current web frameworks. I doubt such a broad definition would ever be agreed to by the original authors of the MVC pattern. But even so, it seems most MVC web frameworks fail to meet even this falsely generic definition. For example, do your templates (views) always query models directly as is claimed in “note that the view gets its own data from the model”? Probably not. My “controllers” tend to do this, massaging the data for easier use by the “view” (template). What do you do when your “controller” returns JSON? Do your controllers use a template to generate JSON? If not, what’s the “view” then? Most MVC-style GUI web frameworks have some sort of event system hooked up that lets the view detect when the model changes. The web just has no such facility in its current form: it’s effectively pull-only. So, in the interest of not mistaking desire with reality, and instead of trying to jam the square peg that is the web into the round hole of “MVC”, we just punt and say there are two things: resources and views. The resource tree represents a site structure, the view presents a resource. The templates are really just an implementation detail of any given view: a view doesn’t need a template to return a response. There’s no “controller”: it just doesn’t exist. The “model” is either represented by the resource tree or by a “domain model” (like a SQLAlchemy model) that is separate from the framework entirely. This seems to us like more reasonable terminology, given the current constraints of the web. Pyramid Applications are Extensible; I Don’t Believe In Application Extensibility¶ Any Pyramid application written obeying certain constraints is extensible. This feature is discussed in the Pyramid documentation chapters named Extending An Existing Pyramid Application and Advanced Configuration. It is made possible by the use of the Zope Component Architecture and within Pyramid. “Extensible”, in this context, means: - The behavior of an application can be overridden or extended in a particular deployment of the application without requiring that the deployer modify the source of the original application. - The original developer is not required to anticipate any extensibility plugpoints at application creation time to allow fundamental application behavior to be overriden or extended. - The original developer may optionally choose to anticipate an application-specific set of plugpoints, which may be hooked by a deployer. If he chooses to use the facilities provided by the ZCA, the original developer does not need to think terribly hard about the mechanics of introducing such a plugpoint. Many developers seem to believe that creating extensible applications is not worth it. They instead suggest that modifying the source of a given application for each deployment to override behavior is more reasonable. Much discussion about version control branching and merging typically ensues. It’s clear that making every application extensible isn’t required. The majority of web applications only have a single deployment, and thus needn’t be extensible at all. However, some web applications have multiple deployments, and some have many deployments. For example, a generic content management system (CMS) may have basic functionality that needs to be extended for a particular deployment. That CMS system may be deployed for many organizations at many places. Some number of deployments of this CMS may be deployed centrally by a third party and managed as a group. It’s useful to be able to extend such a system for each deployment via preordained plugpoints than it is to continually keep each software branch of the system in sync with some upstream source: the upstream developers may change code in such a way that your changes to the same codebase conflict with theirs in fiddly, trivial ways. Merging such changes repeatedly over the lifetime of a deployment can be difficult and time consuming, and it’s often useful to be able to modify an application for a particular deployment in a less invasive way. If you don’t want to think about Pyramid application extensibility at all, you needn’t. You can ignore extensibility entirely. However, if you follow the set of rules defined in Extending An Existing Pyramid Application, you don’t need to make your application extensible: any application you write in the framework just is automatically extensible at a basic level. The mechanisms that deployers use to extend it will be necessarily coarse: typically, views, routes, and resources will be capable of being overridden. But for most minor (and even some major) customizations, these are often the only override plugpoints necessary: if the application doesn’t do exactly what the deployment requires, it’s often possible for a deployer to override a view, route, or resource and quickly make it do what he or she wants it to do in ways not necessarily anticipated by the original developer. Here are some example scenarios demonstrating the benefits of such a feature. - If a deployment needs a different styling, the deployer may override the main template and the CSS in a separate Python package which defines overrides. - If a deployment needs an application page to do something differently needs it to expose more or different information, the deployer may override the view that renders the page within a separate Python package. - If a deployment needs an additional feature, the deployer may add a view to the override package. As long as the fundamental design of the upstream package doesn’t change, these types of modifications often survive across many releases of the upstream package without needing to be revisited. Extending an application externally is not a panacea, and carries a set of risks similar to branching and merging: sometimes major changes upstream will cause you to need to revisit and update some of your modifications. But you won’t regularly need to deal wth meaningless textual merge conflicts that trivial changes to upstream packages often entail when it comes time to update the upstream package, because if you extend an application externally, there just is no textual merge done. Your modifications will also, for whatever its worth, be contained in one, canonical, well-defined place. Branching an application and continually merging in order to get new features and bugfixes is clearly useful. You can do that with a Pyramid application just as usefully as you can do it with any application. But deployment of an application written in Pyramid makes it possible to avoid the need for this even if the application doesn’t define any plugpoints ahead of time. It’s possible that promoters of competing web frameworks dismiss this feature in favor of branching and merging because applications written in their framework of choice aren’t extensible out of the box in a comparably fundamental way. While Pyramid application are fundamentally extensible even if you don’t write them with specific extensibility in mind, if you’re moderately adventurous, you can also take it a step further. If you learn more about the Zope Component Architecture, you can optionally use it to expose other more domain-specific configuration plugpoints while developing an application. The plugpoints you expose needn’t be as coarse as the ones provided automatically by Pyramid itself. For example, you might compose your own directive that configures a set of views for a prebaked restview or somesuch) , allowing other people to refer to that directive when they make declarations in the includeme of their customization package. There is a cost for this: the developer of an application that defines custom plugpoints for its deployers will need to understand the ZCA or he will need to develop his own similar extensibility Ultimately, any argument about whether the extensibility features lent to applications by Pyramid are good or bad is mostly pointless. You needn’t take advantage of the extensibility features provided by a particular Pyramid application in order to affect a modification for a particular set of its deployments. You can ignore the application’s extensibility plugpoints entirely, and instead use version control branching and merging to manage application deployment modifications instead, as if you were deploying an application written using any other web framework. Pyramid Uses its Own HTTP Exception Class Hierarchy Rather Than This defense is new as of Pyramid 1.1. The HTTP exception classes defined in pyramid.httpexceptions are very much like the ones defined in HTTPForbidden, etc). They have the same names and largely the same behavior and all have a very similar implementation, but not the same identity. Here’s why they have a separate - Making them separate allows the HTTP exception classes to subclass pyramid.response.Response. This speeds up response generation slightly due to the way the Pyramid router works. The same speedup could be gained by monkeypatching webob.response.Responsebut it’s usually the case that monkeypatching turns out to be evil and wrong. - Making them separate allows them to provide alternate __call__logic which also speeds up response generation. - Making them separate allows the exception classes to provide for the proper - Making them separate allows us freedom from having to think about backwards compatibility code present in webob.exchaving to do with Python 2.4, which we no longer support in Pyramid 1.1+. - We change the behavior of two classes HTTPForbidden) in the module so that they can be used by Pyramid internally for notfound and forbidden exceptions. - Making them separate allows us to influence the docstrings of the exception classes to provide Pyramid-specific documentation. - Making them separate allows us to silence a stupid deprecation warning under Python 2.6 when the response objects are used as exceptions (related Pyramid has Simpler Traversal Machinery than Does Zope¶ Zope’s default traverser: - Allows developers to mutate the traversal name stack while traversing (they can add and remove path elements). - Attempts to use an adaptation to obtain the next element in the path from the currently traversed object, falling back to Zope’s default traverser allows developers to mutate the traversal name stack during traversal by mutating default traverser ( pyramid.traversal.ResourceTreeTraverser) does not offer a way to do this; it does not maintain a stack as a request attribute and, even if it did, it does not pass the request to resource objects while it’s traversing. While it was handy at times, this feature was abused in frameworks built atop Zope (like CMF and Plone), often making it difficult to tell exactly what was happening when a traversal didn’t match a view. I felt it was better to make folks that wanted the feature replace the traverser rather than build that particular honey pot in to the default traverser. Zope uses multiple mechanisms to attempt to obtain the next element in the resource tree based on a name. It first tries an adaptation of the current ITraversable, and if that fails, it falls back to attempting number of magic methods on the resource ( __getattr__). My experience while both using Zope and attempting to reimplement its publisher in repoze.zope2 led me to believe the following: - The default traverser should be as simple as possible. Zope’s publisher is somewhat difficult to follow and replicate due to the fallbacks it tried when one traversal method failed. It is also slow. - The entire traverser should be replaceable, not just elements of the traversal machinery. Pyramid has a few big components rather than a plethora of small ones. If the entire traverser is replaceable, it’s an antipattern to make portions of the default traverser replaceable. Doing so is a “knobs on knobs” pattern, which is unfortunately somewhat endemic in Zope. In a “knobs on knobs” pattern, a replaceable subcomponent of a larger component is made configurable using the same configuration mechanism that can be used to replace the larger component. For example, in Zope, you can replace the default traverser by registering an adapter. But you can also (or alternately) control how the default traverser traverses by registering one or more adapters. As a result of being able to either replace the larger component entirely or turn knobs on the default implementation of the larger component, no one understands when (or whether) they should ever override the larger component entrirely. This results, over time, in a rusting together of the larger “replaceable” component and the framework itself, because people come to depend on the availability of the default component in order just to turn its knobs. The default component effectively becomes part of the framework, which entirely subverts the goal of making it replaceable. In Pyramid, typically if a component is replaceable, it will itself have no knobs (it will be solid state). If you want to influence behavior controlled by that component, you will replace the component instead of turning knobs attached to the component. Microframeworks Have Smaller Hello World Programs¶ Self-described “microframeworks” exist: Bottle and Flask are two that are becoming popular. Bobo doesn’t describe itself as a microframework, but its intended userbase is much the same. Many others exist. We’ve actually even (only as a teaching tool, not as any sort of official project) created one using Pyramid (the videos use BFG, a precursor to Pyramid, but the resulting code is available for Pyramid too). Microframeworks are small frameworks with one common feature: each allows its users to create a fully functional application that lives in a single Python file. Some developers and microframework authors point out that Pyramid’s “hello world” single-file program is longer (by about five lines) than the equivalent program in their favorite microframework. Guilty as charged. This loss isn’t for lack of trying. Pyramid is useful in the same circumstance in which microframeworks claim dominance: single-file applications. But Pyramid doesn’t sacrifice its ability to credibly support larger applications in order to achieve hello-world LoC parity with the current crop of microframeworks. Pyramid’s design instead tries to avoid some common pitfalls associated with naive declarative configuration schemes. The subsections which follow explain the rationale. Application Programmers Don’t Control The Module-Scope Codepath (Import-Time Side-Effects Are Evil)¶ Please imagine a directory structure with a set of Python files in it: . |-- app.py |-- app2.py `-- config.py The contents of 1 2 3 4 5 6 7 8 9 10 11 from config import decorator from config import L import pprint @decorator def foo(): pass if __name__ == '__main__': import app2 pprint.pprint(L) The contents of 1 2 3 4 5 import app @app.decorator def bar(): pass The contents of 1 2 3 4 5 L = def decorator(func): L.append(func) return func If we cd to the directory that holds these files and we run given the directory structure and code above, what happens? Presumably, our decorator decorator will be used twice, once by the decorated function app.py and once by the decorated function app2.py. Since each time the decorator is used, the list config.py is appended to, we’d expect a list with two elements to be printed, right? Sadly, no: [chrism@thinko]$ python app.py [<function foo at 0x7f4ea41ab1b8>, <function foo at 0x7f4ea41ab230>, <function bar at 0x7f4ea41ab2a8>] By visual inspection, that outcome (three different functions in the list) seems impossible. We only defined two functions and we decorated each of those functions only once, so we believe that the will only run twice. However, what we believe is wrong because the code at module scope in our app.py module was executed twice. The code is executed once when the script is run as and then it is executed again when app2.py imports the same file as What does this have to do with our comparison to microframeworks? Many microframeworks in the current crop (e.g. Bottle, Flask) encourage you to attach configuration decorators to objects defined at module scope. These decorators execute arbitrarily complex registration code which populates a singleton registry that is a global defined in external Python module. This is analogous to the above example: the “global registry” in the above example is the list Let’s see what happens when we use the same pattern with the Groundhog microframework. Replace the contents app.py above with this: 1 2 3 4 5 6 7 8 9 from config import gh @gh.route('/foo/') def foo(): return 'foo' if __name__ == '__main__': import app2 pprint.pprint(L) Replace the contents of app2.py above with this: 1 2 3 4 5 import app @app.gh.route('/bar/') def bar(): 'return bar' Replace the contents of config.py above with this: from groundhog import Groundhog gh = Groundhog('myapp', 'seekrit') How many routes will be registered within the routing table of the “gh” Groundhog application? If you answered three, you are correct. How many would a casual reader (and any sane developer) expect to be registered? If you answered two, you are correct. Will the double registration be a problem? With our Groundhog framework’s route method backing this application, not really. It will slow the application down a little bit, because it will need to miss twice for a route when it does not match. Will it be a problem with another framework, another application, or another decorator? Who knows. You need to understand the application in its totality, the framework in its totality, and the chronology of execution to be able to predict what the impact of unintentional code double-execution The encouragement to use decorators which perform population of an external registry has an unintended consequence: the application developer now must assert ownership of every codepath that executes Python module scope code. Module-scope code is presumed by the current crop of decorator-based microframeworks to execute once and only once; if it executes more than once, weird things will start to happen. It is up to the application developer to maintain this invariant. Unfortunately, however, in reality, this is an impossible task, because, Python programmers do not own the module scope codepath, and never will. Anyone who tries to sell you on the idea that they do is simply mistaken. Test runners that you may want to use to run your code’s tests often perform imports of arbitrary code in strange orders that manifest bugs like the one demonstrated above. API documentation generation tools do the same. Some people even think it’s safe to use the reload command or delete objects from sys.modules, each of which has hilarious effects when used against code that has import-time side Global-registry-mutating microframework programmers therefore will at some point need to start reading the tea leaves about what might happen if module scope code gets executed more than once like we do in the previous paragraph. When Python programmers assume they can use the module-scope codepath to run arbitrary code (especially code which populates an external registry), and this assumption is challenged by reality, the application developer is often required to undergo a painful, meticulous debugging process to find the root cause of an inevitably obscure symptom. The solution is often to rearrange application import ordering or move an import statement from module-scope into a function body. The rationale for doing so can never be expressed adequately in the checkin message which accompanies the fix and can’t be documented succinctly enough for the benefit of the rest of the development team so that the problem never happens again. It will happen again, especially if you are working on a project with other people who haven’t yet internalized the lessons you learned while you stepped through module-scope code using pdb. This is a really pretty poor situation to find yourself in as an application developer: you probably didn’t even know your or your team signed up for the job, because the documentation offered by decorator-based microframeworks don’t warn you about Folks who have a large investment in eager decorator-based configuration that populates an external data structure (such as microframework authors) may argue that the set of circumstances I outlined above is anomalous and contrived. They will argue that it just will never happen. If you never intend your application to grow beyond one or two or three modules, that’s probably true. However, as your codebase grows, and becomes spread across a greater number of modules, the circumstances in which module-scope code will be executed multiple times will become more and more likely