text
stringlengths
181
608k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
138k
score
float64
1.5
5
int_score
int64
2
5
M65 (upper left) is a spiral galaxy about 35 million light-years away, M66 (upper right) is a spiral galaxy about 36 million light-years away, and NGC 3628 is an unbarred spiral galaxy about 35 million light-years away. All three are in the constellation Leo and are known as the Leo Triplet. NGC 3628 is unique because of the 300,000 light-years long tidal tail comprised of stars, dust, and gas. Date: March, 2014 Location: Green Valley, Arizona Telescope: Takahashi FSQ-106EDX Camera: SBIG STT-8300M Filters: Astrodon Gen 2 Mount: AstroPhysics 1200 Exposure: LRGB = 610:120:120:120 minutes, all unbinned
<urn:uuid:595134de-6454-428c-b92e-01d779409f5e>
CC-MAIN-2022-33
http://www.arizonanightskies.com/leo-triplet.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00471.warc.gz
en
0.864598
176
3.203125
3
I am very concerned about your drinking. Binge drinking can cause as much or more damage to your liver than people who drink 1-2 glasses of wine or beer on a daily basis. Initially what happens is that your liver cells get damaged and are replaced by fat. This causes a condition called "Fatty Liver". This can lead to inflammation and finally "Cirrhosis" which is not reversible. This can lead to liver cancer and liver coma The end stage of liver disease includes kidney Hope I have talked you out of Binge drinking.
<urn:uuid:e14ae438-ef57-4380-ab2b-88d6c31ad46e>
CC-MAIN-2017-04
http://www.healthcaremagic.com/questions/Urination-during-or-after-intake-of-alcohol-and-water-Reason/292471
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00285-ip-10-171-10-70.ec2.internal.warc.gz
en
0.953203
120
1.804688
2
About CodeSnip Files on SourceForge. The CodeSnip project's files on SourceForge are organised as follows: * Each of the later releases has its own directory named Release-9.9.9 where 9.9.9 is the version number of the release. In each of these directories are archives of both executable and source code files, usually in both .zip and .tar.gz formats. The latest release will be stored in the directory with the most recent version numner. * Older releases are grouped together in directories named Release-9.9.x where 9.9 represents the major and minor release numbers. Archives containing source and executable code for each of the revisions relating to that release are provided. Usually only .zip archives are available. * Much older releases have directories using the same Release-9.9.x naming convention as above but the directories may contain only source code archives, or possibly nothing except a read-me file explaining how to get All files are named in the following manner: * XXX is either "exe" or "src". - "exe" files contain the executable setup program for this version of CodeSnip along with a read-me file. - "src" files contain the source code of this version of CodeSnip. * 9.9.9 is the version number of the release. * YYY denotes the type of the archive - either .zip or .tar.gz. If you are intending to install CodeSnip please use the latest available Source code archives are provided here as a convenience. You can also get source from the SourceForge repository at Navigate to the "tags" directory and then choose the directory containing the release you want. Directories are named in the form "version-9.9.9" where 9.9.9 is the version number. Prior to v3.0.0 CodeSnip was not maintained on SourceForge and so these versions are not available.
<urn:uuid:33da90b9-8ccf-4e82-baa2-988f6e65566c>
CC-MAIN-2017-04
https://sourceforge.net/projects/codesnip/files/Release-3.9.2/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00464-ip-10-171-10-70.ec2.internal.warc.gz
en
0.816715
427
2.125
2
Activities Sports & Athletics Exercise to Increase Golf Swing Speed A Lunge With a Twist to Strengthen Golfers' Muscles Share PINTEREST Email Print Jordan Siemens/Getty Images Sports & Athletics Golf Basics History Gear Golf Courses Famous Golfers Golf Tournaments Baseball Bicycling Billiards Bodybuilding Bowling Boxing Car Racing Cheerleading Extreme Sports Football Gymnastics Ice Hockey Martial Arts Professional Wrestling Skateboarding Skating Paintball Soccer Swimming & Diving Table Tennis Tennis Track & Field Volleyball Other Activities Learn More By Brent Kelley Brent Kelley Brent Kelley is an award-winning sports journalist and golf expert with over 30 years in print and online journalism. Learn about our Editorial Process Updated on 07/03/19 Many golfers are looking to improve their golf swing power, distance and golf swing speed in a search for longer drives, but most of them are looking in the wrong place — focusing on the club instead of the engine powering the stroke: the golfer's body. Golfers who seriously want to improve their drive strength should look beyond the $500 drivers to the core of what makes a good drive: muscle control and power. A person's body dictates his or her golfing ability, so golf weight training exercises are some of the quickest ways to improving golf swing speed and power off the tee. Combining the golf strength of a golfer's core and lower and upper body is an approach that will yield rapid results and enhanced performance when driving the ball down the fairway toward the hole, and the best exercise to achieve these results are what's known as a "Lunge With a Twist." How to Do the Lunge With a Twist Excercise In order to properly perform the Lunge With a Twist, one will first need a weighted medicine ball like the one pictured above (or a similar weight to use while strengthening upper muscles and core. Then, follow these four steps to master the exercise and strengthen a majority of the muscles needed to improve golf drives. Step 1: Assume a standing position with your arms straight and hanging down in front of you, holding your medicine ball or dumbbell.Step 2: As you step forward with one leg, rotate your upper body to that same side, holding the medicine ball or dumbbell chest high the whole time.Step 3: Return to starting position and do the opposite leg.Step 4: Repeat each side 10 times for 3 sets. If you are consistent with this exercise, you will see improvement in your golf swing speed, power, and distance in a very short period of time. Other Important Exercises for Golfers Although the Lunge With a Twist works out most of the core muscles needed to enhance golf swing speed, power, and distance at once, golfers should also get in the practice of a regular exercise routine to focus on different muscle groups needed for better performance. As athletes, golfers must have absolute control of their swings in order to move the ball precisely where they intend as efficiently as possible toward the hole. For this reason, golfers should exercise regularly to maintain a level of control over the upper, core, and lower muscles associated with golfing. At least one day of cardio (running, etc), one day of weight training and one day of squats and leg exercises are recommended as part of a golfer's weekly exercise regimen to maintain core strength needed for the longest drives. This, paired with occasional Lunges With a Twist, will ensure golfers are swinging the best they can.
<urn:uuid:ce0297d2-fc89-443f-a7fa-8d56c4d618de>
CC-MAIN-2022-33
https://www.liveabout.com/lunge-with-a-twist-exercise-1563377?utm_source=emailshare&utm_medium=social&utm_campaign=shareurlbuttons
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00670.warc.gz
en
0.921147
704
1.664063
2
Meredith College held its annual Veterans Day commemoration, Honoring Women Veterans, on November 12, 2014. The featured speaker for this year’s commemoration was Brigadier General Jeff Clark, director of Walter Reed National Military Medical Center. President Jo Allen welcomed the campus community and noted that the timing of Veterans Day in the Thanksgiving season is appropriate. “Veterans Day should be commemorated in the season of gratitude and wonder,” Allen said. “We are thankful for the honor veterans bestow on us, as worthy of their service.” While it is called Honoring Women Veterans, the event recognized and celebrated the service of all veterans. Allen asked any veterans and active duty military in attendance to stand for recognition. As a women’s college, Meredith draws special attention to women veterans, who have been called “invisible soldiers, because their service went largely unrecognized until the 1970s,” Allen said. Approximately 10% of the 22 million veterans in the United States are women. Ten percent of the 800,000 veterans who live in North Carolina are women. Brigadier General Clark is the first Army officer to lead Walter Reed National Military Medical Center. “We get to care for America’s heroes,” Clark said. In his remarks, Clark drew attention to the sacrifice not only of veterans but of their families. There are 1.1 million military spouses, and 2.2 million children of military families in the U.S. “When you hear the word veteran, I ask that you also think of the veteran’s family,” Clark said. Military service is a family commitment, Clark said. “When we pause to honor military service, as Meredith College does each year, I propose we pause twice, once for veterans and once for their families,” Clark said.
<urn:uuid:17c486be-14d9-4a29-a9b4-1b8eb90901be>
CC-MAIN-2022-33
https://www.meredith.edu/news/annual-meredith-event-honors-all-veterans/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00665.warc.gz
en
0.961179
390
1.953125
2
Napier frog brooch, gold-plated gilt frame with rhinestones, 1960`s ca, American.This brooch has been gently cleaned while respecting the vintage patina and is ready to wear. New gift box included. This vintage Napier pin features a frog in movement. Great for a lapel or to pin on a purse. The body is in a gold gilt polished finish, with scales all over except for the feet. The textured scaling adds depth and a glitter shine. The eyes are two large sparkling emerald green rhinestones. The back of the pin is in gold gilt, featuring a roll over clasp. Napier is stamped on the back of one foot. This pin is in very good condition. The gold gilt is all present and both rhinestones are in very good condition. The pin on the back works well . A new gift box is included in the price. Additional dimensions: The pin alone is: Height: 3.5 cm, Width: 4.8 cm, Depth: 1 cm. The box is: Height: 3 cm, Width: 8.6 cm, Depth: 9 cm.NAPIER JEWELLERY HISTORYThe Napier Company started in North Attleboro, Massachusetts, USA in 1878. James H. Napier became president of the company in 1920, and the company was renamed, The Napier-Bliss Co. The company was known for its ability to be on the forefront of fashion and had a history of sending its designers to Europe. In 1925, James Napier attended the World`s Fair Exposition Internationale des Artes Decoratifs et Industriels Modernes in Paris, and brought back with him business ideas, including designs influenced by Parisian and European fashion. Mr. Napier himself, did not design jewelry. James Napier work for the company, as president, from 1914 to his death in 1960. In the 1920`s and 1930`s, Napier designed necklaces, bracelets and earrings in a range of styles including designs featuring Egyptian motifs, such as cobras, Victorian Revival designs and Art Deco style motifs. The company produced very little jewelry during the 1930`s, focusing on its giftware lines. In the 1940`s, most of the jewelry produced was sterling silver tailored pieces. In the 1950`s, it produced jewelry in a wide range of styles. In the 1950`s, the Napier Company presented First Lady Mamie Eisenhower with a bracelet bearing an elephant design, which was reputedly one of her favourite pieces of jewelry. Napier jewelry is still being manufactured and distributed however under the umbrella of Jones Apparel Group. A good research source book is: "The Napier Co.: Defining 20th Century American Costume Jewelry by Melinda L. Lewis & Henry Swen (2013).
<urn:uuid:83bfb2b4-c3ef-40f3-8150-42232c445ae7>
CC-MAIN-2022-33
https://trendfirst.com/napier-frog-brooch
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00067.warc.gz
en
0.945796
589
1.546875
2
From Huffington Post WASHINGTON -- Sea level has been rising significantly over the past century of global warming, according to a study that offers the most detailed look yet at the changes in ocean levels during the last 2,100 years. The researchers found that since the late 19th century – as the world became industrialized – sea level has risen more than 2 millimeters per year, on average. That's a bit less than one-tenth of an inch, but it adds up over time. Read complete article on the Huffington Post |« Sportsmen Alliance for Marcellus Conservation: Fishermen, Hunters Take On Fracking||Shocking Report Warns Of Mass Extinction From Current Rate Of Marine Distress »|
<urn:uuid:851fdda0-694d-4b9b-bf97-270894301794>
CC-MAIN-2017-04
http://www.greatlakesbass.com/conservation/index.php/2011/06/23/sea-levels-rising-at-fastest-rate
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00053-ip-10-171-10-70.ec2.internal.warc.gz
en
0.927339
145
3.078125
3
An updated edition of an underground classic This is the 4th edition of a self-published book that no respectable publisher would touch with a ten-foot shovel. The 1st edition was published in 1994 with a print run of 600 copies, which the author expected to watch decompose in his garage for the rest of his life. Now, 24 years later, the book has sold over 65,000 print copies in the U.S. alone, been translated in whole or in part into 19 languages and been published in foreign editions on four continents. The previous editions won numerous awards, including the Independent Publisher Outstanding Book of the Year Award, deeming the book Most Likely to Save the Planet." The book has been mentioned on such diverse media outlets as: Mother Earth News, Whole Earth Review, Countryside Journal, The Journal of Environmental Quality, Natural Health, NPR, BBC, CBC, Howard Stern, The Wall Street Journal, Playboy Magazine, Organic Gardening Magazine, the History Channel, Tree House Masters, and many other national and international venues. The 4th edition is a completely revised, expanded, and updated version of what has become an underground classic bestseller. The author draws from 40 years of research, experience, and travel, to expand and clarify your knowledge and understanding of... your poop Not only does the book address what to do with human turds, but it is also a priceless manual for anyone involved in composting or gardening, or looking for basic survival skills. There is no other book like this in print
<urn:uuid:d2d916a5-56b9-413d-b633-991f52bf5675>
CC-MAIN-2022-33
https://www.northshire.com/book/9780964425880
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00071.warc.gz
en
0.949184
312
1.554688
2
Fishing means searching for, attracting, locating, catching, taking or harvesting fish or any activity which can reasonably be expected to result in the attracting, locating, catching, taking or harvesting of fish; Motorboat means the same as that term is defined in Section 73-18-2. Pretreatment coating means a coating which contains no more than 12% solids by weight, and at least 0.5% acid by weight, is used to provide surface etching, and is applied directly to metal surfaces to provide corrosion resistance, adhesion, and ease of stripping. Roll coating means the application of a coating material to a substrate by means of hard rubber or steel rolls. Cart means computer-assisted real-time transcription using specialized equipment to transcribe real time word-for-word spoken English into written English that can be viewed on a computer screen or projected onto a large screen.[PL 2003, c. 685, §2 (NEW).] Houseboat means any boat containing a toilet or sleeping accommodation or capable of containing enclosed or semi-enclosed sleeping accommodation; Snowmobile means a self-propelled vehicle designed to travel on snow or ice, steered by skis or commercial fishing means to take, harvest, hold, transport, or off-load marine species for sale or intended sale (R.I. Gen. Laws § 20-1-3). Exfiltration means any unauthorized release of data from within an information system. This includes copying the data through covert network channels or the copying of data to unauthorized media. Pet means any domesticated animal normally maintained in or near the household of the owner thereof. Muffler means a properly functioning sound dissipative device or system for abating the sound on engines or equipment where such device is part of the normal configuration of the equipment. Filtration means a process for removing particulate matter from water by passage through porous media. Fire fighter means any person employed by the state or any political subdivision as a member or officer of a fire depart- ment or a member of a volunteer department, including the state fire marshal and deputies. Dewatering means the removal of water for construction activity. It can be a discharge of appropriated surface or groundwater to dry and/or solidify a construction site. It may require Minnesota Department of Natural Resources permits to be appropriated and if contaminated may require other MPCA permits to be discharged. Adult motel means a hotel, motel or similar commercial establishment which: Diatomaceous earth filtration means a process resulting in substantial particulate removal in which (1) a precoat cake of diatomaceous earth filter media is deposited on a support membrane (septum), and (2) while the water is filtered by passing through the cake on the septum, additional filter media known as body feed is continuously added to the feed water to maintain the permeability of the filter cake. Air dried coating means a coating that is dried by the use of air or forced warm air at temperatures up to 1940F (900C). Dusting aid means a product designed or labeled to assist in removing dust and other soils from floors and other surfaces without leaving a wax or silicone based coating. “Dusting Aid” does not include “Pressurized Gas Duster.” Sailboat means the same as that term is defined in Section 73-18-2. Cannabis means all parts of the plant Cannabis sativa Linnaeus, Cannabis indica, or Cannabis ruderalis, whether growing or not; the seeds thereof; the resin, whether crude or purified, extracted from any part of the plant; and every compound, manufacture, salt, derivative, mixture, or preparation of the plant, its seeds, or resin. “Cannabis” also means the separated resin, whether crude or purified, obtained from cannabis. “Cannabis” does not include the mature stalks of the plant, fiber produced from the stalks, oil or cake made from the seeds of the plant, any other compound, manufacture, salt, derivative, mixture, or preparation of the mature stalks (except the resin extracted therefrom), fiber, oil, or cake, or the sterilized seed of the plant which is incapable of germination. For the purpose of this division, “cannabis” does not mean “industrial hemp” as defined by Section 11018.5 of the Health and Safety Code. Cannabis and the term “marijuana” may be used interchangeably. Topcoat means a coating that is applied over a primer on an aerospace vehicle or component for appearance, identification, camouflage, or protection. Topcoats that are defined as specialty coatings are not included under this definition. Spirits means any beverage which contains alcohol obtained by distillation mixed with drinkable water and other substances in solution, including, but not limited to, brandy, rum, whisky, and gin. Conifer means a tree that is a Douglas-fir, true fir, pine, western hemlock, spruce, or cedar. Nitrogen oxides means all oxides of nitrogen except nitrous oxide, as measured by test methods set forth in 40 CFR Part 60. Park Sienna Park Sienna LLC, a Delaware limited liability company, and its successors and assigns, in its capacity as the seller of the Park Sienna Mortgage Loans to the Depositor. Semitrailer means every vehicle without motive power designed for carrying persons or property and for being drawn by a motor vehicle and constructed so that some part of its weight and its load rests or is carried by another vehicle.
<urn:uuid:d6b9579a-0069-4e6e-9a67-25c6bbe21662>
CC-MAIN-2022-33
https://www.lawinsider.com/dictionary/shore-fishing
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00466.warc.gz
en
0.941169
1,166
2.46875
2
On December 8, 1953, President Dwight Eisenhower gave his famous “Atoms for Peace” speech at the United Nations General Assembly, imploring nations to focus on peaceful uses of the atom and move away from military uses. Eisenhower recognized the terrible destructive force of the atom, but also saw its great potential for good. This greatest of destructive forces can be developed into a great boon, for the benefit of all mankind. In the 65 years since then, much progress has been made on these fronts, but much needs to be done. Today, nuclear power is the primary source of carbon-free electricity in the world. There have been advances in nuclear medicine and other peaceful uses of the atom. Importantly, the highly enriched uranium in 20,000 Russian nuclear warheads has been blended down for fuel in nuclear reactors, literally fulfilling the challenge raised by Eisenhower in his speech: It is not enough to take this weapon out of the hands of the soldiers. It must be put into the hands of those who will know how to strip its military casing and adapt it to the arts of peace. While there has been significant progress, much remains to be done. Eisenhower sought to bring electricity to the “power starved areas of the world,” but many regions are still without sufficient electricity, nuclear or otherwise. Although nuclear power appears to be the perfect antidote for climate change as it emits no greenhouse gases, reactors are being shut down all over the world before the end of their useful lives. Most worrisome is the fact that countries still possess nuclear weapons and the threat of nuclear proliferation is still very real. Because of the current state of threats, nuclear and otherwise, the Bulletin of Atomic Scientists has moved the hands of its “Doomsday Clock” to two minutes before midnight, the closest it’s been since 1953, the year Eisenhower gave his “Atoms for Peace” speech. Because of the dangers and challenges that remain, we believe is time to revisit Eisenhower’s vision to see how it can be applied to current challenges. There have been many technological advances since the time of his speech, and it is useful to re-examine some of the early nuclear innovations in light of new technological capabilities.
<urn:uuid:51798b95-9af9-4f51-a0e2-b4924164adc4>
CC-MAIN-2022-33
https://atompeace.org/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00268.warc.gz
en
0.961395
452
3.1875
3
Families Like Mine : Children of gay parents tell it like it is Abigail Garner was five years old when her parents divorced and her dad came out as gay. Like the millions of children growing up in these families today, she often found herself in the middle of the political and moral debates surrounding lesbian, gay, bisexual, and transgender (LGBT) parenting. Drawing on a decade of community organizing, and interviews with more than fifty grown sons and daughters of LGBT parents, Garner addresses such topics as coming out to children, facing homophobia at school, co-parenting with ex-partners, the impact of AIDS, and the children's own sexuality. Both practical and deeply personal, Families Like Mine provides an invaluable insider's perspective for LGBT parents, their families, and their allies. "Families Like Mine does for LGBT families what And the Band Played On did for AIDS." -- Esera Tualo, retired NFL star linebacker "Now Garner, who created the site FamiliesLikeMine.com, attempts to do the same for teens, young adults and their families by interweaving her experiences growing up with a gay father and straight mother with those of other children who were raised by lesbian, gay, bisexual or transgender parents. She intends "to advocate for our families to be just that: families." Although there is no exact figure for the number of children who have grown up in LGBT families over the past two decades (estimates vary from one million to 16 million), the issues Garner raises about the messages that we pass on to our children "on what a "well-adjusted" child is; on the risks and advantages of coming out (for both parents and children); and on the effects of a 'homo-hostile' world affect increasing numbers of children whose parents are straight or queer. Despite Garner's decision to interview only children in their 20s and 30s, their concerns about finding a way to name family members (e.g., should a lesbian mother's long-term partner be called a 'step-mom'? Are that step-mom's children stepsisters or -brothers?) and learning how to maintain nontraditional families in the wake of a parent's death or the breakup of a relationship between parent and partner, will reverberate for young people confronting similar difficulties. Nor does Garner flinch from addressing the complex issues surrounding what it means for children raised in LGBT families, herself included, to be, in the words of advocate Stefan Lynch, 'culturally queer, erotically straight.'" --Publishers Weekly
<urn:uuid:208982b0-efa9-4ab3-943f-af9ca51a0d51>
CC-MAIN-2017-04
https://www.hares-hyenas.com.au/p/lesbian-gay-and-trans-parenting-families-like-mine-children-of-gay-parents-tell-it-like-it-is?barcode=9780060527587
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00280-ip-10-171-10-70.ec2.internal.warc.gz
en
0.953645
521
2.390625
2
Monday, Nov. 3, 2008 | 2 a.m. Beyond the Sun Tired of the Nevada election and looking for the next big thing? Consider turning your attention to Kentucky, where you can get a glimpse of ... imagine this ... Nevada in 2010. In the Bluegrass State, the leader of the Republicans in the U.S. Senate, Mitch McConnell, is in a fight for his political life because the Senate Democratic election apparatus is trying to oust him. Republicans plan to retaliate in 2010 by doing the same thing to the Democratic leader, Nevada’s Harry Reid, who will be trying to win another six-year term. The tactics of both sides are a stark departure from the decorum in Senate races that prevailed for more than a century. Campaigns operated within their own state borders, with the understanding that out-of-state senators wouldn’t cross state lines to campaign against a member of the opposing party. But that changed in 2004, when Republicans targeted and defeated Senate Minority Leader Tom Daschle of South Dakota. Democrats say the campaign against McConnell is just a chance to pick up another seat, rather than payback. But if it works, their celebration may be muted. Yes, they won. Targeting the opposition’s leader has worked each time a political party used it. But Reid is up next. As one Republican strategist said, the fierce Democratic attempt to take down McConnell “is more than in years past,” and “less than what it will be in the future.” In Kentucky, the Senate Democratic campaign committee has poured nearly $2 million into the race in the past two weeks alone. Sen. Hillary Clinton appears in an ad for McConnell’s opponent, Bruce Lansford. She and Bill Clinton have worked the campaign trail for the Democrat. Reid apparently has allowed the attacks to unfold. Republicans are planning to go after him with a vengeance and in many ways, that campaign has begun. The Republican National Committee, as well as the state Republican Party and more recently outside groups such as Freedom’s Watch, have dished out steady criticism of Reid since he became party leader after the 2004 election. In one of his early speeches on the Senate floor in 2005, Reid called on President Bush to repudiate Republican attacks, noting that the president had offered to set a “better tone” with the new Congress. Reid has said he has a target on his back. “I don’t think anyone has any expectation Republicans would run anything less than an attack-driven campaign,” Reid spokesman Jon Summers said. “They started that campaign against him immediately. And we expect it will continue.” This tactic of targeting the opposition’s leader is starting to feel like an ancient family feud, with each side inflicting such reflexive pain on the other it’s hard to remember how it all began. Senate Associate Historian Donald A. Ritchie is a helpful guide here, reminding that the parties have targeted leaders on the campaign trail if it suits them. The parties have long funneled national money into individual Senate election campaigns. But until 2004, no individual senator had ever crossed a state line to campaign in person against a member from the other party since 1901. That changed in the Daschle campaign, when Republican Sen. Bill Frist, then majority leader, shocked sensibilities by venturing into South Dakota. Daschle’s defeat coined a verb — as in, Republicans will try to “Daschle” Reid in 2010. The defeat was still ringing when the Democratic campaign arm in the Senate, led by Sen. Chuck Schumer of New York, sought to pick up the Kentucky seat this election cycle. “Harry Reid and I discussed this,” Schumer told reporters recently. “There had been rules of etiquette ... and the rules of etiquette were broken with Tom Daschle.” But to be clear, Reid and the Democrats are still not crossing the lines Frist did when he stepped onto South Dakota soil in 2004. Individual Democratic senators have gone to the state, but their leader, Reid, has not done as Frist did. Nor has Reid appeared in any TV ads in the state. Schumer offers another distinction. He insists the committee was going after the Kentucky seat — not the senator by virtue of his leadership position. Schumer says Democrats targeted the seat because polls showed it might be won. Having the campaign arm go after the seat is well within bounds, both sides agree. Just expect the same in Nevada, Republicans say. Schumer mused that perhaps this race would lead to a detente of sorts, and etiquette “would be restored after this election, whatever the outcome in Kentucky.” That’s the kind of wishful thinking all battle-weary warriors must feel at some point as they’re torching city walls. More realistically, though, it is the children of the war who say enough is enough. Senate leaders years from now, more familiar with Daschle the word than the man, may decide for their own self-preservation the best way to take the target off their back is to ignore the one on their colleague across the aisle. Lisa Mascaro can be reached at (202) 662-7436 or at email@example.com.