to occur and less and less predictable. It’s not responsible to claim that double-execution of module-scope code will never happen. It will; it’s just a matter of luck, time, and application complexity. If microframework authors do admit that the circumstance isn’t contrived, they might then argue that real damage will never happen as the result of the double-execution (or triple-execution, etc) of module scope code. You would be wise to disbelieve this assertion. The potential outcomes of multiple execution are too numerous to predict because they involve delicate relationships between application and framework code as well as chronology of code execution. It’s literally impossible for a framework author to know what will happen in all circumstances. But even if given the gift of omniscience for some limited set of circumstances, the framework author almost certainly does not have the double-execution anomaly in mind when coding new features. He’s thinking of adding a feature, not protecting against problems that might be caused by the 1% multiple execution case. However, any 1% case may cause 50% of your pain on a project, so it’d be nice if it never occured. Responsible microframeworks actually offer a back-door way around the problem. They allow you to disuse decorator based configuration entirely. Instead of requiring you to do the following: 1 2 3 4 5 6 7 8 gh = Groundhog('myapp', 'seekrit') @gh.route('/foo/') def foo(): return 'foo' if __name__ == '__main__': gh.run() They allow you to disuse the decorator syntax and go almost-all-imperative: 1 2 3 4 5 6 7 8 def foo(): return 'foo' gh = Groundhog('myapp', 'seekrit') if __name__ == '__main__': gh.add_route(foo, '/foo/') gh.run() This is a generic mode of operation that is encouraged in the Pyramid documentation. Some existing microframeworks (Flask, in particular) allow for it as well. None (other than Pyramid) encourage it. If you never expect your application to grow beyond two or three or four or ten modules, it probably doesn’t matter very much which mode you use. If your application grows large, however, imperative configuration can provide better predictability. Astute readers may notice that Pyramid has configuration decorators too. Aha! Don’t these decorators have the same problems? No. These decorators do not populate an external Python module when they are executed. They only mutate the functions (and classes and methods) they’re attached to. These mutations must later be found during a scan process that has a predictable and structured import phase. Module-localized mutation is actually the best-case circumstance for double-imports; if a module only mutates itself and its contents at import time, if it is imported twice, that’s OK, because each decorator invocation will always be mutating an independent copy of the object it’s attached to, not a shared resource like a registry in another module. This has the effect that double-registrations will never be performed. Routes Need Relative Ordering¶ Consider the following simple Groundhog application: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 from groundhog import Groundhog app = Groundhog('myapp', 'seekrit') app.route('/admin') def admin(): return '<html>admin page</html>' app.route('/:action') def action(): if action == 'add': return '<html>add</html>' if action == 'delete': return '<html>delete</html>' return app.abort(404) if __name__ == '__main__': app.run() If you run this application and visit the URL /admin, you will see the “admin” page. This is the intended result. However, what if you rearrange the order of the function definitions in the file? 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 from groundhog import Groundhog app = Groundhog('myapp', 'seekrit') app.route('/:action') def action(): if action == 'add': return '<html>add</html>' if action == 'delete': return '<html>delete</html>' return app.abort(404) app.route('/admin') def admin(): return '<html>admin page</html>' if __name__ == '__main__': app.run() If you run this application and visit the URL /admin, you will now be returned a 404 error. This is probably not what you intended. The reason you see a 404 error when you rearrange function definition ordering is that routing declarations expressed via our microframework’s routing decorators have an ordering, and that ordering matters. In the first case, where we achieved the expected result, we first added a route with the pattern /admin, then we added a route with the pattern /:action by virtue of adding routing patterns via decorators at module scope. When a request with a /admin enters our application, the web framework loops over each of our application’s route patterns in the order in which they were defined in our module. As a result, the view associated with the /admin routing pattern will be invoked: it matches first. All is right with the world. In the second case, where we did not achieve the expected result, we first added a route with the pattern /:action, then we added a route with the /admin. When a request with a our application, the web framework loops over each of our application’s route patterns in the order in which they were defined in our module. As a result, the view associated with the /:action routing pattern will be invoked: it matches first. A 404 error is raised. This is not what we wanted; it just happened due to the order in which we defined our view functions. This is because Groundhog routes are added to the routing map in import order, and matched in the same order when a request comes in. Bottle, like Groundhog, as of this writing, matches routes in the order in which they’re defined at Python execution time. Flask, on the other hand, does not order route matching based on import order; it reorders the routes you add to your application based on their “complexity”. Other microframeworks have varying strategies to do route ordering. Your application may be small enough where route ordering will never cause an issue. If your application becomes large enough, however, being able to specify or predict that ordering as your application grows larger will be difficult. At some point, you will likely need to more explicitly start controlling route ordering, especially in applications that require extensibility. If your microframework orders route matching based on complexity, you’ll need to understand what is meant by “complexity”, and you’ll need to attempt to inject a “less complex” route to have it get matched before any “more complex” one to ensure that it’s tried first. If your microframework orders its route matching based on relative import/execution of function decorator definitions, you will need to ensure you execute all of these statements in the “right” order, and you’ll need to be cognizant of this import/execution ordering as you grow your application or try to extend it. This is a difficult invariant to maintain for all but the smallest applications. In either case, your application must import the non- which contain configuration decorations somehow for their configuration to be executed. Does that make you a little uncomfortable? It should, because Application Programmers Don’t Control The Module-Scope Codepath (Import-Time Side-Effects Are Evil). Pyramid uses neither decorator import time ordering nor does it attempt to divine the relative complexity of one route to another in order to define a route match ordering. In Pyramid, you have to maintain relative route ordering imperatively via the chronology of multiple executions of the pyramid.config.Configurator.add_route() method. The order in which you add_route becomes the order of route matching. If needing to maintain this imperative ordering truly bugs you, you can use traversal instead of route matching, which is a completely declarative (and completely predictable) mechanism to map code to URLs. While URL dispatch is easier to understand for small non-extensible applications, traversal is a great fit for very large applications and applications that need to be arbitrarily extensible. “Stacked Object Proxies” Are Too Clever / Thread Locals Are A Nuisance¶ Some microframeworks use the import statement to get a handle to an object which is not logically global: 1 2 3 4 5 6 7 8 9 10 11 12 13 from flask import request @app.route('/login', methods=['POST', 'GET']) def login(): error = None if request.method == 'POST': if valid_login(request.form['username'], request.form['password']): return log_the_user_in(request.form['username']) else: error = 'Invalid username/password' # this is executed if the request method was GET or the # credentials were invalid The Pylons 1.X web framework uses a similar strategy. It calls these things “Stacked Object Proxies”, so, for purposes of this discussion, I’ll do so as well. Import statements in Python ( from bar import baz) are most frequently performed to obtain a reference to an object defined globally within an external Python module. However, in normal programs, they are never used to obtain a reference to an object that has a lifetime measured by the scope of the body of a function. It would be absurd to try to import, for example, a variable named i representing a loop counter defined in the body of a function. For example, we’d never try to import i from the 1 2 3 def afunc(): for i in range(10): print i By its nature, the request object created as the result of a WSGI server’s call into a long-lived web framework cannot be global, because the lifetime of a single request will be much shorter than the lifetime of the process running the framework. A request object created by a web framework actually has more similarity to the i loop counter in our example above than it has to any comparable importable object defined in the Python standard library or in normal library code. However, systems which use stacked object proxies promote locally scoped objects such as request out to module scope, for the purpose of being able to offer users a nice spelling involving import. They, for what I consider dubious reasons, would rather present to their users the canonical way of getting at a from framework import request instead of a saner from myframework.threadlocals import get_request; request = get_request() even though the latter is more explicit. It would be most explicit if the microframeworks did not use thread local variables at all. Pyramid view functions are passed a request object; many of Pyramid’s APIs require that an explicit request object be passed to them. It is possible to retrieve the current Pyramid request as a threadlocal variable but it is a “in case of emergency, break glass” type of activity. This explicitness makes Pyramid view functions more easily unit testable, as you don’t need to rely on the framework to manufacture suitable “dummy” request (and other similarly-scoped) objects during test setup. It also makes them more likely to work on arbitrary systems, such as async servers that do no monkeypatching. Some microframeworks offer a run() method of an application object that executes a default server configuration for easy execution. Pyramid doesn’t currently try to hide the fact that its router is a WSGI application behind a convenience run() API. It just tells people to import a WSGI server and use it to serve up their Pyramid application as per the documentation of that WSGI server. The extra lines saved by abstracting away the serving step behind seem to have driven dubious second-order decisions related to API in some microframeworks. For example, Bottle contains a for each type of WSGI server it supports via its This means that there exists code in bottle.py that depends on the rocket. You choose the kind of server you want to run by passing its name into the run method. In theory, this sounds great: I can try Bottle out on gunicorn just by passing in a name! However, to fully test Bottle, all of these third-party systems must be installed and functional; the Bottle developers must monitor changes to each of these packages and make sure their code still interfaces properly with them. This expands the packages required for testing greatly; this is a lot of requirements. It is likely difficult to fully automate these tests due to requirements conflicts and build issues. As a result, for single-file apps, we currently don’t bother to offer a run() shortcut; we tell folks to import their WSGI server of choice and run it by hand. For the people who want a server abstraction layer, we suggest that they use PasteDeploy. In PasteDeploy-based systems, the onus for making sure that the server can interface with a WSGI application is placed on the server developer, not the web framework developer, making it more likely to be timely and correct. Here’s a diagrammed version of the simplest pyramid application, where comments take into account what we’ve discussed in the Microframeworks Have Smaller Hello World Programs section. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 from pyramid.response import Response # explicit response, no TL from wsgiref.simple_server import make_server # explicitly WSGI def hello_world(request): # accepts a request; no request thread local reqd # explicit response object means no response threadlocal return Response('Hello world!') if __name__ == '__main__': from pyramid.config import Configurator config = Configurator() # no global application object. config.add_view(hello_world) # explicit non-decorator registration app = config.make_wsgi_app() # explicitly WSGI server = make_server('0.0.0.0', 8080, app) server.serve_forever() # explicitly WSGI Pyramid Doesn’t Offer Pluggable Apps¶ It is “Pyramidic” to compose multiple external sources into the same number of includes can be done to compose an application; includes can even be done from within other includes. Any directive can be used within an include that can be used outside of one (such as Pyramid has a conflict detection system that will throw an error if two included externals try to add the same configuration in a conflicting way (such as both externals trying to add a route using the same name, or both externals trying to add a view with the same set of predicates). It’s awful tempting to call this set of features something that can be used to compose a system out of “pluggable applications”. But in reality, there are a number of problems with claiming this: - The terminology is strained. Pyramid really has no notion of a plurality of “applications”, just a way to compose configuration from multiple sources to create a single WSGI application. That WSGI application may gain behavior by including or disincluding configuration, but once it’s all composed together, Pyramid doesn’t really provide any machinery which can be used to demarcate the boundaries of one “application” (in the sense of configuration from an external that adds routes, views, etc) from another. - Pyramid doesn’t provide enough “rails” to make it possible to integrate truly honest-to-god, download-an-app-from-a-random-place and-plug-it-in-to-create-a-system “pluggable” applications. Because Pyramid itself isn’t opinionated (it doesn’t mandate a particular kind of database, it offers multiple ways to map URLs to code, etc), it’s unlikely that someone who creates something application-like will be able to casually redistribute it to J. Random Pyramid User and have it just work by asking him to config.include a function from the package. This is particularly true of very high level components such as blogs, wikis, twitter clones, commenting systems, etc. The integrator (the Pyramid developer who has downloaded a package advertised as a “pluggable app”) will almost certainly have made different choices about e.g. what type of persistence system he’s using, and for the integrator to appease the requirements of the “pluggable application”, he may be required to set up a different database, make changes to his own code to prevent his application from shadowing the pluggable app (or vice versa), and any other number of arbitrary changes. For this reason, we claim that Pyramid has “extensible” applications, not pluggable applications. Any Pyramid application can be extended without forking it as long as its configuration statements have been composed into things that can be pulled in via It’s also perfectly reasonable for a single developer or team to create a set of interoperating components which can be enabled or disabled by using config.include. That developer or team will be able to provide the “rails” (by way of making high-level choices about the technology used to create the project, so there won’t be any issues with plugging all of the components together. The problem only rears its head when the components need to be distributed to arbitrary users. Note that Django has a similar problem with “pluggable applications” that need to work for arbitrary third parties, even though they provide many, many more rails than does Pyramid. Even the rails they provide are not enough to make the “pluggable application” story really work without local modification. Truly pluggable applications need to be created at a much higher level than a web framework, as no web framework can offer enough constraints to really make them work out of the box. They really need to plug into an application, instead. It would be a noble goal to build an application with Pyramid that provides these constraints and which truly does offer a way to plug in applications (Joomla, Plone, Drupal come to mind). Pyramid Has Zope Things In It, So It’s Too Complex¶ On occasion, someone will feel compelled to post a mailing list message that reads something like this: had a quick look at pyramid ... too complex to me and not really understand for which benefits.. I feel should consider whether it's time for me to step back to django .. I always hated zope (useless ?) complexity and I love simple way of thinking (Paraphrased from a real email, actually.) Let’s take this criticism point-by-point. If you can understand this hello world program, you can use Pyramid: 1 2 3 4 5 6 7 8 9 10 11 12 13 from wsgiref.simple_server import make_server from pyramid.config import Configurator from pyramid.response import Response def hello_world(request): return Response('Hello world!') if __name__ == '__main__': config = Configurator() config.add_view(hello_world) app = config.make_wsgi_app() server = make_server('0.0.0.0', 8080, app) server.serve_forever() Pyramid has ~ 650 pages of documentation (printed), covering topics from the very basic to the most advanced. Nothing is left undocumented, quite literally. It also has an awesome, very helpful community. Visit the #pyramid IRC channel on freenode.net (irc://freenode.net#pyramid) and see. I’m sorry you feel that way. The Zope brand has certainly taken its share of lumps over the years, and has a reputation for being insular and mysterious. But the word “Zope” is literally quite meaningless without qualification. What part of Zope do you hate? “Zope” is a brand, not a technology. If it’s Zope2-the-web-framework, Pyramid is not that. The primary designers and developers of Pyramid, if anyone, should know. We wrote Pyramid’s repoze.bfg), in part, because we knew that Zope 2 had usability issues and limitations. repoze.bfg (and now Pyramid) was written to address these issues. If it’s Zope3-the-web-framework, Pyramid is definitely not that. Making use of lots of Zope 3 technologies is territory already staked out by the Grok project. Save for the obvious fact that they’re both web Pyramid is very, very different than Grok. Grok exposes lots of Zope technologies to end users. On the other hand, if you need to understand a Zope-only concept while using Pyramid, then we’ve failed on some very basic axis. If it’s just the word Zope: this can only be guilt by association. Because a piece of software internally uses some package named zope.foo, it doesn’t turn the piece of software that uses it into “Zope”. There is a lot of great software written that has the word Zope in its name. Zope is not some sort of monolithic thing, and a lot of its software is usable externally. And while it’s not really the job of this document to defend it, Zope has been around for over 10 years and has an incredibly large, active community. If you don’t believe this, http://taichino.appspot.com/pypi_ranking/authors is an eye-opening reality Years of effort have gone into honing this package and its documentation to make it as simple as humanly possible for developers to use. Everything is a tradeoff, of course, and people have their own ideas about what “simple” is. You may have a style difference if you believe Pyramid is complex. Its developers obviously disagree.
<urn:uuid:7f12d187-b5ef-45ae-982f-13dc4712b956>
CC-MAIN-2017-04
http://docs.pylonsproject.org/projects/pyramid/en/1.3-branch/designdefense.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00334-ip-10-171-10-70.ec2.internal.warc.gz
en
0.898677
17,813
1.929688
2
First off, what is the Google Ads platform? Google Ads (previously named Google AdWords) is a paid advertising platform that allows anybody to reach potential customers in pivotal moments along the consumer’s journey. Billions of times per day, people rely on Google to look up answers, discover new places, learn new skills or shop for products and services. In other words, when people want-to-know, want-to-go or want-to-buy, they turn to Google. With Google Ads, businesses can appear to targeted potential customers at the top of search results and on popular websites. But, how does Google make sure the right ads are presented to the right customer at the right time? You can’t simply buy your way to the top of Google search results. Google Ads is an auction based platform. Advertisers determine their maximum bid for placement in paid digital ad placement and auctions run every time a user searches or browses the web. However, the highest bid doesn’t always win. The winner, and highest positioned ad, is determined by Ad Rank, which is essentially the max bid multiplied by the ad’s Quality Score. The most impactful factors in calculating an ad’s Quality Score are: - Expected click-through-rate - Landing page experience - Ad relevance - And the use of Ad Extensions Higher quality ads lead to lower advertising costs. Relevant search results are vital to Google Ads and advertisers using the platform. Implementing Quality Score in Google auctions prevents advertisers from simply buying their way into search results for irrelevant keywords. Additionally, the higher an advertiser’s Quality Score, the less they have to bid to reach potential customers. Consequently, lower online advertising costs result in greater return on investment. Partner with Adcoast. Our team of Google certified digital marketing professionals get the most out of our client’s marketing and advertising budgets.
<urn:uuid:41c34932-763d-43ee-9f05-47039289fbbf>
CC-MAIN-2022-33
https://hellodfw.com/winning-google-ads-auctions/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572304.13/warc/CC-MAIN-20220816120802-20220816150802-00468.warc.gz
en
0.921224
402
1.554688
2
New European Commission President Ursula von der Leyen has a plan to boost the EU’s role on the world stage. In her first Brussels press conference since taking over from Jean-Claude Juncker, von der Leyen said she will lead a “geopolitical Commission.” She said each week’s meeting of her top team — the College of Commissioners — will make time for a report on “external action.” Plus, members from all commissioner cabinets will form a new “External Coordination” body to bridge external and internal policy work. The first meeting of the new College of Commissioners took place on Wednesday and featured an agenda heavily geared toward external relations, with commissioners hearing updates on NATO, Albania, and the U.N. Climate Change Conference. You may like Ursula von der Leyen said each week’s meeting of her top team will make time for a report on “external action.” Von der Leyen, a former German defense minister, is also spending much of her first days in office focusing on the bloc’s external relations. She began her week at the COP25 summit in Madrid, and will head to Ethiopia at the end of the week for discussions with the African Union. In her press conference, von der Leyen said up to €100 billion could be available to help people and industries affected by the EU’s climate push. “Europe can be and must be a frontrunner on this topic,” she said. She also pushed back against a proposal by the Finnish presidency of the Council of the EU to reduce planned EU budget spending on areas such as border security and defense, noting that she is “concerned” about the proposed “severe cuts.” “I think it is time that we work together to ensure that we can deliver on the objectives we have all agreed on together,” she said, while noting that she will discuss the 2021-2027 EU budget with European leaders at their summit next week. Von der Leyen repeated the Commission’s long-standing position that Albania and North Macedonia should be allowed to begin talks toward EU membership, calling a delay in doing so led by opposition from France a “strategic mistake.” “I think strategically it’s absolutely important that we make it clear to west Balkans, as clear as we possibly can in our signals, that we want them on our side and that we have a high interest in their getting close to the European Union,” she said. “We’ve required a lot of North Macedonia and Albania, they have done it all,” she said, while noting that she understands France’s position of calling for a revision of accession procedures but that North Macedonia and Albania should be allowed to begin negotiations “in parallel” to any changes. Nevertheless, von der Leyen will face significant obstacles in achieving her ambition of a “geopolitical” Commission. When it comes to issues like accession and funding for strategic EU programs in areas such as defense, migration or development aid, the Commission can offer proposals, but decisions are ultimately up to EU leaders — and they are divided on key issues such as enlargement, the size of the bloc’s budget, and what kind of spending the EU should prioritize. Von der Leyen is not getting the luxury of a honeymoon period, as tensions mount in Malta over an investigation into the murder of journalist Daphne Caruana Galizia. “I am concerned by the recent developments in Malta, and we are following the situation very closely. To be very clear on that, we harshly condemn the murder of the journalist Daphne,” von der Leyen said. “I will not comment on ongoing national investigations, however what I will say is that I expect there to be a thorough and independent investigation free from any political interference.” Von der Leyen did, however, manage to deliver on one policy priority in her first days, announcing that all Commission cabinets will for the first time include at least 50 percent female staff at an administrative level. This is “a little revolution,” she said. “It should be normal, it should not be an issue.”
<urn:uuid:02af36e1-dc1d-4c9e-87db-a07d7d050eb4>
CC-MAIN-2022-33
https://www.politico.eu/article/meet-ursula-von-der-leyen-geopolitical-commission/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00668.warc.gz
en
0.952483
899
1.71875
2
|For other uses, see Quartermaster (disambiguation)| |Ship(s) captained or crewed| |Behind the scenes| This man was a sailor who served aboard the Edinburgh Trader as the ship's quartermaster during the time of the East India Trading Company's appearance in Port Royal. The Quartermaster showed a superstitious nature, as noted by Captain Bellamy. When the dress of the stowaway Elizabeth Swann was found aboard the Edinburgh Trader, the Quartermaster assumed it to mean the ship was haunted by a female presence. The Quartermaster spoke up to Captain Bellamy when questioned, saying that all the men had felt the presence of the spirit. The Quartermaster and the bursar argued over what to do with what they perceived to be the dress of the female spirit. The bursar's suggested solution to the perceived ghostly threat was to throw the dress overboard, however the Quartermaster contended with this saying that such actions would only anger the spirit. He was killed during the Kraken's attack on the Edinburgh Trader. Behind the scenes - The Quartermaster was portrayed by Steven Spiers in Pirates of the Caribbean: Dead Man's Chest. - This character was credited as "Quartermaster/Edinburgh" during the ending credits for Dead Man's Chest. - In a deleted scene from Dead Man's Chest, titled "Every Man for Himself", which depicts the Quartermaster and some survivors of the Kraken's attack. But after taunting Will Turner, the Quartermaster and the other survivors were killed by one of the Kraken's tentacles. The scene plays out similarly in the film's screenplay drafts. However, as it was not revealed if this happened or not, it is unknown if it is canon or not. Notes and references |v • d • eCrew of the Edinburgh Trader|
<urn:uuid:15397173-1ab4-4ea9-b1f6-06c1988b0c2e>
CC-MAIN-2017-04
http://pirates.wikia.com/wiki/Quartermaster_(Edinburgh_Trader)
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00162-ip-10-171-10-70.ec2.internal.warc.gz
en
0.963953
378
2.34375
2
sold fresh in most markets are sweet cherries -- they have a thick, rich, almost plumlike texture and sweet taste. If you like your cherries cooked, then you have probably eaten tart cherries, which are juicier and slightly sour. About This Plant Tart cherries thrive in zones 4 to 6, sweet cherries in zones 5 to 7. Tart cherries are self-fertile, while sweet cherries need a compatible variety for cross-pollination. Choose sweet cherry varieties that are especially adapted to your climate and resistant to the major diseases in your area. Standard-size trees start bearing in about their fourth year, dwarf trees in about their third year. One mature, standard-size tart or sweet cherry tree will produce 30 to 50 quarts of cherries each year; a dwarf tree, about 10 to 15 quarts. Choose a sunny site with good air circulation and deep, well-drained soil. Avoid low areas or places surrounded by buildings or shade trees, where cold air settles. Plant cherry trees in early spring. Set bare-root trees atop a small mound of soil in the center of the planting hole, and spread the roots down and away without unduly bending them. Identify original planting depth by finding color change from dark to light as you move down the trunk towards the roots. If the tree is grafted, position the inside of the curve of the graft union away from the afternoon sun. For container-grown trees, remove the plant from its pot and eliminate circling roots by laying the root ball on its side and cutting through the roots with shears. Don't cover the top of the root-ball with backfill because it could prevent water from entering. Space sweet cherries on standard rootstocks 35 to 40 feet apart; dwarfs, 5 to 10 feet apart. Space tart cherries on standard root stocks 20 to 25 feet apart; dwarfs, 8 to 10 feet apart. Set trees on standard rootstocks with the graft union a few inches below the soil level. Set trees on Colt dwarfing rootstock with the graft union several inches above the soil level. Train dwarf tart cherry trees to a central leader. Train semi-dwarf or standard-size cherry trees to a modified leader. Prune trees every year in late winter to encourage the growth of new fruiting wood. Don't prune in the fall. Fertilize each spring until trees start to bear, then fertilize only after harvest each season. Cherries are susceptible to a number of different disease and insect pests, depending on region. Contact your cooperative extension office for information on managing pests in your area. The sugar content of cherries rises dramatically in the last few days of ripening, so wait until they turn fully red, black, or yellow (depending on the variety) before harvesting. Harvest as the cherries ripen over the course of about a week. Pick the cherries with the stems attached, being careful not to tear off the fruit spur that will produce fruit year after year.
<urn:uuid:545fa682-cbce-4db6-9aac-4cff9b4d3a88>
CC-MAIN-2017-04
https://garden.org/learn/articles/view/2071/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280761.39/warc/CC-MAIN-20170116095120-00098-ip-10-171-10-70.ec2.internal.warc.gz
en
0.908908
624
3.078125
3
"Will Climate Change Denial Inherit the Wind?" NCSE's Josh Rosenau contributed "Will Climate Change Denial Inherit the Wind?" to Mobilizing Ideas, the blog of the Center for the Study of Social Movements at the University of Notre Dame. "The persistence of the creationist movement is a remarkable example of the power of social movements, and provides a valuable lesson for students of other anti-science movements," he argued. After reviewing the strategies that have enabled creationism to flourish, he suggested, "A similar dynamic may be forming around the science of climate change as well, and social movement theory will play a key role in understanding that battle — and perhaps in sparing climate science from being doomed, like evolution, to be used as a shibboleth for political factions." "Just as the creationist movement's persistence grew out of its success in linking religious identity with creationist belief, there is a danger that climate change denial could establish itself as a permanent feature of American politics if denialist beliefs establish themselves as core parts of the conservative identity," Rosenau observed, citing the shifts with regard to climate change of nationally prominent Republican politicians through the dozen years of the twenty-first century. But there are, he added, encouraging signs that "the climate change denial movement may not be able to fully merge with movement conservatism, averting the danger that climate change denial would join creationism as a permanent feature of the American sociopolitical landscape."
<urn:uuid:0df1cdb2-42dd-4816-9d22-b176e1230ae5>
CC-MAIN-2017-04
https://ncse.com/news/2013/04/will-climate-change-denial-inherit-wind-0014786
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280483.83/warc/CC-MAIN-20170116095120-00294-ip-10-171-10-70.ec2.internal.warc.gz
en
0.940577
295
2.21875
2
End Date: 30/09/2024 Funding: Greece 2.0 National Recovery and Resilience Plan Project Leader: Ioannis Emiris The sector of design tools for Integrated Circuits (ICs) is a critical link of the Semiconductor industry, with worldwide revenue of $9.3 billion in 2017 and annual growth rate appr. 9%. Helic’s tools are used to model and simulate Integrated Circuits under realistic operating conditions, to reduce the number prototyping cycles before production and to significant accelerate time-to-market. Recent developments in IC design, impose requirements for high density, integration of heterogeneous technologies, high operating frequencies and low power consumption, and have established electromagnetic Crosstalk noise as a major design constraint and a terrifying prospect for time-to-market delays, with huge potential consequences in lost revenues for the manufacturers. Recent developments in IC design, impose requirements for high density, integration of heterogeneous technologies, high operating frequencies and low power consumption, and have established electromagnetic Crosstalk noise as a major design constraint and a terrifying prospect for time-to-market delays, with huge potential consequences in lost revenues for the manufacturers. Practically, a new segment has been emerging in the EDA market, to cover new needs for the detection and avoidance of electromagnetic Crosstalk noise, in the high value and fast-growing markets of high-performance Digital ICs (e.g. GPU, CPU), memories and heterogeneous Systems in Package (SiP). The proposed method for calculating parasitic capacitances is based on an innovative application of the Random Walk method and aims to solve the electrostatic problem of fast parasitic capacitances extraction, also in a manner extensible to future application in 3D ICs. The following performance targets will be met: - Accuracy equal or better to that of existing tools (max error 5%-10%) - Reduced execution time due to intrinsically parallelisable nature - Small memory footprint The main proposed research axes are: - Development of a Random Walk algorithm for parasitic capacitances extraction - Development of Computation Geometry methods that will support the proposed Random Walk method, with particular emphasis in the efficient solution of the Maximum Empty Cube problem - Optimisation of Helic’s modelling engine via pre-characterisation of Green functions used for sampling The new modelling engine will be integrated into Helic’s existing workflow and will be used experimentally to extract parasitic models of verification structures and IC blocks that will be designed during the Project. For the algorithms’ development, Helic will collaborate with the ATHENA Research Centre team that has internationally unique experience in geometric and scientific calculations. Helic will also collaborate with Prof. E. Papadopoulou (U. Svizzera Italiana, ex IBM) who has strong experience in the industrial implementation of geometric calculations applied to Microelectronics problems. The University of Patras will guide overall development as an expert end-user of IC design tools and will deliver designs and measurements of verification structures and IC blocks in modern technology nodes (28nm or 40nm).