<urn:uuid:1e8069d2-3ed2-4b43-a45b-7ef598c42928>
CC-MAIN-2017-04
https://lasvegassun.com/news/2008/nov/03/reid-next-new-cycle/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280266.9/warc/CC-MAIN-20170116095120-00502-ip-10-171-10-70.ec2.internal.warc.gz
en
0.972961
1,123
1.640625
2
Thick Film Chip Resistors Low Ohmic - MCR50JZHJL ROHM's low-resistance chip resistor series (MCR series) are for relatively higher current circuit such as current detection circuit. This device emplyes metal-glaze base resistive element and is high-reliability device. |Resistance Tolerance||J (±5%)| |Resistance range[Ω]||0.1 to 0.91| |Operating Temperature[°C]||-55 to 155| |Type||General Purpose (Low resistance)| - ・Very-low ohmic resistance from 100mOhm is in lineup by thick-film resistive element. ・High-reliability chip resistor employing metal glaze as resistive element. Outros Novo / Atualizado produtos em relação aResistors
<urn:uuid:2e42b6f6-809f-42d0-98af-19b0bcbfb98f>
CC-MAIN-2016-44
http://www.rohm.com/web/br/products/-/product/MCR50JZHJL
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721355.10/warc/CC-MAIN-20161020183841-00013-ip-10-171-6-4.ec2.internal.warc.gz
en
0.651703
188
1.914063
2
The Supreme Court Doesn’t Understand that Racial Prejudice is Different from Aversion to Homosexuality The politicians are trying to remove colleges’ tax exempt status if they do not agree to same sex marriage. This was heard last month before the Supreme Court in Obergefell v. Hodges. In the Bob Jones case the Court held that a college would not be tax exempt if it “opposed interracial marriage or interracial dating.” Samuel Alito wondered if a college should have its tax exemption removed if it went against same sex marriage. As if they were identical. What kind of stupid judges do we have when they consider that comparison is identity? Can’t Alito dream that prejudice against the color of one’s skin is not the same as repulsion against sexual perversion. MLK said that, “I have a dream that my four little children will one day live in a nation where they will not be judged by the color of their skin, but by the content of their character.” I dare say that he would consider homosexuality an objectionable part of the content of their character and would in no way compare it to his fight for equality and civil rights. I asked a black friend of mine in my gym if he did or didn’t object to the way the gays identified with the blacks in their struggle for acceptance. He resented the comparison. So do I and I’m neither black nor gay. They are unrelated. There is no way that gays should piggyback on the suffering that blacks went through as slaves. Alito’s wondering if tax exemptions for racially integrated schools should be instituted for schools accepting gay marriage is simply naïve. They are unrelated. One is a mere skin color and the other is a divergent urge that doesn’t apply to ninety-eight percent of the people. Darwin’s survival instinct makes homosexuality difficult to accept even in the most liberal mind. It’s empathetic adoption is a sham. Even liberals are not viscerally OK with it. It’s sad for the gays. But the body is what the body is and organically dictates the mind’s thinking. The views expressed in this opinion article are solely those of their author and are not necessarily either shared or endorsed by EagleRising.com
<urn:uuid:ccd5a6fd-0a74-4059-bba5-203e30a94670>
CC-MAIN-2017-04
http://eaglerising.com/18699/the-supreme-court-just-doesnt-understand/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282926.64/warc/CC-MAIN-20170116095122-00395-ip-10-171-10-70.ec2.internal.warc.gz
en
0.965588
490
1.828125
2
The Catholic Church’s relationship to Judaism as taught by the Second Vatican Council and the interpretations and developments of that teaching by subsequent popes, “are binding on a Catholic,” said the Vatican official responsible for relations with the Jews. Swiss Cardinal Kurt Koch, president of the Pontifical Commission for Religious Relations with the Jews and a member of the Congregation for the Doctrine of the Faith, spoke to reporters May 16 after delivering a speech on Catholic-Jewish relations in light of Vatican II’s declaration “Nostra Aetate” on the church’s relations with non-Christian religions. The afternoon speech followed Cardinal Koch’s participation in a meeting of the doctrinal congregation to examine the latest progress in the Vatican’s reconciliation talks with the traditionalist Society of St. Pius X. “There are questions to clarify in discussions with this community. I can’t say more than that,” he told reporters, echoing a Vatican statement saying the reconciliation talks are ongoing. In addition to the highly publicized position of Bishop Richard Williamson, an SSPX bishop who denies the Holocaust, public statements by the society’s superior general, Bishop Bernard Fellay, leave in doubt whether the society as a whole accepts the entirety of “Nostra Aetate,” including its condemnations of anti-Semitism and of the idea that the Jews were to blame for the death of Jesus. “All the doctrinal decisions of the church are binding on a Catholic, including the Second Vatican Council and all its texts,” Cardinal Koch said when asked if the SSPX would be expected to accept all the teachings of Vatican II. “The ‘Nostra Aetate’ declaration of the Second Vatican Council is a clear decree and is important for every Catholic,” he added. [More]
<urn:uuid:65204869-9b4e-40f7-b02f-2bd8acf57fd1>
CC-MAIN-2017-04
http://www.cathnewsusa.com/2012/05/catholics-must-accept-vatican-ii-including-on-judaism-cardinal-says/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280410.21/warc/CC-MAIN-20170116095120-00452-ip-10-171-10-70.ec2.internal.warc.gz
en
0.943332
391
2.171875
2
This Baker Tilly webinar provides insights on the financial and regulatory compliance areas most important in each stage of bank M&A activity. Significant merger and acquisition (M&A) activity is happening throughout the banking sector. Buyers of community banks seek to align growth goals and discover potential issues early in the evaluation process. Sellers work to attract buyers and maximize value. The resulting financial institution must proactively manage myriad accounting, tax, and regulatory compliance requirements to achieve all the expected benefits. Within all of the M&A-related activities, executives must focus on key financial, tax and regulatory compliance items. These occur in three primary stages: 1) Readiness, 2) Structuring and getting the deal done and 3) Ongoing compliance and post-transaction. - The reasons behind increased M&A activity in banking - The most important financial, tax and regulatory compliance items within each stage of M&A activity - Why these items are critical in a successful merger or acquisition
<urn:uuid:d042894f-6c75-4971-bb1c-f32a3cfe9d65>
CC-MAIN-2017-04
http://bakertilly.com/insights/key-items-in-each-stage-of-bank-ma-activity/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00234-ip-10-171-10-70.ec2.internal.warc.gz
en
0.915261
203
1.53125
2
Note: You clicked on an external link, which has been disabled in order to keep your shopping session open. Your search for "chrna2" returned 34 TaqMan® Gene Expression Assays cholinergic receptor nicotinic alpha 2 subunit Nicotinic acetylcholine receptors (nAChRs) are ligand-gated ion channels formed by a pentameric arrangement of alpha and beta subunits to create distinct muscle and neuronal receptors. Neuronal receptors are found throughout the peripheral and central nervous system where they are involved in fast synaptic transmission. This gene encodes an alpha subunit that is widely expressed in the brain. The proposed structure for nAChR subunits is a conserved N-terminal extracellular domain followed by three conserved transmembrane domains, a variable cytoplasmic loop, a fourth conserved transmembrane domain, and a short C-terminal extracellular region. Mutations in this gene cause autosomal dominant nocturnal frontal lobe epilepsy type 4. Single nucleotide polymorphisms (SNPs) in this gene have been associated with nicotine dependence. [provided by RefSeq, Nov 2009] |Protocol||Protocol: TaqMan® Gene Expression Assays||PDF, Unknown KB| |App Note||Application Note: TaqMan® Gene Expression Assays Endogenous Controls||PDF, Unknown KB| |QRC||QRC: TaqMan® Gene Expression Assays||PDF, Unknown KB| |White Paper||Design Process for Gene Expression Assays||PDF, Unknown KB| |White Paper||Gene Expression Assay Performance Guarantee||PDF, Unknown KB| |White Paper||TaqMan® Assays shipped at ambient temperature retain their quality and stability||PDF, Unknown KB| |Brochure||Understanding Your Shipment||PDF, Unknown KB| |White Paper||Product Stability Study||PDF, Unknown KB| |Spreadsheet||Pathogen Assay Information||XLSX, Unknown KB| Please enter the information below and press OK to send your cart to Core Services for purchase.
<urn:uuid:b53429c3-cf70-4466-8bdd-18e4e02764d2>
CC-MAIN-2017-04
https://www.thermofisher.com/order/genome-database/browse/gene-expression/gene/CHRNA2
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285289.45/warc/CC-MAIN-20170116095125-00152-ip-10-171-10-70.ec2.internal.warc.gz
en
0.773448
445
1.6875
2
I have multiple sclerosis and rheumatoid arthritis. Are these two diseases related? Yes. Both are autoimmune diseases in which for some unknown reasons the body starts attacking the joints or the nervous system. There are genetic as well as environmental reasons that predispose some patients to these diseases, but the exact causes have not been determined. Learn more in the Everyday Health Rheumatoid Arthritis Center.
<urn:uuid:a12ac627-e29c-4cb5-82b0-0e07bd57cf78>
CC-MAIN-2017-04
http://www.everydayhealth.com/rheumatoid-arthritis/specialists/the-relationship-between-ms-and-ra.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280825.87/warc/CC-MAIN-20170116095120-00206-ip-10-171-10-70.ec2.internal.warc.gz
en
0.933962
82
1.695313
2
Download EBOOK From Magical Child to Magical Teen: A Guide to Adolescent Development PDF for free The author of the book: Joseph Chilton Pearce Format files: PDF, EPUB, TXT, DOCX The size of the: 8.69 MB Edition: Park Street Press,U.S. Date of issue: 29 April 2003 Description of the book "From Magical Child to Magical Teen: A Guide to Adolescent Development": A groundbreaking perspective on Nature's plan for full human creativity and intelligence during the teen years - Shows what is at the core of today's serious social and psychological problems - Explores the sexual and spiritual stage of adolescent development - Details the connection between adolescent brain and heart development and the issue of nature vs. nurture - By the author of "Magical Child" (250,000 copies sold) Something is supposed to happen during the adolescent years--something greater than MTV, video games, and the Internet. Joseph Chilton Pearce describes this something as the natural mandate for post-biological development--the development of the PDF sexual and spiritual senses and expansion of our growth process outside of our bodies and into the physical world that surrounds us. Though first written in the mid 1980s, the message of "From Magical Child to Magical Teen" is even more compelling and helpful today--especially for those who live with and work with adolescents. Drawing on the stages of development outlined by Swiss biologist Jean Piaget and the brain research of neuroscientist Paul MacLean, Pearce demonstrates how nature has built into us an agenda for the intelligent unfolding of our lives. He offers a powerful critique of ePub contemporary child-rearing practices and a groundbreaking alternative to existing perspectives on adolescence so we can unleash our greatest potential, as well as that of our children, in order to experience our fullness in the manner nature intended all along. Reviews of the From Magical Child to Magical Teen: A Guide to Adolescent Development So far in regards to the ebook we've From Magical Child to Magical Teen: A Guide to Adolescent Development responses consumers have never nevertheless remaining their own report on the sport, or not read it yet. Nevertheless, in case you have by now see this e-book and you are willing to create their own conclusions well ask you to spend time to exit an evaluation on our site (we can easily post both bad and good reviews). To put it differently, "freedom involving speech" Most of us completely helped. Your current comments to book From Magical Child to Magical Teen: A Guide to Adolescent Development : other readers can choose about a guide. This sort of assistance is likely to make people much more U . s .! Joseph Chilton Pearce Unfortunately, at present we really do not have got details about this performer Joseph Chilton Pearce. Even so, we will appreciate for those who have almost any specifics of the item, and are also wanting to supply this. Send out this to all of us! We've got each of the check, if everything are real, we shall submit on the site. It is significant for individuals that most correct concerning Joseph Chilton Pearce. All of us thanks before hand internet marketing prepared to head to meet up with all of us! Download EBOOK From Magical Child to Magical Teen: A Guide to Adolescent Development for free Leave a Comment From Magical Child to Magical Teen: A Guide to Adolescent Development
<urn:uuid:ef270b7f-a3f1-4c95-85c1-ebaf9edb02dd>
CC-MAIN-2016-44
http://clearwalksoft.com/health/75759-from-magical-child-to-magical-teen-a-guide-to-adolescent-development.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718866.34/warc/CC-MAIN-20161020183838-00003-ip-10-171-6-4.ec2.internal.warc.gz
en
0.895118
697
1.765625
2
You can connect to an Esri File Geodatabase (FileGDB) from the Map Interoperability dialog. The Esri File Geodatabase support is available in all OpenCities Map CONNECT and Bentley Map V8i (SELECTSeries 4) and above editions of the product. Inside the Map Interoperability dialog, select the Connections tab. Right-click on the Connections folder and select the New Esri Geodatabase Connection… option. A new dialog will open, where you are prompted to browse for the .gdb directory. Select the directory where the Geodatabase files are stored and select OK to continue. The New Connection Parameters dialog will open. Right-click on Current Session to access a list of options, including to Check All or None of the features and to choose how the features will be shown. Edit General, Connection Parameters, Feature Parameters and Feature Symbology as desired. Select ‘Connect’ to establish the connection. Note: OpenCities Map & Bentley Map currently support version 10.x of the File Geodatabase and previous versions cannot be opened. You can also connect to an ESRI File Geodatabase by using a registered connection (created in Bentley Geospatial Administrator), by opening a saved XML file (.gbdx) or by importing .gdb file from the Imports tab of the Map Interoperability dialog.
<urn:uuid:670e757a-3e63-47bf-8507-23ebeab615aa>
CC-MAIN-2022-33
https://communities.bentley.com/products/geospatial/desktop/w/geospatial_desktop__wiki/25265/--connect-to-esri-file-geodatabase
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00076.warc.gz
en
0.823172
296
1.851563
2
NASHVILLE, Tenn. — Jimi Hendrix is known around the world as being one of the best musicians to ever live. While he was born in Seattle and lived in the UK, many don't know that he spent time honing his craft in Middle Tennessee. Hendrix enlisted in the Army and trained as a paratrooper in the 101st Airborne Division. That brought him to Clarksville, but he was soon discharged which led to him to Nashville to pursue music. “This being the guitar mecca of America, I think it was only fitting that he was here," Gtar Phil, a Nashville musician, said. “This city has a way of propelling you as a musician.” At the time, Jefferson Street in Nashville was full of R&B, soul, and blues music. Clubs hosted acts like James Brown, B.B. King, Aretha Franklin, Otis Redding, Little Richard, and many others. Hendrix started playing in bands as a rhythm guitar player, and eventually worked his way up to leading his own bands, playing clubs like the Del Morocco Club, Club Baron, and Club Stealaway on Jefferson Street. He also would play clubs in Printer's Alley. “You could hear the music out on the sidewalks, everybody’s just talking and having a good time," Lorenzo Washington of Jefferson Street Sound said of Jefferson Street back in the days when Jimi Hendrix was in Nashville. “You had over 600 and some homes and businesses on Jefferson Street, so everybody was neighbors on Jefferson Street, this was a close-knit community.” Jefferson Street Sound is a museum and studio on Jefferson Street that Washington put together to educate the public about the musical history of Jefferson Street, which included acts such as Hendrix, James Brown, Etta James, Billy Cox, Aretha Franklin, Marion James, Otis Redding, and so many others. Washington has a special connection to Jimi Hendrix, as he met his first wife by giving her and her friends a ride to see Hendrix at the Del Morocco on Jefferson Street, and Washington himself saw Hendrix play. “He played his guitar behind his head, between his legs, and with his teeth,” Washington remembered. Those who knew Hendrix said he always had a guitar with him, whether he was at home, at a club, or simply walking down Jefferson Street. The guitar would not leave his hands. Fast-forward to 2019, and all of the clubs on Jefferson Street where Hendrix played are gone, except for Club Baron, which has since become The Elks Lodge. One of the venues Hendrix played most often was the Del Morocco Club, as he lived in a house right next to the venue. Both Hendrix's old house and the Del Morocco were demolished, and now Interstate 40 travels over the site. “It’s definitely a special energy," Gtar Phil said as he stood where Hendrix's house once was, realizing he could have come up with the guitar parts and inspiration for some of his biggest hits in that spot. “Yeah, it could have happened right here. It’s pretty amazing.” One person looking to educate people about Hendrix's legacy here in Nashville is Joe Chambers, founder of the Musicians Hall of Fame and Museum. He launched a Hendrix exhibit at the museum, and he said the reaction from people can be surprising. “People are like, what? Hendrix in Nashville? Oil in water? That don’t go, you know? Country and psychedelic, but yeah, it does," Chambers said. Chambers has worked over the years to gather, preserve, and display music memorabilia, including pictures from Jimi Hendrix's time in Nashville. One photo caught his eye. “When I saw this picture, I’m like, I’ve been there, I know where that’s at," Chambers said. It was a venue called the Jolly Roger, which existed in a basement in Printer's Alley. Hendrix played there on numerous occasions, and when Chambers looked into it, he realized the club was closed, and getting ready to be turned into condos. Chambers reached out to the person in charge of the project and got permission to go into the old club and salvage what he could. “They gave me a really long extension cord, one of those lights you hang under a car hood, and I went down there and I was looking for this, the stage, and you know, the bathroom doors," Chambers explained, adding that he found it. “I was just thinking about the picture, so I said, just get me what’s in the picture.” The stage where Hendrix once played, along with the back wall and ceiling, are now on display in the Musicians Hall of Fame and Museum, along with a guitar Jimi Hendrix played, a drum set Mitch Mitchell played, and many other artifacts. While Jefferson Street acknowledges Hendrix's past in Nashville with murals and museums, there's little to no sign of Hendrix in Printer's Alley, except in stories, and in music. “I’m sure he cut his chops there just like all of us," Stacy Mitchhart, a Nashville musician who has been playing at Bourbon Street Blues for more than two decades, said. "We've all got places around our hometowns or wherever we live where we cut our chops, and then you develop and become who you are.” When people reflect on the fact that Hendrix was relatively unknown and had almost no money when he lived in Nashville, they tend to take a step back. It's amazing to many that such an icon wasn't always bigger than life. “I think it speaks to our need to never overlook anybody, and that everyone’s important, that everyone has a story, and that everyone has a destiny," Gtar Phil said. Another fun fact about Hendrix in Nashville is he made his TV debut at the NewsChannel 5 studios on the TV show "Night Train" while playing in Little Richard's band (video above). After touring the Chitlin' Circuit throughout the South with acts like the Isley Brothers and Little Richard, Hendrix moved to England, and soon became a major headlining act. One of Hendrix's most famous performances was at Woodstock in 1969. Unfortunately, Hendrix died at the age of 27, and only had about 4 years of mainstream success before his death. To this day, Hendrix's impact is still apparent in Nashville, with music-lovers and guitar players diving into his catalog and continuing to listen to his music. Check out the NC5 Woodstock 50th Anniversary Playlist on Spotify below!
<urn:uuid:36394b64-d4d5-41eb-898c-694f77d059a5>
CC-MAIN-2022-33
https://www.newschannel5.com/news/from-nashville-to-woodstock-exploring-jimi-hendrixs-history-in-nashville
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00266.warc.gz
en
0.984846
1,422
1.515625
2
You can use the function object in two ways: as a generator of level/time pairs for line~ and curve~, and as a transfer function calculator. The first mode requires two messages: bang and next. The bang message produces a series of level/time pairs that represent all of the points up to the first sustain point. Subsequent sections of the envelope need to be accessed by sending the next message. This is appropriate for creating musically-useful modulation envelopes for amplitude, filtering and pitch. The other way to use it is as a transfer function. In this mode of operation, you treat the function object as an X/Y graph space, where the X dimension is an arbitrarily large value (1000 by default), and the Y value is between 0.0 and 1.0. If you feed the function a numeric value, it is considered the X value, and subsequently outputs the Y value at that location. The result is the equivalent of the values that are displayed when you hover your mouse over the function object interface. The function object has two curvature modes: "linear" and "curve". When in the linear mode, the output will output value pairs that represent the time and target value for each of the points in the function display. Typically, this output is sent to a line~ object, which can be used to drive almost any object at audio rate. When in curve mode - either set in the inspector or using the mode message - the function object produces output consistent with the values required by the curve~ object - value triplets that include delta time, target value and curve value. The curve value ranges from -1.0 through 1.0, with positive values producing a logarithmic curve, and negative values producing an exponential curve: When function is in curve mode, you can directly change the curvature of any line segment by option-clicking on the segment, then dragging vertically. (To learn more about logarithmic and exponential curves, you can check out this site.)
<urn:uuid:f73d0d9d-56ae-465d-9396-27cd68c90a01>
CC-MAIN-2016-44
https://cycling74.com/wiki/index.php?title=function&oldid=4126
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720380.80/warc/CC-MAIN-20161020183840-00056-ip-10-171-6-4.ec2.internal.warc.gz
en
0.847249
416
2.59375
3
hyperbole – hy-PUR-bə-lee – an exaggeration to create emphasis or effect. Washington’s latest legislation – the one extending the payroll tax cut for 2 months – could be one of the worst pieces of legislation ever passed. Republicans supported the bill thinking they would lose votes if they didn’t support something. Democrats got their payroll tax cut and extended unemployment benefits -they will call this a “stimulus” and take credit for growing the economy. So for once it’s not due to political party differences – democrats and republicans are working together. The House even passed this epitome of political nonsense by unanimous consent. But when looking at the bill from an economic point of view it doesn’t make sense. Each of its five parts exposes a problem inherent with Washington, not necessarily what the bill aims to fix. Let’s look at them one by one. The Payroll Tax Cut (Or as I like to call it, Destroying Social Security) First, consider the false name “Payroll Tax Cut”, then consider what it does: De-fund, destroy (you pick the word) Social Security. Cutting collections that go into Social Security only accelerates the demise of this entitlement. (The original legislation caused Social Security to run a deficit of $50 Billion) Millions of people have been erased from the income tax rolls so cutting income tax rates does nothing for them. This leaves payroll taxes as the only populist tool for politicians. But, a 2% cut in Social Security tax rate does not boost economic output because it is not a cut in the top marginal tax rates. This means the government must make up any revenue loss by cutting spending (which it never does), borrowing more or raising taxes on someone else. But, taking money from one group to give to another is a zero sum game, at best. In the year since the 2% tax cut was initiated in January 2011, and with the Fed’s super-easy monetary policy (near zero % interest rates), consumption increased at an annual rate of 4.3% – unchanged from the 4.2% growth rate for all of 2010, the year prior to the cut. The tax cut appears to have accomplished nothing. Potentially proof that only marginal tax rate cuts may increase economic growth. Unemployment Benefits Extension This is the one that always trips up politicians – no one wants to be on record against this “handout”. It is clear that two-year unemployment benefits have done little to create jobs. Extending unemployment benefits does nothing to encourage employment – in fact it can have the opposite effect, paying people to stay unemployed longer. Unemployment will likely fall when the government stops threatening to raise businesses’ costs (taxes and regulations). Increased Fees on Fannie Mae and Freddie Mac Every bill Congress passes is supposed to be “paid for” by offsetting cuts in spending or tax hikes. This partially explains the two-month extensions. It’s cheaper to fund a two-month holiday than a full year. The Senate simply pushed for a two-month tax bill to delay the debate until post-election. The two-month cut needs to be paid for, so Congress levied 10 years of higher fees on Fannie Mae and Freddie Mac. But what do fees on mortgage providers have to do with de-funding social security? Nothing. Social Security tax cuts should be paid for by cutting future benefits. If Congress was honest, Americans would probably not support a tax cut today for lower benefits tomorrow. It would be called eating our seed-corn. Unfortunately, we already ate it (we spend more than Social Security brings in). So this tax cut just makes our already underfunded plan even more underfunded. So Congress avoids this by putting more fees on home ownership! Raising fees on Fannie and Freddie makes no sense. They’re already losing billions and Congress isn’t going to put these funds into escrow to pay for future losses. Instead it will spend the money today and taxpayers will be on the hook for losses. They should be closing down Fannie and Freddie, not making them a bigger part of government. The “Doc Fix” Back in 1997, Congress passed a “balanced budget act” that was supposed to control spending by holding back the growth rate of Medicare spending. Medicare payments to doctors were supposed to be held down by a formula. In the first few years, these reductions were small – Congress avoided putting these cuts into effect by passing a “doc fix” every year, or just delaying the inevitable. In order to comply with these cuts today – which have never been allowed to happen – doctor reimbursements need to fall by a whopping 27.4%. If this were to happen, doctors who treat Medicare patients would be up in arms. No one wants that – it’s not good for business. Congress used this bill to push off these cuts again. It also “kicked the can” on eleven other items as well. Along with the “doc fix,” Congress also made sure cuts to ambulance and mental health add-ons, bone mass measurement, outpatient treatments, and other varied items did not happen. This behavior, which many in Washington knows happens every year, is potentially about to go into hyper-drive. President Obama promised roughly $500 billion of future Medicare cuts would help pay for Obamacare. These future cuts are based on formulas very similar in design to the 1997 bill. So why would anyone believe Congress won’t do the same thing all over again? When faced with the choice of cutting spending or making a constituent mad… Congress always choose the constituents… and not the ones who pay for it all. But it gets even worse. Every year, the Congressional Budget Office (CBO) assumes that Congress will follow through on its 1997 agreement when it scores the budget. So the deficit forecast for the next decade assumes a cut in doctor reimbursements that everyone knows likely won’t happen. When the budget deficit rises more than expected everyone in Washington expresses amazement, regret and surprise and then blames it on the private sector and the rich for not paying enough taxes. Is this a messed up system or what? The Keystone Pipeline Republicans used this bill to force President Obama to make a decision within 60 days on the Keystone Pipeline extension. This project would have already been put in place if private businesses and private money were the only deciding factors. But politicians in the US are too busy subsidizing solar and wind power while delaying and penalizing traditional carbon-based fuel sources. From an economic point of view the pipeline is a no-brainer, making this the only economically viable part of this bill. But it highlights the continued failures of Washington. The Worst Bill in History? Any business that ran this way may quickly be out of business. Government, because it has so much control and power, can avoid the inevitable for a little longer. But eventually the game comes to an end. It is happening in Europe right now. The Welfare State has come to its logical conclusion – bankruptcy. Greece and Spain are doing us a favor: a potential preview. Spain, for example, just admitted its deficit is 8.5% of Gross Domestic Product, not the 6% that it was publicizing last year. So, it is proposing a package of tax hikes and spending cuts equal to 1.5% of GDP. This will leave the deficit at 7% of GDP, even though it had promised under new rules to get it down to 4.5%. Governments seem unwilling to deal with issues that are relatively straightforward. Spending needs to be paid for by taxes, but taxes undermine the incentives to produce and invest in global business. Eventually governments spend so much the economy can’t support it (no matter how much tax rates rise) and bond buyers go on strike. Which is where many European countries are now at. The United States is not there yet. However it is steadily approaching that day if nothing changes. Politics as usual is not working. Just as the above bill demonstrates, every piece points to a government potentially running out of self-control. It’s always easier to keep spending… and Congress acts like no one will figure that out. It links Social Security tax cuts to mortgage fees, it ignores rules that it previously agreed to and promised to follow through on and it “stimulates” an economy that does not need to be stimulated. It continues programs that don’t work. And the entire time it is doing this it keeps telling us that “without government everything would fall apart”. It’s a broken system and the only common theme that runs through it is a considerable effort to get re-elected. It becomes clearer by the day, all the Emperors are naked… there are no more clothes. The good news is we the people are waking up. The European Welfare State is failing and history suggests the US will find a way to correct its course before it’s too late. The opinions voiced in this material are for general information purposes only and are not intended to provide specific advice or recommendations for any individual and are not necessarily representative of the views of LPL Financial. To determine which investment(s) may be appropriate for you, consult your financial advisor prior to investing. All performance referenced is historical and no guarantee of future results. My coach Dan Sullivan likes to say, “Amateurs practice until they get it right; professionals practice until they can’t get it wrong.” From athletics to engineering, medicine to money management, consistent practice is the secret sauce of victory. Professional athletes always have a coach and are insistent on training. Their regimens are scheduled, predictable, and […]
<urn:uuid:232e5b0a-8080-47f0-a737-70d5b79c3cd2>
CC-MAIN-2022-33
https://prosperion.us/commentary/leadership-by-hyperbole/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00077.warc.gz
en
0.958215
2,025
2.0625
2
150 dpi image of 69272 dpi image of 692 Title: Letter, [2nd cent. B.C.] Subject: Hephaistion (From Egypt), 2nd cent. B.C. Correspondence --Egypt --Fayyum --332-30 B.C. Documentary papyri --Egypt --Fayyum --332-30 B.C. Material: 1 item : papyrus, three fragments, of which two join, mounted in glass, incomplete. Note: Dimensions of fragments are 19.8 x 13.6 cm. or smaller. 12 lines. Written along the fibers on the recto. Upper margin of 5.5 cm.; lower margin of 7 cm.; right margin of 3 cm. Extracted from mummy cartonnage with P.Duk.inv. 691 and P.Duk.inv. 693-697. P.Duk.inv. 692 was formerly P.Duk.inv. MF79 19. Papyrus letter from Egypt. Written to Hephaistion and concerns correspondence. The farewell reads "be of good health." In Greek. Descriptive database available in repository. Images and texts on these web pages are intended for research and educational use only. Please read our statement on use and reproduction for further information on how to receive permission to reproduce an item and how to cite it. If you are interested in the techniques used to create the images (compression, color correction, resolution), please see the document on imaging techniques. If you are interested in the methodology used to create the catalogue record, please see the article on the papyrus catalogue records. Return to the papyrus home page Return to Duke University Special Collections Library home page Please see our page with contact information if you have any comments or questions about the Duke Papyrus Archive.Last updated by Peter van Minnen on 11/3/95
<urn:uuid:76c8dd9e-9300-452d-b9b4-a0ac87f11611>
CC-MAIN-2017-04
http://library.duke.edu/rubenstein/scriptorium/papyrus/records/692.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284411.66/warc/CC-MAIN-20170116095124-00466-ip-10-171-10-70.ec2.internal.warc.gz
en
0.786191
394
1.71875
2
Collection Scope and Content Note Show all series level scope and content notes Correspondence, office files, printed material, and other papers relating to Gates's study of U.S. land policy, his role in Indian land claims, and his work as a professor of American history. Includes "A History of Economic Influences on the Fort Belknap and Blackfeet Indian Reservations," by Paul W. Gates, August 1975, written for the U.S Dept. of Justice. Mimeo material on the MIT tenure case of David Noble, 1986. New Hampshire towns annual reports. Also contains personal and family papers of the Gates and Cowdell families, including school memorabilia from Maine and Massachusetts, undergraduate scrapbook from Colby College. Also includes papers of Lillian Frances Cowdell Gates, his wife of 62 years. Lillian Gates was born in England and educated in Canada at the University of British Columbia in Vancouver and the United States at Clark University. In 1956 she received the Ph.D. degree from Radcliffe College. In addition to editing Professor Gates' works, she wrote AFTER THE REBELLION: THE LATER YEARS OF WILLIAM LYONS MACKENZIE, "a meticulous portrait of one of Scotland's foremost immigrants to Canada." This volume was published in 1988. Also includes set of card facsimiles made for sale at the British Museum featuring 12 illustrations from an "Early Sixteenth Century Flemish Calendar (Add. MS. 24098)." Correspondence, including letters to and from David M. Ellis, History Department, Hamilton College, Clinton, New York; office files; pamphlets; circulars; reprints; recommendations of students; issues of NATIONAL GUARDIAN; material on 1940s politics; broadsides; photostats and atlas of Wisconsin pine lands, and manuscript map of Northern Wisconsin showing Cornell University land and area of railroad land grant; photostats of THE SACRAMENTO DAILY RECORD and CALUSA SUN, both California newspapers; material on Indian claims, and exhibit material for Gates' presentation before the Indian Claims Commission, Washington, D.C.; description of a three volume oral history project with Paul Schuster Taylor, completed by the Regional Oral History Office, University of California at Berkeley, and a copy of an introduction to this memoir by Gates; other publications by and about Paul S. Taylor; article on public land policy by Sheldon Greene; National Endowment for the Humanities grant reviews; appraisals of project proposals; and other papers of Paul Wallace Gates.