<urn:uuid:861f3cef-dd2b-4cac-a7e8-62b4a41610f0>
CC-MAIN-2022-33
https://www.ilsp.gr/en/projects/ranwalk-en/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571745.28/warc/CC-MAIN-20220812170436-20220812200436-00469.warc.gz
en
0.89792
629
1.742188
2
This is a question that might be pertinent as states continue to debate whether there ought to be such a thing as “same-sex marriage,” a legal category that has just come into force in Minnesota. The reason the question may be raised as the debate continues has to do largely with the work of John Boswell, a historian who passed away back in 1994, but who was the author of two books in 1980 and 994 that truly helped press the idea. He argued that a rite known as “brother making” was actually a rite of “same-sex marriage.” Well, he literally wrote “same-sex union,” but that phrase was consistently compared to “heterosexual marriage,” so “same-sex marriage” is what he meant (at least in today’s terms), even if he was trying to be a little reserved in how he wrote. Here is one response to the whole debate worth reading and considering: In addition, I would add that Boswell does some eisegesis (reading into) the sources by implicating a sexual component to a brother-making rite between monks. The historical texts do not insinuate a sexual component. In order to claim they do, he assumed “brothers” has a very broad definition (in order to include homosexual lovers) and “wedding ceremony” a very narrow definition (in order to make all parallels to the marriage rite point only in a sexualizing direction). My point here is not that there were not homosexuals in the past. There were. Nor is my point that it is impossible that any two monks committing to one another as brothers could have engaged in such acts. It’s certainly possible. My point is simply that one is making quite the stretch if one wishes to call adelphopoiesis “same sex marriage” (or even “same sex union” with an explicitly sexual component)–quite the stretch. Boswell definitely demonstrated that there was always a homosexual “sub-culture,” if you will, within Christian societies (for his historical work was on more than merely the brother-making rite) but when it comes “same-sex marriage,” one is on better ground to argue for a “progressive” approach than to claim the Orthodox Church has a same-sex marriage rite. The reality is, we do not and the reality is, our bishops would not allow such a thing (which must be distinguished from whether someone can have a homosexual orientation and be Orthodox–for he/she most certainly can). What this means for the legal enterprise in America? Probably very precious little, but to the degree that the question is raised, it might be helpful to know that Boswell’s work on this particular rite is not as one-sided and definitive in favor of a same-sex marriage ceremony as some people might claim.
<urn:uuid:d8a1138f-4970-4d42-8fa2-246330f59df9>
CC-MAIN-2017-04
http://holyresurrection.areavoices.com/2013/08/02/is-there-a-historical-same-sex-marital-rite/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281151.11/warc/CC-MAIN-20170116095121-00118-ip-10-171-10-70.ec2.internal.warc.gz
en
0.976752
607
2.140625
2
Reading about a couple of ominous developments - one hopefully temporary and the other long-term prompted this idea. They both reminded him to appreciate each new morning and to embrace the blessings that it brings because there are no guarantees about tomorrow. Recent “saber rattling” between nuclear powers could lead to the disruption of the stability of our world in a matter of minutes. And equally concerning in the long-term is that Earth is likely entering the “Sixth Extinction” with the potential of losing three-quarters of all living species. It’s not an asteroid, ice age, or excessive volcanic activity causing this; it’s the explosion of human population. As we 7.4 billion humans expand our geographic footprint and increasingly extract resources we crowd out other species. Scary stuff, but also the kind of “teachable opportunity” that Principal Ed U. Katumm relishes. “The world is changing rapidly. It’s our responsibility to help our students understand these challenges and opportunities. Consider the dramatic changes in our own lifetimes like cell phones instead of landlines and LED lights that use 1/6 the electricity of old-fashioned incandescent bulbs. Just think, this morning my plug-in hybrid car transported me to school powered only by the solar panels on my own home. This is stuff my dear departed dad would have considered science fiction,” Principal Katumm continued. He went on to list a few of the promising opportunities he predicted their students would help develop. “Imagine, by 2040 Hawaii plans to be powered 100% by renewable energy. That’s also the year Britain will ban the sale of new gas and diesel-powered vehicles. Our students will be the ones developing and benefitting from a whole new clean energy revolution. The future is already here! “Our charge is to not just teach our students the technical skills needed to participate in the development of these new opportunities. Even more important, they must understand the peril in taking for granted the beautifully complex web of life that supports us. Without vigilance and stewardship we may lose much that is dear to us all here on the only home we’ll ever know where we’re forever… Earthbound.”
<urn:uuid:ffadc1f8-3f35-4e9f-8a4d-390ddd3332cc>
CC-MAIN-2022-33
https://www.foreverearthbound.net/blog/archives/08-2017
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570741.21/warc/CC-MAIN-20220808001418-20220808031418-00076.warc.gz
en
0.943587
463
1.953125
2
a group formed for interdisciplinary collaboration and support. R is a statistical package used by many digital textual analysts to explore aspects of styelometry. Here at IU, we have an instance of the popular Rstudio running on Karst to facilitate work on large corpora. However, it is often helpful to begin work with a small test set (sometimes even a single...Indiana UniversityHazelbaker Hall (Wells Library E159)Bloomington, INUnited States CartoDB is a free, cloud based tool for mapping and data visualization. This workshop will take you through the steps of creating a map, including uploading and editing data, styling your map, and publishing. CartoDB can manage a myriad of data files and types, just drag-and-drop. Their library has...Indiana UniversityWells W144 (Learning Commons Classroom, SE corner)Bloomington, INUnited States Topic:Big data, big history, distant reading, the return of the longue durée—digital scholarship in the humanities favors large-scale and long-term approaches. Using data-driven methods, we can now explore texts and sources at previously unimaginable magnitudes, but do these experimental avenues of...Indiana UniversityWells’ Library’s Hazelbaker HallBloomington, INUnited States
<urn:uuid:312377bc-0a05-401d-8a86-6b89202fdea8>
CC-MAIN-2022-33
https://www.hastac.org/groups/image-text-interface
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00272.warc.gz
en
0.863452
284
2.171875
2
Most low- and middle-income countries (LMIC) rely significantly on private health expenditure in the form of out-of-pocket payments (OOP) and voluntary health insurance (VHI). This paper assesses VHI expenditure trends in LMIC and explores possible explanations. This illuminates challenges deriving from changes in VHI expenditure as countries aim to progress equitably towards universal health coverage (UHC). Health expenditure data was retrieved from the WHO Global Health Expenditure Database to calculate VHI, OOP and general government health (GGHE) expenditure as a share of total health expenditure (THE) for the period of 1995–2012. A literature analysis offered potential reasons for trends in countries and regions. In 2012, VHI as a percentage of THE (abbreviated as VHI%) was below 1 % in 49 out of 138 LMIC. Twenty-seven countries had no or more than five years of data missing. VHI% ranged from 1 to 5 % in 39 LMIC and was above 5 % in 23 LMIC. There is an upwards average trend in VHI% across all regions. However, increases in VHI% cannot be consistently linked with OOP falling or being redirected into private prepayment. There are various countries which exhibit rising VHI alongside a rise in OOP and fall in GGHE, which is a less desirable path in order to equitably progress towards UHC. Discussion and Conclusion Reasons for the VHI expenditure trends across LMIC include: external influences; government policies on the role of VHI and its regulation; and willingness and ability of the population to enrol in VHI schemes. Many countries have paid insufficient attention to the potentially risky role of VHI for equitable progress towards UHC. Expanding VHI markets bear the risk of increasing fragmentation and inequities. To avoid this, health financing strategies need to be clear regarding the role given to VHI on the path towards UHC. Electronic supplementary material The online version of this article (doi:10.1186/s12939-016-0353-5) contains supplementary material, which is available to authorized users.
<urn:uuid:bf893cd6-b947-4c23-922c-e884808b8e7d>
CC-MAIN-2017-04
http://pubmedcentralcanada.ca/pmcc/solr/reg?pageSize=25&term=author%3A(%22Brown%2C+Elizabeth%22)&sortby=score+desc&filterAuthor=author%3A(%22Pettigrew%2C+Luisa%22)
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282140.72/warc/CC-MAIN-20170116095122-00124-ip-10-171-10-70.ec2.internal.warc.gz
en
0.933861
440
1.664063
2
The funding formula for health care is broken. Alberta’s windfall proves it TheGlobeandMail.com – commentary Oct. 09 2013. Gregory Marchildon and Haizhen Mou, Contributed To The Globe And Mail Parliamentary Budget Officer Jean-Denis Fréchette recently announced that Ottawa’s reform of the Canada Health Transfer (CHT) and spending cuts make federal finances sustainable for the long-term – but possibly at the expense of the provinces. Capping the CHT to the rate of economic growth, it appears, will make provincial finances less sustainable. But this is only one aspect of CHT reform that could negatively impact the provinces. The second, less visible CHT reform – the change to a pure per capita funding formula – will have an even more negative impact on the ability of most provinces to finance necessary health care. As it turns out, only one province – Alberta – will benefit from the new funding formula. In the federal budget of 2007, the Harper government announced that the CHT would be allocated on a strict equal per capita basis beginning in 2014. What this means is that each province will receive a CHT amount according to the size of its population, regardless of the income, demographic, geographic or other conditions of the province. This is significantly different from the current formula which allocates CHT based on both the population share and the income level of the provinces. Although the new CHT formula seems balanced and fair on the surface, it will, in fact, make it much more difficult for some provinces to afford necessary health services given their unavoidably higher cost structures for medicare. Less populous provinces with relatively larger and more isolated rural and remote populations, for example, have to spend more to deliver a similar basket of services relative to more densely populated provinces. Similarly, provinces with a larger proportion of older residents also face higher health care costs. The ‘Big Three’ federal transfers of monies to the provinces presently – the CHT, the Canada Social Transfer (CST), and Equalization – were established to fulfill the national objective of ensuring that core health and social services are made available to all Canadians, an objective that we have entrenched in the Charter of Rights and Freedoms. In theory, the CHT should uphold the five criteria of the Canada Health Act: public administration, comprehensiveness, universality, portability and accessibility of health services – thereby encouraging a sense of common citizenship even if there are differences in how medicare is managed and delivered across the provinces. When combined with a lack of desire to enforce even the minimal criteria under the Canada Health Act, the new formula is money for nothing. In fact, the new formula will take money away from most provinces while delivering an enormous windfall to Alberta. Based on estimates for 2014-15, Alberta will receive $954-million more under the new formula than under the current formula – $235 for every man, woman and child in the province. Every other province will lose money as follows: Ontario, $335-million; British Columbia, $272-million; Quebec, $196-million; Newfoundland, $54-million; Manitoba, $31-million; Saskatchewan, $26-million; Nova Scotia, $23-million; New Brunswick, $18-million; and Prince Edward Island, $3-million. In other words, the government of Alberta is the only winner – a reward perhaps for already running the most expensive provincial health system in Canada? To remedy this, we propose an alternative formula that adjusts for two health care cost drivers over which provincial governments have no control: demographic aging and geographic dispersion. Those provinces and territories with both a more highly dispersed and an older population would receive more CHT. Think about Labrador as well as the northern and rural areas of Manitoba and Saskatchewan. Those provinces with either an extremely young demographic (Alberta) or a highly urbanized population (Ontario) would receive less. Altering the CHT in this way would assist provinces facing unavoidably higher health costs to continue to provide medicare services of roughly comparable quality under the five criteria of the Canada Health Act. In other words, the CHT would again serve a national policy purpose, not automatically dish out money based blindly on a population count. Canadians want to know that their citizenship means something more than being the resident of an individual province. They want to know that they will have access to needed medical services without financial barriers wherever they live in the country. It is time to revisit the original purpose of the CHT. Gregory P. Marchildon is an expert advisor with EvidenceNetwork.ca, and along with Haizhen Mou, teaches in the Johnson-Shoyama Graduate School of Public Policy, an interdisciplinary centre for public policy research, teaching and executive training at the Universities of Regina and Saskatchewan. < http://www.theglobeandmail.com/commentary/the-funding-formula-for-health-care-is-broken-albertas-windfall-proves-it/article14764089/ >
<urn:uuid:e838fd81-ccbd-43ec-8441-3171928c598d>
CC-MAIN-2017-04
http://spon.ca/the-funding-formula-for-health-care-is-broken-albertas-windfall-proves-it/2013/10/17/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00546-ip-10-171-10-70.ec2.internal.warc.gz
en
0.935289
1,049
1.742188
2
speak. Humankind is fearful or disdainful of its dark side, so it denies its dark side. Oftentimes, some elements of humankind feel that it is better to displace its negative feelings onto an outgroup i.e. any group considered to be outsiders by the dominant society. There are others who INVENT a scapegoat or a boogeyman to expain dark or negative occurrences. Yes, many people need a scapegoat or boogeyman to advert negative feelings from themselves, projecting them onto others. What do YOU think?
<urn:uuid:63f815d8-0060-48b2-a26b-9db0867f9041>
CC-MAIN-2017-04
http://hubpages.com/education/forum/112830/it-is-humankinds-nature-to-have-a-scapegoat-or-a-boogeyman--so-to-
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280825.87/warc/CC-MAIN-20170116095120-00208-ip-10-171-10-70.ec2.internal.warc.gz
en
0.939507
110
1.664063
2
The UK and US made a joint commitment to changing the lives of the 1.2 billion poor people in the world today and accelerating progress towards the Millennium Development Goals by 2015. Prime Minister David Cameron and President Barack Obama today made a joint commitment to changing the lives of the 1.2 billion poor people in the world and accelerating progress towards the Millennium Development Goals by 2015. During wide ranging talks they agreed to work together to bring peace and stability to fragile states such as Sudan and Afghanistan. They also agreed to put mechanisms in place to ensure international aid is spent more effectively and accountably. Over the next five years the UK and US will work together to: - prevent stunting and child mortality in 17 million undernourished children, by for example, supplying vitamin supplements through schools - generate $2.8 billion agricultural GDP through research and development activities. For example by supporting research into crops that can survive floods, droughts, rising temperatures and natural disasters - leverage $70 million in private investment to improve market opportunities and links with smallholders, including through DFID’s new Private Sector Department - save the lives of at least 50,000 women in pregnancy and childbirth, by training more midwives in developing countries, for example get more than 5 million girls into primary and secondary school, by for example building schools and training teachers in areas that lack education institutions - help 18 million women to access financial services, by providing micro-loans and other financial support, so they can start up small businesses do more to prevent violence towards women in at least 15 countries, by for example supporting the creation of a UN Women’s agency International Development Secretary Andrew Mitchell said: Combating poverty, disaster and conflict is not just morally right, it is firmly in our national interests. It is also an expression of the fundamental values we share. The UK and US will target investment where it can do the most good and are committed to strengthening our partnership to deliver the best results for the poorest people. The two Governments will also: - work together in fragile states such as Sudan and Afghanistan to build peace and stability, by for example strengthening local policing and judiciary - be even more open, accountable and transparent, putting in place mechanisms such as the UK Aid Transparency Guarantee and the US’s Foreign Assistance Dashboard - Work to strengthen GAVI so that it can save more lives including by providing underused vaccines which could prevent four million childhood deaths by 2015 - continue to call for a global climate deal that limits the increase in temperature to 2 degrees Celsius - increase the incomes of the 1.2 billion of the world’s poorest people who depend on forests for their livelihoods through our partnership with REDD+ (Reducing Emissions from Deforestation and Forest Degradation) Read more in the joint fact sheet
<urn:uuid:166220a9-2c27-48eb-82ab-f5bbb56fc148>
CC-MAIN-2016-44
https://www.gov.uk/government/news/us-and-uk-join-up-on-global-development
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720737.84/warc/CC-MAIN-20161020183840-00220-ip-10-171-6-4.ec2.internal.warc.gz
en
0.942728
582
2.53125
3
Kempsey flood mitigation systems to be reviewedFriday March 15, 2013 - 09:33 EDT In the wake of the recent flood event, the Kempsey Shire Council will today hold three meetings to discuss flood mitigation systems with residents. The first meeting will be at the Belmore River Flood Gates at 9 o'clock this morning, followed by a gathering at the Kinchela Flood Gates Right Bank, and a final meeting at Glenrock Drain. The council's Kathy Oliver says the organisation knows improvements can be made and is keen to hear feedback from locals. "They're important so we can get some feedback from the community, sharing their experiences and what information they want access to so we have an idea what the community is looking for," she said. © ABC 2013 More breaking news A smoke haze across Perth from prescribed burns has prompted an alert from the Department of Parks and Wildlife. It has been more than two weeks since floodwaters inundated parts of Myrtleford in Victoria, but there is still some cleaning up to do. Victoria and Tasmania won't have time to recover from damaging winds this morning, with rain threatening to cause flooding across both states in the next 24 hours.
<urn:uuid:41e5811a-6708-4c58-b03a-73cb97194680>
CC-MAIN-2016-44
http://www.weatherzone.com.au/news/kempsey-flood-mitigation-systems-to-be-reviewed/24024
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718309.70/warc/CC-MAIN-20161020183838-00406-ip-10-171-6-4.ec2.internal.warc.gz
en
0.951231
247
1.570313
2
Typhoon Neoguri weakened from super-typhoon status between Monday night and Tuesday morning in Asia, but still packed winds up to of 110 knots (204 kmh or 126 mph). The storm is expected to weaken as it passes over an island with two active nuclear facilities, and the good news is that despite some alarmist news coverage, the chances of a Fukushima-style crisis appear to be low. The Okinawa island chain, where more than 100,000 people were urged to evacuate to higher ground amid an “emergency warning” and an oil refinery closed, may also be spared the brunt of the storm, which is currently passing between the two southern island chains, according the US Navy’s Joint Typhoon Warning center in Pearl Harbor: That’s not to say the storm isn’t powerful. Okinawa is being lashed by heavy winds and driving rain, according to first-person videos uploaded on Youtube. Schools and businesses are shut and waves over 10 meters high are expected. Further south, the storm’s center also missed the southern Miyako islands, where thousands of people had been urged to relocate out of the way of high waves: The center of the storm is still expected to pass right over the island of Kyushu, though, where there are two active nuclear plants, which have been shut in advance of the storm. Because the plants have been shut down, the typhoon is unlikely to cause any radioactive release, Gregory Jaczko, former chairman of the U.S. Nuclear Regulatory Commission, told Bloomberg. At the point the storm hits Kyushu, the most recent US Navy report shows, the highest winds are expected to be only 60 knots (69 mph), still strong but not unusual for Japan’s typhoon season.
<urn:uuid:ba3cc0b5-d6e7-4f52-aa3f-279f186f57b5>
CC-MAIN-2017-04
https://qz.com/231355/weakening-typhoon-neoguri-still-aims-for-the/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00117-ip-10-171-10-70.ec2.internal.warc.gz
en
0.961991
367
2.203125
2
Preparing Healthy Soil For So you’re ready to venture forward with your new garden? Soil preparation is so important if you want beautiful, healthy plants. After all, the soil is the foundation of the garden. The best composition for your garden is to prepare a near-perfect mixture of silt, sand, and clay. Ideally, you should have a mixture containing 40% sand, 40% silt, and 20% clay. There are several different ways to determine whether your dirt is prepared properly. One method is to compress some of the dirt mixture in your hand. If it crumbles instead of holding its shape, the mixture most likely contains too much sand. If after poking the compressed ball with your finger it doesn’t fall apart very easily, your mixture contains too much clay. If you still can’t determine the proper content of your soil, try separating the ingredients by following these instructions. Place 1-2 cups of the dirt into a jar of water. Shake the container until the soil is suspended and let it set awhile. You should be able to watch it separate into three layers. The top layer is the clay, second is the silt, and the sand will be your third. You should then be able to compare the components of each layer and within your dirt. Remember, it should be 40% sand, 40% silt, and 20% clay. After analyzing the content of your mixture, you may decide that it is low on a certain ingredient. In that case, if you’re dealing with too much sand or silt, it would be best to add some compost or peat moss. If it has too much clay, mix some sand with peat moss. The peat moss, when it is moistened, helps the added ingredient infiltrate into the mixture better. If you just can’t seem to get a proper mixture, you will certainly find products at your local gardening store to help you. The water content of the dirt is another important consideration when preparing for your garden. If your garden is at the bottom of a hill, it is most likely going to absorb way too much water and drown out the plants. If this is the case, you should probably add enough dirt to elevate your garden 4-5 inches above ground to allow for more drainage and less saturation. Another vital part of the preparation process is adding nutrients to the dirt. Most soils contain little or no nutrients naturally, so one or two weeks prior to planting you should add fertilizer to your garden. Mix it into the dirt well and let it set for a while. Once this is done, your soil will be completely ready for planting the seeds. Once the seeds are planted, you should continue to treat the soil. Over the first couple of weeks, the seeds will soak up all the nutrients you added to the dirt; this is necessary for the seeds to sprout into an actual plant. They will continue to need nourishment to flourish; therefore, approximately a week after planting the seeds, add the same amount of fertilizer that you added before they were planted. After this, you should continue to fertilize but not nearly as often. Add just a little bit every couple of weeks and that should be plenty to keep your garden thriving. Basically, the entire preparation process can be summed up into these simple steps: • Ensure the makeup of the dirt is properly prepared for gardening. • Make sure you have adequate drainage in your garden. • Add fertilizer to your garden both before and after the seeds are planted. • Add fertilizer on a regular basis after that. As always, if you need more information on any of these steps, just visit your local nursery and inquire there. Most of the employees there are very knowledgeable and helpful, and will be glad to give you their advice. If you follow these simple steps you’ll soon have plenty of beautiful, healthy plants! Create a garden What is so special about gardening
<urn:uuid:2dd414f3-b848-4970-a72b-ca73c85f3a3d>
CC-MAIN-2017-04
http://www.everyday-wisdom.com/soil.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00359-ip-10-171-10-70.ec2.internal.warc.gz
en
0.932849
816
3.03125
3
Will the government fix its spending crisis or are deficits actually getting worse? "Government spending hit an all-time high for a single month in March, pushing the budget deficit up significantly from the red-ink level of a year ago. In its monthly accounting of the government's books, the Treasury Department reported Wednesday that federal spending totaled $250 billion last month, up 13.7 percent from March 2005. Government receipts also were up, rising 10.6 percent from a year ago, to $164.6 billion. That left a deficit for the month of $85.5 billion, a record imbalance for March."
<urn:uuid:156c356a-edf2-4e34-b15f-044751e10bfe>
CC-MAIN-2022-33
https://www.monex.com/will-the-government-fix-its-spending-crisis-or-are-deficits-actually-getting-worse/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571911.5/warc/CC-MAIN-20220813081639-20220813111639-00470.warc.gz
en
0.941926
127
1.53125
2
Alpha-1 Anti-Trypsin Deficiency Disorder is a genetic condition passed on from parents to their children. Possible outcomes of this condition include serious lung and/or liver disease at various life stages, which may result in the need for oxygen therapy. People with alpha-1 antitrypsin deficiency usually develop the first signs and symptoms of lung disease between ages 20 and 50. A-1 antitrypsin is a protein that is predominantly produced by the liver and is supposed to protect the lungs from an enzyme called neutrophil elastase. Normally, this enzyme digests damaged or ageing cells and bacteria in the lungs and helps to promote healing. However, this enzyme can also attack healthy lung tissue. So, if the body is deficient in its A-1, then the enzyme can damage lung tissue. The interesting thing about A-1 is that the initial and primary diagnosis is usually Emphysema, a disease that normally affects older individuals. Alphas are commonly misdiagnosed with asthma or smoking-related COPD. As the lungs deteriorate, the patient may be diagnosed with asthma, chronic bronchitis, or bronchiectasis. It’s not uncommon for Alphas to acquire lung infections and to experience further lung damage as a result. A-1 is estimated to affect 1 out of every 2,500 people in the USA and it takes an average of 3 doctors 7 years to diagnose the disease. Also, in the USA, there are more than 12 million people diagnosed with COPD and approximate 3% of them are predicted to have A-1. It is also estimated that 20 million people in the US are undetected carriers of the abnormal gene that causes A-1. The number one health tip for someone with A-1 is, if you smoke, STOP! It is also important to avoid pollution, dust, chemicals and ozone. Most doctors recommend flu and pneumonia vaccines annually. They also recommend limiting alcohol intake. And, of course, it’s important to eat a healthy diet and exercise. Treatments for A-1 include “augmentation therapy,” which consists of weekly IV infusions of alpha-1 antitrypsin, drug therapy and organ transplantation.
<urn:uuid:d2f87b43-5407-4434-9225-bf01e65ead43>
CC-MAIN-2017-04
http://www.oxygenconcentratorstore.com/blog/what-is-alpha-1/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00281-ip-10-171-10-70.ec2.internal.warc.gz
en
0.945603
459
3.671875
4
Photography Versus Traditional Photography Photography generally is one of the late 20th century’s state-of-the-art technologies. It’s about half the price of traditional photography, using the results being of equal or higher quality. You waste nothing there is no film needed, and also, since you simply print the images you’ll need, photography is both economical and eco-friendly. Possibly probably the most compelling facet of photography is the thought of showing pictures to individuals wherever they’re, as lengthy as there is a computer and a web connection. Photography is a well-liked hobby, pastime, or perhaps a career for most people. Photography originates a lengthy way since its beginning and it is recognition hasn’t waned. Actually, photography has become much more popular which is gradually replacing film photography, particularly in professional environments. For experienced photographers, the proceed to digital capture brings by using it a substantial learning curve. A camera is, essentially, just a little computer. Display quality differs from camera to camera. The caliber of digital camera models has elevated through the years, yet lots of people feel it is not quite just like a normal camera yet. When you are looking for a camera bear in mind it does not matter how your camera costs, or how large it’s. You are searching for that camera you are pleased with, and that’s what’s most significant. One thing I love about digital camera models is the fact that, unlike film, you are able to reuse the storage media again and again without any expense. Have you ever used a movie camera, you’ll remember how annoying it had been you could only store a couple of pictures around the film, without the opportunity to delete them after they were created. In this way, photography adds another key to photography. It’s no longer just photography, it’s digitally publish-processed photography. Digital age has introduced concerning the finest transformation in photography since photography was invented. Digital and traditional photography are complimentary arts. Both get their particular places within the lives of amateur and photography lovers. The abilities acquired in traditional photography will certainly be forwarded to digital world. You can observe that the field of photography has room for photography and traditional photography. Let us just hope that digital and traditional photographers can enjoy all possible worlds and then produce great work. In the end, photography is simply another tool of modernization within an ever-altering world.