<urn:uuid:1b56b218-9ca3-4ee4-af35-e34cf08c6b1e>
CC-MAIN-2017-04
http://ebooks.library.cornell.edu/cgi/f/findaid/findaid-idx?c=rmc;cc=rmc;rgn=Entire20%25Finding20%25Aid;view=reslist;subview=standard;didno=RMM00357.xml;focusrgn=scopecontent;byte=173515056
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00081-ip-10-171-10-70.ec2.internal.warc.gz
en
0.908635
569
1.960938
2
Bedwetting during travel or holiday season November 18, 2013 It’s November already and the holidays are right around the corner. For a lot of families, this means either traveling to visit others, or out of town family members will be coming to celebrate. For families who have a child experiencing wetting accidents (day or night time), this can pose a challenge for both. For the child, they can experience embarrassment and shame, with a fear of having an accident in someone else’s home, or in a different environment (i.e. sleeping in someone else’s bed). For the parent(s) it’s a concern of how to manage the logistics of the wetting accidents. This combined with the hustle and bustle of the holiday season adds stressors for everyone, taking away some of the fun and enjoyment of the season. Here are some tips to help both you and your child successfully manage this scenario: - Supplies to have on hand or pack when traveling: - Waterproof disposable underwear (pull ups) – pack more than you think you will need just in case - Protective vinyl pants – these look just like regular underwear and can be worn over pull ups for added protection - Waterproof overlays or disposable underpads – these protective pads have an absorbent layer and a waterproof layer. They can be placed right on top of regular sheets and can be swapped out for a clean one if they become wet or soiled. - If your child will be sleeping in a sleeping bag, there are waterproof sleeping bag liners available - Large plastic bags – pack plenty in case of an accident. They help isolate any odor and are a sanitary way to store any wet underwear, pajamas or bedding - Clothing that is machine washable - A urine stain or odor remover - Talk with your child about how to handle an accident if it occurs. Having them involved in the decision making process lessens their embarrassment and gives them a sense of responsibility Let your child pick out the waterproof underwear and vinyl pants – stock up on these as these may not be readily available in stores when traveling - Help them learn how to change their own protective undergarments Pack an extra change of clothing and plastic bags in a back pack just in case - Be prepared – make sure have you and your child knows where the bathroom is and have everything you need on hand so clean up is quick and easy Though wetting accidents can be a tough topic for many families, incorporating these ideas can help ease the stressors for both you and your child, making the holidays more enjoyable and fun for everyone.
<urn:uuid:d66e4e45-c0ed-434e-acf6-8ac8937de62f>
CC-MAIN-2017-04
http://www.swedish.org/blog/2013/11/bedwetting-during-travel-or-holiday-season
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00448-ip-10-171-10-70.ec2.internal.warc.gz
en
0.925105
545
1.734375
2
Share This Author Social network analysis: a powerful strategy, also for the information sciences The growth of SNA is documented and a co-author network of S NA is drawn, and centrality measures of the SNA network are calculated. The R- and AR-indices: Complementing the h-index The R- and AR-indices are introduced and it is proposed the pair (h, AR) as a meaningful indicator for research evaluation and a relation characterizing the h-index in the power law model is proved. Requirements for a cocitation similarity measure, with special reference to Pearson's correlation coefficient It is concluded that Pearson's r is probably not an optimal choice of a similarity measure in ACA and further empirical research is needed to show if, and in that case to what extent, the use of similarity measures in ACA that fulfill these requirements would lead to objectively better results In full-scale studies. Similarity measures in scientometric research: The Jaccard index versus Salton's cosine formula Sitations: an exploratory study - R. Rousseau We investigate the distribution of domain names and the distribution of links between web sites. It is shown that the Lotka function provides an adequate description. The percentage of self-sitations… An informetric model for the Hirsch-index It is shown that in each practical situation an IPP always has a unique h-index, which is based on the total number of items in Lotkaian systems. Introduction to Informetrics: Quantitative Methods in Library, Documentation and Information Science This chapter discusses informetric models, the dual approach between sources and items giving rise to the definition of Information Production Processes, and some science policy applications. Diversity of references as an indicator of the interdisciplinarity of journals: Taking similarity between subject fields into account The often‐heard argument, namely, that interdisciplinary research exhibits larger visibility and impact, is studied on the basis of these selected journals, yet, as only 7 journals are studied, albeit chosen to cover a large range of interdisciplinarity, further research is still needed. Mapping collaborative knowledge production in China using patent co-inventorships Examination of geographic variations in intraregional, inter-regional and international knowledge exchanges of China from 1985 to 2007 shows that a strong knowledge transfer network would much improve the innovation capacities in less favored regions and help them break out from their “locked-in” development trajectories.
<urn:uuid:7fe5bfd9-b7b2-4f6c-9df7-e1d2f7e27150>
CC-MAIN-2022-33
https://www.semanticscholar.org/author/R.-Rousseau/1807373
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00672.warc.gz
en
0.909799
554
1.632813
2
Manifesting is usually related to some personal issues: attracting a romantic partner, manifesting a happier life, some sorts of relations that will allow us to have abundance in our life, or attracting some specific objects or amounts of money. Not many people however talk about manifesting in business – and it can have amazing impact on business. A Designer’s Story Kiran Rai, founder of Sir Alistair Rai, a company designing and selling Indian inspired scarves, jewelry and accessories, talks about how she used the law of attraction to manifest success in her life and in business: she started as a girl with a dream and a love of fashion who spent countless hours sketching, staring out the window, wishing it would happen – and then she got tired of wishing, and started pretending like it already happened: she started practicing introducing herself by her new job title, imagining what her office space would look like, picturing her new commute route; she worked hard, but she had a goal and a clear image of her being successful in her business. And she made it. Later, as her business grew, she expanded her manifesting: she used creative visualization to assemble a team of employees who have created a symbiotic relationship with her, and with each other; as for the retail stores she spent years courting, after manifesting that her line was carried there, their buyers started calling seasonally; the stylists she used to dream of working with are today ordering regularly. But she also says: I’m not suggesting that you surrender your business degree and let the fates decide the future of your company. Good sense, hard work and a lot of luck play equally crucial roles in successful business. But if manifesting is free, harmless and it brings good things your way… why not give it a try? LOA Working for the Real Estate Agents Maya Bailey, a business coach, describes how she used the law of attraction in coaching real estate agents to double and triple their incomes. Before she introduced it to her clients, she wanted to see if it could work for her – and it did: she started getting immediate results, significant increase in income and in clients, but most importantly for her, she was attracting the kind of clients she really wanted to work with, her “ideal clients”. When she introduced the practice to the real estate clients she was coaching, she saw mixed results: for those who were eager to learn about the law of attraction (about half of her clients), introduction to this new practice worked wonders, and their business skyrocketed. For the other half, nothing happened. having a background in psychology, she soon discovered that the other half was carrying limiting self-beliefs, such as: - I don’t deserve to be successful - I don’t have what it takes to succeed - Marketing is not for me - There is never enough money to go around - Real estate is too competitive for me. According to her, once she coached them to release these limiting beliefs, the law of attraction worked like a charm! How to Apply the LOA to Your Business Even if you don’t want, or don’t have the time to dive deep into the spirituality, you can apply some pretty simple steps that will get results quickly enough: - Think about what you want, and be clear about it. Write what you want on a piece of paper (or on your computer) - Imagine – visualize – yourself having what you want, one goal at a time, include vivid details to your visualization and, at the same time, feel what it would feel like to have what you want. Add a strong positive emotion to each of your visualizations. - Get all of your limiting self-beliefs out to the open, and clear them. - Take action! Start noticing opportunities and acting according to them, work on expanding your business, but always keep in mind the end goal – as it has happened. - Whatever happens, believe that you will make it – every obstacle is only an opportunity to learn and to grow, in business and as a person. In every business today, your mindset is the key to your success. Using the law of attraction will only help you get there faster, and with more fun. As Kiran Rai said, it’s free and harmless – and it will certainly make you feel good about yourself!
<urn:uuid:c7e57910-cad8-44d0-ac62-d33f58100ecc>
CC-MAIN-2017-04
http://www.thelawofattraction.org/how-manifesting-impacts-business/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280718.7/warc/CC-MAIN-20170116095120-00400-ip-10-171-10-70.ec2.internal.warc.gz
en
0.97606
917
1.695313
2
On Saturday, Jan. 26, Stoneridge Creek celebrated Lunar New Year, saying goodbye to the Year of the Dog and welcoming the Year of the Pig. Celebrated by more than 20 percent of the world’s population, Lunar New Year, which will be on Feb. 5 this year, is the most important holiday in China. Unlike western New Year that follows the sun around the earth, Lunar New Year is based on the Chinese lunar calendar and follows the moon. The tradition is celebrated with special meals, art, entertainment and fireworks. Stoneridge Creek resident Kate Gong created this event five years ago with the desire to share her culture with the entire senior living community she’s called home for the past five years. A wonderful aspect of this annual event is that it gives all residents the ability to learn about various cultures from one another. “This Lunar New Year celebration gives residents and their families the opportunity to learn more about the Asian culture through traditional food, entertainment and even personal stories,” said Gong. “I started this event to heighten awareness of the culture while also bringing us all closer as a community.” Stoneridge Creek understands the importance of residents sharing their culture and spirituality. Research shows there’s a link between this and better mental health, and it also helps people feel more connected with the world around them. More than 400 residents, team members and families attended this year’s event, which featured an Imperial Fashion Show of the Royal Chinese Court. Fifteen models showcased traditional attire worn in the courts of emperors and empresses. And, of course, it wouldn’t be Lunar New Year without the energetic and athletic Vovinam Viet Martial Arts group, who performed the popular lion dance.
<urn:uuid:90135986-cba7-4e59-8375-2ecd20674410>
CC-MAIN-2022-33
https://stoneridgecreek.com/2019/01/28/more-than-400-people-celebrate-lunar-new-year/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00069.warc.gz
en
0.94845
367
2.34375
2
New King Coal offers to clean up coal-fired power plants, for free Billionaire coal-magnate Chris Cline is offering to clean up two outdated coal-fired power plants, for free. The plant owner, power-provider Dynegy says no thanks. In a bizarre turn of events this week, Cline has sided with the environmental group Sierra Club in asking the Illinois Pollution Control Board (IPCB) to not grant time extensions for old coal plants to update their systems, Forbes reports. Cline – owner of Foresight Energy, a coal miner – wants Dynergy to let him pay for the eco-friendlier upgrades and, in exchange, promise to buy his coal. The Board has been granting five-year waivers to several old plants because of the huge costs associated with modern pollution control systems. Aged facilities don't have the required scrubber devices which remove sulphur dioxide emissions. This week the IPCB was weighing whether to allow companies to continue delaying the installations. According to Forbes, Foresight CEO, Michael Beyer, testified to the Illionis Pollution Control Board on Tuesday, stating that if Dynergy did not want to foot the bill – estimated at about $500 million – his company would. Otherwise, the miner could just buy the two plants, Beyer added. Cline does not sell much coal to Illinois plants because they don't have scrubbers. Dynergy is in the process of buying five outdated coal-fired power plants from Ameren – a holding company – and has been fighting to retain the five-year waiver which was originally granted to Ameren. The IPCB denied the request in June.
<urn:uuid:7dbc8a09-d6ce-419e-8ad7-1517837b543f>
CC-MAIN-2017-04
http://www.mining.com/new-king-coal-offers-to-clean-up-coal-fired-power-plants-for-free-85693/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284405.58/warc/CC-MAIN-20170116095124-00040-ip-10-171-10-70.ec2.internal.warc.gz
en
0.971412
350
1.875
2
If these editors had a time machine and could tell their past selves about the present, more journalists might be employed right now. Or not – if they’d messed with the past it’s probably equally likely that Skynet would be running our lives or resurrected dinosaurs would have eaten all humans. But that’s not the point this Nieman Reports piece is trying to make (as much as we’re sure they love dinosaurs as much as we do)–actually, Nieman asked six former editors what they’d do differently if they were back in charge at their old papers. The answers may surprise you, ranging from hiring more investigative reporters (Ronnie Agnew, former editor of The Clarion-Ledger) to using amateur photos from readers (Mike Pride, former editor of the Concord Monitor). That’s quite a difference. Skip Perez, former editor of The Ledger in Lakeland, Fla., had a different take: it’s not about what to cover or how to cover it, it’s about preventing burnout. “But my sense is that almost everyone is overlooking the “people piece,” meaning the newsroom staffers who should care deeply about the quality of their work and feel good about it every day…How might newsrooms recapture that essential spirit, short of hiring a managing editor for psychotherapy?…a commitment to staff training is essential. Training budgets are among the first to be eliminated when money gets tight. But the right kind of training will boost morale and reward the news organization with dedicated staffers itching to tackle groundbreaking assignments. And those who are given training opportunities will gladly share their experiences and ideas with colleagues at a meeting or brown bag lunch.” Now that’s a revolutionary idea.
<urn:uuid:3d16a0da-c397-4480-aa82-ca0f633344a8>
CC-MAIN-2016-44
http://www.adweek.com/fishbowlny/what-editors-would-have-done-differently/319091?red=mj
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719908.93/warc/CC-MAIN-20161020183839-00159-ip-10-171-6-4.ec2.internal.warc.gz
en
0.971389
368
1.757813
2
Will new tech era spell literary death? His novels are acclaimed by fellow writers and critics, and his latest book is a bestseller in Korea. Kim, 37, has swept up most of the local literary awards. Last year he won the prestigious Hwang Sun-won Award for his novella “The Comic Who Headed to the Moon.” Before this interview, I read his fourth novel, “Whoever You Are, How Lonely You Are” (Munhak Dongne Publishing). Published last year, it’s been on the bestsellers list for a number of weeks. I also took a look at his first collection of essays, “Phrases of Youth,” published in 2004. Kim said he’d wanted to be an astronomer or a guitarist when he was at high school. “I think it was fate that I ended up majoring in English literature,” Kim says. “If I hadn’t studied Ian Watt’s ‘The Rise of the Novel’ at college, I probably wouldn’t have become a novelist.” What interested Kim was Watt’s thoughts on the English novelist Daniel Defoe, author of “Robinson Crusoe” (1791). Watts said Defoe’s novel was intricately related to the advent of capitalism and colonialism in the British Empire. “I was immediately drawn to Watt’s theory. It inspired me to think that if a novel is a social construct, I could write one, too ― even if I’m not a genius.” Before he debuted as a novelist, Kim wrote poems. He recalls the first time he heard a literary magazine was going to publish his work. It was the happiest moment of his life. He was a senior at college at the time. “That summer, I wrote poems for hour after hour,” he says, “enough for five volumes.” Kim stopped writing poetry when the literary critic Kim Hyeon died. “I thought he would be the only person who would understand my poems,” he said. Kim read about Kim Hyeon’s death in a newspaper. Aimlessly wondering the streets, he’d spent the night on a bench outside a hospital emergency room. The newspaper had been discarded and Kim saw the critic’s obituary. “I’d really wanted to show my work to Kim Hyeon and in that moment in the park all my hopes vanished,” Kim said. Kim started writing novels in the belief that good literature leads to social change. Like all Koreans his age, he has seen his fair share. He was a teenager when civilians were killed in the democratic uprisings of the 1980s. He went to college when the Korean Teachers Union fought for labor reforms and the military regime had just cleared out from the Blue House. Then the Berlin Wall came down, and when Kim started college in 1991, the Soviet Union collapsed. “Superficially, my novels may appear autobiographical, a mix of political incident and love stories,” he says. “But they’re not. I’m against novels that pretend to have an omniscient point of view but use the first person as a narrator.” Kim’s latest novel investigates how a person is transformed between 1991 and 2007. The story reflects changes that have taken place in Korea during this period. He says the story is based on a relatively simple plot, but the narrative becomes increasingly complex. “It’s naive to think that literature will eventually disappear,” Kim says, acknowledging that many commentators feel that novels and poetry are devalued in today’s society. “Just because we have computers, movies and cable TV doesn’t mean that life will no longer be hard. Pain, despair and sadness will always be with us. That’s why literature plays such an important role in our lives.” However, Kim says literature is increasingly narrowing down in terms of scope and subject. “Not enough novels are being produced by writers to ... meet the readers’ needs,” he said. By Jang Jeong-il Contributing Writer [email@example.com]
<urn:uuid:15ceabd3-6b47-4145-8772-552141ad9478>
CC-MAIN-2022-33
https://koreajoongangdaily.joins.com/2008/01/11/artsDesign/Will-new-tech-era-spell-literary-death/2884998.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00074.warc.gz
en
0.980107
918
1.882813
2
During the next three weeks, the Church provides options for Mass, for those who are preparing for baptism at Easter. These are called "the scrutinies," and I know some don't care for them. Here's how it works, in case you're unfamiliar--or maybe you've seen something other than this. The readings are from "year A"--which was last year--so they aren't the same for this Mass as those used at all other Masses this weekend (same next weekend and the onee after). The Gospels are taken from John, and they are longer -- although an abbreviated lection can be used. This week, it was "the woman at the well"; next week, "the man born blind"; and then, "Lazarus raised from the dead." The Mass prayers are also different. Everything emphasizes preparation for the Easter sacraments. In my homily I talked about the water having a double-symbolism of baptism and the Holy Spirit, and talked both about the thirst the catechumens have for the Holy Spirit, and the wonderful gift each of us has in our baptism. I also mentioned how much I look forward every year to giving this gift at the Vigil, and I invited everyone to take part. After the homily, the catechumens and their sponsors are called forward; I invite them to kneel, we offer our prayers of the faithful, and then I pray a prayer over them called an "exorcism" (but I don't tell them that, since that might sound a little scary); it is about protection from evil, recognizing that the evil one would like to derail them. After that, I impose hands silently on them, and then dismiss them for reflection on the Word of God. The Creed follows, and then the rest of Mass. I used the Roman Canon, in particular because there is an option for prayers to be inserted for the godparents, and those to be baptized. The only other thing you might experience is two sets of intercessions--one for the catechumens, and then the regular ones; but I exercise the option of combining them. I like this because it gives an opportunity to focus on the sacraments and also invite everyone to be aware of, and pray for, those entering the Church; it reminds us of our mission to share the Gospel. On the other hand, I don't like that the folks at that Mass didn't hear the other readings.
<urn:uuid:c7190b29-4320-4e35-a3a8-e6a5f3e55e29>
CC-MAIN-2017-04
http://frmartinfox.blogspot.com/2009/03/final-journey-to-easter.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280410.21/warc/CC-MAIN-20170116095120-00452-ip-10-171-10-70.ec2.internal.warc.gz
en
0.972579
512
1.742188
2
At VCPS, we specialise in the assessment of mental health concerns in children. We work closely with multidisciplinary team members to help promote psychological adjustment of children and their families. At VCPS, our intake team is designed to personally tailor psychologist assistance, and are available to answer any queries you may have. The intake team will take the time to understand the needs of your child and family in order to help you decide which practitioner is best suited to your child. We provide assistance to children who may be experiencing concerns including: - Behavioural problems: Refusal to attend school, poor self-control, behaviour which is dangerous to themselves or others, lying, stealing and aggressive behaviour - Emotional problems: Trauma reactions, stress, anxiety, depression, tantrums, suicidal thoughts, extreme anger outbursts - Relationship problems: Social withdrawal, family conflict, poor peer relationships (including bullying) - Developmental problems: Social skills, learning, attention, concentration and play difficulties - Health and wellbeing problems: Disturbed eating or sleeping patterns, poor self-care, self-injury, physical symptoms indicating emotional distress - Other psychological problems: Hallucinations (voices and visions that no-one else can experience), delusions (false beliefs), seeming to be out of touch with reality, habitual and obsessive behaviour You may view our full suite of services for children here. Our practitioners use a variety of techniques according to a child’s needs, including cognitive behavioural therapy, mindfulness, play therapy, family and parenting work, group work, work with parent/s and child together, and individual psychotherapy. Our work with a client can be short-term (six sessions) or long-term, depending upon the goals identified. If necessary, we work in collaboration with all of the systems relevant to the child (including their immediate environment, their family, school, or other health professionals involved). Our practitioners also specialise in providing assessments for children and adolescents in order to gain information for diagnostic purposes, guide treatment and determine any educational needs. Some of the most common child and adolescent assessments are listed below. - Autism assessment: Identify and diagnose autism spectrum disorders across ages, developmental levels and language skills, and determine the symptom severity. The assessment is designed to elicit behaviours directly related to ASD and covers the areas of communication, social interaction, restricted and repetitive behaviours and play. These assessments gain information that can inform diagnosis, treatment planning and educational recommendations. - ADHD assessment: A reliable and leading assessment tool is used to diagnose ADHD and used to also assess comorbid disorders such as oppositional defiant disorder and conduct disorder in children and adolescents aged 6 to 18 years. The assessment takes into account home, social and school setting behaviours with rating forms for parents, teachers and youth. The results assist in developing informed intervention and treatment strategies. - Cognitive assessments: This assessment is used for diverse reasons such as identifying intellectual disabilities, learning disorders and difficulties, evaluating cognitive strengths and weaknesses, assessing giftedness and assessing the impact of brain injuries. A cognitive profile is greatly beneficial in not only guiding treatment, but more importantly can lend vital information required to assist in educational planning in terms of a child’s learning styles, strengths and utilising these strengths to improve cognitive weaknesses. - Emotional and behavioural assessments: Identify emotional and behavioural difficulties in children and adolescents, particularly when it is unclear as to what may be causing a child’s problem behaviours.
<urn:uuid:87cbcb5a-1183-4791-800a-8521769948de>
CC-MAIN-2022-33
https://vcps.com.au/service/children/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00470.warc.gz
en
0.935428
711
1.898438
2
Scientists make breakthrough in plant medicine productionJune 28th, 2008 - 4:36 pm ICT by ANI Washington , June 28 (ANI): Scientists from Wageningen University and Research Centre in the Netherlands have made a breakthrough in plant medicine production, by unravelling and manipulating the glycosylation of proteins in plants. It is believed that this knowledge may be put to use by allowing plants to be applied more often in the production of therapeutic proteins, an important type of medicine. In fact, this discovery geld with the technology developed by the Wageningen UR research institute Plant Research International for the production of biopharmaceuticals in plants. In a process known as glycosylation, proteins in plants, animals and people are seen with various sugar chains, which play a vital role in the functioning of many proteins. In addition, their identity and uniformity is crucial to the quality of therapeutic proteins. Glycosylation basically involves three stages firstly, chains are constructed, and then attach to the protein in specific locations and finally the sugar chains are further modified as specific sugars are attached to the chain. We are the first institute in the world to identify a gene in plants that is involved in the construction of these sugar chains, the first stage in glycosylation. It seems that the chains become increasingly uniform as the expression of this gene is reduced, The Science Daily quoted scientist Maurice Henquet, as saying. This results in the development of mainly a single type of chain, a relatively simple one. Thus, the sugar chains attached to the proteins are a better starting point for making adjustments that are designed to optimise the biological function as medicine. From now on we will be able to improve the manipulation of glycosylation. And plants will become even more suitable for medicine production, added Henquet. (ANI) Tags: biological function, biopharmaceuticals, breakthrough, discovery, expression, glycosylation, manipulation, medicine, netherlands, plant medicine, plants, protein, scientist, scientists, sugar chains, sugars, therapeutic proteins, uniformity, wageningen university, wageningen ur
<urn:uuid:c2863fd1-f587-4886-965d-782c85ab031b>
CC-MAIN-2017-04
http://www.thaindian.com/newsportal/entertainment/scientists-make-breakthrough-in-plant-medicine-production_10065512.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279489.14/warc/CC-MAIN-20170116095119-00013-ip-10-171-10-70.ec2.internal.warc.gz
en
0.944617
444
3.015625
3
Quotes of the day posted at 10:21 pm on December 5, 2012 by Erika Johnsen The White House hardened its position that Congress should raise the U.S.’s borrowing limit without preconditions, adding an unpredictable new element into the high-stakes budget talks. In a Wednesday speech to top corporate chiefs, President Barack Obama said he wouldn’t negotiate with Republicans on this issue as he did in 2011. “I want to send a very clear message to people here: We are not going to play that game next year,” Mr. Obama said in remarks to the Business Roundtable, a trade group. He said Washington needs to “break that habit before it starts,” referring to the way Republicans would like to use the debt limit to negotiate further spending cuts. Sen. Charles Schumer (D-N.Y.) says Republican threats to allow the debt limit to expire next year have no credibility. … “I think they learned their lesson with the debt ceiling, I don’t think it’s leverage for them at all,” Schumer told reporters Wednesday. … “I think they’ve learned that mistake and any talk that that is leverage for them is false,” he added. House Minority Leader Nancy Pelosi (D-Calif.) signaled Wednesday that she didn’t want the debt ceiling – and its accompanying drama – wrapped up in the fiscal cliff negotiations. “Well I don’t think the debt ceiling has a place in all of this,” she told reporters on Wednesday. “I think that we continue the McConnell rule.” The so-called “McConnell Rule” is a bit of procedure crafted by Senate Minority Leader Mitch McConnell (R-Ky.) under the Budget Control Act. for raising the debt ceiling. It calls for the debt ceiling to increase, unless both chambers of Congress pass a resolution to block it. If that were to happen, Obama would veto it and send it back to Congress, which would need a two-thirds majority to override the veto. This process is a way to symbolically put the onus on raising the debt limit on the president. Portman, in a letter he plans to send to President Obama, says he opposes the White House proposal, floated last week, to permanently roll back congressional oversight of the debt ceiling. The Ohio Republican, who once served as budget chief to President George W. Bush, adds that the debt limit has historically been lawmakers’ best opportunity to get the federal budget in line, and reminds the president that he once voted against a debt ceiling increase. “For Congress to surrender its control over the debt limit would be to permanently surrender what has long provided the best opportunity to enact bipartisan deficit reduction legislation,” Portman writes in a letter he is currently circulating among colleagues. If the debt ceiling were still what it used to be—nothing more than an opportunity, once a year or so, for the opposition party to give speeches on the floor decrying the majority’s profligate ways, followed by a pro forma vote to raise it—then they wouldn’t care about maintaining it. They want to keep it because the threat of economic calamity is a weapon they can use to extort policy concessions they wouldn’t be able to get otherwise. Grover Norquist even suggested we should have a hostage crisis every month. … Eliminating the debt ceiling once and for all may seem like a secondary part of these negotiations, but Democrats really should push it to the forefront. Make Republicans defend the hostage-taking that they did in 2011 and the fact that they want the ability to do it again when it suits them. Maybe then we can finally slay this beast. The seemingly endless series of budget showdowns that have characterized the last two years has a lot of people frustrated, and understandably so. But I think it’s a mistake to attribute that pattern to a failure to seriously bargain, as many critics suggest. It is in fact the only plausible outcome of bargaining given our increasingly problematic fiscal situation. A lasting bargain — a middle-ground deal that provides a solution that endures for many years, of the sort reached in the 80s and 90s — is not really going to be possible in this situation. And the frustration about this has to do with a failure to grasp just what our situation is, and just how different the goals of the two parties are at this point. … Over and over, the two parties basically try to position themselves in ways that will let them get nearer their versions of deficit politics in the next showdown. What result are all “middle ground” agreements that avert immediate catastrophe by setting up further decision points to come. They are not “grand bargain” agreements that set us on a sustainable course toward fiscal sanity. And there is a reason for that: Broadly understood, the two parties’ goals are not exactly about the budget but about the nature of the government we have, and now that we have entered the lean years of the welfare state they are not quite commensurate. Barack Obama says his election victory is a mandate to pursue the policy course he’s insisting on in negotiations with Republicans on the fiscal cliff. He wants a tax increase of $1.6 trillion, $50 billion of new and immediate stimulus spending and the end of congressional approval to raise the ceiling on U.S. debt—the debt that a ratings agency downgraded in 2011. The campaign stump speech in which Mr. Obama demanded that Congress cede him control over the debt ceiling slips my mind. But we all recall his repeated cries for increasing taxes on “the wealthiest” ($200,000 individual/$250,000 joint), so arguably he has a claim to that. Consequences do come with the democratic habit of holding elections. … The message of the 2010 election, for Republicans anyway, was unambiguous: Slow down the runaway public-spending train, the spending train that caused the nation’s voters to torch and punish Republicans in the 2006 midterms. On the available evidence, a Republican who forgets those recent elections is headed for retirement. So naturally Barack Obama wants John Boehner and the Republicans in control of the House to forget those elections.
<urn:uuid:8953f7f3-6570-4a0e-b878-5edd9a45647c>
CC-MAIN-2017-04
http://hotair.com/archives/2012/12/05/quotes-of-the-day-1220/comment-page-9/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282926.64/warc/CC-MAIN-20170116095122-00401-ip-10-171-10-70.ec2.internal.warc.gz
en
0.958874
1,304
1.617188
2
China Eastern Airlines will use Beijing's upcoming new airport as an opportunity to expand its international network, especially to destinations in economies participating in the Belt and Road Initiative, a top company official said. Industry experts said the Beijing Daxing International Airport, which is expected to open on Sept 30, will play a key role in China's civil aviation, and in the development of the Beijing-Tianjin-Hebei region and the Yangtze River Economic Belt. The gigantic airport will also serve as a key transport hub connecting regions relating to the Belt and Road Initiative, said Huang Pu, general manager of China Eastern Airlines' planning and coordination division in Beijing. According to Huang, the new airport has presented the Shanghai-based carrier with an opportunity for its long-term development, and the carrier is ready to make Beijing its second headquarters. He Jiankai, general manager of China Eastern's business network operations, agreed. "The Beijing Daxing International Airport will enable China Eastern to obtain more slots for launching international routes from Beijing. Shanghai and Beijing will be China Eastern's two gateways to long-haul routes to overseas destinations." Read Original Article
<urn:uuid:238d5243-1811-46b1-aacb-47077106ec10>
CC-MAIN-2022-33
https://www.chinatravelnews.com/article/129081
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00073.warc.gz
en
0.929171
237
1.78125
2
There are many benefits to applying digital marketing. It heightens conversion rates and improves top quality of leads. It also engages audiences whatsoever stages, by product research to repurchasing. In contrast, traditional advertising is based on limited data and will measure magazine readership and neighborhood demographics. To determine the best digital web marketing strategy, consider the following: Content marketing targets on creating and distributing content that will interest your target market and increase your business. This article can range coming from blog content to movies, white-colored papers, training calls, and social media posts. It also helps in building brand level of sensitivity and raising authority position. Content promoting also requires analytic expertise, such as identifying the best ways to reach your target audience. After getting a basic understanding of the audience’s https://digitalconnect.pro/digitalization-of-companies/ requirements, you can decide which strategy to use. Content marketing includes SEO and content material marketing. A total digital promoting strategy should include an online site, social media outreach, and SEO. Small businesses will not be able to implement all these approaches at once, nevertheless they can start with all the basics. After a while, they will steadily increase their targeted traffic and income. And don’t forget regarding the power of social media. With billions of active users, you can goal ads based upon interests, demographics, and behavioural patterns. The utilization of digital programs and methods has become a necessary part of business strategies. They help hook up businesses with customers and measure the success of their marketing efforts. With a solid knowledge of digital advertising, marketers can support bigger advertisments through no cost or paid out channels. With these tools, entrepreneurs can screen their advertisments and produce decisions based upon them. Therefore , while the way forward for marketing remains to be uncertain, digital marketing can make your company thrive. For instance , a brandname can use digital marketing to create leads because they build brand loyalty among consumers.