<urn:uuid:a183ec32-c3d5-4132-8e0e-0d8866dd84b2>
CC-MAIN-2022-33
https://rlrugsandfabrics.com/photography-versus-traditional-photography/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00667.warc.gz
en
0.969871
518
2.140625
2
Air Date: Week of November 15, 1996 Author Jane Brox's fifth essay in a series on the seasons at her family farm in Dracut, Massachusetts brings the year full cycle to the autumn apple harvest and the anniversary of her father's death. CURWOOD: During the past year, commentator Jane Brox has taken us on a journey through the seasons on her family's farm in northern Massachusetts. Last winter, she introduced us to her father, who was born when family farms were the norm in the Merrimack Valley. Today, only a few people still work the land. Jane and her father were among them. Just before we aired that story her father, John Brox, passed away. In the spring, Ms. Brox told us what it was like to go through a time of planting, renewal, and hope for the first time without him. At the end of the summer she introduced us to her farm stand, where city folks came to shop and where she longed for the end of the long harvest season. Now, as the long shadows of winter again start to fall over her home, Jane Brox reflects on the long year since her father died, and the changes that have come to her and her farm. BROX: The air no longer smells of fermenting windfall apples. It's clear and cold and a harder light falls on the bare turned branches of the fruit trees. The farm stand is closed tight. Except for a few rows of cabbage, broccoli, and cauliflower, which I could still pick on a warm day, all the fields are in rye. What remains of the vibrant, tight-hearted fall, is the scrape of oak leaves and the small, thin notes of finches as they peck at seed. (Sounds of scribbling) BROX: I work inside at a table set in a west-facing bay window that frames a solitary Baldwin apple tree. It's one of the oldest fruit trees here, planted by the man who built my white farmhouse, who lived a more frugal life than I could imagine, repairing with scrap, insulating with paper, saving string. Baldwins were a standard part of that earlier life, when every family farm had its own orchard and every tree yielded a different variety of apple: Russet, Greening, Winesap, Sheetnose, Ben Davis, Astracan. BROX: A few trees of those varieties still bear on gravelly New England hillsides. Their gray bark trunks have thickened with the years. Their crabbed branches clatter in the winter wind. Commercial apple trees will never look that way again. Most have been cut down and replaced, if not by houses, by dwarf or semi-dwarf trees, which are easier to pick and produce a higher yield per acre. And the old kinds of apples, fallen to market pressures, have been replaced by more uniform, redder varieties: Macintosh and Delicious that everyone knows, crisp bright Macoun, perfect for eating out of hand. BROX: But the Baldwin tree still bears a good crop every other year. This fall its branches almost touched the ground, it was so laden. The fruit slowly turns a brownish red all September, before it deepens to a darker red, with a rusty splay at its stem. Spicy and juicy, long valued for its keeping qualities, I can still make a pie from its fruit in March. Baldwins are slow to ripen and sweeter after the frost, so this tree is one of the last to be picked, and its harvest, late this fall, marked the final turn of the difficult year. (Church music: Ave Maria) BROX: Back at the start, in the clear winter light of my father's funeral, I couldn't even imagine getting this far. BROX: The old farmers hold on a long time, and my father was no different. He had worked so hard to his own dreams and ideas of this place, had for so long alone decided what to grow and where, how to market and to whom. Even in his last months I think he found the necessity to compromise and relent, more difficult than the physical work. Such control doesn't make for easy succession, and there are days, I feel, we're all the more lost for his having held on so stubbornly. BROX: Even so, it may be that very stubbornness that also makes it possible for us to continue. My father had his choices. He could have done other things to greater profit and with less love with his life and this land. Having chosen to continue farming here, he has given us the chance to go on, too. And in the end, however well he may have prepared us, it would never have been enough. Since it's not so much the work we're unprepared for as it is his absence. (Music up and under) CURWOOD: Jane Brox lives in Dracut, Massachusetts. Her latest book, Here and Nowhere Else, won this year's L.L. Winship Pen New England Award. Her essays are produced by Living on Earth's Sandy Tolan. Living on Earth wants to hear from you! P.O. Box 990007 Boston, MA, USA 02199 Donate to Living on Earth! Living on Earth is an independent media program and relies entirely on contributions from listeners and institutions supporting public service. Please donate now to preserve an independent environmental voice. Major funding for Living on Earth is provided by the National Science Foundation. Kendeda Fund, furthering the values that contribute to a healthy planet. The Grantham Foundation for the Protection of the Environment: Committed to protecting and improving the health of the global environment. Contribute to Living on Earth and receive, as our gift to you, an autographed copy of one of Mark Seth Lender's extraordinary hummingbird photographs. Follow the link to see Mark's current collection of photographs.
<urn:uuid:957f7cbf-68e0-4430-96d7-512f7c4f3c37>
CC-MAIN-2017-04
http://www.loe.org/shows/segments.html?programID=96-P13-00046&segmentID=7
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00155-ip-10-171-10-70.ec2.internal.warc.gz
en
0.969701
1,233
1.765625
2
Scientists found that around 20 minutes more sleep was needed by women compared to men – and said this was thought to be because the female brain works harder during the day. The study was carried out on a sample set of 210 middle-aged men and women. “One of the major functions of sleep is to allow the brain to recover and repair itself,” study author Jim Horne, a sleep expert formerly director of the Sleep Research Centre at Loughborough University, told the Mail Online. “During deep sleep, the cortex — the part of the brain responsible for thought memory, language and so on – disengages from the senses and goes into recovery mode.” Prof Horn said the amount of sleep was necessitated by the complexity and intensity of brain activity during the day. He said: “The more of your brain you use during the day, the more of it that needs to recover and, consequently, the more sleep you need. “Women tend to multi-task — they do lots at once and are flexible — and so they use more of their actual brain than men do. Because of that, their sleep need is greater. “The average is 20 minutes more, but some women may need slightly more or less than this.” However, he said men who have complex jobs which involve a lot of “decision-making and lateral thinking” are also likely to need more sleep than the average male. The study also found that poor sleep among women was linked to a number of side effects. Increased levels of psychological distress and greater feelings of hostility, depression, and anger were all found in women who slept poorly, but not men. Make Money Online in Nigeria... Click HERE To Start Now!
<urn:uuid:3cf50b37-e41e-4fb3-8477-393706313fec>
CC-MAIN-2017-04
http://nigeriana.org/food-health/women-need-sleep-men-scientific-research/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00541-ip-10-171-10-70.ec2.internal.warc.gz
en
0.976035
362
3.0625
3
My sister, Bonnie, filled in more information about this image, which was among the photographs of Waipahu in the 1940s posted here yesterday. Bonnie recalls that some of the links my grandparents, Duke and Lani Yonge, had with the area: Yes, the stacks belong to the Waipahu Mill. It was at the top of Depot Road, with the bottom being at Pearl Harbor. The building in the foreground is St. Joseph’s Catholic Church, on the makai/Ewa corner of Depot Road and Farrington Highway. The vacant land you see between the camera and the church, and to the left of the church was once (maybe was then) our grandparents’ property. There was a cane field between the house and the highway, with cane sold to Ewa Plantation. I remember that I questioned why not the mill right in Waipahu. I don’t know whether it was because the folks from Ewa would come and harvest the cane and haul it away, while Waipahu would not, or if Ewa paid a better price, but I do remember asking — so Ewa plantation sticks. Seems strange when the field was in sight of the mill, but … who am I to question??? The school and parking lot for the church now front on the highway. I don’t remember when our grandparents moved to their “new house” up on Farrington Hwy. I am thinking that they moved about 1947. I do remember that our grandparents were the first house after the bridge over the stream on the mauka side, and that they originally owned 4 or 5 house lots. They built on one, or maybe they took up two. They sold one to the Yokono family, who owned the little grocery store in Waipahu where our grandmother alway shopped. The Yokonos were a part of the hui that formed the Star Market chain. The first store was in Waipahu town, on the opposite side of Depot street from the old store and in the block between the highway and the mill. Seems to me like the store in Kahala was another very early store in their chain — but I may not be remembering well. Across Farrington Hwy was the library and the telephone company switch building. Waipahu High School was just Ewa of the phone company, on the corner of Farrington Hwy and the little road that went past the Jones house and down around to where the old house was located behind the Catholic church. Now it connects with Depot Road. I don’t remember that it did 60 years ago. Not far beyond the high school, Kunia Road intersected Farrington Highway. How did I get here? Was just going to tell you that this is a photo showing the back side of the Catholic Church. Oh, and that the priest and our grandfather were drinking buddies! He was, after all, raised Catholic, even though he was never a practicing Catholic as an adult.
<urn:uuid:d2397f7f-fea6-443a-af7f-bdee92fb9129>
CC-MAIN-2017-04
http://www.ilind.net/2013/02/04/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00363-ip-10-171-10-70.ec2.internal.warc.gz
en
0.984558
618
1.914063
2
Mass and Energy Imbalance in problems with DPM When you check mass balance or energy balance in the : Report -> Fluxes panel for a problem where Discret phase is coupled to the gas phase, the user will get an uneven balance. In DPM problems, the Report -> Fluxes panel will always give an uneven mass balance and energy balance. The energy imbalance being only for cases with combustion or heat transfer from the particles to the gas phase. In this case the user should go to the Report -> Volume integral -> sum -> Discrete Phase Model, then calculate the sum for: DPM mass source DPM enthalpy source the DPM mass source sum should be algebraically equal to the mass imbalance in the Report->flux panel the DPM enthalpy source sun should be algebraically equal to the energy imbalance in the Report->flux panel Of course, this happens at convergence. For large combustion problems, this energy balance can take longer to achieve and is a better indication of convergence than only relying on residuals.
<urn:uuid:52f039db-4774-450d-bb4e-48d2098b3536>
CC-MAIN-2017-04
http://www.eureka.im/526.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00076-ip-10-171-10-70.ec2.internal.warc.gz
en
0.845952
218
1.953125
2
Worrying about meeting your mortgage payments and the possibility of default is a gloomy situation, compounded by the high levels of foreclosures across the country. Proactive steps need to be taken early to avoid default which can lead to serious consequences. Temporary financial problems are easier to deal with than long term prospects of mortgage difficulties, resulting from unemployment or illness, but both can be approached in similar ways. The first step is to make an immediate assessment of your overall financial picture. Cutting back on all unnecessary expenditure and prioritising the mortgage payment over any unsecured debt is necessary. Whilst this may provide temporary relief it may not suffice long term unless income is increased as well. A very viable option is renting a room in your home for additional income which could be used to lessen the mortgage burden. Other ways to increase income should be explored, as the key to managing debt is to reduce expenditure and increase income. Savings can be also be utilized to cover mortgage payments. If you are unable to tackle the problem in this way it is imperative to contact your lender and discuss options before you miss a mortgage payment. It is important to remember that defaults which lead to foreclosures are a costly business for the lender. The mortgage issuer is better served by working with you to find a solution. They are far more likely to be willing to do so if you approach them early and in a professional manner. Lenders may be willing to discuss temporary solutions such as loan modification or forbearance. Options to take a payment holiday or extend the term of your mortgage exist. A simple way to reduce the payments is to ask your mortgage lender to reduce the interest rate on your mortgage if that would make the prospect of default loss likely. If they are unwilling to do so then mortgage refinancing is an option to reduce your interest rate and secure lower payments, but it is an expensive option which may be avoidable if you can negotiate successfully with the lender. If you have equity in the property is worth considering selling the home and either downsizing or renting until your finances improve. This option protects your equity which would be significantly reduced if foreclosure was the outcome of defaulting on your payments. Unfortunately those with negative equity will not benefit from this and have little prospect of securing a refinancing, thus leaving loan modification their best option. There are solutions available which can prevent you defaulting on your mortgage but they involve putting an effort in. The one course of action which should never be pursued is ignoring the problem or your mortgage lender.
<urn:uuid:9a6f79f7-98da-4f7b-bd26-c3391b27e1e1>
CC-MAIN-2022-33
https://indiantiger.org/ways-to-avoid-defaulting-on-your-mortgage/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00669.warc.gz
en
0.959473
508
1.601563
2
Once upon a time, there lived a mechanical engineer who pondered a question that has bothered intelligent, curious children for years. Namely, what qualities would the glass in Cinderella's slippers need to have in order for her to walk and dance comfortably (and hold her weight)? Once upon a time, there lived a mechanical engineer who pondered a question that has bothered intelligent, curious children for years. Namely, what qualities would the glass in Cinderella’s slippers need to have in order for her to walk and dance comfortably (and hold her weight)? Yes, that was a question answered by one Antariksh Bothale, a BTech and MTech in Mechanical Engineering, on question and answer site Quora this week. “It is delightful to have my masters degree in Mechanical Engineering put to use in resolving age old engineering problems,” wrote Bothale before giving a thorough mathematical breakdown of the problem. The question made me smile because it’s one I used to ask my parents all the time. After all… the risks seemed huge! What if the glass broke and sliced through her feet? It seemed like such a ridiculous choice of footwear. “They were MAGIC glass slipers” my mother used to say, exasperated by my relentless story hole poking. But that just didn’t cut it for me. Bothale’s answer, however, does. “Whenever we design something that needs to bear force, we test for various possible modes of failure and try to ensure that our object is strong against all of them,” he writes before undertaking an analysis of the compressive stress on the slippers arising from Cinderella's weight which he estimates at around 50kgs. “I mean, her cousins were fat and ugly, so we have to leave them some room on the top, right?” he jokes. Bothale starts by assuming Cinderella’s weight can be applied uniformly across her shoe, and roughly estimates her foot size and overall foot area at A = 0.015m squared. If 50 kgs of weight were to be applied uniformly across this area, Bothale calculates that the compressive stress developed in the material would be: Turns out it’s good news for Cinderella and fairy tale purists alike then, because Bothale writes that the Yield strength of ordinary glass for compressive stress is approximately, which is three orders of magnitude more than what Cinderella's weight can produce. Perfect. Or maybe not quite yet, because Cinderella doesn’t just stand there looking pretty in her glass slippers, she actually has to walk around and dance, and that, points out Bothale, could lead to more compressive stress due to the bending moment applied to her heel every time she walks. For simplicity’s sake, Bothale makes a couple of assumptions. He gives Cinderella’s heel a diameter of 2cm and a length of 6cm from the tip to the point where it joins the rest of the shoe. He then assumes her stepping angle to be about 30°, which would mean that only half of her weight would act in the normal direction to the heel. Plugging those numbers into his equation, Bothale calculates the maximum bending stress in the heel to a max of 19MPa, which he says is “dangerously close” to the critical stress level of 50MPa. “Even if we make a few more allowances by making the heel thicker or the stepping angle smaller, we cannot let our little princess veer so dangerously close to disaster,” he writes. And so, Bothale recommends using thermal toughened safety glass, with its yield strength of 200MPa and a higher Young’s Modulus. Even when the clock strikes midnight and Cinderella has to hightail it to her pumpkin carriage in those glass heels, increasing the impact force three to five times that of regular walking, Bothale calculates her dress would likely prevent her from making long strides, keeping her stepping angle within safe limits and ensuring the shoes don’t shatter. Though he does say the princess to be would be “well-advised to develop a toe-first foot strike, which would totally solve the problem.” I don’t know about happily ever after, but Bothale’s attempt at solving the glass slipper conundrum certainly made my day. What theoretical fairy tale problems would you like to see solved through engineering? Let us know in the comments section below.
<urn:uuid:c6ce0351-fbac-443a-932c-0ac4318954ad>
CC-MAIN-2016-44
http://www.eetimes.com/author.asp?section_id=28&doc_id=1286655&piddl_msgorder=
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719646.50/warc/CC-MAIN-20161020183839-00126-ip-10-171-6-4.ec2.internal.warc.gz
en
0.963317
934
2.578125
3
An agreed plan establishing, in numerical or financial terms, the policy to be pusued and the anticipatted outcomes of that policy. 1 of 3 Benefit Of Using Budgets: - They provide direction an co-ordination: spending is geared toward the aims of the business rather than those of the individual. It will be easier for the workforce to understand the fairness of the allocations or targets. - They motivate staff: According to Mayo and Herzberg, teams and individuals are encouraged by the responsibility and and the recognition gained from meeting budget targets. Some companies link rewards to the achievement of targets in a budget. 2 of 3 Disadvantages Of Using Budgets: - They are difficult to monitor fairly: Senior managers will be less aware of detailed expenditure and costs, so they may have to rely on the hinesty of the budget holder in explaining a department or sections budgeting needs. - Allocations may be incorrect: Budgeting is based on predictions on future events. 3 of 3 Similar Business Studies resources:
<urn:uuid:616870f1-053d-4e98-b812-365ba63ea0bd>
CC-MAIN-2016-44
https://getrevising.co.uk/revision-cards/business_studies_65
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720845.92/warc/CC-MAIN-20161020183840-00085-ip-10-171-6-4.ec2.internal.warc.gz
en
0.933056
213
3.234375
3
While the Senate labors over climate change legislation, corporations including IBM and Wal-Mart are attempting to make sense of what it actually means to retool for a more energy-efficient economy. That starts with an understanding of how a product's carbon emissions can be traced through an often lengthy supply chain. IBM told the New York Times that it will start requiring its network of 28,000 suppliers to install management systems to track data on energy use, greenhouse gas emissions, waste, and recycling. Subcontactors must do the same if their products or services make up a significant portion of IBM's supply chain. Additionally, the company is asking that suppliers establish specific environmental goals and publicly disclose results. Wayne Balta, IBM's VP of corporate environmental affairs and public safety, told the company's Smarter Planet blog that IBM's immense purchasing power significantly impacts environmental policies in the 90 countries it sources from. He said the company began working with suppliers in environmental management as early as the 1970s. While IBM is not imposing specific numerical targets for suppliers, it is attempting to institutionalize data-gathering systems. The system helps "suppliers build their own capacity in a way that's not only good for the environment but their business," Balta told the Times. "It's about creating a system that works regardless of who is in leadership and what's in green vogue." IBM's announcement comes after Wal-Mart's decision in February to require its more than 100,000 suppliers to answer a questionnaire about their carbon footprints. This marks the first steps in an initiative to get suppliers to cut greenhouse gas emissions, save energy, and reduce water consumption. According to Wal-Mart CEO Mike Duke, this would amount to a reduction of 20 million metric tons of greenhouse gas emissions by the end of 2015--one-and-a-half times the company's project carbon footprint growth over the next five years. Wal-Mart, long the bane of environmentalists and corporate social responsibility activists, has been attempting to change its image with initiatives like a supplier packaging scorecard and big moves into the organic foods market. Does IBM's initiative have a slight whiff of corporate greenwashing? As the environmental blog Treehugger notes, IBM's are just "baby steps...no dates, and no numbers, means this could be simply a lot of lip service and not much action." John Paterson, IBM's vice president for global supply and chief procurement officer, has already acknowledged that the biggest challenge will be working with suppliers in emerging markets like China, Brazil, and India, where sustainability is not as big an issue and where IBM spends a third of its supply chain budget. As Swedish furniture giant IKEA famously learned when its suppliers in India used child labor to make carpets, transparency is not always easy.
<urn:uuid:5ace5342-5eac-44ec-bade-de1a481c0efe>
CC-MAIN-2017-04
http://www.theatlantic.com/personal/archive/2010/04/greening-ibms-supply-chain/39079/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281069.89/warc/CC-MAIN-20170116095121-00267-ip-10-171-10-70.ec2.internal.warc.gz
en
0.952516
570
2.671875
3
A tax audit is an examination of your tax return by the IRS to verify that your income and deductions are accurate. A tax audit is when the IRS decides to examine your tax return a little more closely and verify that your income and deductions are accurate. Typically, your tax return is chosen for audit when something you have entered on your return is out of the ordinary. There are three main types of IRS audits: the mail audit, the office audit and the field audit. No matter what type of audit the IRS decides to conduct, you will receive notification of it by mail. A mail audit is the simplest type of IRS examination and does not require you to meet with an auditor in person. Typically, the IRS requests additional documentation to substantiate various items you report on your tax return. For example, if you claim $10,000 in charitable deductions, the IRS may send you a letter requesting proof of your donations. Generally, submitting sufficient proof will conclude the audit in your favor if the IRS is satisfied. An office audit is an in-person audit conducted at a local IRS office. These audits are typically more in-depth than mail audits and usually include questioning by an audit officer about information on your return. You will be asked to bring specific information to an office audit, such as the books and records for your business or your personal bank statements and receipts. You also have the right to bring an accountant or lawyer to represent you at these meetings. The field audit is the broadest type of examination that the IRS conducts. In these cases, an IRS agent will conduct the audit at your home or place of business. Generally, field audits are conducted when the IRS is questioning more than just a deduction or two. A field audit is generally very thorough and will cover many, if not all, items on your return. Possible outcomes of an audit There are three possible outcomes of an IRS audit. If the IRS is satisfied with your explanations and the documentation you provide, then it will not change anything on your tax return. If the IRS proposes changes to your tax return, you can either agree and accept the changes or challenge the agent's assessment. If you agree, you will sign an examination report or other form provided by the IRS and establish some type of payment arrangement. If you disagree with the findings, you can set up a conference with an IRS manager to further review your case or you can request a formal appeals conference. TurboTax has you covered When you prepare your taxes with TurboTax, you automatically receive our Audit Support Center, which will help you understand why the IRS contacted you and how you should respond. For an additional fee, we also offer the added protection of Audit Defense, which provides you with professional representation in the case of an audit – you’ll never have to speak to the IRS if you don’t want to. Get every deduction TurboTax Deluxe searches more than 350 tax deductions and credits so you get your maximum refund, guaranteed.
<urn:uuid:90f4597b-6c12-4862-b2ca-26b411ee1409>
CC-MAIN-2016-44
https://turbotax.intuit.com/tax-tools/tax-tips/Taxes-101/What-Are-Tax-Audits-/INF14396.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719784.62/warc/CC-MAIN-20161020183839-00426-ip-10-171-6-4.ec2.internal.warc.gz
en
0.945405
608
2.6875
3
Beverly Johnson made history as the first Black supermodel to grace the cover of Vogue in the 1970s, and went on to write “The Face That Changed It All: A Memoir.” Now, she is fighting for equality and representation in the fashion industry, and recently penned a powerful op-ed about racism for The Washington Post. “Extra’s” Cheslie Kryst caught up with Beverly, who said she was prompted to write her op-ed after Vogue’s Anna Wintour sent an internal email to apologize for not doing more to elevate Black voices and for publishing items that were racially and culturally “hurtful or intolerant.” Addressing Wintour’s comments, Johnson said, “I was just surprised that there must have been a lot of pressure in order for her to write that, and I think that it really opened up the conversation in a lot of different industries who are addressing the problem of systemic racism in their industry.” Hoping she can elicit change now, she added, “The things in the op-ed are things I have been saying my entire career, the whole 50 years… People are listening to what we are saying and believing what we are saying, so I think this was the time.” Johnson’s business and romantic partner, Brian Maillian, helped her conceive a new initiative for the fashion, beauty, and media industries called the Beverly Johnson Rule. “I wanted to do something in the way that was actionable… That rule is for an opening that two Black professionals should be interviewed and not only be interviewed for a model, but for the board of directors, the C suites, the executives. We want to be in the room, and I think maybe this rule will get people to do just that.” While she graced the cover of Vogue in 1974, Johnson feels that African-American models are still not on equal ground. “We’re not paid for it. We take one step forward and five back,” she said. “It really hasn’t changed very much. I mentor a number of young models, and what they are complaining about are the same things I was complaining about.” As for what she would say to Anna Wintour if they spoke face-to-face, Johnson replied, “’Why don’t you put the Beverly Johnson Rule as part of a mandate at Condé Nast and give two black professionals the opportunity to interview for any open positions?’ And I would state what the Rooney Rule did in the NFL, and [that] it’s also been instituted in the Writers Guild, so there is some evidence that it works. So that is what I would say to her.” The Rooney Rule requires underrepresented minorities to be interviewed for head coaching and senior football operation jobs.
<urn:uuid:e75256bf-9c5e-485e-9610-5f08b7466d77>
CC-MAIN-2022-33
https://atlantadailyworld.com/2021/01/31/beverly-johnsons-message-for-vogues-anna-wintour/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00070.warc.gz
en
0.976707
610
1.96875
2
Tag: sodium thiopental The Supreme Court tonight vacated the stay of execution an Arizona federal judge issued yesterday in the case of Jeffrey Landrigan. Landrigan was scheduled to be executed this morning using sodium thiopental that was manufactured by a company outside the U.S. which was not an FDA approved manufacturer of the drug. Arizona appealed to the 9th Circuit, did not prevail, and the matter was referred to the full court later today. Justices Kagan, Sotomayor, and Bryer would have denied the state's request and kept the stay in place. Arizona authorities are preparing the execution chamber now, so they can kill him within the 34 hour period set by the death warrant. Here's what the order says (received by email, no link): [More...] (8 comments, 384 words in story) There's More :: Permalink :: Comments Last week we wrote about the impending Arizona execution of Jeffrey Landrigan. Landrigan alleged that the sodium thiopental Arizona planned to inject into Landrigan was not made by Hospira, Inc., the one U.S. company authorized to manufacture it. In other words, it came from a foreign source. He sought a stay and an order compelling the state to disclose the origin of the drug. The Arizona Supreme Court denied both requests. With only 18 hours left before the execution, a federal judge today granted Landrigan a stay and ordered Arizona to immediately disclose the source of the drug. The court's 19 page ruling is here. According to the Arizona Republic, the drug came comes from Great Britain. [More...] (1 comment, 604 words in story) There's More :: Permalink :: Comments Update: The Arizona Supreme Court has denied the requests for a stay of execution and to produce information about the drug's origin. The ruling is here. At a court hearing in Arizona today to stay the execution of Jeffrey Landrigan set for next Tuesday, the Arizona Attorney General admitted that the sodium thiopental it planned to inject into Landrigan was not made by Hospira, Inc., the one U.S. company authorized to manufacture it. In other words, it came from a foreign source. His lawyers argue that using the drug sodium thiopental that has expired or was obtained from an unreliable source may not work correctly, potentially subjecting Landrigan to cruel and unusual punishment through death by suffocation. They want the Supreme Court to order the state to disclose the source of the drug..... prosecutors said they can’t identify the source because state law requires confidentiality for those involved with executions. But, the prosecutor did acknowledge it didn't come from Hospira, which isn't currently producing the drug. And no other U.S. company is authorized to manufacture it. [More...] (3 comments, 306 words in story) There's More :: Permalink :: Comments
<urn:uuid:39f4fb99-c798-4e97-94d3-d4c4f19db04a>
CC-MAIN-2017-04
http://www.talkleft.com/tag/sodium%20thiopental
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284352.26/warc/CC-MAIN-20170116095124-00194-ip-10-171-10-70.ec2.internal.warc.gz
en
0.965554
589
1.5625
2
Send the link below via email or IMCopy Present to your audienceStart remote presentation - Invited audience members will follow you as you navigate and present - People invited to a presentation do not need a Prezi account - This link expires 10 minutes after you close the presentation - A maximum of 30 users can follow your presentation - Learn more about this feature in our knowledge base article Do you really want to delete this prezi? Neither you, nor the coeditors you shared it with will be able to recover it again. Make your likes visible on Facebook? You can change this under Settings & Account at any time. list of literary devices in macbeth Transcript of list of literary devices in macbeth "All hail, Macbeth, hail to thee thane of Cawdor. All hail, Macbeth, that shalt be King hereafter. The witches have prophesied that Macbeth will be Thane of Cawdor and a King. They just wanted to put a that desire in him so he acts upon, and since witches are suppose to be supernatural we believe that this is what is going to happen in the story. Similie Comparison between unlike things using like, as, or as though 1.3 "Into the air, and what seemed corporal melted As breath into the wind." The witches have just vanished when Macbeth tried to question them farther. The witches what seemed to him just vanished into thin air. 1.3 "And make my seated heart knock at my ribs." Macbeth is worried and nervous and a little exited about being a king and what has to be done to become a King. He is afraid to kill King Duncan Metaphor A comparison in which one thing is said to be another. Rhyme Rhymed words at the end of the lines. Allusion A reference to to a person, event or place, real or fiction. Can be drawn from history, geography, literature or religion. Blank Verse A verse that has no rhymes at the end of the lines. Tragic Flaw A certain quality in the carachter that causes his own fall and ends in tragedy. 4.2 "He cannot buckle his distemper'd cause Within the belt of rule" This means that King Macbeth could not control his temper and follow the rules of playing fair to stay a King. 3.4 "And keep the natural ruby of your cheeks, When mine is blanched with fear." Macbeth is fearful of ghost that appeared to him during the feast. He is so scared that he turned white, while other people are not scared because they can't see the ghost they have natural red cheeks. 4.1 O well done! I commend your pains; And every one shall share i' the gains; And now about the cauldron sing, Live elves and fairies in a ring, Enchanting all that you put in. The main witch is talking to the rest of the witches about how well they have done and soon they will get what they deserved. "Toad, that under cold stone Days and nights has thirty-one" Instead of saying that toad has thirty-one days the witch says "days and nights has thirty one". She mixed the usual order of words. 1.2 "Except they meant to bathe in reeking wounds, Or memorise another Golgotha" During the battle When Macbeth was defeating the other side they gave them lots of wounds and and made that day for them to be like Golgotha, were Jesus had the worst agony in the world. "Scale of dragon, tooth of wolf, Witches' mummy, maw and gulf Of the ravin'd salt-sea shark, Root of hemlock digg'd i' the dark, Liver of blaspheming Jew, Gall of goat, and slips of yew Silver'd in the moon's eclipse, Nose of Turk and Tartar's lips" These lines have kind of a marhing beat to them. They were made like that to sound enchanting since witches are doing their "magical" work making a potion, and it sounds like they are putting a spell on it. 2.2 "Whence is that knocking? How is't with me, when every noise appals me? What hands are here? ha! they pluck out mine eyes. Will all great Neptune's ocean wash this blood Clean from my hand? No, this my hand will rather The multitudinous seas in incarnadine, Making the green one red." Macbeth is scared of every noise after he killed King Duncan. And this verse has no rhymes at the end of the lines because he has done something bad and now his lines are not going the way they are supose to. 5.8 "We shall not spend a large expense of time Before we reckon with your several loves, And make us even with you. My thanes and kinsmen, Henceforth be earls, the first that ever Scotland In such an honour named. What's more to do, Which would be planted newly with the time, As calling home our exiled friends abroad That fled the snares of watchful tyranny; Producing forth the cruel ministers Of this dead butcher and his fiend-like queen, Who, as 'tis thought, by self and violent hands Took off her life; this, and what needful else That calls upon us, by the grace of Grace, We will perform in measure, time and place: So, thanks to all at once and to each one, Whom we invite to see us crown'd at Scone." Malcolm is saying that the bad King has been punished and the Queen took her own life. Now they will do their best with the help of God to bring their country back to order. And new King will be crowned. What thou art promised: yet do I fear thy nature; It is too full o' the milk of human kindness To catch the nearest way: thou wouldst be great; Art not without ambition, but without The illness should attend it: what thou wouldst highly, That wouldst thou holily; wouldst not play false, And yet wouldst wrongly win: thou'ldst have, great Glamis, That which cries 'Thus thou must do, if thou have it; And that which rather thou dost fear to do Than wishest should be undone.' Hie thee hither, That I may pour my spirits in thine ear; And chastise with the valour of my tongue All that impedes thee from the golden round, Which fate and metaphysical aid doth seem To have thee crown'd withal. The flaw of Macbeth was that he was unsure of what is the right thing to do, or what is it exactly he wants to do. It is very easy to change his mind because he is very indecisive. And in this poem Lady Macbeth is ready to take advantage of his indecisiveness and push him to do murder. Soliloquy A speech of a character to show what is on his/her mind "Is this a dagger which I see before me, The handle toward my hand? Come, let me clutch thee. I have thee not, and yet I see thee still. Art thou not, fatal vision, sensible To feeling as to sight? or art thou but A dagger of the mind, a false creation, Proceeding from the heat-oppressed brain? I see thee yet, in form as palpable As this which now I draw. Thou marshall'st me the way that I was going; And such an instrument I was to use. Mine eyes are made the fools o' the other senses, Or else worth all the rest; I see thee still, And on thy blade and dudgeon gouts of blood, Which was not so before. There's no such thing: It is the bloody business which informs Thus to mine eyes. Now o'er the one halfworld Nature seems dead, and wicked dreams abuse The curtain'd sleep; witchcraft celebrates Pale Hecate's offerings, and wither'd murder, Alarum'd by his sentinel, the wolf, Whose howl's his watch, thus with his stealthy pace. With Tarquin's ravishing strides, towards his design Moves like a ghost. Thou sure and firm-set earth, Hear not my steps, which way they walk, for fear Thy very stones prate of my whereabout, And take the present horror from the time, Which now suits with it. Whiles I threat, he lives: Words to the heat of deeds too cold breath gives. A bell rings I go, and it is done; the bell invites me. Hear it not, Duncan; for it is a knell That summons thee to heaven or to hell. Macbeth is talking to himself before he killed King Duncan. He tries to reason with himself and make himself feel less guilty about deed that is to be done. Aside Words spoken by an actor to be heard only by the audience. Cannot be ill, cannot be good: if ill, Why hath it given me earnest of success, Commencing in a truth? I am thane of Cawdor: If good, why do I yield to that suggestion Whose horrid image doth unfix my hair And make my seated heart knock at my ribs, Against the use of nature? Present fears Are less than horrible imaginings: My thought, whose murder yet is but fantastical, Shakes so my single state of man that function Is smother'd in surmise, and nothing is But what is not. Macbeth is talking to himself while having a conversation with Banquo and Angus about his newborn secret desire to kill the King.