<urn:uuid:842dd0a0-b421-496f-a2bc-920d6b986ba5>
CC-MAIN-2022-33
https://visitrometour.com/how-digital-marketing-can-change-your-business/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573667.83/warc/CC-MAIN-20220819100644-20220819130644-00072.warc.gz
en
0.930854
394
1.515625
2
Changing icons can greatly impact the look and feel of your Windows PC. So, everyone trying numerous customization and tweaks on their OS. If you are one of them who gives importance to the design of your windows, you might consider tweaking icons of your OS. Not only the desktop icons can be changed, but each of the folder, drive, and file icons can be altered as per your requirements. In this article, we are going to provide the complete steps to change icons in Windows without having to sweat much. Have a look. How Change Desktop Icons in Windows Desktop icons plays a crucial role in providing ease in accessing the most important sections like Computer, Recycle Bin, Network, and your User folder, etc. If you want to change the desktop icons, follow these simple steps. This will help you to apply custom desktop icons Note: If you want, have a look at these free desktop icons to select as the new one. - Go to the Desktop of your PC. - Right-click on the desktop. - Select Personalize from the context menu. - Now, the personalization screen will appear. There, click on the “Change desktop icons” link on the left sidebar. - Now, select and highlight the icon you wish to change, and click the Change Icon button. If you are using Windows 7, there will be a box saying whether to allow themes to change icons or not. Uncheck it if you don’t want themes to change your icons that you are going to change. - Now, the icon selection window will open up where you can select any of the provided icons by windows. If you have any other .ico files in your PC (You can download them from the link given above), just click the browse to find the icon. - After selecting the desired icon, click Ok. Now you have some cool desktop icons. You can also change the desktop icons size by right-clicking on the desktop and selecting the appropriate option from the “View” section. Change Folder or Shortcut icons in Windows The steps to change folder icon, or to change shortcut icon is almost same. You have to do the same procedure for all of them which is given below. - Right-click on the folder or shortcut. - Select Properties from the context menu. - Navigate to the Customize tab. - Now, click the Change Icon button. - The remaining steps are as described in the above section. Now, you have some stylish folder icons as well as some good shortcuts. Change Drive Icon Having some stylish, cool looking drive icons in your my computer window is not that bad. So, if you ever wanted to tweak the drive icons in Windows, follow these steps. - Download Drive Icon Changer and run it as administrator by right-clicking on the file and selecting “Run as administrator” option from the context menu. - Now, the program screen will show up. There, select the drive that you want to change the icon of. Then browse the icon. - Just click the Save button and a message saying “Icon changed successfully” will pop up. - If it is prompted for a reboot, click Yes. After rebooting completed, you will see the drive icon has changed. Repeat the same steps for all the drives if you want to change multiple drive icons on your PC. Change EXE icon Changing the EXE icons is a little tricky. But it is also very easy as the above methods. If you want to change the icon of any .exe file, follow these steps. Note: It is recommended to change the icons after creating a backup copy of the .exe file. - Download Resource Hacker and install it. - It will add an option namely “Open using Resource Hacker” to your context menu. Just right click on the EXE file and choose that option. - Now, the resource hacker window will show up. There, select the “Icon” folder in the left pane and click the “Action” menu on the top and then select “Replace Icon” option. - Now, another window will open up. There, click the Open file with new icon button and browse the icon. The file types like EXE, RES, DLL, or ICO are allowed. - After choosing the icon, it will preview it in the left side. Now, select the icon to replace from the right side. If multiple items are listed there, you have to find the right one to replace. Usually, the first one will be the EXE file icon. - After highlighting the correct icon to replace, click the “Replace” button. - Now, you will be directed back to the resource hacker screen, and you can see several new icon sizes are showing in the icon folder. - You can now save the EXE file and replace the EXE file if prompted. Now, go back to the location of the EXE file, and you will see a new icon will be applied to that file. How to Restore the Default Icons After changing the icons, at any time you wanted to restore them back to default, just follow these steps. Restore the Default Desktop Icons - Right-click on the desktop and select “Personalization” from the context menu. - Click “Change desktop icons” option in the left pane. - In the opened window, click the “Restore Default” button. - Now, your desktop icons will then be restored to their default. Restore the Default Folder or Shortcut Icons - Navigate to the icon selection screen by following the instructions in “Folder or Shortcut icon change” section. - Now, you will see a “Restore Default” button. Click on it. - And that’s it. Your folder icons will be restored to default. Now, you know how to change icons in Windows. These steps are applicable to almost of the windows version including, Windows Vista, Windows 7, Windows 8, Windows 8.1, and Windows 10. Also, you can download any of the icons pack available in different sources online. Also check out the free icon websites. They will provide you with the best looking icons for your files and folders. If you face any difficulties in the process, do not hesitate to ask us help. We will be happy to help you.
<urn:uuid:0e8769da-fcf6-4b9b-a81c-8921c20741e1>
CC-MAIN-2017-04
http://thetechhacker.com/2017/01/11/how-to-change-icons-in-windows/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282926.64/warc/CC-MAIN-20170116095122-00391-ip-10-171-10-70.ec2.internal.warc.gz
en
0.863264
1,352
1.820313
2
Loreto’s second annual Engineering Speed Meet was recently held in college. The event saw twelve professional engineers from a wide range of disciplines come into college for the evening; from chemical engineering students to water treatment engineers, satellite technologists to designers of mass spectrometers. The evening gave Loreto students and Year 11 students from Chorlton High School the opportunity to ask the engineers about the career path that had lead them to their current role; the qualifications they took at A level and university, the skills they use, the wide range of roles available and the surprising realities of their day-to-day jobs. Before the Speed Meet students had an opportunity to explore the engineering possibilities of spaghetti, with a competition to build a bridge capable of supporting the maximum load. Feedback from both the engineers and the students was overwhelmingly positive, with many new perspectives on future careers. Engineering Your Future Coincidentally, two days later, thirteen Loreto students got the opportunity to spend a day at Siemens plc in a series of workshops run by the Institute for Engineering and Technology (IET). This event provided a valuable in-depth experience of engineering in practice, and was over-subscribed.
<urn:uuid:343d3515-199a-4bd3-be92-9a77c4d9d17b>
CC-MAIN-2017-04
http://loreto.ac.uk/engineering-speed-meet-2016/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00049-ip-10-171-10-70.ec2.internal.warc.gz
en
0.969826
250
1.570313
2
Pharmacy Awareness Month is the perfect time to celebrate pharmacist’s expertise and the important role they play in delivering quality care to patients! Many people are unaware of the many places where pharmacists make a difference in the health care of Canadians. Pharmacists are the most accessible health care professionals. They are counted on for advice on prescription, non -prescription and herbal treatments. Understanding how medications work, adverse effects to watch for and interactions between medications are some of the areas where pharmacists educate patients. In addition, pharmacists advise on vaccinations as well as administering them and provide consultaion services in helping people quit smoking. What many people don’t know is the area of specialization that some pharmacists have developed; from diabetes education to women’s health to geriatric specialization, oncology, auto-immune diseases and more. Pharmacists work in hospitals, family health teams, the pharmaceutical industry and in academia doing research and educating students. As health professionals, pharmacists are dedicated to being lifelong learners. As part of their license to practice pharmacy, each pharmacist must maintain a learning portfolio of all of their educational activities and establish annual learning goals. Most pharmacists graduating today, have had 7-8 years of university education along with a year of internship prior to wiriting their licensing exams. The pharmacists at Brant Arts are proud to service our patients and welcome your questions.
<urn:uuid:1023d210-08a5-4394-a727-aa77b433e5fe>
CC-MAIN-2022-33
https://brantarts.ca/blog/pharmacist-awareness-month/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00477.warc.gz
en
0.959328
287
2.359375
2
What Happens During Probate? (Part 1) Like most other legal proceedings, the probate process can be intimidating to individuals who have never gone through the process before. Some executors may be “scared out of office” when they realize that they have obligations to the decedent’s heirs and beneficiaries as well as to the court. Probate need not be a frightening goblin of a process, however. Any angst or anxiety you feel after learning you have been designated as a person’s executor or administrator can be relieved by simply taking the time to learn about the probate process. Initiating Probate by Filing a Petition The probate process begins when a decedent dies (with or without a will) and an individual steps forward with or without the decedent’s will (as the case may be) and files a petition to probate the decedent’s estate. The petition can be found at the courthouse if the person is unable to procure a copy of the necessary petition online. If the decedent died testate (that is, with a will), the individual will present the will to the court so that the court may declare the will to be valid and enforceable – or to find otherwise, if the evidence so shows. During this process, the person who presents him- or herself to the court will typically also request that the court appoint him or her as personal representative (executor) over the decedent’s estate. If the person is the same individual named as executor in the will, or if the person appears to be suited to be the personal representative of the decedent’s estate, then the court will appoint the individual to be the representative of the estate. Issuance of Letters of Administration At the same time as the person is appointed to be the personal representative of the estate, the court will also issue Letters of Administration to the representative. These “letters” are formal legal documents informing companies and financial institutions that the person has been appointed to represent the estate in winding up the decedent’s affairs. Without these letters, the person would be unable to access financial records and close bank accounts in the decedent’s name. Notify Creditors, Heirs, and Beneficiaries Once an appointment is made, the representative must make creditors of the decedent aware of the decedent’s passing and provide them with an opportunity to present any claims they may have against the decedent’s estate. To provide notice, the representative will typically publish a formal legal notice in the newspaper of the locale in which the decedent died and send a copy of this notice to each creditor that the representative can identify. The newly-appointed personal representative must also provide notice that he or she has been appointed as representative by the court within thirty days of the appointment. Complete an Inventory on the Estate’s Property The purpose of an inventory is to identify for all heirs and beneficiaries what property the estate has in its possession, how it is being held (i.e., is it community property acquired during the decedent’s marriage) and the approximate value of the estate’s property. Although the representative need not take actual physical control of the estate’s property at this time (which may not be feasible or even advisable if it is being possessed by the individual(s) who would possess the property under the terms of the will), the representative can do so and safeguard the asset or property until distribution to the appropriate heir or beneficiary. At this point, the representative has taken the initial steps necessary to probate an individual’s estate. The remainder of the steps focus on management and distribution of the decedent’s property. Find out more about what happens during probate by contacting the experienced attorneys at Leighton & Abdo, PLLC.
<urn:uuid:4bc020ca-ebec-4eac-a419-0cf60b07b73e>
CC-MAIN-2022-33
https://mail.estateplanninglegalservices.com/happens-probate-part-1/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00471.warc.gz
en
0.947769
815
2.375
2
Modeling a small, blue planet The oceans play an important role in the earth's climate; they transport heat from equator to pole, provide moisture for rain, and absorb carbon dioxide from the atmosphere. Ocean models, such as this one from Los Alamos National Laboratory, help explain interactions between individual eddies that may be altered in a changing climate. This visualization, courtesy of the Lab's MPAS-Ocean Model, shows ocean currents and eddies in a high-resolution global ocean simulation with the Antarctic in the center. Colors show speed, where white is fast and blue is slow. Detailed turbulent structures are visible throughout the Southern Ocean, where the Antarctic circumpolar current flows eastward around the globe. Large eddies are particularly visible in the Agulhas current at the southern tip of Africa. These ocean simulations are validated against satellite and shipboard observations. Even though individual eddies occur on scales of 10-150 km, their cumulative effects have large and long-ranging consequences on the earth's climate. In the Southern Ocean, eddies transport heat poleward. The strength of large-scale circulations in the northern hemisphere is sensitive to the turbulence in the Southern Ocean. Ocean models are used to test how these interactions may be altered in a changing climate. This high-resolution simulation includes 90 million grid cells, ranging from 10 to 30 km in horizontal width. It is run on a super computer using eight thousand processors. The MPAS-Ocean model is developed at Los Alamos National Laboratory by the Climate, Ocean, and Sea Ice Model team (COSIM). Core MPAS-Ocean developers include Mark Petersen (CCS-2), Todd Ringler, and Douglas Jacobsen (T-3). MPAS-Ocean is a component of the Accelerated Climate Model for Energy, a new climate model by the Department of Energy. The image was created using Paraview software with the assistance of Phillip Wolfram (T-3). Picture of the Week Gallery Click thumbnails to enlarge. Cooling new Trinity supercomputer The Art of Climate Modeling Laser probe for critical subcriticals Dark Sky Simulation Melting High Explosives Climate feedbacks from a warming arctic Creating an earthquake in a lab An explosion of 3D printing technology Hot cells for isotopes Fuel from the fire Supercomputer building blocks Perovskite solar power From nuclear weapons testing to stockpile stewardship Laser-driven neutron source for research and global security A powerful cosmic particle accelerator Molecular "dimmer" switches Growing a greener future with algal biofuels Explosive science to save lives Jamming to the earthquake shake Making the (reactive) case for explosives science Raising the bar on carbon capture Biocrusts: small organisms, big impacts Bismuth and tin on the rocks Need to Know: Van Allen Belts Science in 60 - The Forecast Calls for Flu Gazing into the future of earthquake prediction Circuits of Light Training the explosives experts Hacking the bio-nano interface for better biofuels Shedding light on climate change Tickling the dragon for explosives science Tabletop fire prediction Fighting the flu, one cell at a time Better climate models? Just add ice. Secretary of Defense reviews plutonium operations at the Lab Planets unlikely to form around binary stars
<urn:uuid:955f4928-5d35-43ee-8d08-48737234cd45>
CC-MAIN-2016-44
http://www.lanl.gov/newsroom/picture-of-the-week/pic-week-9.php
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720972.46/warc/CC-MAIN-20161020183840-00251-ip-10-171-6-4.ec2.internal.warc.gz
en
0.842213
706
3.578125
4
One of many most important purposes of travel is to achieve experiences that enable us to grow and develop as individuals and it is important that people travel the best way that bests suits them at a particular time. Even probably the most ardent travel nut seems to search out it relatively easy to remain in a single place for 6-9 months once they have a ardour-driven venture to focus on. Once you allow home once more 2-three months is enough time travelling to either get very deep in a new culture (it is an particularly good timeframe for learning a language) or to visit a pair new countries in one journey. Silakan kunjungi halaman Syarat & Ketentuan Reschedule Sriwijaya Air untuk panduan lengkap mengenai pengubahan jadwal penerbangan Anda. In truth, it means that you can meet more people as a result of different vacationers and locals find an individual traveller extra approachable than those in a tightly-knit group. Demi kenyamanan Anda, kami bekerja sama hanya dengan penyedia jasa transportasi paling berpengalaman. Konfigurasi tempat duduk ini dibagi ke dalam dua kelas, yaitu delapan kursi untuk kelas bisnis dan 112 kursi untuk kelas ekonomi. Penumpang kelas bisnis mendapatkan kapasitas bagasi sebesar 30 kg — 10 kg lebih besar daripada kapasitas bagasi di kelas ekonomi. For the sake of affection, people will travel for hours to spend as much time as they will with the love of their life. When travelling to Japan, plan and analysis the best time of 12 months to go. The climate differs significantly in different parts of the islands. Kenyamanan penumpang selalu menjadi perhatian utama Sriwijaya Air, termasuk bagi penumpangnya di Kelas Ekonomi. Keberhasilan Sriwijaya Air untuk membuka jalur penerbangan ke Singapura cukup layak untuk diapresiasi. Jet lag could be a curse for people who need to travel extensively for their work as a result of sleep patterns change into disturbed and business conferences or coaching classes grow to be an actual check of endurance.
<urn:uuid:1624cfc1-91d5-4291-9359-e3309fe6d8f3>
CC-MAIN-2022-33
https://www.gatorfreethought.com/travel-to-barcelona-spain.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00470.warc.gz
en
0.659684
524
1.789063
2
American Idioms List, Definitions and Example Sentences; The idiom is a collection of culture or region-specific sentences that are not easily understood or difficult to translate based on the true definition of the words used only. American idioms are sentences used by Americans in some cases to express themselves differently. American idioms may not be fully understood when read directly. However, when the entire sentence is evaluated, its meaning can be revealed. Such sentences occur when two or more words come together. American idioms are used in radio programs, websites, casual conversations and all possible interactions with other people. In some cases, it can be quite difficult to determine the full meaning of these sentences. It may also be necessary to understand what is going on in the environment in order to establish an effective and sound communication in the regions where such statements are used. Examples of American idioms are now; Of the night (At all hours): It means very late, all the time of the night. Example: Her mother was very worried and thought of her at any time of the night. All bets are off: Indicates that all bets on the tender are closed. Example: I was going to bid, but all bets are off. Blow smoke: This statement means that a person exaggerates things more than they should be and makes them look like they are doing a job they cannot do. Example: In the evening, he commented on the whole match and blow smoke like he was a football player. To make matters worse: A statement that an event that is in a bad condition has become worse. Example: John had an accident by car to make matters worse, he had some fractures in his feet and hands. At each other’s throats: It means that people fight and argue with each other in the face of an event, situation and action. Example: They spoke very badly and Mark at each other’s throats. About time: An idiom that describes the upcoming and even passing time. Example: About time to buy a new house and car. Easy-going: It means tolerant, easy to understand and naive. Example: Samatta is easy-going person I have ever seen. He is never happy and upset for any event. Enough is enough: This statement means that it should not be enough and more. It is generally said when a certain situation is sufficient. Example: You just eat enough is enough. If you eat more, you will gain excess weight. Money talks: In a case, it means a statement stating that the money has more money. Example: Money talks from this football game.
<urn:uuid:280fb570-748b-4ecd-9bf2-6a217494f0d2>
CC-MAIN-2022-33
https://englishgrammarhere.com/idioms/american-idioms-definitions-and-examples/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00071.warc.gz
en
0.96893
553
2.953125
3
Design : The New Art of Prosthetic Limbs Prosthetic limbs have come a long, long way over the last couple of years – creative, wild designs and greatly increased functionality have transformed the look of that old peg leg. From steampunk to glam, bondage leather to carved wood – the designs keep on coming. Using new 3D scanning and printing techniques, these innovations can mirror the bodies natural contours and fit around an existing prosthetic leg. With the option to design your own limb, you can add metallics, wood, paintings, rhinestones, leather, lace patterns and even tattoos into the mix. Scott Summit and Bespoke Innovations Coming from an industrial design background, and with previous clients including Apple and Nike, Scott Summit had years of experience behind him before he entered the prosthetics industry. Summit also gave a TED talk in 2011 about the beauty of prosthetic limbs, take a look at what he had to say on the TED website. The Alternative Limb Project At 20, pop artist Viktoria Modesta took the radical decision to undergo a below-the-knee amputation, to improve her mobility following difficulties at birth which left her with a damaged left leg. Working with designer Sophie de Oliveira Barata, founder of the Alternative Limb Project, they created a number of wonderfully outrageous legs. Oliveira Barata originally trained as a film and TV prosthetics designer and now works with Bespoke, aiming to show the wearer’s personality and individuality in each piece. She had the idea after one of her regular clients, a young girl called Pollyanna, began requesting a few frills. “I’d been making her leg every year because she was growing,” De Oliveira Barata recalls, “and every year she wanted something different. It started off with little Peppa Pigs at the top of her leg, and they were all eating ice-cream. And the next year she wanted a whole Christmas scene at the top of her leg. She was getting bored coming in every year; it was a chore for her but when she had something to look forward to, it completely changed her experience. And her friends and family were asking her what she was going to have. And it became quite an exciting event for her, so I could see the rehabilitation effect in that way.” – Via The Guardian Featured below are prosthetics The Alternative Limb Project did for Viktoria Modesta and other gorgeous pieces from their portfolio. The Crystal Leg For Viktoria Modesta The Stereo Leg For Viktoria Modesta The Light Leg For Viktoria Modesta The Anatomical Leg This anatomical treat of a leg was designed by Oliveira Barata for Ryan Seary, an ex-serviceman who lost his leg in an explosion during a search mission in Afghanistan. The Floral Porcelain Leg Designed for Kiera Roche, chairperson for the charity Limb Power. “I think losing a limb has a massive impact on one’s self esteem and body image. Having a beautifully crafted limb designed for you makes you feel special.” The Snake Arm Created for Jo-Jo Cranfield, a British Swimmer, Motivational/Inspirational Speaker and Swimming Teacher. “My alternative limb is so different to any other prosthetic limb I have ever had.I wear it with pride. I’ve never seen a two armed person with snakes crawling into their skin, and even if I did I don’t think it would be so comfy! My alternative arm makes me feel powerful, different and sexy!” We couldn’t find out much about this cool reptilian scaled and collaged arm – but it was too beautiful to skip! I believe it is also designed by Sophie de Oliveira Barata. William Root’s Exo Leg Based in San Francisco, industrial designer William Root is currently working on the prototype for what he calls the “Exo-Prosthetic Leg.” Using 3D scanning, modeling, and printing to create customized prosthetic limbs, the manufacturing of high-tech prostheses becomes much more affordable, to people with amputations. The Alleles Design Studio These prosthetic leg covers are designed and produced by a Victoria-based startup called the Alleles Design Studio. They are made of graphic, custom, interchangeable scrims called fairings, out of lightweight ABS plastic. Depending on the day, they might be etched out with a Star Wars motif, butterflies, menacing skulls, lace, Alice In Wonderland images or a simple lattice illuminated from behind with a glowing LED. Limbitless Solutions is a non-profit organization devoted to bringing volunteers and technology to the kids who need it most. After donning the bionic limbs, parents say their children seem more confident, more energetic, and less anxious about interacting with other people. Rather than their disability being a focus of jeering, they get excited questions and curious stares for their sleek bionic limb. Evan Kuester (Enk’d), wanted to create something custom, something that looks different from the typical 3D printed prosthetic hands for his friend Ivania. He wanted to create something that would be both useful and eye-appealing. He came up with quite the unique design, one that was very feminine and beautiful in appearance. (below) And here is the more robotic looking “JD-2″, another stunning design from his website. McQueen made these prosthetic legs of carved elm wood for Aimee Mullins. Mullins is a world-class Paralympic athlete, and she modeled the boots for his 1999 show, No. 13. “They were solid wood, so there’s no give in the ankle. So any kind of a runway walk that I had practiced went out the window. And then suddenly they laced me into this leather bodice, and there were some spinning discs in the floor of the runway, which I had, while practicing in these wooden legs, you know . . . was very conscious of how to avoid them. But now that my neck was secured in this almost neck-brace position, I couldn’t look down. I couldn’t even see where the spinning discs were. And I just remember thinking, “Okay, you’ve done the Olympics. You’ve done harder things than this. You can do this. You can survive it… And you know, the fact is, nobody knew that they were prosthetic legs. They were the star of the show—these wooden boots peeking out from under this raffia dress—but in fact, they were actually legs made for me.” - Aimee Mullins
<urn:uuid:1e5d8f8d-c44d-4e85-baea-1bc2afa083bb>
CC-MAIN-2016-44
http://eclectix.com/prosthetic-limb-design-a-new-art/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720737.84/warc/CC-MAIN-20161020183840-00221-ip-10-171-6-4.ec2.internal.warc.gz
en
0.966375
1,417
1.695313
2
The curtain could fall on Belarus, but Georgia may take its place Belarus and Georgia are dangerous reminders of what happens when you create a security vacuum and open the door to Russian interference. The United States and European Union should keep a watchful eye on Georgia. Despite a desire to join the EU and NATO’s popularity among the general public, the governments aren’t going in the right direction for membership of either country. In recent years, Georgia seems to have a determination to cut itself off at the knees. According to the National Statistics Office of Georgia, the amount of foreign direct investment (FDI) has fallen some 40 percent since 2017, and the government only has itself to blame. The Georgian government has been on an unexplainable quest to run foreign investors out of town. There are two prime examples of this. The first was the country’s proposed first deep-water port in Anaklia. Costing $2.5 billion and boasting a planned depth of 16 meters, it would be able to dock any ship in the world and was meant to play a huge part of the country’s roadmap to reinvent itself into a hub for intercontinental trade between Asia and Europe. It would have attracted logistics and transportation investment from across Western Europe — encouraging nations such as Germany and the Netherlands, among others, to take an interest in security and stability in Georgia. Ultimately, this would have drawn a lot more attention to Russia’s continued illegal occupation of Abkhazia and south Ossetia. The Port of Anaklia would also make Romania, at the other end of the Black Sea — with its large but underutilized seaport of Constanta, at the mouth of the Danube River — a much more important economic player in the greater Black Sea region. This would, in turn, add impetus to improving the usefulness of the Danube for large-scale commerce and improving the frail transportation network of Romania. But the Kremlin does not want this. Drawing more attention to its illegal occupation of 20 percent of Georgia or improving the economy of Romania are not in Russia’s interests, which is why the Kremlin worked so hard to undermine the Anaklia project. So the Georgian government torpedoed the deal by refusing to underwrite loans from investors and international development organizations, forcing investors to enter arbitration last month. Further FDI will be hard to come by until the case is solved. The second incident is far more worrying from the standpoint of security, democracy and rule of law. Last year, an Azeri company that is building a digital corridor of fiber optic cable from Asia to Europe paid $61 million to acquire a 49 percent share of the Georgian company Caucasus Online, in order to secure the Georgian part of the pipeline. Representatives of the owners had many meetings with senior government officials and the Georgian National Communications Commission (GNCC), the national regulator, to keep them fully informed. This should have been a deal that Georgia, the U.S. and Europe would be heavily in favor of, because it would increase the country’s digital independence from Russia. And after the large-scale cyber attack on Georgia last October, which was blamed on Russia, you would be forgiven for assuming it would be a Georgian priority, especially because alternate routes include Iran and Russia itself. But now that the deal has gone through, the Georgian government is trying to have it reversed and has gone so far as to push through changes to the telecommunications law via late-night meetings in Parliament. These new laws give the GNCC unprecedented powers over the private sector — unheard of in a modern democracy. One of the most concerning aspects of the amendments is the creation of “special government administrators” who have almost unlimited power over telecoms companies. They have been given the power to appoint or dismiss company directors and their supervisory boards; file a lawsuit against contracts made a year before their appointment and demand their annulment; or restrict a company’s right to distribute profits, dividends and bonuses, or to increase their salaries. It’s a playbook for potential corruption and curtailing of free speech that could quickly spread to other industries. Couple this with a lack of foreign investment and there is a tried-and-tested formula for a state to turn its back on democracy and essentially turn into a new Belarus. Right now, the internet in Belarus has been bid to curb the protests against President Alexander Lukashenko, and the Georgian government may have just given themselves the power to flick the switches. Both of these FDI deals would have gone against Russian interests, and both of them are in the process of being shot down by the representatives who should be most in favor. Private investment is the third leg of a stool, along with defense cooperation and diplomacy, essential to building prosperity, security and stability. If Georgia wants to fulfill its potential as a Western liberal democracy, to further its Western integration and gain the benefits of improved security and quality of life, it must make itself attractive to this investment. Disappointingly, especially for the talented young people of Georgia, the government seems to be going in another direction. Retired Lt. Gen. Ben Hodges was the Commanding General, United States Army Europe, and is currently the Pershing Chair in Strategic Studies at the Center for European Policy Analysis in Washington, D.C.
<urn:uuid:77706e9a-32ea-4633-a524-2e83fc5a6fcd>
CC-MAIN-2022-33
https://thehill.com/opinion/international/513432-the-curtain-could-fall-on-belarus-but-georgia-may-take-its-place/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00467.warc.gz
en
0.963583
1,096
1.914063
2
There are no open spots for this class, but we found something similar! 5.0 (2) · Ages 7-10 Self Talk for Kids: How to Be Kind to Yourself (NOT LIVE, FLEX) 5.0 (4) · Ages 12-17 Grow Your Self-Confidence! How to Feel Confident About You! 5.0 (1) · Ages 13-17 Self Acceptance - You Are Great Just the Way You Are (13-17) 5.0 (5) · Ages 12-18 Ongoing Private Coaching Sessions: Experience Real Growth! 5.0 (39) · Ages 9-14 Get your confidence back and dare to be different : Self-Confidence Strategies for Teens 5.0 (5) · Ages 8-12 You Are Great Just the Way You Are (8-12) learner per class How does a “One-Time” class work? Meets once at a scheduled time Live video chat, recorded and monitored for safety and quality Great for exploring new interests and different styles of teachers How Outschool Works There are no open spots for this class. You can request another time or scroll down to find more classes like this. In this upbeat class, learners will discuss topics that will help them grow into their best selves. This is also a place where we will talk about roadblocks that can occur from either within or from outside that stop us from achieving our goals. In class, we will put our thinking caps on and critically think about what it means to be our best selves and how being our best selves can positively impact the world around us. While the following topics are samples, this 1:1 class is tailored to... Students will learn skills to help them grow into their best selves. I have more than 20 years of demonstrated experience in developing leaders all over the United States. I have been a recurring national speaker at continuing education conferences and symposiums for physicians and have a long-standing history of organizing, facilitating, and teaching in all aspects of Life Coaching including for athletes and entertainers. I have spent my life working with children and adults of diverse ages, experiential, educational, cultural, and socio-economic backgrounds. I have a Master’s in counseling and a Doctorate in Education. Please see my full biography under my information. 45 minutes per week in class, and maybe some time outside of class. Shirley Vazquez (Dr. Shirls) Information is the great equalizer 🇺🇸Lives in the United States 140 total reviews 194 completed classes My varied background gives me the ability to teach classes on a variety of subjects. I have spent my life working with children and adults of diverse ages, experiential, educational, cultural and socio-economic backgrounds. I taught ESL classes...
<urn:uuid:fa43741e-1a36-4cd5-94ca-b1ea0de27db6>
CC-MAIN-2022-33
https://outschool.com/classes/dream-do-right-each-audacious-minute-personal-development-life-coaching-8rCjs2MG
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00065.warc.gz
en
0.915936
642
1.5
2
United Nations Overwhelmingly Votes in Favor of Palestinian Authority Status Upgrade (LIVE STREAM) The United Nations General Assembly overwhelmingly passed a resolution Thursday to upgrade the status of the Palestinians in the international body. The 193-member assembly passed the resolution by a vote of 138-9, with 41 abstentions. The Palestinians, represented through the Palestine Liberation Organization (PLO), a non-governmental political and paramilitary organization, will now be recognized as a “non-member observer state.” Immediately after the vote, a Palestinian flag was unfurled on the floor the General Assembly, the Associated Press reported. In his speech, Palestinian President Mahmoud Abbas said told the General Assembly that it was “being asked today to issue the birth certificate of Palestine.” While short of full member status, the upgraded status will allow the Palestinians to join several UN agencies and treaties, such as the International Criminal Court (ICC), where the Palestinians could bring criminal charges against Israel. The Palestinians failed to gain full UN statehood status last year after the U.S. threatened to veto the initiative in the Security Council. The U.S. and Israel were quick to condemn the vote. “Today’s unfortunate and counterproductive resolution places further obstacles in the path peace,” American U.N. Ambassador Susan Rice said. “Abbas’s speech proves once more, for anyone who needed more proof, that we are dealing with an enemy who has no desire or intention to make peace” Israeli Foreign Minister Avigdor Lieberman said. Earlier in the day, U.S. Secretary of State Hillary Clinton, speaking at the Brookings Institution, said the U.S. believes the resolution will “do nothing to advance the peace and the two-state solution we all want to see,” NBC News reported. Jewish groups also spoke out against the vote. “The United Nations General Assembly recklessly set back the chances for peace between Israelis and Palestinians today,” read a statement from the American Israel Public Affairs Committee (AIPAC). Notably, the UK abstained from the vote after it failed to receive assurances that the Palestinians would immediately return to negotiations and wouldn’t pursue criminal charges against Israel in the International Criminal Court. While the vote is a major political setback for the U.S. and Israel, many analysts believe that it is largely a symbolic, with only real Palestinian independence being achieved through negotiations. However, it could provide a boost for Palestinian Authority President Mahmoud Abbas, whose power and relevance within Palestinian politics has diminished at the expense of Hamas. A live stream of the proceedings at the United Nations can be viewed below.
<urn:uuid:3d26dbac-7ab8-4e9f-9b8d-942cbc34329d>
CC-MAIN-2017-04
http://www.algemeiner.com/2012/11/29/live-blog-united-nations-overwhelmingly-votes-in-favor-of-palestinian-authority-status-upgrade-live-video/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00435-ip-10-171-10-70.ec2.internal.warc.gz
en
0.938132
558
1.820313
2
Medical Tutorial That Bleeds As You Go: Great Idea? The Endoscopic Tutorial System with a Bleeding Complication also known as Patent# US 6863536 reminds me of that old poster about the movie, Alien that was slathered in all the New York subways and bus stops when it was released some 30 years ago. It read: “In space, no one can hear you scream.” Well, maybe they were right and then again maybe they were wrong, as when you get right down to it, this device is about as creepy as it gets. A system for simulating a medical procedure performed on a subject, one can only study it and wonder why. If you need a good laugh, you might want to consider reading up on the Endoscopic Tutorial System with a Bleeding Complication. It is comprised of four parts including: a simulated organ, a simulated instrument for performing the medical procedure, a locator to determine where the simulated instrument will go within the simulated organ and a visual display simulating the data received during the medical procedure. If all of this reminds you of that old song, It’s Only Make Believe, I can assure you it is not coincidence. Here are some other ideas related to the world of medicine although neither is quite as mad as Patent#US 6863536. Read Rane’s piece, “Intel Corp. Releases New Home Medical Monitor" and John P. Barkers “Brainwave Controlled Technology Heading Our Way.” Have a wonderful medical procedure and don’t forget to…not tell me anything about it!
<urn:uuid:e26d871d-9e05-4b97-b2b4-f148cd90eea1>
CC-MAIN-2017-04
http://inventorspot.com/articles/medical_tutorial_bleeds_you_go_great_idea_22050
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280718.7/warc/CC-MAIN-20170116095120-00403-ip-10-171-10-70.ec2.internal.warc.gz
en
0.962323
332
1.882813
2
If you haven’t managed a construction project in Los Angeles County, you may be confused when asked to submit your story pole survey to the Planning and Zoning Committee. Story poles are tall poles with flags or contractor tapes on them that depict the outline of the project. They are put into place on site for review by architectural review and compliance boards, neighborhood associations, and the general public as part of a due notice requirement. The intent of story poles is to illustrate that planned development abides by city ordinances, and in many cases, does not encroach upon public and coastal views. In one project I worked on a few years back, prior to making an offer, we used story poles to mark the potential allowed development of neighboring homes to see what the effect would be on the view of a particular property my boss wanted to buy. When we saw who could build high enough to block the view, we reached out to those individuals to buy their development rights. We created a view easement to attach to their deed that changed the height allowances of future construction. The offer was a current market rate per square foot of potential new space. There are companies who specialize in story poles and there are land survey companies who offer the service. They will work in coordination with your architect or project manager to create the plan required for your particular circumstance. In general, story pole plans include the proposed roof plan with top of pole elevations labeled at points of ridges, parapets, hips, gables, chimneys etc… and the corners of the proposed building. Exaggerated or architecturally significant roof overhangs are sometimes included, but not always, as they can distort the bulk of the project and make it more difficult to pass review. After the poles are erected, they are photographed from multiple angles and allowed to stay in place for a pre-determined period of time, based on your city. It’s generally a fairly quick process, but to be sure, allow 2-3 weeks from hire to receiving the story pole report. Here’s a link to the City of Malibu’s Story Pole Policy so you can see what we’re talking about:
<urn:uuid:3b8dfa8b-c0a9-4354-b4fd-4187ad85313b>
CC-MAIN-2022-33
https://celebrityestatemgmt.com/story-poles/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00264.warc.gz
en
0.9564
446
1.851563
2
In this study, the SiC particles with a mean diameter of 300nm were used to be co-deposited with Ni-P base to produce Ni-P-SiC composite coatings by means of the pulse current electroforming technology. The relationship between the SiC particles and phosphorous contents in the composite coatings has been constructed. The wear behavior of the Ni-P-SiC composite coatings was examined by that measurements data including the wear weight loss, the coefficient of friction, and the temperature increments under the wear tests, in which were correlated to the observation and analysis of the worn surface of the composite coatings. Experimental results show that the wear resistance of Ni-P-SiC composite coatings is superior to Ni-P composite coatings, if they are under the same level of hardness. In addition, the wear weight loss of Ni-P-SiC composite coatings is even about 62% less than that of Ni-P composite coatings, if they are based on the same production conditions. Further more, both the hardness and wear resistance of Ni-P-SiC composite coatings are superior to pure Ni coating, wherein its wear resistance is even up to 10 times better than that of pure Ni coating. |頁(從 - 到)||358-363| |期刊||Key Engineering Materials| |出版狀態||已發佈 - 2008| ASJC Scopus subject areas
<urn:uuid:58e5a479-b003-4bf6-aa72-cdb267b55031>
CC-MAIN-2022-33
https://tmu.pure.elsevier.com/zh/publications/the-wear-behavior-of-pulse-current-electroforming-ni-p-sic-compos
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00678.warc.gz
en
0.937534
409
2.609375
3
Objective: To determine the 3-day stroke risk of patients presenting to emergency department with transient ischaemic attack, and to evaluate the predictive value of ABCD2 (Age, Blood pressure, Clinical features, Duration of symptoms and Diabetes) score for these patients. Methods: The prospective study was conducted on patients with diagnosis of transient ischaemic attack who were divided into low (0-3 points), medium (4-5 points) and high (6-7 points) risk groups according to their ABCD2 scores. The sensitivity of the scoring system on estimation of the risk of stroke in 3 days was evaluated through receiver operating characteristic curve. SPSS 15 was used for data analysis. Results: Of the 64 patients in the study, none of the low-risk group had stroke. Stroke was present in 4 of 33 (12.12%) medium-risk patients, while there were 4 in 18 (22.22%) in the high-risk group. Sensitivity and specificity of each ABCD2 score for 3rd day stroke risk was calculated. In the receiver operating curve generated by these calculations, the c statistics was determined as 0.76 (95% CI: 0.64, 0.86; p<0.01) and the most appropriate cut-off score to dichotomise the study group was determined as 4. Conclusions: In transient ischaemic attack patients with an ABCD2 score of four or higher had a markedly increased short-term stroke risk, while those with a lower score were quite safe. It is appropriate to hospitalise patients with a score of four or more and investigate for underlying cause and initiate treatment. Keywords: ABCD2, Emergency department, Risk scoring system, Stroke risk, Transient ischaemic attack. (JPMA 63: 1142; 2013). Transient ischaemic attack (TIA) is a brief episode of neurological dysfunction with symptoms lasting less than 24 hours and resulting from focal cerebral ischaemia not associated with permanent cerebral infarction.1 Patients who have had a TIA are at increased risk of stroke, myocardial infarction and vascular deaths. For this reason, emergency physicians have a significant role in the management of these patients.2 A recent survey suggested that in the population older than 65 years, 1 in 15 reported a history of TIA. About 15% of patients experiencing stroke have reported a history of TIA.3 Ten per cent of patients with TIA experienced a stroke within 3 months, and half of these strokes occurred within 48 hours of the initial TIA.4 Clinical prediction scores such as the California Index, Age, Blood pressure, Clinical features, and Duration of Symptoms (ABCD) and Age, Blood pressure, Clinical features, Duration of symptoms and Diabetes (ABCD2) scores have been developed with the aim of improving identification of TIA sub-groups at higher or lower early stroke risk. The ABCD2 score uses clinical features, medical history, and blood pressure to generate a number that can be used to determine the patient's short-term risk of stroke.5 The ABCD2 system is a prognostic system based on clinical data designed to predict stroke risk after a TIA, to guide triage to specialist care, target secondary prevention, and to inform public education. Use of the score has been recommended in national guidelines in North America, Europe and Australia.6,7 The ABCD2 score has been proposed as a useful clinical tool for risk stratification after TIA. This model combines 5 clinical variables into a 7-point scale: age, blood pressure, clinical features, duration of symptoms and history of diabetes. International guidelines have recommended that patients with low ABCD2 scores (3 or less) be triaged for non-specialist care or less urgent specialist care (up to 1 week or longer).8 Emergency evaluation and hospital admission for patients with a score of >4 on these scales have been recommended.9 Existing prognostic scores for stroke risk after TIA validate well on multiple independent cohorts, but the unified ABCD2 score is likely to be most predictive.10,11 Patients at high risk need immediate evaluation to optimise stroke prevention. The aim of this study was to determine the 3rd day stroke risk of patients presenting to an emergency department (ED) with TIA and to evaluate the predictive value of the ABCD2 score for these patients. Patients and Methods The prospective, cross-sectional study comprised all patients presenting with an ED diagnosis of TIA from May to July 2010, at the Haydarpasa Numune Research and Training Hospital, Istanbul. The study was approved by the Ethics Committee of Marmara University. TIA is defined as acute onset of focal cerebral or monocular symptoms lasting less than 24 hours and thought to be attributable to a vascular cause in the opinion of neurologist evaluating the patient. All patients who were older than 18 years and had sufficient clinical suspicion to justify diagnostic testing for a neurovascular cause were eligible for inclusion. On enrollment, a standardised case report form was completed, collecting data on clinical features of the TIA, medical history, and findings of clinical examination. Subsequently, all relevant diagnostic testing was recorded. Exclusion criteria included: patients <18, diagnosis of any kind of haemorrhage, a computed tomography (CT) scan or other investigation that revealed a primary cause of the symptoms other than TIA, lack of informed consent, or lack of specification of time of symptom onset. Patients with a clinical diagnosis of stroke were also excluded. All patients who were suspected of having a TIA were consulted by an expert neurologist blinded for the study, and those patients who were diagnosed as having a TIA by the neurologist, were included. Data evaluated included demographic information, medical history, presenting symptoms, location of admission (hospital or observation unit), vital signs, and results of diagnostic testing. The ED physician noted the patient's age, blood pressure, clinical symptoms, duration of symptoms and history of diabetes mellitus, and, using these parameters, the ABCD2 score was calculated in the range of 1 to 7 (Table-1). The five potential risk factors were age, blood pressure, clinical features (motor weakness and speech disturbance), duration of symptoms and diabetes. These risk factors were defined and chosen according to previous studies. Age was dichotomised at 60 years. Clinical features were classified as follows: motor weakness (focal, usually unilateral, weakness of one or more of the face, arm, hand or leg); speech disturbance (defined as either dysarthria or dysphasia or both) without weakness. Other neurological symptoms were excluded for this criterion. Limb weakness required a clear description of loss of power as opposed to more vague terms, such as "clumsiness" or "heaviness," in the absence of definite weakness. Symptom durations were divided as less than 10 min, 10-59 min, and 60 min or longer. In patients with more than one TIA in the past month, the duration of the longest event was used. Diabetes was defined as requiring either oral medication or insulin. Hypertension was coded as elevated blood pressure on first recording after the TIA (cut-off points of 140mmHg systolic and 90mmHg diastolic were used). Patients were categorised into 3 groups according the ABCD2 score as low risk (0-3 points), medium risk (4-5 points), and high risk (6-7 points). After the initial evaluation; the patients were either discharged with the medical advices of the neurologist, or admitted to the neurology ward according to decision of the neurologist. Follow-up was performed at 3rd day, either by a centralised telephone interview or by consultation with the neurologist. Death, stroke, and further vascular events, as well as hospital admissions, were recorded. The primary outcome was stroke occurring within 3 days of TIA presentation. Stroke was defined as a rapidly developed focal or global disturbance of cerebral function, with no apparent non-vascular cause, lasting more than 24 hours or until death, and distinguishable from the event leading to the initial TIA diagnosis. To find a clinically and statistically significant difference between the mean ABCD2 scores of patients with and without stroke (difference between independent means, one-tailed). With a type 1 error of 0.05, a power of 0.80, and allocation ratio of 7, the minimum sample size that was required was 56. Using convenience sampling, a total of 64 patients were enrolled during the 3-month period. The power of the study with these 64 patients at the end of the study to statistically distinguish between the ABCD2 scores of patient with and without stroke was 0.85. Normally distributed variables were reported as means and standard deviation with 95% confidence interval (CI) and were compared using Student's t-test for independent variables. To test for normal distribution, which is the main assumption for a Student's t-test to be done, we used Kolmogorov-Smirnov and Levene's tests. Also, normal distribution was assessed using normal quantile plot and histograms. Categorical variables were presented as frequencies and percentages with ranges and were assessed using Fisher's exact test. The level of significance was taken as p<0.05. The stroke risks of the patients were expressed with their 95% CI on the basis of a linear regression. A receiver operating characteristic curve (ROC) analysis was conducted to identify the threshold that maximised the sensitivity and specificity for discriminating between high and low-risk patients for stroke according to their ABCD2 scores. Statistical analyses were performed using SPSS 15. The G*Power version 3.1.2. (Franz Faul, Universitat Kiel, Germany) was used for power and sample size analysis. MedCalc Software v11.3 was used for ROC analysis. The mean age of the 64 patients was 68.4±11.79 years, and there were 36 (56.3%) males. The mean time from symptom onset to enrollment was 4.96±3.87 hours. Of the 64 patients, 22 (34.4%) presented with speech disturbances, 30 (46.9%) with unilateral weakness and 12 (18.8%) with unilateral numbness. In 12 (18.8%) patients, symptoms lasted for less than 10 minutes; in 24 (37.5%) between 10-60 minutes; and in 28 (43.8) more than an hour. Nineteen (29.7%) patients had a history of diabetes mellitus; 51 (79.7%) presented with high blood pressure; 46 (71.9%) had a history of hypertension; 15 (23.4%) had a history of coronary artery disease (CAD); 10 (15.6%) had a history of atrial fibrillation; 5 (7.8%) had a history of peripheral arterial disease; 8 (12.5%) had a history of stroke; 11 (17.2%) had a history of TIA; and 8 (12.5%) had a history of hyperlipidaemia. Besides, 14 (21.9) patients were smokers/ex-smokers; 16 (25.0%) were on acetylsalicylate; 6 (9.4%) were using clopidogrel and 10 (15.6%) were using warfarin. Patient characteristics were noted according to the components of the ABCD2 score (Table-2). The scores were then grouped to create strata for low, moderate and high risk to identify patients who could be managed non-urgently and those who probably needed priority for evaluation, treatment and observation. Overall, 13 (20.3%) were classified as low risk, defined as a score of less than 4 (stroke risk 0% at 3 days); 33 (51.6%) as moderate risk with a score of 4 or 5 (stroke risk 12.1% at 3 days); and 18 (28.1%) as high risk with a score of greater than 5 (stroke risk 22.2% at 3 days) (Table-3). The sensitivity and specificity of ABCD2 to predict stroke on the 3rd day was calculated for every score (Table-4). The ROC curve of ABCD2 Risk Score vs. presence of stroke on 3rd day was drawn (Figure) and accuracy of each score and level were compared as described by Hanley & McNeil (Area Under the Curve [AUC]: 0.76; SE: 0.09; 95% CI 0.64, 0.86).12 The ABCD2 Risk Score discriminated patients with a high risk of developing stroke on the 3rd day from patients with TIA but a low risk successfully. TIA is a cerebrovascular disease characterised by sudden focal neurologic or monocular symptoms lasting less than 24 hours.2,13,14 Most cases of TIA last less than 1 hour and usually less than 30 minutes.14,15 While most patients easily recover from symptoms of TIA, some progress to stroke, which is life-threatening or causes a permanent neurological deficit. It is crucial to distinguish these patients in an ED. There is a variety of clinical and radiological methods for making that distinction and the ABCD2 scoring system is the easiest and most commonly used among these methods. The current study tried to define the value of the ABCD2 scoring system for predicting risk among TIA patients. Many recent studies have also researched the predictive value of the ABCD2 system; though the results varied, they all concluded that the scoring system is valid for risk stratification.4,16-19 These studies have defined different risk groups and clinical end-points. The predictive value of the ABCD2 scoring system needs to be clarified before widespread clinical use.20 The results suggest that ABCD2 scoring clearly distinguishes TIA patients who had stroke on the third day from those who did not. When we look through the literature, a study including 2893 patients evaluated the predictive value of ABCD2 scoring on the 2nd, 7th and 90th days for stroke risk, and demonstrated that it is significant for all end-points (C statistics were between 0.62 and 0.83).10 Another study with 470 patients has shown that ABCD2 successfully predicted stroke risk on days 2, 7, 30 and 90.21 Although the current study divided patients into three risk groups, when the sensitivity and specificity of each ABCD2 score for third day stroke risk was calculated, the highest sensitivity and specificity was shown to be >4, so the cutoff value was defined as 4. Another study investigated the sensitivity, specificity, positive and negative predictive values of the ABCD2 score using different cutoff levels, and the associated admission rates for the score. Sensitivity was calculated as 86.4% and the negative predictive value as 91.7% for the cutoff of an ABCD2 score of 4; the sensitivity was calculated as 96.6% and the negative predictive value as 96.1% for the cutoff of an ABCD2 score of 3. Hospitalisation ratios, according to these values, were 69.1% vs. 83.6% respectively.21 In another study, all 121 TIA patients were hospitalised for investigation of etiology and medical intervention. The ABCD2 scores of patients who had arterial revascularisation or anti-coagulant treatment were investigated retrospectively and no difference was detected between those whose score was >3 and those with a score >3 concerning the need for medical intervention.22 The current study found that stroke risk was low for a score >4. Although these patients do not require hospitalisation, but it should be kept in mind that they may still require medical treatment or intervention. In the current study, none of the 13 low-risk patients had a stroke on the third day; 4 of the 33 medium-risk (12.1%) and 4 of the 18 high-risk (22.2%) patients had a stroke. In other words, while none of the patients with a score <4 had stroke; 8 (15.9%) of those with an ABCD2 score of >4 had stroke. In a multi-centered study held with large patient population, patients were classified as low (<4), medium (4-5) and high (6-7) risk groups according to their ABCD2 scores. Among the low-risk group comprising 1628 patients, the stroke risk was calculated as 1% on the 2nd day and 1.7% on the 7th day, while it was 4.1% to 5.9% for the medium-risk group of 2169 patients, and 8.1% to 11.7% for the high-risk group of 1012 patients on the corresponding days. Although these risk values were different for each centre, it has been demonstrated that there is a correlation between ABCD2 scores and stroke risk throughout the study.10 In spite of our limited patient population, a similar concordance was presented in our study. Data reported in the study revealed that when patients presenting to an ED with a diagnosis of TIA were evaluated with the ABCD2 scoring system, patients with a score of >4 increased short-term stroke risk, whereas those with a score <4 had a quite low risk. However, the limited sample size of this study and presence of other studies prevent a brave decision regarding out patient follow up for low-risk patients. Nevertheless, similar results of more comprehensive studies support the view that ABCD2 scoring is valuable for risk stratification among TIA patients.10 The ABCD2 scoring system is instructive regarding decisions on the follow-up and treatment of patients. Those with a score of >4 should be hospitalised for investigation of etiology and appropriate treatment. ED doctors especially should use ABCD2 scoring since it is easier and faster compared to other diagnostic methods. The clinical situation of the patient, other risk factors, cost-effectiveness and facilities should also be considered while deciding on treatment and follow-up. We are grateful to Dr. Ray Guillery for editorial assistance of the manuscript. 1. Easton JD, Saver JL, Albers GW, Alberts MJ, Chaturvedi S, Feldmann E, et al. Definition and evaluation of transient ischemic attack a scientific statement for healthcare professionals from the American Heart Association/ American Stroke Association Stroke Council; Council on Cardiovascular Surgery and Anesthesia; Council on Cardiovascular Radiology and Intervention; Council on Cardiovascular Nursing; and the Interdisciplinary Council on Peripheral Vascular Disease. Stroke 2009; 40: 2276-93. 2. Libetta C, Venables GS. Diagnosis and management of transient ischaemic attacks in accident and emergency. J Accid Emerg Med 1998; 15: 374-9. 3. Johnston SC, Gress DR, Browner WS, Sidney S. Short-term prognosis after emergency department diagnosis of TIA. JAMA 2000; 284: 2901-6. 4. Cucchiara BL, Messe SR, Taylor RA, Pacelli J, Maus D, Shah Q, et al. Is the ABCD score useful for risk stratification of patients with acute transient ischemic attack? Stroke 2006; 37: 1710-4. 5. Schrock JW, Victor A, Losey T. Can the ABCD2 risk score predict positive diagnostic testing for emergency department patients admitted for transient ischemic attack? Stroke 2009; 40: 3202-5. 6. Johnston SC, Nquyen-Huynh MN, Schwarz ME, Fuller K, Williams CE, Josephson SA, et al. National Stroke Association guidelines for the management of transient ischemic attack. Ann Neurol 2006; 60: 301-13. 7. National Stroke Foundation. Clinical Guidelines for Acute Stroke Management. (Online) Melbourne: NSF, 2007. (Cited 2009 September). Available from URL: Error! Hyperlink reference not valid.http://www.strokefoundation.com.au/. 8. Sheehan OC, Kyne L, Kelly LA, Hannon N, Marnane M, Merwick A, et al. Population-based study of ABCD2 score, carotid stenosis, and atrial fibrillation for early stroke prediction after transient ischemic attack: the North Dublin TIA Study. Stroke 2010; 41: 844-50. 9. Fothergill A, Christianson TJ, Brown RD Jr, Rabinstein AA. Validation and refinement of the ABCD2 score: a population-based analysis. Stroke 2009; 40: 2669-73. 10. Johnston SC, Rothwell PM, Nguyen-Huynh MN, Giles MF, Elkins JS, Bernstein AL, et al. Validation and refinement of scores to predict very early stroke risk after transient ischemic attack. Lancet 2007; 369: 283-92. 11. Carpenter CR, Keim SM, Crossley J, Perry JJ, Best Evidence in Emergency Medicine Investigator Group. Post transient ischemic attack early stroke stratification: the ABCD(2) prognostic aid. J Emerg Med 2009; 36: 194-200. 12. Ustrell-Roig X, Serena-Leal J. Stroke. Diagnosis and therapeutic management of cerebrovascular disease. Rev Esp Cardiol 2007; 60: 753-69. 13. Lewandowski CA, Rao CPV, Silver B. Transient ischemic attack: definitions and clinical presentations. Ann Emerg Med 2008; 52: S7-16. 14. Scott PA, Timmerman CA. Stroke, transient ischemic attack, and other central focal conditions. In: Tintinalli JE, Kelen GD, Stapczynski JS, (eds.). Emergency Medicine A Comprehensive Study Guide. 6th ed. North Carolina: McGraw-Hill; 2004; pp 1382-90. 15. Purroy F, Molina CA, Montaner J. Absence of usefulness of ABCD Score in the early risk of stroke of transient ischemic attack patients. Stroke 2007; 38: 855-6. 16. Sciolla R, Melis F; SINPAC Group. Rapid identification of high-risk Transient Ischemic Attacks: prospective validation of the ABCD Score. Stroke 2008; 39: 297-302. 17. Tsivgoulis G, Spengos K, Manta P, Karandreas N, Zambelis T, Zoakopoulos N, et al. Validation of the ABCD Score in identifying individuals at high early risk of stroke after a transient ischemic attack: a hospital-based case series study. Stroke 2006; 37: 2892-7. 18. Bray JE, Coughlan K, Bladin C. Can the ABCD score be dichotomised to identify high-risk patients with transient ischemic attack in the emergency department? Emerg Med J 2007; 24: 92-5. 19. Asimos AW, Johnson AM, Rosamond WD, Price MF, Rose KM, et al. A multicenter evaluation of the ABCD2 score's accuracy for predicting early ischemic stroke in admitted patients with transient ischemic attack. Ann Emerg Med 2009; 55: 201-10. 20. Ong ME, Chan YH, Lin WP, Chung WL. Validating the ABCD2 Score for predicting stroke risk after transient ischemic attack in the ED. Am J Emerg Med 2010; 28: 44-8. 21. Lou M, Safdar A, Edlow JA, Caplan L, Kumar S, Schlaug G, et al. Can ABCD2 score predict the need for in-hospital intervention in patients with transient ischemic attacks? Int J Emerg Med 2010; 3: 75-80. This journal is a member of and subscribes to the principles of the Committee on Publication Ethics.
<urn:uuid:9f925b7f-6a0c-441c-9b77-3a3cc3438a37>
CC-MAIN-2016-44
http://jpma.org.pk/full_article_text.php?article_id=4634
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720380.80/warc/CC-MAIN-20161020183840-00056-ip-10-171-6-4.ec2.internal.warc.gz
en
0.938882
5,020
1.640625
2
Transforming Your Dragons José Stevens, Ph.D. How to Turn Fear Patterns into Personal Power Treat yourself to the best homework assignment of your life! Take the Dragon Personality Test to identify which of the seven dragons—arrogance, self-deprecation, impatience, martyrdom, self-destruction, greed and stubbornness—are your primary (and secondary) dragons. Then learn how to deal with and conquer them at last. - Have all your energy available to you to make choices - Be a magnet and a role model for people around you - No longer attract those people who are compulsively drawn to your weaknesses - Be a genuinely attractive human being, not attractive because of your dramas - Find compassion for others still in the grip of their own dragons - Have the power that comes from being truly at peace SKU: 3 Category: Books © All rights reserved. www.thepowerpath.com You may make copies of this writing and distribute it in any media you wish so long as you do not charge for it or alter it in any way. You must credit the author and include this entire copyright notice. While the text may be shared, no audio files including lectures, music and/or sound meditations may be posted on any site for any reason without written permission from the Power Path.