<urn:uuid:569593eb-0fb2-42e3-a749-8673702d7d22>
CC-MAIN-2017-04
https://prezi.com/jjqsfwda1tdg/list-of-literary-devices-in-macbeth/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00372-ip-10-171-10-70.ec2.internal.warc.gz
en
0.961298
2,139
2.9375
3
The Hyperledger project is bearing fruits. Two participating companies in the Hyperledger Project, IBM and Bank of Tokyo-Mitsubishi UFJ have signed a contract to develop and use blockchain technology. A press release in this regard, issued by IBM, states that both the companies will be working together on automating inter-business transactions from next year. The project, built on Hyperledger Project Fabric – a Linux Foundation initiative will be implemented on a pilot scale for a period of one year. Based on the success of the jointly developed blockchain prototype built on IBM Cloud, they may offer it to other businesses in the future. The press release further stated that the smart contracts based blockchain application can drastically improve efficiency and accountability of service level agreements in multi-party transactions while allowing automation of the involved processes. During the pilot phase, both IBM and Bank of Tokyo-Mitsubishi UFJ will be constantly monitoring the delivery and usage of equipment. All reports are expected to be recorded on the blockchain for increased transparency. The growing interest in blockchain technology among mainstream banking and financial institutions is a well-known fact. There are multiple consortiums working on developing solutions that can be integrated
<urn:uuid:2036a5d8-92f4-4a37-bf0e-fd1cce430c6f>
CC-MAIN-2017-04
http://thebitcoinnews.com/ibm-and-bank-of-tokyo-mitsubishi-ufj-collaborate-on-hyperledger-based-pilot/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280761.39/warc/CC-MAIN-20170116095120-00096-ip-10-171-10-70.ec2.internal.warc.gz
en
0.935982
243
1.828125
2
The Light Box Over the course of previs, the filmmakers recognized a number of other obstacles that would have to be addressed. In some cases, technology had to catch up with the ambitions of the filmmakers for how they wanted to tell the story. One pioneering invention was the brainchild of Lubezki and Webber: the Light Box. Lubezki notes, "We had to solve a very complicated lighting situation, which became clear during previs. Once we determined how the lights would affect the faces of the characters in the computer, we had to be able to match it in order to composite the live action and animation perfectly. I needed lights that could move fast and change colors in an instant." As often happens, inspiration struck where Lubezki least expected it. He recounts, "I was at a concert and noticed that the lighting director had cleverly used LEDs to create beautiful lighting effects and projections. I got very excited because I knew that could be the answer for us. The next day I called Alfonso and said, 'I think I've found a way to light the movie.'" Lubezki contacted Webber and they started doing tests, which, the cinematographer admits, were far from perfect. "There were glitches we had to sort out, like flicker and color hue aberrations. I have to say, it was Tim who came up with solutions to all the problems and brought the whole idea to life. Then Manex Efrem and his special effects guys built the box based on the specifications of what Tim and I needed. It was a true team effort. And when the Light Box came together, I knew it was not only going to be the way I could light 'Gravity,' but would impact the way I light movies for years to come." Standing on Stage R at London's Shepperton Studios, the finished Light Box was constructed on a raised platform and stood over 20 feet tall and 10 feet wide. On one side, steps led up to the sliding door that accessed the interior, and on the other was a gantry that connected the structure to its own "mission control" -- VFX technicians positioned at a bank of computers. The glow from the monitors was the only illumination, apart from the Light Box itself, permitted on the soundstage. "It's quite a feat of geometry," Efrem describes. "We built it so they could change the shape: bring in the walls, bring the ceiling down or change the configuration of the floor. Some of the individual panels were also hinged to allow them to open and close." The interior of the box was comprised of 196 panels, each measuring approximately two feet by two feet and fitted with 4,096 LED bulbs, which could cast whatever light or colors were needed and alter them at any speed. Webber expounds, "They essentially worked like the pixels on a TV screen or a computer monitor. The terrific thing about the Light Box was that it didn't just give us the ability to make lighting adjustments in a way that would be physically impossible otherwise, it enabled us to add a huge amount of complexity to the lighting, with subtle variations to both color and The added advantage was that any image could be projected onto the walls, whether the planet Earth, the International Space Station (ISS) or the distant stars, "giving the actor the perspective of what their character was seeing," Webber continues. "It was primarily so we could reflect the appropriate light on them, but it had the double benefit of being a visual reference for them, too." The filmmakers had to take into consideration where characters were in relation to the globe in determining the shade and brightness of the Earth's bounce light. Cuaron says, "As much as possible, we tried to follow a course that made sense in terms of sunrises and sunsets and day into night, as well as the different environments -- from the blueness of the Pacific, to the concentration of city lights, to the northern lights over the Arctic. We cheated a bit because we wanted to create an eloquent voyage that captures the breathtaking beauty of our planet." Fortunately, as Webber relates, they had the best possible reference material. "We were very lucky that NASA was willing to share much of the information they've gathered, particularly in the form of photographs and film footage. Astronauts actually make very good photographers; we got some truly stunning images. We would look at the time lapse shots they did from the ISS and say, 'Gosh, if we did something like that, no one would believe it was real.' It was just so amazing." Bullock offers, "What blew me away is how they are able to show this world of ours to the viewer. I'd never seen it like that before and felt guilty that I had never appreciated it as much as I do now." The actress spent many days within the confines of the Light Box, which Cuaron says, in some ways, mirrored the solitude of her character. "She was essentially on her own inside this cube, secluded from the rest of the people on the set, with projections of the Sun and the Moon and planet Earth rotating around her. It was interesting because we had been concerned about how long we were going to be isolating her, but Sandra applied that creatively and was able to convey some of her own experience at that point." "There was no human connection, other than the voices coming through my little earwig, which helped because it made me feel so alone," Bullock attests. "I'm glad it was done the way it was done, as whenever I started to become frustrated or lonely or at a loss, I was like, 'just use it...use it.'" Next Production Note Section Home | Theaters | Video | TV Your Comments and Suggestions are Always Welcome. © 2017 6®, All Rights Reserved.
<urn:uuid:b1694ee8-393e-4303-a31c-3df72c986074>
CC-MAIN-2017-04
http://www.cinemareview.com/production.asp?prodid=16825
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00142-ip-10-171-10-70.ec2.internal.warc.gz
en
0.978675
1,269
1.703125
2
P28 - High Protein Spread Peanut - 16 oz. (1 lb.) (453g) The original P28 High Protein Peanut Butter Spread is made with the highest quality Whey Protein and Dry Roasted Peanuts. The High Protein Peanut Butter spread is the perfect nutrient-rich addition to P28 Bread, Bagels, and Flat Bread. Peanut Butter is a good source of Fiber, Protein, and Vitamins B3 and E. It's been known that poly-and monounsaturated fats in peanut butter can lower your risk of developing heart disease and Type 2 diabetes. - 14g Protein Per Serving - Made with Natural Ingredients - Made with Whey Isolate - Gluten Free - 0 Trans Fat - Cholestrol Free Whey Isolate Benefits: Whey Isolate is superior to all other forms of protein. It provides the body with the perfect Amino Acid profile for building, strengthening, and repairing muscle. Whey protein is the fastest absorbing type of protein available. It is perfect for when you wake up and for your post work out nutrition. At these times, your body is at its most catabolic state, and desperately needs the protein. Why not use the best possible protein available? Whey Protein helps: - Build lean muscle mass - Decrease recovery time - Increase metabolic rate (which in tune helps burn body fat) Frequently Asked Questions How do I properly store the P28 Spreads? It is recommended that you store P28 Spreads at room temperature. Refrigeration/freezing is not recommended. The Spreads will stay fresh for 1 year. What is the shelf life of the P28 Spreads? P28 Spreads last up to 1 year! Why do I need protein? Protein is an important nutrient needed by everyone on a daily basis. It is made up of essential and non-essential amino acids, which are the "building blocks" for healthy bodies. Protein has a number of different roles in the body including the following: Repair body cells. Build and repair muscle and bones. Provide a source of energy. Control many of the important processes in the body related to metabolism. What is whey protein isolate? Whey Protein Isolate (WPI) is when the whey protein is filtered to remove any lactose, fat, and carbohydrates from the original protein. It is a by-product of cheese manufactured from cow's milk. Whey protein is the best protein you can get whether you want to build muscle, lose weight, and to get healthy. Is whey protein good for athletes and those who exercise? Whey protein is a high quality, complete protein and a rich source of branched chain amino acids and essential amino acids. These are important for individuals who are involved in sports, exercise, or do resistance training. The requirement for branched chain amino acids increases during exercise as they are taken up directly by the skeletal muscles versus first being metabolized through the liver, like other amino acids. Low levels of branched chain amino acids may contribute to fatigue and they should be replaced within 2 hours or less following exercise. Many athletes often take one-half of their whey protein drink before exercise to help optimize their workout. Whey protein also helps to repair and rebuild lean muscle tissue that is broken down by exercise. P28 was developed by three brothers in the bakery business, with the help of their personal trainer/nutritionist. The three of them were overweight and out of shape. They wanted to lose weight and get back into shape quickly. The first thing they did was join a local gym. Their personal trainer sat them down before they started their workout program and explained that nutrition was just as important as working out. They started working out regularly and made some changes in their diets. After months in the gym, they were not seeing the results they expected. They soon realized that exercising alone wasn’t enough. They began to understand their trainer’s beliefs of how important proper nutrition was in their diets in order to reach their fitness goals. Growing up in the baking business, one thing they didn’t want to give up was bread. They wanted to develop a healthy line of bread products that not only helped them reach their fitness goals, but also was enjoyable to eat every day. They wanted someone with fitness and nutrition experience involved with the development of their products. Their personal trainer who is an experienced all natural body builder/nutritionist was their first choice. Once he heard about their idea while they were training, he was excited to become a partner in this product line. He also strongly believed in the need for nutritious bread products for anyone who wanted to reach their fitness goals. In 2008, after a year of development, they introduced P28 Bread. P28 is the first Original High Protein Bread on the market. They now offer this quality product to you as part of your family’s healthy lifestyle. P28 Foods currently offers Bread, Bagels, Wraps, Spreads, and Pancakes. You can now find their products in 10 countries and over 8,000 retail locations across the world. As consumers increasingly become aware of the benefits of a healthy, high protein diet, the demand for P28 products has consistently grown at a rapid pace. Their promise to their customers is to constantly research and develop healthy new food alternatives for all to enjoy and benefit from nutritiously.
<urn:uuid:a7d55e9a-9a8c-4619-b677-f489dc28f041>
CC-MAIN-2017-04
https://www.luckyvitamin.com/p-542007-p28-high-protein-spread-peanut-butter-16-oz
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00209-ip-10-171-10-70.ec2.internal.warc.gz
en
0.969213
1,129
1.617188
2