<urn:uuid:88d9f533-c34b-4096-8067-a0e4068f9fc2>
CC-MAIN-2022-33
https://thepowerpath.com/power-path-library/books-by-jose-stevens/transforming-your-dragons/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571234.82/warc/CC-MAIN-20220811042804-20220811072804-00077.warc.gz
en
0.916023
283
1.53125
2
The 25-year-old Austrian national was detained in his flat in the quaint northern town of Braunau am Inn where the Fuehrer was born on April 20, 1889. The man, who reportedly called himself “Harald Hitler”, was arrested under a 1947 Austrian law which made it illegal to promote Nazi ideology. “It was obvious that he glorified Hitler,” police spokesman David Furtner told AFP. Images of the man have been posted on Facebook. Photo: Screenshot Servus TV Authorities became aware of his existence after photos emerged on social media of the man posing outside Hitler's actual birth house, a large yellow corner house in the town's historic centre. Other snaps showed him standing in a Braunau pub dressed in traditional garb including a loden jacket and lederhosen. According to local media reports, the copycat introduced himself to patrons as “Harald Hitler” and insisted on being served “Austrian mineral water”. The suspect who offered no resistance during his arrest had moved to Braunau in mid-January, police said. The case once again puts the spotlight on Braunau, a town of 17,000 on the German border which has repeatedly made headlines because of its historical ties to Hitler. Most recently it drew attention after the government in December expropriated the dilapidated building where Hitler came into the world. The move followed years of bitter wrangling with owner Gerlinde Pommer who had been renting the premises to the interior ministry since the 1970s and refused to sell or carry out essential renovation works. The government said the seizure had been necessary to stop the building from becoming a pilgrimage site for Nazi sympathisers. In response, Pommer launched proceedings against the expropriation last month, arguing it was unconstitutional. The court is yet to rule on the case.
<urn:uuid:e0b56fb3-5792-4a5a-9bd4-a05d761332fe>
CC-MAIN-2022-33
https://www.thelocal.at/20170213/hitler-lookalike-arrested-in-austria/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00476.warc.gz
en
0.974996
390
2.171875
2
In continuation to our previous post about whether deafness is inherited or not, we at Compare DNA Kits were asked whether depression is inherited genetically or not. It makes no surprise that this is a popular question in the U.S or outside of it. In the USA, it is claimed that depression hits as much as 10% of the population at a certain point in their lifetime. In other countries the statistics are a little more murky around the statistics as a significant portion of the population which suffers from depression or other mental issues and illnesses goes undiagnosed (if you have no access to mental health locally – visit BestOnlineTherapy.com. When it comes to whether depression is genetically inherited the most confusing statistics is this – the likeliness of having mental issues as someone whose parents or siblings suffer from mental illnesses is five times higher. That piece of statistics often hints people that genetics are involved, but genetics are far from being the only factor involved. The depression gene is a realthing, and depression is considered a partly genetically-inherited disease, but it’s not only the genetic but also the environment. In a previous article we have explored that very topic and realized that while some diseases are purely genetic, others such as cancer, are a mix of genetics and environment, as well as general maintenance of health. If someone has inherited the “depression gene” and grew up with adults with mental illnesses then the likeliness of depression is high. If someone has inherited the “depression gene” and did not have mental issues in the family or other traumas, then he is only slightly more susceptible to develop depression compared to the the population’s median average risk. The bottom line is that depression is partly inherited genetically, and partly a product of the environment, upbringing and other factors.
<urn:uuid:93b129a2-f274-41e2-a4e6-cc40288105e0>
CC-MAIN-2022-33
https://comparednakits.com/depression-genetic/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz
en
0.972621
374
3.078125
3
Situational Judgement Tests (SJTs) are a measurement method of aptitude for employment. The FY1 SJT is designed to assess the professional attributes expected of a Foundation doctor. The SJT score is used for the selection to the Foundation Programme together with the Educational Performance Measure since FP 2013. In the SJT for selection to the Foundation Programme, there are two item formats: - Rank five possible responses in order - Select the three most appropriate responses for the situation The choice of response options reflects the scenario content and is the appropriate format to both provide and elicit the information needed. For example, the nature of some scenarios and the possible responses to them lend themselves to ranking items (requiring the ability to differentiate between singular actions, considerations or statements that vary in appropriateness, importance or timeliness in response to a scenario), whereas some scenarios lend themselves to multiple choice items (where it is necessary to do more than one thing/tackle more than one aspect in response to a scenario). The SJT assesses a number of different attributes, which were identified during a multi-method, multi-source job analysis of the Foundation Year One (FY1) role. The target attributes form the basis of the SJT items, which are written by Subject Matter Experts who work closely with Foundation doctors. This ensures that the scenarios presented are an accurate reflection of what FY1s encounter in their role. The items are then reviewed by other Subject Matter Experts including Foundation doctors, to ensure they are both realistic and fair. Applicants must answer what they ‘should’ do in the scenario described, not what they ‘would’ do. This is because research into SJTs shows that questions asking an applicant what they ‘would’ do is more susceptible to coaching, and the General Medical Council places an emphasis on probity. You can find examples of SJT questions here.
<urn:uuid:2efaa447-1073-45e6-80de-1736a93c0eb2>
CC-MAIN-2022-33
https://isfp.org.uk/sjt/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00471.warc.gz
en
0.92516
390
2.15625
2
Latina Marriage Customs Most Latino marriages in the us take place in reports where Mexican women can be a majority. There are many different Hispanic marriage traditions, and a lot of these people have become even more well-known than these people were in the past. There is absolutely no real developed language that may describe what sort of bride should certainly behave or perhaps what kind of groom’s conversation he ought to make. In the majority of cultures, the bride’s family unit will do almost all of the talking and she is required to be well mannered and well intentioned. If you are planning big event, then you might want to learn some of these customs to make the event even more exceptional for everyone included. The first tradition connected with weddings to get Latina ladies is that they are expected to hold down jobs throughout the pre-wedding dash off to. This is to provide financial support to the spouse and children. A large number of employers will not likely hire a great expecting female if she is still single, so this is one way to help them to help out. Even if they have a job, the responsibility may be added to her routine if possible. Another custom used is always to give the bride’s father and mother a plentiful gift. It really is anything from furniture to an intricate homemade getaway. This is meant to communicate gratitude and love and also promote the thought of family and monetary responsibility. A large number of Latino brides like to marry outside their culture. Since this is starting to become more common, this means that there are lots of other practices from which to draw. Sometimes, the bride’s friends and family may want to hold a special event at the home of this groom’s family members. It can be a more formal affair, with speeches and toasts and gifts. In some cases, the bride’s relatives will backer a event outside the bride’s home, that can include a bbq and music. A Latina bride is usually not supposed to hold straight down a regular task during the years that mail order wife latin she is betrothed. However , this is not always the situation. In some cases, if the family will not have enough money to deliver their little girl to school, they may request her to volunteer by a local women’s shelter. The benefit to this traditions is that your lover gets to fulfill a need in her community and this lady gets to produce http://www.keralaclick.com/web-design/ several valuable internet connections. There are many Latina marital relationship traditions to stick to. One of the most important things to remember would be that the customs range from culture to culture. In the United States, many Latino women wed guys from Latina America or from The country of spain. But some other Latina couples wed men out of places like Korea and Vietnam.
<urn:uuid:3728f339-fbbc-41a5-b8f4-ca47dd3bab5b>
CC-MAIN-2022-33
https://www.numaweb.es/latina-marriage-customs/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00069.warc.gz
en
0.969081
594
1.570313
2
In 2008, outraged by a string of snooping incidents involving celebrities’ medical records, California legislators passed a groundbreaking law that compelled hospitals to quickly report patient privacy breaches and gave the state power to levy fines for such violations. Since then, the state Department of Public Health has imposed more than 100 fines on hospitals and clinics, totaling more than $10.7 million. In just the past four years, state inspectors have written up hospitals more than 3,700 times. But a ProPublica analysis of state data shows enforcement has been inconsistent. Health inspectors in Los Angeles County — home to more than 100 hospitals — have issued only a handful of violation reports since 2012. Several of the biggest and best-known hospitals in Los Angeles have publicly acknowledged significant breaches during that time, but have clean records. Meanwhile, inspectors in the neighboring region that encompasses the Inland Empire have cited hospitals repeatedly, some dozens of times, even for inadvertent errors. Eisenhower Medical Center in Rancho Mirage has been hit with the most privacy-related deficiencies in the state, 278. The facilities with the second-most and seventh-most citations are also in Riverside County. Most of Eisenhower’s deficiencies were minor and quickly corrected, records show, but some were not. In 2013, a hospital employee admitted she accessed the records of patients (who were also Eisenhower employees) to get their ages and marital status to find dates for a friend. The state’s hit-and-miss enforcement isn’t confined to issuing deficiencies, a non-punitive report that requires hospitals to fix any problems identified. It also extends to the fines issued under the law, which often take years, if they come at all. Most of the fines meted out in 2015, for example, involved breaches that took place in 2012 and 2013. One went back to 2009. ProPublica analyzed deficiencies cited against California hospitals since Jan. 1, 2012, excluding those for breaches before 2011, as well as all fines imposed since the law went into effect. (You can view them using our HIPAA Helper tool.) Hospitals With the Most Deficiencies Below are the California hospitals that have received the most privacy-related deficiencies from the California Department of Public Health, from January 2012 to September 2015. |Hospital name||City||# of deficiencies| |Eisenhower Medical Center||Rancho Mirage||278| |Riverside County Regional Medical Center||Moreno Valley||120| |University of California San Francisco Medical Center||San Francisco||108| |Contra Costa Regional Medical Center||Martinez||101| |Santa Clara Valley Medical Center||San Jose||83| |Scripps Mercy Hospital||San Diego||72| |Riverside Community Hospital||Riverside||65| |Doctors Medical Center||Modesto||65| |Marin General Hospital||Greenbrae||64| |Community Regional Medical Center||Fresno||60| Brenda Klutz, a Sacramento health care consultant and former state health department official, called ProPublica’s findings significant and important. “I think it’s something the department would certainly want to drill down on and get to the bottom of,” she said. The California Department of Public Health declined interview requests but, in written responses, acknowledged the inconsistencies ProPublica found. Spokeswoman Anita Gore stated the department plans to address the discrepancies by providing more training to inspectors in district offices across the state and is in the process of hiring more inspectors. “Medical and personal information breaches are a serious issue and are treated as such,” Gore wrote. She added that not all breaches are the same — some are accidental and others are malicious — and the state’s response will be different based on the facts. Nowhere are the discrepancies starker than in Los Angeles County, where the county’s Department of Public Health is paid to inspect health facilities on the state’s behalf. In part because of problems with the quality of Los Angeles County’s nursing home inspections, the state health department said it has provided extra training to the county’s inspectors and has added staff to increase monitoring of those county inspectors. Los Angeles County’s public health department said in a statement that it follows the state’s policy for how to handle privacy incidents at hospitals. Under the policy — at least as Los Angeles County views it — citations are only issued if inspectors decide hospitals had a breach that’s “intentional, malicious or widespread” or if they don’t have adequate processes in place to prevent repeat breaches. The county said it was not aware that its handling of privacy breaches varied from the state health department’s other offices, or that the state was concerned by this. Kaiser Permanente operates multiple hospitals throughout California and has experienced firsthand the different approaches taken by the Department of Public Health’s various offices. Two Kaiser facilities — the South Sacramento hospital on Bruceville Road and the Sacramento hospital on Morse Avenue — ranked first and second for citations in Sacramento County, with 17 and 13. Meanwhile, Kaiser’s flagship in Los Angeles has had none, although it has reported privacy breaches to the state, a spokeswoman confirmed. “We can’t speculate how this information is recorded or reported by the state, but we can tell you that we comply with all federal and state reporting requirements,” Vanessa Benavides, Kaiser Permanente’s chief compliance and privacy officer, said in a statement. Citation numbers alone do not reflect whether hospitals are systematically violating patient privacy. A spokesman at Ronald Reagan UCLA Medical Center in Los Angeles said the hospital has reported 164 privacy breaches to the state health department since July 2013. It hasn’t received a single citation since 2012. (It was fined in 2009 and 2010.) The most-cited hospitals are not those with the most fines. Eisenhower, which has the most deficiencies in the state, has never been fined under California’s privacy statute. By contrast, San Francisco General Hospital had the most fines — seven — but ranked only 37th in total violations since 2012. Troy Williams, San Francisco General’s chief quality officer, said he couldn’t say why the hospital ranked so high in fines when it hadn’t been cited all that often. Fines for other hospitals may be waiting in a queue, he said, or that the regulators that oversee San Francisco just recommend more fines. “We had a privacy breach back in 2009 and we didn’t get penalized til 2012, and that’s about what we’ve been seeing, anywhere from two to three years,” he said. “It’s a pretty long time.” Fines are recommended by district offices, but must be approved by health department officials in Sacramento. In a written statement, the department acknowledged that it takes a long time to assess fines, attributing the delays both to the agency’s workload and its “multiple layers of review.” About the Series This year, ProPublica has been chronicling how weaknesses in federal and state laws, as well as lax enforcement, have left patients vulnerable to damaging invasions of privacy. More reporting like this: - Another VA Headache: Privacy Violations Rising at Veterans’ Medical Facilities - Few Consequences For Health Privacy Law’s Repeat Offenders - HIPAA Helper: Who is Revealing Your Private Medical Information? - New Jersey Psychology Practice Revealed Patients’ Mental Disorders in Debt Lawsuits - Nursing Home Workers Share Explicit Photos of Residents on Snapchat Klutz, the former state health official, said lengthy delays between violations and the resulting fines are problematic when the state’s goal is to prompt hospitals to change their behavior. “You want the consequence of a violation to closely follow the violation,” she said. Recent audits of the state Department of Public Health have found inconsistencies in its licensing and certification arm, particularly oversight of nursing homes. A 2014 report commissioned by the department repeatedly cited inconsistencies and variability among its different regional offices. Another report from the California State Auditor in October 2014 found similar problems. The California Legislature in 2008 passed two bills to safeguard privacy after hospital employees snooped in the records of celebrity patients including then-California first lady Maria Shriver, singer Britney Spears and actress Farrah Fawcett. “Your private medical information shouldn’t be flapping in the breeze like an open hospital gown,” then-Assembly member Dave Jones, the author of one bill, told the Los Angeles Times. Jones, now the state’s insurance commissioner, declined a request for comment through a spokeswoman because he does not monitor the law’s implementation in his current job. California’s law is distinct from the Health Insurance Portability and Accountability Act, the federal patient privacy law known as HIPAA. Indeed, the state health department said it does not coordinate or consult with the federal agency that enforces HIPAA, even if the two agencies are investigating the same breach. Officials at Eisenhower Medical Center said they weren’t aware the hospital had the most privacy deficiencies in the state until they were informed by ProPublica. “I don’t know why we would be number one except we do have a very strong program” to identify and report privacy violations, general counsel Michael Appelhans said. “We do a lot of training for employees” and do not discipline employees when they disclose unintentional violations. Riverside County Regional Medical Center had the second-highest number of privacy deficiencies, 120. A number were quite serious: A patient’s HIV test results were released in response to an attorney’s subpoena, even though they should not have been; a staff member took a photo of a trauma patient with a knife stuck in his head and posted it on a social media site; an admissions clerk used a patient’s information to call and ask if she had a boyfriend; and the hospital sent the wrong patient’s information to the Department of Justice as part of a “Firearms Prohibition” reporting system. Yet the hospital has never been fined by the state. Riverside University Health System said in a statement that it has implemented “a series of corrective actions aimed at ensuring compliance” with the law. It hired new leaders to implement a “robust compliance” program, allocated more money to the effort, purchased new training software for staff, and hired a contractor to conduct a HIPAA security risk assessment.
<urn:uuid:47b8fd5e-fc00-4b49-a22e-7342481011e2>
CC-MAIN-2022-33
https://www.propublica.org/article/california-patient-privacy-law-inconsistent-enforcement?token=rDN2JjVD-29cFGugPPAR36o3bRQRVGSp
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00073.warc.gz
en
0.949233
2,219
1.585938
2
|Biographical detail : ||A scholar and jurist. Ayatollah Murtadha was one of the most renowned scholars that Najaf, where he was born, has produced this century. It was to Burujerdi that Grand Ayatollah Sayyed Abualqasim al-Musawi al-Khoei entrusted his works to be researched, analysed and interpreted, including the Mustanad al-Urwath al-Wathqa (an exegesis relating to the collectivity of Islamic laws). This 10-volume work is the standard universal text for the highest stage of teaching in Shi’ite Islamic jurisprudence. An unknown assailant that sent shock-waves through the Muslim community assassinated him. He was an unassuming person, of social and cultural insight described as, “who knew and loved the people he led, not only in prayers but also in example”.
<urn:uuid:b2fcb07e-e717-49b5-ad7b-47a2497a5047>
CC-MAIN-2017-04
http://salaam.co.uk/knowledge/biography/viewentry.php?id=2140
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00347-ip-10-171-10-70.ec2.internal.warc.gz
en
0.962138
190
2.3125
2
Week 6—Commandments 4-10 Join us for Adult Catechumenate classes following each Wednesday Divine Service. This is offered for those that would like a refresher course on their catechetical instruction and especially for those desiring to join us and confess the Lutheran faith. The Fourth Commandment Honor your father and your mother. What does this mean? We should fear and love God so that we do not despise or anger our parents and other authorities, but honor them, serve and obey them, love and cherish them. The Fifth Commandment You shall not murder. What does this mean? We should fear and love God so that we do not hurt or harm our neighbor in his body, but help and support him in every physical need. The Sixth Commandment You shall not commit adultery. What does this mean? We should fear and love God so that we lead a sexually pure and decent life in what we say and do, and husband and wife love and honor each other. The Seventh Commandment You shall not steal. What does this mean? We should fear and love God so that we do not take our neighbor’s money or possessions, or get them in any dishonest way, but help him to improve and protect his possessions and income. The Eighth Commandment You shall not give false testimony against your neighbor. What does this mean? We should fear and love God so that we do not tell lies about our neighbor, betray him, slander him, or hurt his reputation, but defend him, speak well of him, and explain everything in the kindest way. The Ninth Commandment You shall not covet your neighbor’s house. What does this mean? We should fear and love God so that we do not scheme to get our neighbor’s inheritance or house, or get it in a way which only appears right, but help and be of service to him in keeping it. The Tenth Commandment You shall not covet your neighbor’s wife, or his manservant or maidservant, his ox or donkey, or anything that belongs to your neighbor. What does this mean? We should fear and love God so that we do not entice or force away our neighbor’s wife, workers, or animals, or turn them against him, but urge them to stay and do their duty. [The text of the leads is from Ex. 20:3, 7, 8, 12–17.] The Close of the Commandments What does God say about all these commandments? He says, “I, the Lord your God, am a jealous God, punishing the children for the sin of the fathers to the third and fourth generation of those who hate Me, but showing love to a thousand generations of those who love Me and keep My commandments.â€Â (Ex. 20:5–6) What does this mean? God threatens to punish all who break these commandments. Therefore, we should fear His wrath and not do anything against them. But He promises grace and every blessing to all who keep these commandments. Therefore, we should also love and trust in Him and gladly do what He commands.
<urn:uuid:286c2827-6e43-4b02-8c26-a0fea2464c07>
CC-MAIN-2022-33
https://outerrimterritories.com/adult-catechumenate-week-6-commandments-4-10
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00669.warc.gz
en
0.953721
691
2.515625
3
In the future, there will be no Shamu. SeaWorld, known for its clapping seals, leaping whales, and inhumane captivity, has decided that its orca-breeding program can no longer be justified, and that the animals performing now will be the last generation to do so. SeaWorld owns 29 killer whales, which have a lifespan of about 30 years, so the change may take awhile. In November, the San Diego park announced it would phase out its high-flying acrobatics in favor of a toned-down conservation-themed show in a much larger tank. SeaWorld has been criticized for mating orcas when they are too young and forcing them to inbreed. Wayne Pacelle, the president and CEO of the Humane Society, who brokered the decision to end the breeding program, said, “Today’s announcement signals that the era of captive display of orcas will end.” The SeaWorld CEO Joel Manby signaled that the change is the next logical step in the SeaWorld brand overhaul. “As one of the largest rescue organizations in the world, we will increase our focus on rescue operations,” he said in a statement. Much of the criticism of SeaWorld’s practices stems from the intensely critical 2013 documentary Blackfish, which showed orcas held in pens barely larger than their bodies and trainers performing dangerously close to the animals. The movie focused on Tilikum, an orca who accidentally killed a SeaWorld trainer and who is reportedly very sick. Since Blackfish, the ocean park’s stock price has fallen by more than half, and attendance has been way down as well.
<urn:uuid:ff804646-6a0c-46b0-87ef-ec4c264b0347>
CC-MAIN-2017-04
http://nymag.com/daily/intelligencer/2016/03/seaworld-is-phasing-out-orca-breeding.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00465-ip-10-171-10-70.ec2.internal.warc.gz
en
0.958515
339
2
2
|Publication number||US7881240 B1| |Application number||US 11/627,215| |Publication date||1 Feb 2011| |Filing date||25 Jan 2007| |Priority date||25 Jan 2007| |Publication number||11627215, 627215, US 7881240 B1, US 7881240B1, US-B1-7881240, US7881240 B1, US7881240B1| |Inventors||Andrew M. Wurtenberger, Ryan S. Talley| |Original Assignee||Sprint Spectrum L.P.| |Export Citation||BiBTeX, EndNote, RefMan| |Patent Citations (54), Non-Patent Citations (25), Referenced by (3), Classifications (6), Legal Events (2)| |External Links: USPTO, USPTO Assignment, Espacenet| 1. Technical Field The present invention relates to wireless communications, and, more particularly, to configuration of access nodes and access terminals in wireless communication systems. 2. Description of Related Art Many people use mobile stations, such as cell phones and personal digital assistants (PDAs), to communicate with cellular wireless networks. These mobile stations and networks typically communicate with each other over a radio frequency (RF) air interface according to a wireless communication protocol such as Code Division Multiple Access (CDMA), perhaps in conformance with one or more industry specifications such as IS-95 and IS-2000. Wireless networks that operate according to these specifications are often referred to as “1xRTT networks” (or “1x networks” for short), which stands for “Single Carrier Radio Transmission Technology.” These networks typically provide communication services such as voice, Short Message Service (SMS) messaging, and packet-data communication. Recently, service providers have introduced mobile stations and wireless networks that communicate using a protocol known as EV-DO, which stands for “Evolution Data Optimized.” EV-DO networks, operating in conformance with industry specification IS-856, provide high rate packet-data service (including Voice over IP (VoIP) service) to mobile stations using a combination of time-division multiplexing (TDM) on the forward link (from the network to mobile stations) and CDMA technology on the reverse link (from mobile stations to the network). Furthermore, some mobile stations, known as hybrid mobile stations or hybrid access terminals, can communicate with both 1x networks and EV-DO networks. In the EV-DO context, a mobile station is typically referred to as an access terminal, while the network entity with which the access terminal communicates over the air interface is known as an access node. The access node typically includes a device known as a radio network controller (RNC), which is similar to a base station controller (BSC) in 1x networks. The access node also includes one or more base transceiver stations (BTSs) or “Node-Bs,” each of which include one or more antennas that radiate to define respective wireless coverage areas. Among other functions, the RNC controls one or more BTSs, and acts as a conduit between the BTSs and an entity known as a packet data serving node (PDSN), which provides access to a packet-data network. Thus, when positioned in one of these wireless coverage areas, an access terminal may communicate over the packet-data network via the access node and the PDSN. In addition to VoIP communication, access terminals frequently engage in other types of packet-data communication, such as instant messaging (IM) and web browsing. Each instance of an access terminal engaging in a type of packet-data communication for a period of time may be deemed a “packet flow,” which would typically involve Internet Protocol (IP) packets being sent and received by the access terminal. For example, a given VoIP call may be referred to as a VoIP packet flow. Thus, as examples, an access terminal may engage in VoIP packet flows, IM packet flows, push-to-talk (PTT) packet flows, streaming-video packet flows, streaming-audio packet flows, video-telephony packet flows, and best-effort packet flows such as web-browsing packet flows and file-transfer-protocol (FTP) packet flows. To address the fact that access terminals engage in these various types of packet flows, a particular revision of EV-DO specifications, known as EV-DO Rev. A (“EV-DO-A”), provides for what are known as profile IDs, which are identifiers associated on a one-to-one basis with types of packet flows. Thus, one profile ID may be associated with VoIP packet flows (i.e., “conversational voice”), while another may be associated with best-effort packet flows, and so on. Again, an access terminal may be able to communicate according to more than one profile ID, which is another way of stating that it can engage in more than one type of packet flow. Furthermore, to be able to participate in one or more of these various types of packet flows, an access terminal may run (i.e., launch, enable, execute, etc.) particular communication applications, perhaps in response to receiving one or more user commands. As an example, to be able to participate in push-to-talk (PTT) packet flows, the access terminal may enable a PTT application. As another example, to be able to participate in IM packet flows, an access terminal may run an IM application. As yet another example, to be able to engage in web-browsing packet flows, an access terminal may launch a web browser. To initiate connectivity, when powered on in a coverage area of an access node, an access terminal may send what is known as a Universal Access Terminal Identifier (UATI) request to the access node. The access node may respond by granting a UATI to the access terminal in a message known as a UATI response. This UATI response typically contains the granted UATI, which then serves to identify the access terminal to the access node for some period of time. After acquiring a UATI, the access terminal will typically communicate with the access node over the air interface to set up what is referred to as a “session.” Essentially, an access terminal that has a session with an access node can engage in packet-data communication over the packet-data network to which the access node and the PDSN provide access. Conversely, an access terminal that does not have a session with an access node can not engage in packet-data communication over the packet-data network. As part of setting up the session, the access terminal sends a connection request to the access node, requesting an air-interface connection. The access node will responsively work to establish the air-interface connection with the access terminal, which involves the access node instructing the access terminal to communicate with the access node over what is known as a traffic channel. This traffic channel takes the form of particular timeslots on the forward link, during which the access node sends data to the access terminal, and a particular CDMA channel on the reverse link, over which the access terminal sends data to the access node. In addition to establishing the connection with the access terminal, the access node takes a number of other actions, one of which is to validate that the access terminal is authorized to engage in communication via the access node. Another such action is to set up a radio-packet (e.g., A10/A11) connection between the access node and the PDSN for the access terminal. The access node also facilitates establishment of a data link (e.g., a point-to-point protocol (PPP) connection) between the access terminal and the PDSN. The access node may also facilitate assignment (e.g., by the PDSN or by a Mobile-IP home agent) of an IP address to the access terminal. Finally, the access terminal and the access node negotiate over the traffic channel to agree on a set of profile IDs for the access terminal to use during the session; in other words, they agree as to the types of packet flows in which the access terminal is capable of engaging and in which the access terminal is permitted to engage. Once those steps are complete, the access terminal has a session with the access node, and can therefore communicate over the packet-data network via the access node and the PDSN, according to the agreed-upon set of profile IDs. Typically, the air-interface connection is then torn down, freeing up those resources for other access terminals. Both the network and the access terminal maintain data pertaining to the rest of what was established, however, including the IP address, radio-packet connection, and data link. This transition from having a traffic channel to not having one is referred to as the access terminal going from active to dormant. Thereafter, if the access terminal wants to initiate packet-data communication, it will send another connection request to the access node, which will then assign a traffic channel to the access terminal. If, on the other hand, the access terminal receives data addressed to the access terminal, the access node would typically send a page to the access terminal over a common paging channel, which takes the form of certain timeslots on the forward link. Perhaps in that page, or in an ensuing message, the access node will assign a traffic channel to the access node. The access terminal can then engage in one or more packet flows of any of the negotiated types, over the packet-data network, using the assigned traffic channel, as well as the previously-established IP address, radio-packet connection, and data link. As part of setting up a packet flow, either the access terminal or the access node, or both, may send the other a message known as a ReservationOnRequest (RoR). The RoR includes at least one profile ID, which indicates the type of packet flow that is being requested. Once an RoR has been sent and acknowledged, the access terminal has an “open reservation” on the assigned traffic channel. This open reservation is associated with the profile ID that was included in the RoR; in other words, the open reservation is associated with the type of packet flow in which the access terminal is then able to engage. Note that an access terminal may have more than one open reservation on the assigned traffic channel at one time, corresponding to the fact that the access terminal can engage in more than one packet flow at one time. The network typically uses this profile-ID information to apply a particular quality of service (QoS) to the packet flow, which essentially means providing a particular level of packet forwarding (or “expedited forwarding”) treatment to certain packet flows. This traffic shaping is also known as “DiffServ” (“differentiated services”). Thus, a profile ID effectively represents a set of QoS characteristics to be applied to a packet flow. Methods and systems are provided for dynamic configuration of the EV-DO-A slot cycle index based on communication application. In one aspect, an exemplary embodiment may take the form of a method, in accordance with which an access terminal (1) executes a set of communication applications, each application associated with a respective slot cycle index; (2) identifies a desired slot cycle index at least in part by determining, among the respective slot cycle indexes associated with the set of executing applications, which slot cycle index is associated with the shortest slot cycle; (3) sends a request message to an access node, requesting the desired slot cycle index; (4) negotiates with the access node to agree on a negotiated slot cycle index; and (5) checks for pages from the access node according to a slot cycle that is determined at least in part by the negotiated slot cycle index. These as well as other aspects and advantages will become apparent to those of ordinary skill in the art by reading the following detailed description, with reference where appropriate to the accompanying drawings. Various exemplary embodiments are described herein with reference to the following drawings, wherein like numerals denote like entities. Among the parameters that pertain to the communication between the access node and the access terminal is a parameter known as the “slot cycle index.” As mentioned above, on an EV-DO-A system, the paging channel is used by the access node to page an access terminal, to indicate that the access node has data to send to the access terminal. With a particular degree of frequency, each access terminal checks the paging channel for any pages directed to that access terminal. That degree of frequency is controlled by the slot cycle index. For example, an access terminal using a slot cycle index of 2 may check for pages every 5.12 seconds, with the access node correspondingly using the same period for scheduling pages to the access terminal. As further examples, a slot cycle index of 1 could correspond to a period of 2.56 seconds, 0 to 1.28 seconds, −1 to 0.64 seconds, and −2 to 0.32 seconds. Thus, while other implementations are certainly possible, it could be the case that, the lower the slot cycle index, the more frequently the access node schedules pages to the access terminal, and the more frequently the access terminal checks for pages. Note that an access node may receive data for an access terminal at any point in the period that is set by the slot cycle index. Thus, on average, the access node will have to wait half of that period before paging the access node. Note that both the access node and the access terminal operate in a synchronized manner according to a common clock, which may be Global Positioning System (GPS) time. And both know the slot cycle index for the access terminal. As such, the access node schedules pages for the same time at which the access terminal checks for them. And it should be noted that current implementations involve access nodes using the same slot-cycle-index value for all access terminals, regardless of the type(s) of packet flow(s) in which they are engaging, or of the one or more communication applications that they currently have enabled. Note that an EV-DO access terminal can check the EV-DO paging channel whether or not it is currently involved in a packet flow on an EV-DO traffic channel. In 1x networks, mobile stations cannot, over the same time period, monitor the paging channel and communicate on a traffic channel, both of which are Walsh-coded CDMA channels. As stated, however, EV-DO networks use TDM on the forward link, so access terminals can both monitor the paging channel and communicate on a traffic channel over the same time period. Note that the access terminal can do this at what is effectively, but not actually, the same exact time, due to the TDM nature of the EV-DO forward link. Note that certain types of packet flows require a better QoS than others. That is, there are latency-sensitive packet flows, such as VoIP packet flows, that require expedited (i.e. prioritized) forwarding of packets, and there are latency-tolerant packet flows, such as web-browsing packet flows (“best-effort packet flows” generally), for which expedited forwarding is not necessary. It is also generally desirable for setup times to be minimized for latency-sensitive packet flows. For example, it is desirable to set up PTT and IM packet flows quickly. Thus, according to the present invention, certain access-terminal applications may be considered latency-sensitive, while others may be considered latency-tolerant. As examples, a PTT application may be considered latency-sensitive, while a web browser may be considered latency-tolerant. Therefore, in addition to applying a higher QoS to packets associated with a latency-sensitive application, it would also be advantageous to associate a lower slot cycle index with an access terminal that currently has such an application enabled. This way, when that access terminal is, for example, called by another user, the page message to alert the access terminal of the call will be received more quickly. Conversely, a higher slot cycle index may be appropriate for an access terminal that is currently running only latency-tolerant applications. This way, it will not check for pages with a high degree of frequency, which would drain battery power. Furthermore, network resources dedicated to paging would be used frequently for access terminals running latency-sensitive applications and less frequently for access terminals that are not, which will result in a more efficient use of those network resources. In operation, upon setting up a session, an access terminal may be assigned by the access node to use a default value for its slot cycle index, such as 2. At that time or thereafter, the access terminal may determine that it wants to enable one or more communication applications that are latency-sensitive. This could involve placing a VoIP call, enabling a PTT application, launching an IM application, as well as numerous other examples. The access terminal may responsively send a request message to the access node, requesting that the access terminal be assigned a slot cycle index that is lower than that default value. The access terminal and the access node may then negotiate to establish a slot-cycle-index value for the access terminal. In the initial request, or at some other point in this negotiation, the access terminal may indicate to the access node why the access terminal is requesting the lower slot cycle index. In other words, the access terminal may convey to the access node an indication of one or more of the applications that the access terminal has enabled, will be enabling, or wishes to enable. The access node may then responsively assign the requested slot cycle index to the access terminal. The access node may instead to assign some other slot cycle index to the access terminal, or perhaps deny the request altogether, which would result in the access terminal still having the default slot-cycle-index value. Depending on which of these results the access terminal obtains, the access terminal may decide not to enable one or more of the communication applications that gave rise to the request in the first instance. To facilitate operation of the present invention, the access terminal, or perhaps both the access terminal and the access node, may maintain data that correlates particular applications with particular slot-cycle-index values. And there is no need for only two classifications of applications (i.e., latency-sensitive and latency-tolerant). Any groupings of applications could be used, associated with any number of slot-cycle-index values. Note that hybrid access terminals may negotiate with the access node and with the 1x network to arrive a situation where the hybrid access terminals would check for pages on the EV-DO network and on the 1x network at different times, so that neither page-checking process would interfere with the other. Note that an access terminal may base its decision as to what slot-cycle-index value to request on whichever application is the most latency-sensitive, among the applications that it wishes to run or among those that it is currently running. Thus, an access terminal that is running both an IM application and a web browser would request the same slot cycle index as an access terminal that is running just the IM application, since the IM application would be, in this example, the more latency-sensitive of the two. Furthermore, a given access terminal may request a different slot cycle index each time there is a change in the set of applications that it is running, where that change results in a different slot cycle index being associated with the most latency-sensitive, currently-running application. Advantageously, the present invention tailors the slot cycle index to the applications running on particular access terminals, to ensure that the latency requirements of each access terminal are met. Furthermore, battery power is conserved on access terminals that are running only latency-tolerant applications, by using a relatively longer slot cycle, that is, a higher value for the slot cycle index and a corresponding lower frequency of checking for pages. a. Exemplary Communication System As shown in Access terminal 102 may be any mobile device arranged to carry out the access-terminal functions described herein. As such, access terminal 102 may include a user interface, a wireless-communication interface, a processor, and data storage comprising instructions executable by the processor for carrying out those functions. The user interface may include buttons, a touch-screen, a microphone, and/or any other elements for receiving inputs, as well as a speaker, one or more displays, and/or any other elements for communicating outputs. The wireless-communication interface may comprise an antenna and a chipset for communicating with one or more access nodes over an air interface. As an example, the chipset could be one suitable for engaging in EV-DO communications. The chipset or wireless-communication interface in general may also be able to communicate with a CDMA network, a Wi-Fi (IEEE 802.11) network, and/or one or more additional types of wireless networks. The processor and data storage may be any suitable components known to those of skill in the art. As examples, access terminal 102 could be or include a cell phone, a PDA, a computer, a laptop computer, a hybrid IS-2000/IS-856 device, and/or a multi-mode Wi-Fi/cellular device. Furthermore, access terminal 102 may store data that correlates particular slot cycle indexes with particular communication applications. As an example, access terminal 102 may store a table such as that shown as correlation data 200 of Moreover, access node 104 may include instructions executable by its processor to receive a request message from access terminal 102, requesting a particular slot cycle index. In particular, access terminal 102 may be executing one or more communication applications, each associated with a respective slot cycle index (e.g. by correlation data such as correlation data 200). Access terminal 102 may have identified the particular slot cycle index by determining, among the slot cycle indexes associated with the various communication applications that access terminal 102 is executing, which slot cycle index is associated with the shortest slot cycle. Access node 104 may further comprise instructions to then negotiate with access terminal 102 to agree on a slot cycle index, perhaps using the requested slot-cycle-index value as a starting point in that negotiation. Finally, access node 104 may comprise instructions to thereafter schedule pages to access terminal 102 according to a slot cycle that is determined by the agreed-upon slot cycle index. PDSN 106 may be any networking server or other device arranged to carry out the PDSN functions described herein. As such, PDSN 106 may include a communication interface, a processor, and data storage comprising instructions executable by the processor for carrying out those functions. The communication interface may include a wired packet-data interface such as an Ethernet interface for communicating with access node 104 and over PDN 108. Note that, instead or in addition, PDSN 106 may comprise a wireless interface for communicating with access node 104 and over PDN 108. And PDSN 106 may use the same interface or separate interfaces for communicating with access node 104 and for communicating over PDN 108. PDN 108 may include one or more wide area networks, one or more local area networks, one or more public networks such as the Internet, one or more private networks, one or more wired networks, one or more wireless networks, and/or one or more networks of any other variety. Devices in communication with PDN 108 may exchange data using a packet-switched protocol such as IP, and may be identified by an address such as an IP address. At step 306, access terminal 102 sends a request message to access node 104, requesting the desired slot cycle index. At step 308, access terminal 102 negotiates with access node 104 to agree on a negotiated slot cycle index. At step 310, access terminal 102 checks for pages from access node 104 according to a slot cycle that is determined at least in part by the negotiated slot cycle index. These steps are further explained in the following subsections. At step 302, access terminal 102 executes a set of communication applications, where each application associated with a respective slot cycle index. As explained above, access terminal 102 may store a set of correlation data 200 that correlates each of a set of communication applications with a particular slot cycle index. So, in this example, a user of access terminal 102 may have launched all three applications listed in At step 304, access terminal 102 identifies a desired slot cycle index at least in part by determining, among the respective slot cycle indexes associated with the set of executing applications, which slot cycle index is associated with the shortest slot cycle. Thus, using the example given above, if access terminal is executing the PTT application (associated with a slot cycle index of −2 (and, consistent with the other examples given herein, thus associated with a slot cycle of 0.32 seconds)), the IM application (associated with a slot cycle index of 0 and thus with a slot cycle of 1.28 seconds), and the web browser (associated with a slot cycle index of 2 and thus with a slot cycle of 5.12 seconds). Therefore, in this example, of the communication applications that access terminal 102 is executing, the PTT application is associated with the shortest slot cycle, and the desired slot cycle index would be determined to be −2. In some embodiments, access terminal 102 may identify the desired slot cycle index in response to detecting a change in the set of applications that it is executing. Thus, access terminal may be operating using a first slot cycle index. Then, access terminal 102—perhaps at least in part at the instruction of its user—may launch a particular application or group of applications, close a particular application or group of applications, and/or otherwise change the set of communication applications that it is currently executing. In this example, before this change in the set of executing applications, the most latency-sensitive executing application was associated with the first slot cycle index. After the change, the most latency-sensitive of the then-executing applications is associated with a second slot cycle index, which is not equal to the first slot cycle index (and could be less than or greater than the first slot cycle index). As a result of detecting this change, access terminal 102 identifies the second slot cycle index as the desired slot cycle index in step 304. Note that access terminal 102, may, in some embodiments, be configured to initially operate using a default slot cycle index. Preferably, this default slot cycle index would be the one associated with the longest slot cycle. In the example scenarios described herein, this would mean that the default slot cycle index value would be 2, associated with a slot cycle of 5.12 seconds. Typically, then, the desired slot cycle index that is identified in step 304 would be associated with a slot cycle that is shorter than the slot cycle that is associated with the default slot cycle index. At step 306, access terminal 102 sends a request message to access node 104, requesting the desired slot cycle index that was identified in step 304. This request message could take many forms and be according to any suitable protocol. Along with the desired slot cycle index, this request message could include an indication of the one or more communication applications that access terminal 102 is executing, is about to execute, and/or wishes to execute. At step 308, access terminal 102 negotiates with access node 104 to agree on a negotiated slot cycle index. This negotiated slot cycle index could be equal to the desired slot cycle index that access terminal 102 identified in step 304 and requested in step 306; however, the negotiated slot cycle index could also be different than that desired slot-cycle-index value. If the two values are different, it would most often (though not necessarily always) be the case that the negotiated value would be associated with a longer slot cycle than would the desired value. That is, the access node would typically grant the requested slot cycle index if possible, or award a value that is associated with a longer slot cycle, perhaps during times of heavy loading on a particular carrier frequency in a particular sector. In cases where access terminal 102 does not get the slot cycle index that it requests, it may decide to terminate (or not launch) one or more particular communication applications. At step 310, access terminal 102 checks for pages from access node 104 according to a slot cycle that is determined at least in part by the negotiated slot cycle index. Thus, according to the example numbers used herein, if the slot cycle index that was negotiated in step 308 was 0, then access terminal 102 may operate using a slot cycle of 1.28 seconds. Correspondingly, access node 104 would then preferably schedule pages to access terminal 102 according to that same slot cycle. And many other examples are possible as well. Various exemplary embodiments have been described above. Those skilled in the art will understand, however, that changes and modifications may be made to those examples without departing from the scope of the claims. |Cited Patent||Filing date||Publication date||Applicant||Title| |US4870408||30 Apr 1987||26 Sep 1989||Motorola, Inc.||Method for dynamically allocating data channels on a trunked communication system| |US5442809||2 Mar 1994||15 Aug 1995||Motorola, Inc.||Method of assigning a voice/data channel as a temporary control channel in a radio communications system| |US5568511||26 Aug 1992||22 Oct 1996||Ericsson Ge Mobile Communications Inc.||System and method for radio disconnect and channel access for digitized speech trunked radio systems| |US5710591||27 Jun 1995||20 Jan 1998||At&T||Method and apparatus for recording and indexing an audio and multimedia conference| |US5818836||9 Aug 1995||6 Oct 1998||Duval; Stephen C.||Method and apparatus for anonymous voice communication using an online data service| |US5850611||7 Nov 1997||15 Dec 1998||Motorola, Inc.||Method and apparatus for communicating in a dispatch communication system| |US5884196||6 Jun 1996||16 Mar 1999||Qualcomm Incorporated||Method and apparatus of preserving power of a remote unit in a dispatch system| |US5936964||18 Apr 1997||10 Aug 1999||Telefonaktiebolaget Lm Ericsson||Round-trip delay optimization of multiplexed speech channels| |US5983099||11 Jun 1996||9 Nov 1999||Qualcomm Incorporated||Method/apparatus for an accelerated response to resource allocation requests in a CDMA push-to-talk system using a CDMA interconnect subsystem to route calls| |US6014556||15 Jul 1997||11 Jan 2000||Ericsson Inc.||Method for priority in terminating call setup| |US6032051||1 Dec 1997||29 Feb 2000||Telefonaktiebolaget L/M Ericsson||Wireless mobile comunication devices for group use| |US6041241||3 Mar 1997||21 Mar 2000||Motorola, Inc.||Apparatus and method for balancing power savings and call set up time in a wireless communication device| |US6119017||25 Nov 1997||12 Sep 2000||Motorola, Inc.||Method of registration in a communication system| |US6178323||6 Nov 1998||23 Jan 2001||Nec Corporation||System and method for determining a tentative master of a radio conference system| |US6381467||22 Jun 2000||30 Apr 2002||Motorola, Inc.||Method and apparatus for managing an ad hoc wireless network| |US6477150||3 Mar 2000||5 Nov 2002||Qualcomm, Inc.||System and method for providing group communication services in an existing communication system| |US6490452||21 Jan 2000||3 Dec 2002||Motorola, Inc.||Group handover in a cellular communications network| |US6526377||2 Nov 1999||25 Feb 2003||Intel Corporation||Virtual presence| |US6564049||10 May 1999||13 May 2003||Ericsson Inc.||Methods and systems for providing group calls with reduced setup times| |US6668167||6 Oct 2001||23 Dec 2003||Mcdowell Mark||Method and apparatus for sharing mobile user event information between wireless networks and fixed IP networks| |US6865398||4 Feb 2002||8 Mar 2005||Sprint Spectrum L.P.||Method and system for selectively reducing call-setup latency through management of paging frequency and buffering of user speech in a wireless mobile station| |US7043266||4 Feb 2002||9 May 2006||Sprint Spectrum L.P.||Method and system for selectively reducing call-setup latency through management of paging frequency| |US20020034941||23 Feb 2001||21 Mar 2002||Prathap Patil||Methods and systems for tracking wireless devices| |US20020055364||12 Sep 2001||9 May 2002||Chung-Ching Wang||Method and system for using common channel for data communications| |US20020058523||17 Oct 2001||16 May 2002||Mark Maggenti||Controller for reducing latency in a group communication network| |US20020071445||7 Dec 2000||13 Jun 2002||Geng Wu||Method and apparatus for the transmission of short data bursts in CDMA/HDR networks| |US20020145990||11 Mar 2002||10 Oct 2002||Sayeedi Shahab M.||Apparatus and method for supporting common channel packet data service in a cdma2000 RAN| |US20020147818||5 Dec 2001||10 Oct 2002||Michael Wengrovitz||Session initiation protocol routing using voice cookies| |US20020172165||4 Dec 2001||21 Nov 2002||Eric Rosen||Communication device for reducing latency in a mobile-originated group communication request| |US20020172169||12 Feb 2002||21 Nov 2002||Eric Rosen||Communication device for providing an efficient dormant mode for a group communication network| |US20020173308||15 May 2001||21 Nov 2002||Motorola, Inc.||Instant message proxy for circuit switched mobile environment| |US20020173325||4 Dec 2001||21 Nov 2002||Eric Rosen||Method and apparatus for reducing latency in waking up a group of dormant communication devices| |US20020173326||4 Dec 2001||21 Nov 2002||Eric Rosen||Controller for reducing latency in a group dormancy-wakeup process in a group communication network| |US20020173327||12 Dec 2001||21 Nov 2002||Eric Rosen||Method and apparatus for delivering information to an idle mobile station in a group communication network| |US20020177461||12 Feb 2002||28 Nov 2002||Eric Rosen||Controller for providing an efficient dormant mode for a group communication network| |US20020191583||14 Jun 2001||19 Dec 2002||Harris John M.||Slot cycle assignment within a communication system| |US20020198008||21 Jun 2001||26 Dec 2002||Smith Dwight Randall||Method and apparatus for providing instant messaging in a wireless communication system| |US20030008657||12 Dec 2001||9 Jan 2003||Eric Rosen||Method and apparatus for a voiding simultaneous service origination and paging in a group communication network| |US20030021264||11 Sep 2002||30 Jan 2003||Zhakov Vyacheslav I.||Call transfer using session initiation protocol (SIP)| |US20030032448||30 Apr 2002||13 Feb 2003||Koninklijke Philips Electronics N. V.||Logbook emulet| |US20030083045||1 Nov 2001||1 May 2003||Palm Inc.||Temporary messaging address system and method| |US20030100326||27 Nov 2001||29 May 2003||Grube Gary W.||Group location and route sharing system for communication units in a trunked communication system| |US20030114156||18 Dec 2001||19 Jun 2003||Kinnavy Michael J.||Method and mobile station for enabling a preferred slot cycle| |US20030114174||19 Dec 2001||19 Jun 2003||Brian Walsh||Mobile telephone short text messaging with message thread identification| |US20030119540||21 Dec 2001||26 Jun 2003||Mathis James Earl||Contact list-based group call| |US20030125062||27 Dec 2001||3 Jul 2003||Bethards Charles W.||Method and apparatus for providing status information associated with a plurality of users| |US20040014456||20 Aug 2001||22 Jan 2004||Vaeaenaenen Mikko Kalervo||Instant video-and voicemail messaging method and means| |US20050036464 *||9 Jul 2004||17 Feb 2005||Samsung Electronics Co., Ltd.||Apparatus and method for enabling different reduced slot cycle modes in a wireless network| |US20050164741 *||23 Jan 2004||28 Jul 2005||Samsung Electronics Co., Ltd.||Apparatus and method using page response messages to change the slot cycle index of a selected mobile station in a wireless network| |US20050186973 *||2 Feb 2005||25 Aug 2005||Peter Gaal||Method and apparatus for sending signaling for multicast and broadcast services| |US20060153139 *||12 Dec 2003||13 Jul 2006||Seongsoo Bae||Method and system for preventing call drop by limiting search time of 1x system during 1x ev-do system traffic state| |US20070060164 *||11 Jul 2006||15 Mar 2007||Yu-Chul Kim||Method and apparatus for controlling reduced slot cycle mode for paging in a mobile communication system, and system thereof| |EP0817457A2||30 Jun 1997||7 Jan 1998||AT&T Corp.||Anonymous voice communication| |EP0984608A2||25 Jun 1999||8 Mar 2000||AT & T Corp.||Anonymous voice communication using on-line controls| |1||3rd Generation Partnership Project 2 (2002), "Fast Call Set-Up," 1-6.| |2||3rd Generation Partnership Project 2 ‘3GPP2’, "interoperability Specification (IOS) for CDMA 2000 Access Network Interfaces—Part 3 Features," Nov. 2001.| |3||3rd Generation Partnership Project 2 '3GPP2', "interoperability Specification (IOS) for CDMA 2000 Access Network Interfaces-Part 3 Features," Nov. 2001.| |4||Douskalis, (2000) "IP Technology: The Integration of Robust VoIP Services," 36-39.| |5||Ericsson, www.telecomcorridor.com/wireless%20horizons/1Coyne.pdf, printed from the World Wide Web on Jun. 27, 2001.| |6||Final Office Action from U.S. Appl. No. 10/067,080, mailed Apr. 27, 2004.| |7||Final Rejection for U.S. Appl. No. 10/067,028, mailed Nov. 2, 2005.| |8||Mobile Tornado, http://www.mobiletornado.com/products-iprsptt.html, printed from the World Wide Web on Jan. 27, 2003.| |9||Mobile Tornado, http://www.mobiletornado.com/products—iprsptt.html, printed from the World Wide Web on Jan. 27, 2003.| |10||Non-Final Office Action from U.S. Appl. No. 10/067,080, mailed May 21, 2003.| |11||Office Action from U.S. Appl. No. 10/067,028, mailed Dec. 14, 2004.| |12||Office Action from U.S. Appl. No. 10/067,028, mailed Jun. 27, 2005.| |13||OMA, "Discussion and definitions on PoC Floor Control, Input Contribution," Doc #OMA-REQ-2003-0375-PoC-Floor-Control, Jun. 2, 2003.| |14||OMA, "Inputs for PoC Requirements Document," Input Contribution, Doc #OMA-REQ-2003-0367-PoC-Input-Motorola, May 29, 2003.| |15||OMA, "PoC Use Case: Examples of User Requirements," Input Contribution, DOC #OMA-REQ-2003-0305-PoC Use Case, May 6, 2003.| |16||OMA, "PoC Use case: Mobile-PC Example," Input Contribution, DOC #OMA-REQ-2003-0323 PoC Mobile-PC use case, May 5, 2003.| |17||OMA, "PoC Use case: Multimedia Group Call Example," Input Contribution, Doc #OMA-REQ-2003-0306-PoC UseCase-group-multimedia-scenario, May 6, 2003.| |18||OMA, "Push to Talk over Cellular (PoC)," Version 0.1.6, May 12, 2003.| |19||OMA, "Discussion and definitions on PoC Floor Control, Input Contribution," Doc #OMA-REQ-2003-0375-PoC—Floor—Control, Jun. 2, 2003.| |20||OMA, "Inputs for PoC Requirements Document," Input Contribution, Doc #OMA-REQ-2003-0367-PoC—Input—Motorola, May 29, 2003.| |21||OMA, "PoC Use case: Mobile—PC Example," Input Contribution, DOC #OMA-REQ-2003-0323 PoC Mobile-PC use case, May 5, 2003.| |22||Qualcomm Chats Up "Push-to-Talk," http://siliconvalley.internet.com/news/print.php/953261, printed from the World Wide Web on Jan. 27, 2003.| |23||Schulzrinne and Rosenberg, "SIP Caller Preferences and Callee Capabilities," Internet Engineering Task Force, Internet Draft, Oct. 22, 1999.| |24||Unpublished U.S. Appl. No. 10/277,465, filed Oct. 22, 2002 entitled "Method for Call Setup Using Short Data Bursts" (Sprint Docket No. 1999).| |25||Vakil et al., "Host Mobility Management Protocol Extending SIP to 3G-IP Networks," Internet Engineering Task Force, Internet Draft, Oct. 1999.| |Citing Patent||Filing date||Publication date||Applicant||Title| |US8848688 *||3 Oct 2008||30 Sep 2014||Sprint Spectrum L.P.||System and method for using a handoff threshold associated with a slot cycle index to determine whether to perform an access terminal handoff| |US8929872 *||15 Sep 2011||6 Jan 2015||Qualcomm Incorporated||Management of paging channel monitoring| |US20120238284 *||15 Sep 2011||20 Sep 2012||Qualcomm Incorporated||Management of paging channel monitoring| |U.S. Classification||370/311, 370/345| |Cooperative Classification||H04W28/18, H04W68/02| |25 Jan 2007||AS||Assignment| Owner name: SPRINT SPECTRUM L.P., KANSAS Effective date: 20070125 Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WURTENBERGER, ANDREW M.;TALLEY, RYAN S.;REEL/FRAME:018805/0868 |29 Jul 2014||FPAY||Fee payment| Year of fee payment: 4
<urn:uuid:b084aa9f-499f-4a8d-906d-6172192ae65a>
CC-MAIN-2017-04
http://www.google.ca/patents/US7881240
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00344-ip-10-171-10-70.ec2.internal.warc.gz
en
0.875767
9,265
2.125
2
An autonomous house or off-the-grid (OTG) house is designed to be operated independently from infrastructural support services ("grids") such as the mains electricity grid, water supply system, sewage/excreta disposal system, centralised food production system, gas grid, and in some cases, storm drains, mains electricity grid-connected communication services and public roads. An autonomous neighbourhood is a collection of houses which together work autonomously (as one unit). Some of the houses may be completely autonomous on one aspect (ie electricity production, ...) but not on other aspects (ie sewage disposal, ...) The phrase "off the grid" has also entered popular language as a related but distinct concept of generally independent lifestyles or desire to be low-profile. For example: "I'm not on social media because I prefer to stay off the grid." This article focuses in detail on the housing and appliances of autonomous houses. Habits and lifestyle choices allowing use reduction are discussed in Green living. Sustainable city living then again discusses some of the areas of action specific to green living in a urban environment. Overview[edit | edit source] One of the major drawbacks of centralised systems (ie municipal sewage systems, mains electricity grids, ...) is that they require long water piping/cabling, towers, ... These components tend to increase the cost of the system, which is ultimately charged to the users of the system. In addition, besides increasing cost, it also decreases efficiency (ie a lot of energy is lost in the longer cabling, ...) Autonomous houses however have very short piping/cabling. This has several advantages including reduced environmental impacts, increased security, and lower costs of ownership. Autonomous houses often rely very little on civil services and are therefore safer and more comfortable during civil disaster or military attacks. This, as the houses would not lose power or water if public supplies were compromised for some reason. However, it would be very hard to impossible for every house to attain autonomous operation on each aspect (ie food production, water supply, sewage, energy production, ...) Even if it were possible, then systems in which autonomous operation is assured per neighbourhood (so say per 10 houses or per street -exact size depends on the region-) are still cheaper. This is because, when we arrange autonomous operation per neighbourhood, 1 single (larger) unit (ie wind turbine, water treatment plant, ...) can serve much more people, hereby lowering the cost (ie when compared to each house requiring its own (smaller) unit). However, by nonetheless reducing the amount of people served compared to a municipal (or even nation-wide) system, we still increase self-sufficiency/security and also still increase the efficiency of the system. Another major advantage of autonomous neighbourhood systems is that the tasks for maintaining the autonomy can be shared among much more people, hereby decreasing the effort required considerably. For example, food can be grown by one family and preserved by another. Sewage can be handled by yet another family, ... The house itself[edit | edit source] Earth sheltering and windbreaks can also reduce the absolute amount of heat needed by a building. Rounded, aerodynamic buildings also lose less heat. Systems[edit | edit source] In most aspects, autonomous houses/neighbourhoods tend to implement use reduction. This as it is a cost-effective approach (they limit the needed investments on the equipment, ...). Water supply[edit | edit source] In addition, greywater (water from washing machines, sinks, showers and baths) may be reused in landscape irrigation and toilets as a method of water conservation. Sewage/excreta disposal[edit | edit source] Some of the oldest pre-system sewage types are pit toilets, latrines, and outhouses. These are still used in many developing countries but do not allow composting, incineration or any other method of destroying pathogens. As such, there is a serious risk of microbial and viral contamination and thus can cause the operator of becoming ill. The standard system used today is a flush toilet with drain leach field and a septic tank. They however require huge amounts of water (although some tweaks can reduce water use for these, see flush toilet) to operate and can be -relatively- complicated. Incinerator systems are also quite practical. The ashes are biologically safe, and take up less than 1/10 the volume of the original waste. The approaches above however treat human excrement as a waste rather than a resource. Composted human excrement can be used to provide (or return, ie if the garden is used to grow food) nutrients to a garden. Recycling human excrement requires minimal life-style changes. In this context, Composting toilets are a better choice as they allow reuse of the human excrement, in a safe manner. They also reduce water use by half, and eliminate the difficulty and expense of septic tanks. Food production[edit | edit source] Food production has often been included in historic autonomous projects to provide security. Skilled, intensive gardening can support an adult from as little as 100 square meters of land per person, possibly requiring the use of organic farming and aeroponics. Some proven intensive, low-effort food-production systems include urban gardening (indoors and outdoors). Indoor cultivation may be set up using hydroponics, while outdoor cultivation may be done using permaculture, forest gardening, no-till farming, and do nothing farming. Greenhouses are also sometimes included (see Earthship Biotecture). Sometimes they are also outfitted with irrigation systems or heat sink-systems which can respectively irrigate the plants or help to store energy from the sun and redistribute it at night (when the greenhouses starts to cool down).Template:Citation needed Electricity[edit | edit source] Besides energy conservation, we also need to generate power, preferably in a way that it can be sustained infinitely. This means the energy source must preferably be renewable, and must not harm the environment or the people working under it. The most commonly used renewable sources of energy are: biomass, waterW, geothermalW, windW, and solarW. Solar power harnesses the energy of the sun to make electricity. Two typical methods for converting solar energy into electricity are photo-voltaic cellsW that are organized into panels and concentrated solar power, which uses mirrors to concentrate sunlight to either heat a fluid that runs an electrical generatorW via a steam turbineW or heat engine, or to simply cast onto photo-voltaic cells. The energy created by photo-voltaic cells (which are preferably placed on the roof) is a direct current and has to be converted to alternating current before it can be used in a household. Solar tile roofs have the potential to be more cost-effective than retrofitted solar power, because buildings need roofs anyway. A downside however is that they can not rack the sun during the day, and are hard to access in case they need repairs/cleaning. Modern solar cells last about 40 years, which makes them a reasonable investment in some areas. Solar cells have only small life-style impacts: The cells must be cleaned a few times per year. Direct current can be either stored in batteries for later use, or we can use an AC/DC inverter for immediate use. To get the best out of a solar panel, the angle of incidenceW of the sun should be between 20-50 degrees. Solar power via photo-voltaic cells are usually the most expensive method to harnessing renewable energy, but is falling in price as technology advances and public interest increases. It has the advantages of being portable, easy to use on an individual basis, readily available for government grants and incentives, and being flexible in regards to location (though it is most efficient when used in hot, arid areas since they tend to be the most sunny).For those that are lucky, affordable rental schemes may be found.Concentrated solar power plants are typically used on more of a community scale rather than an individual household scale, because of the amount of energy they are able to harness but can be done on an individual scale with a parabolic reflectorW. A number of areas that lack sun have wind. In these cases, wind turbines may be a solution. Wind power is harnessed through turbines, set on tall towers (typically 20' or 6m with 10' or 3m diameter blades for an individual household's needs) that power a generator that creates electricity.They typically require an average of wind speed of 9 mi/hr (14 km/hr) to be worth their investment (as prescribed by the US Department of Energy), and are capable of paying for themselves within their lifetimes. Wind turbines in urban areas usually need to be mounted at least 30' (10m) in the air in order to receive enough wind and to be void of nearby obstructions (such as neighboring buildings). Mounting a wind turbine may also require permission from authorities. Wind turbines have been criticized for the noise they produce, their appearance, and the argument that they can affect the migratory patterns of birds (their blades obstruct passage in the sky). Wind turbines are much more feasible for those living in rural areasand are one of the most cost-effective forms of renewable energy per kilowatt, approaching the cost of fossil fuels, and have quick paybacks.For those that have a body of water flowing at an adequate speed (or falling from an adequate height) on their property, hydroelectricity may be an option. On a large scale, hydroelectricity, in the form of dams, has adverse environmental and social impacts. When on a small scale, however, in the form of single turbines, hydroelectricity is very sustainable. Single water turbines or even a group of single turbines are not environmentally or socially disruptive. On an individual household basis, single turbines are the probably the only economically feasible route (but can have high paybacks and is one of the most efficient methods of renewable energy production). It is more common for an eco-village to use this method rather than a singular household.Geothermal energy production involves harnessing the hot water or steam below the earth's surface, in reservoirs, to produce energy. Because the hot water or steam that is used is reinjected back into the reservoir, this source is considered sustainable. However, those that plan on getting their electricity from this source should be aware that there is controversy over the lifespan of each geothermal reservoir as some believe that their lifespans are naturally limited (they cool down over time, making geothermal energy production there eventually impossible). This method is often large scale as the system required to harness geothermal energy can be complex and requires deep drilling equipment. There do exist small individual scale geothermal operations, however, which harness reservoirs very close to the Earth's surface, avoiding the need for extensive drilling and sometimes even taking advantage of lakes or ponds where there is already a depression. In this case, the heat is captured and sent to a geothermal heat pumpW system located inside the shelter or facility that needs it (oftentimes, this heat is used directly to warm a greenhouse during the colder months).Although geothermal energy is available everywhere on Earth, practicality and cost-effectiveness varies, directly related to the depth required to reach reservoirs. Places such as the Philippines, Hawaii, Alaska, Iceland, California, and Nevada have geothermal reservoirs closer to the Earth's surface, making its production cost-effective.Biomass power is created when any biological matter (ie bagasseW, biogas, manure, stoverW, straw, used vegetable oil, wood, ...) is burned as fuel. As with the case of using green materials in a household, it is best to use as much locally available material as possible so as to reduce the carbon footprint created by transportation. Although burning biomass for fuel releases carbon dioxideW, sulfur compounds, and nitrogen compounds into the atmosphere, a major concern in a sustainable lifestyle, the amount that is released is sustainable (it will not contribute to a rise in carbon dioxide levels in the atmosphere). This is because the biological matter that is being burned releases the same amount of carbon dioxide that it consumed during its lifetime.However, burning biodiesel and bioethanol (see biofuel) when created from virgin material, is increasingly controversial and may or may not be considered sustainable because it inadvertently increases global poverty, the clearing of more land for new agriculture fields (the source of the biofuel is also the same source of food), and may use unsustainable growing methods (such as the use of environmentally harmful pesticides and fertilizers).Digestion of organic material to produce methane is becoming an increasingly popular method of biomass energy production. Materials such as waste sludge can be digested to release methane gas that can then be burnt to produce electricity. Methane gas is also a natural by-product of landfills, full of decomposing waste, and can be harnessed here to produce electricity as well. The advantage in burning methane gas is that is prevents the methane from being released into the atmosphere, exacerbating the greenhouse effect. Although this method of biomass energy production is typically large scale (done in landfills), it can be done on a smaller individual or community scale as well.During times of low demand, excess power can be stored in eletrochemical batteries for future use. However, batteries need to be replaced every few years. Microbial fuel cells allow the generation of electricity from biomass. Unlike direct incineration of biomass however, the method using a microbial fuel cell is completely emissionless. The plant can be chopped and converted as a whole, or it can be left alive so that waste saps from the plant can be converted by bacteria. In addition, recent advances in passively stable magnetic bearings may someday permit inexpensive storage of power in a flywheel in a vacuum, and some other types of fuel cells may also be useful for storing power. Other possible options are Earth batteries. In many areas, battery expenses can be eliminated by attaching the building to the electric power grid and operating the power system with net metering. Utility permission is required, but such cooperative generation is legally mandated in some areas (for example, California). A (semi-)grid-based building is less autonomous, but more economical and sustainable with fewer lifestyle sacrifices. In rural areas the grid's cost and impacts can be reduced by using single wire earth return systems (for example, the MALT-system). In areas that lack access to the grid, battery size can be reduced by including a generator to recharge the batteries during extended fogs or other low-power conditions. Auxiliary generators are usually run on biofuel or petrofuel. An hour of charging usually provides a day of operation. Modern residential chargers permit the user to set the charging times, so the generator is quiet at night. Some generators automatically test themselves once per week. Heating and cooling[edit | edit source] Heating[edit | edit source] Passive solar heating can heat most buildings in even the coldest climates. In colder climates, extra construction costs can be as little as 15% more than new, conventional buildings. In warm climates, those having less than two weeks of frosty nights per year, there is no cost impact. Electric heaters and electric stoves may provide pollution-free heat (depending on the power source), but use large amounts of electricity. If enough electricity is provided by solar panels, wind turbines, or other means, then electric heaters and stoves become a practical autonomous design. Radiator reflectors can be made and placed behind your radiators and the walls. They can be made DIY from sticking aluminium kitchen foil unto pieces of cardboard. The reflectors improve the efficiency of your radiators greatly as they avoid that any heat generated goes into the walls. Perhaps surprisingly, heat that goes into the inner or outer brick walls of your house is lost and does not contribute to heating the house (unlike e.g. with glass bottle walls, which do radiate this heat back). An increasing number of commercial buildings use a combined cycle with cogeneration to provide heating, often water heating, from the output of a natural gas reciprocating engine, gas turbine or stirling electric generator. The domestic water can be heated using either the same heating system (ie gas or firewood can also be used to heat the domestic water, by using a heat exchanger). In addition, solar water heating can be incorporated (often as a additional technology). Solar thermal energy is harnessed by collecting direct heat from the sun. One of the most common ways that this method is used by households is through solar water heatingW. In a broad perspective, these systems involve well insulated tanks for storage and collectors, are either passive or active systems (active systems have pumps that continuously circulate water through the collectors and storage tank) and, in active systems, involve either directly heating the water that will be used or heating a non-freezing heat-transfer fluid that then heats the water that will be used. Passive systems are cheaper than active systems since they do not require a pumping system (instead, they take advantage of the natural movement of hot water rising above cold water to cycle the water being used through the collector and storage tank). Other methods of harnessing solar power are solar space heatingW (for heating internal building spaces). Some authorities advocate that bottled gas or natural gas be replaced by biogas. However, this is usually impractical unless live-stock are on-site. The wastes of a single family are usually insufficient to produce enough methane for anything more than small amounts of cooking. Cooling[edit | edit source] Windows can be shaded in summer. Eaves can be overhung to provide the necessary shade. These also shade the walls of the house, reducing cooling costs. Another trick is to cool the building's thermal mass at night, and then cool the building from the thermal mass during the day. It helps to be able to route cold air from a sky-facing radiator (perhaps an air heating solar collector with an alternate purpose) or evaporative cooler directly through the thermal mass. On clear nights, even in tropical areas, sky facing radiators can cool below freezing. If a circular building is aerodynamically smooth, and cooler than the ground, it can be passively cooled by the "dome effect." Many installations have reported that a reflective or light colored dome induces a local vertical heat driven vortex that sucks cooler overhead air downward into a dome if the dome is vented properly (a single overhead vent, and peripheral vents). Some people have reported a temperature differential as high as 8°C between the inside of the dome and the outside. Buckminster Fuller discovered this effect with a simple house design adapted from a grain silo, and adapted his Dymaxion house and geodesic domes to use it. A heat pump system can also be used, by making it run in reverse. Storm drains[edit | edit source] Drainage systems are a crucial compromise between human habitability and a secure, sustainable watershed. Paved areas and lawns or turf do not allow much precipitation to filter through the ground to recharge aquifers. They can cause flooding and damage in neighbourhoods, as the water flows over the surface towards a low point. Typically, elaborate, capital-intensive storm sewer networks are engineered to deal with stormwater. In some cities, such as the Victorian era London sewers or much of the old City of Toronto, the storm water system is combined with the sanitary sewer system. In the event of heavy precipitation, the load on the sewage treatment plant at the end of the pipe becomes too great to handle and raw sewage is dumped into holding tanks, and sometimes into surface water. Autonomous buildings can address precipitation in a number of ways: If a water absorbing swale for each yard is combined with permeable concrete streets, storm drains can be omitted from the neighbourhood. This can save more than $800 per house (1970s) by eliminating storm drains. One way to use the savings is to purchase larger lots, which permits more amenities at the same cost. Permeable concrete is an established product in warm climates, and in development for freezing climates. In freezing climates, the elimination of storm drains can often still pay for enough land to construct swales (shallow water collecting ditches) or water impeding berms instead. This plan provides more land for homeowners and can offer more interesting topography for landscaping. Sustainable urban drainage systemsW replicate the natural systems that clean water in wildlife and implement them in a city's drainage system so as to minimize contaminated water and unnatural rates of runoff into the environment. A green roof also captures some precipitation and uses the water to grow plants. It can be built into a new building or used to replace an existing roof. Communication[edit | edit source] An increasing number of activists provide free or very inexpensive web and email services using cooperative computer networks that run wireless ad hoc networks. Network service is provided by a cooperative of neighbors, each operating a router as a household appliance. These minimize wired infrastructure, and its costs and vulnerabilities. Private Internet protocol networks set up in this way can operate without the use of a commercial provider. Satellite Internet access can provide high speed connectivity to remote locations, however these are significantly more expensive than wire-based or terrestrial wireless systems. Wimax and forms of packet radio can also be used. Depending on the speed and latency of these networks they may be capable of relaying VoIP traffic, negating the need for separate telephony services. Finally, the Internet Radio Linking Project provides potential for blending older (cheap) local radio broadcasting with the increased range of the internet. Depending on the location a mobile phone network may be available which can provide voice and data services. satellite-based telephone systems can also be used, as either fixed installations or portable handsets and can be integrated into a PABX or local IP-based network. Public transportation system[edit | edit source] Gallery[edit | edit source] Notes and references[edit | edit source] - Graywater Reuse and Rainwater Harvesting. Colorado State University Extension. Web. 27 Oct. 2010. - Publications list of the New Alchemy Institute. Retrieved 2010-02-05. - "Urban Homestead at a Glance" Path of Freedom - How to Grow a Complete Diet in Less Than 1000 Square Feet Dave Duhon & Cindy Gebhard, 1984, 200 pp. Ecology Action GROW BIOINTENSIVE(R) Publications - Solar Energy Technologies Program: Concentrating Solar Power. Energy Efficiency & Renewable Energy. US Department of Energy, 19 Oct. 2010. Web. 31 Oct. 2010. - McDilda, Diane Gow. The Everything Green Living Book: Easy Ways to Conserve Energy, Protect Your Family's Health, and Help save the Environment. Avon, MA: Adams Media, 2007. Print. - Jeffery, Yvonne, Michael Grosvenor, and Liz Barclay. Green Living for Dummies. Indianapolis, IN: Wiley Pub., 2008. Print. - Brown, Lester Russell. Plan B 4.0: Mobilizing to save Civilization. New York: W.W. Norton, 2009. Print. - Gipe, ibid. - Eaton power; see the specifications and manuals. Referenced 2007-12-27 - Kohler Generators; see the specifications and manuals. Referenced 2007-12-27 - Capstone Microturbine White-Paper (PDF) Retrieved on 2007-12-28. - Energy Savers: Solar Water Heaters. Energy Efficiency & Renewable Energy. US Department of Energy, 20 Oct. 2010. Web. 28 Oct. 2010. - Swales replacing drains: Paul Hawken, Amory Lovins and Hunter Lovins, "Natural Capitalism," ch. 5, pp83. The cited development is Village Homes, Davis, California, built in the 1970s by Michael and Judy Corbett - Environment Agency - Techniques. Environment Agency. Web. 27 Oct. 2010. - Environment Agency - Sustainable Drainage Systems. Environment Agency. Web. 27 Oct. 2010. - Northern Economics Inc. and Electric Power Systems Inc. April 2001. "Screening Report for Alaska Rural Energy Plan." (Report published on government website). Alaska Department of Commerce, Community, and Economic Development, via dced.state.ak.us. Retrieved on 2007-09-16. See also[edit | edit source] [edit | edit source] - http://www.HomePower.com Home Power Magazine - http://www.off-grid.net - Off-Grid reports on the people, technologies, events and influences throughout the global off-grid community. The Landbuddy section helps you find others to go off-grid with and the free classifieds are full of ads for off the grid real estate. The Off-Grid101 section has basic information on appropriate technology - from the right kind of solar cooker to how to gather rainwater. - VelaCreations - a documentation of a couple living off-grid for more than a decade - Smithsonian magazine interview about living off-grid (archive) - West Texas Weekly article on John Wells' life off the grid
<urn:uuid:0a181495-8f48-41db-84bd-dcadb349cc55>
CC-MAIN-2022-33
https://www.appropedia.org/Off-grid
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00269.warc.gz
en
0.934021
5,295
3.296875
3
Know when, where to specify a clean agent system Fire protection engineers should use NPFA 2001 to direct the specification of clean agent fire extinguishing systems, which are typically used in mission critical facilities. - Compare and contrast clean agent fire extinguishing systems. - Evaluate their use and outline the codes and standards used to dictate their specification. - Assess the pros and cons of various clean agent systems. Clean agent systems were initially developed to address emerging technologies related to the computer, aircraft, and marine industries. Halon 1301, one of the most common clean agents in its time, was developed in the 1960s. Its primary use was to provide fire protection to sensitive equipment related to computer mainframes and telecommunications equipment on aircraft and marine vessels. It was a very efficient means of fire protection that left no residue after discharge, and was a relatively lightweight means of suppression. As technology advanced and environmental concerns became important, the need for alternative agents became evident. Modern clean agents were developed to replace earlier gaseous-based systems that had been determined to have a detrimental impact to the environment. Halon 1301 and 1211 were found to deplete ozone when exposed to the atmosphere. There was a clear need to provide alternative fire-extinguishing agents that were safer to the environment, or cleaner. Hence clean agents were developed. They are defined as an electrically nonconducting fire extinguishant that does not leave a residue upon evaporation. In 1989, the Montreal Protocol determined that halon gases, including those used in fire-extinguishing systems, when exposed to the atmosphere caused a depletion of the ozone layer. As such, a ban was placed on the production and continued use or sale of halon-type fire-extinguishing systems. In the United States, the U.S. Environmental Protection Agency banned the manufacture of halon in the mid-1990s. This caused the need to develop alternative extinguishing agents and systems. The Technical Committee on Halon Protection Options was organized in 1991 and started working to address standards for those systems replacing halon. They cited a need to develop standards on how to design, install, maintain, and operate the newer systems being developed. As a result of the work performed by the committee and the NFPA, NFPA 2001: Standard on Clean Agent Fire Extinguishing Systems was formed. This standard provides minimum requirements for the design, installation, testing, maintenance, and operation for both total flooding and local-application clean agent systems used to protect property and equipment against fire. The standard was first published in 1994 and was developed to address alternatives to halon extinguishing systems. Since its initial publication in 1994, the standard has been updated multiple times and 2015 is the current edition. The standard has been updated to reflect changing technologies in the manufacture of clean agents, their use, and application in fire-extinguishing systems. The current edition includes new content to address recycling and disposal of the agents and higher-pressure agents. NFPA standards provide criteria on how to design, install, test, maintain, and operate the systems they govern. They do not dictate when these systems are required, which is typically left to the governing building and/or fire codes. These codes will require a certain level of protection and the NFPA standards will guide those involved in how to design and install the systems. NFPA 2001 addresses the requirements for system components, system design, local application systems, inspection, testing, maintenance, and training as well as requirements for marine systems. Annex material provide additional explanatory material to support the designers, installers and users of these systems. NFPA 2001 is the standard that dictates how to design and install clean agent systems. By reference within a building or fire code, the standard becomes enforceable, as it is part of the governing codes. Clean agent systems are typically used to protect sensitive electronic equipment or valuable property and equipment against fire. They can be used in conjunction with, or as a replacement for, water-based systems. Because the agent does not leave a residue after application, it can limit the damage caused by other types of extinguishing systems and is easier to return to normal operations because cleanup time is reduced. Clean agent systems are very common in protecting data-processing centers or rooms where computer equipment and servers are present. Clean agent systems can be a valuable tool in protecting sensitive electronic equipment or valuable property and equipment. Many of the model building and fire codes require automatic sprinkler systems to protect the building based on the use and size of the building. They do permit alternative extinguishing systems in lieu of sprinklers under certain conditions. The International Building Code (IBC) 2012 edition allows alternative systems under Section 904. This section references NFPA 2001 when clean agent systems are to be provided as part of the protection for the building. The use of these systems requires the approval of the fire code official, as they are considered alternative systems in the code. It also should be noted that their use may not allow other exceptions or reductions permitted by code for sprinkler protection. Therefore, the designer must carefully examine the application of the alternative system and make sure it does not impact other design components. When complete automatic sprinkler protection is required by code, there are certain options that a designer of clean agent systems can use. One includes the application of only a clean agent system for the room to be protected, and a fire-resistance rating around the room to reduce impact to a fire from this room to the remainder of the building. If the room is relatively small with respect to the overall size of the building, this option could be used to protect the space and still obtain reductions and exceptions for the overall building because limited areas of the building are not protected by sprinklers. This approach should be specifically discussed and agreed upon with the fire code official. The second option is to use a clean agent system in conjunction with a water-based sprinkler system to protect the space. The water-based system gives a code-compliant approach to providing automatic sprinklers for all areas of the building, or a fully sprinklered building. This option should be explored when full automatic sprinkler protection is required and the use of the clean agent system in lieu of sprinklers is not allowed. The clean agent system gives a first line of defense against a fire that, if extinguished, should not actuate the water-based system. If fire growth continues, the water-based system will provide protection of the building. It is not uncommon for a pre-action sprinkler system to meet the automatic sprinkler system code requirements and then supplement a clean agent system for protection of the equipment. The pre-action system does not have water in the system prior to activation, thus mitigating the potential for water damage. The pre-action system can be designed to require two detection components to operate before the water is released into the room. This can be a combination of smoke detection and sprinkler actuation. If only one actuates, water is not released. The clean agent system can be designed to use the smoke-detection system to release the agent and provide a first line of protection, thereby protecting the equipment or valuable property before the water-based system releases to protect the overall building.
<urn:uuid:3738357e-fbdb-4b8d-b18c-6d025abbcfdf>
CC-MAIN-2017-04
http://www.csemag.com/single-article/know-when-where-to-specify-a-clean-agent-system/c6eab3f57a41e7a720b65a138ec7645c.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00573-ip-10-171-10-70.ec2.internal.warc.gz
en
0.943078
1,471
2.921875
3
Child Wellbeing System Prevent Child Abuse Iowa recognizes the important role that the child welfare system and the Department of Human Services play in the safety of Iowa’s children. A prevention-focused, data-driven, well-supported Child Welfare System protects children and supports families. Goal: Ensure that the Departments of Human Services and Public Health have the resources required to maintain and improve the quality of child and family services. The impact of child abuse and neglect is well-documented. In 2020, DHS documented over 30,000 reports of child abuse or neglect with more than 10,000 children experiencing at least one confirmed or founded case. The COVID-19 pandemic has increased stress on families, decreased access to family supports, and reduce child interaction with mandatory reporters. DHS reports decreased up to 50% during the height of the pandemic. In recent years, the state has launched independent reviews of child welfare policies and practices in response to the deaths of Sabrina Ray and Natalie Finn. The resulting reports from the Ombudsman and the Child Welfare Policy and Practice Group have provided recommendations for Child Welfare System improvements. To ensure that Iowa’s children and families are supported the legislature and governor must provide necessary resources to: - Focus on primary prevention efforts, to increase protective factors against child abuse and neglect. - Ensure the Departments of Human Services and Public Health are able to attract, develop and retain a skilled and diverse work force with manageable caseloads, so that they can accurately assess reports of maltreatment and work with families to meet their needs. - Update or replace data management systems to ensure workers have access to timely, accurate data for decision-making. We encourage you to ask your legislator to support policies that prioritize prevention and increase protective factors for Iowa children.Find Your Legislator
<urn:uuid:543b5a1d-ed96-44a8-8f4a-5a96804a268d>
CC-MAIN-2022-33
https://pcaiowa.org/advocacy/child-wellbeing-system/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00479.warc.gz
en
0.931823
369
2.890625
3
Richard Caruthers Little (born in 1938) is a Canadian-American impressionist and voice actor. He has been nicknamed "The Man of a Thousand Voices". Little was born in Ottawa, Ontario, Canada, the middle of three sons of Lawrence Peniston Little, a doctor, and Elizabeth Maud (née Wilson). He attended Lisgar Collegiate Institute. In his early teens, he formed a partnership with Geoff Scott, another budding impressionist, concentrating on reproducing the voices of Canadian politicians such as Prime Minister John Diefenbaker and Ottawa mayor Charlotte Whitton.
<urn:uuid:3b899905-ba0c-487a-ad18-f98307cc144e>
CC-MAIN-2022-33
https://reelcowboys.org/members/LittleRich.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00675.warc.gz
en
0.96914
125
1.71875
2
Jungles and Mountains Chess by Gary K. Gifford I had been thinking of this game off and on for about a year. But it kept evolving into a much bigger game which drifted further away from chess and more towards a role-playing game with quicksand, natives, wild animals, etc. Perhaps these ideas were form watching too many Tarzan shows as a little kid? Perhaps from reading too many Edgar Rice Burroughs novels? Finally, on the morning of 29 October 2006 I awoke with the idea of this simple very chess-like version of the game. The link to the pre-set follows. You may need to cut-and-paste the link into the search-bar. /play/pbm/play.php?game%3DJungles+and+Mountains+Chess%26settings%3DJPG-juxta See pre-set or above for graphical representation: r n b q k b n r g d e g g d e g g g g g g g g g M M M M M M M M M M M M M M M M g g g g g g g g g D E g g E D g R N B Q K B N R In the above text description: r/R, n/N, b/B, q/Q, k/K = chess pieces, Black is lower case e/E = Engineer d/D = Dozer (Bull-Dozer) g = green (Jungle Green) M = Mountains See setup. Also: g = green: This jungle terrain is removed by Dozers. While present on squares, other pieces cannot move onto or through the jungle brush. M = Mountainous materials. Rocks, boulders. This material is removed by Engineers. While present on squares, other pieces cannot move onto or through the mountainous material. Other pieces are as in chess. Castling, check and check mate apply. There are no pawns. As in chess except for jungle and mountain aspects; no pawns; and addition of Engineers and Dozers. Engineers: Move 1 step diagonally. They cannot move through uncleared jungle. They can cut through and remove mountain materials. When they move onto a mountain square, that material is removed, automatically. Engineers can capture and can be captured. Dozers: Move 1 step orthogonally. They cannot move through mountainous material. They do cut through and remove jungle brush by bull-dozing over it. When they move onto a brush square, that material is removed, automatically. Dozers can capture and can be captured. Note: Jungle and Mountain terrain cannot be added to squares, only removed. To be added as needed due to questions or improvements to rules. Gary K. Gifford, 29 October 2006; rules updated 19 Nov. 2006. Set-p image added March 29, 2008. This 'user submitted' page is a collaboration between the posting user and the Chess Variant Pages. Registered contributors to the Chess Variant Pages have the ability to post their own works, subject to review and editing by the Chess Variant Pages Editorial Staff. By Gary K. Gifford. Web page created: 2006-10-29. Web page last updated: 2006-10-29
<urn:uuid:b082b44c-0af8-42d9-a017-57001067c7a8>
CC-MAIN-2022-33
https://www.chessvariants.com/page/MSjungles-and-mountains-chess
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00667.warc.gz
en
0.941336
682
1.59375
2
Smart Lock is an Android feature that allows you to keep your device unlocked when you’re in trusted situations. When you enable Smart Lock, the lock screen is automatically disabled when certain conditions are met. Such as your device being on your body or in a trusted location, such as your home. If you find yourself unlocking your device many times during the day, you may want to use Smart Lock. You can leave the lock screen security settings at the levels you want. Enable Lock Screen Security Before you enable Smart Lock, you need to enable some type of lock screen security on your device. You should always use lock screen security on your device, even if you don’t use Smart Lock. The procedure for setting up your lock screen security will be slightly different, depending on your device. We used a Google tablet for this example. To enable the lock screen security on your device, swipe down either once or twice and tap the “Settings” (gear) icon. On the “Settings” screen, tap “Security” in the “Personal” section. On the “Security” screen, tap “Screen lock“. You will most likely see five methods for locking your device on the “Choose screen lock” screen. Again, the methods available depend on the type of Android device you are using. The first two options, “None” and “Swipe” provide no security at all. Choosing the “None” option completely disables the lock screen. Choosing “Swipe” enables the lock screen, but all you have to do to unlock your device is swipe your finger across the screen. You should not be using either of these options. To secure your device, you can choose to draw a “Pattern“, enter a numerical “PIN“, or enter an alphanumeric “Password” to unlock your device. The “Password” option is the most secure. Your device may also have a fingerprint scanner you can enable to add more security. Access The Smart Lock Options Now, that your device has a security lock screen enabled, you can select a Smart Lock method. To access the Smart Lock options, open the “Settings” app, if it’s not already open. Tap “Security” on the “Settings” screen and then tap “Smart Lock“. Under “Lock screen and security” on the right, tap “Security lock settings“. Enter your device password or PIN, depending on the type of lock screen security you chose, and tap the continue button on the keyboard or on the dialog box, depending on your device. If you chose Pattern for the lock screen security, draw your pattern. Choose The Method For Automatically Unlocking Your Device The Smart Lock screen displays with four or five options (depending on your device) for keeping your Android device unlocked in certain situations. You can use as many of these options as you want. Even with Smart Lock enabled, you will need to manually unlock your device with your PIN, pattern, or password when it sits idle for four hours and after you restart your device. On-Body Detection Smart Lock Method The “On-body detection” Smart Lock method uses the accelerometer built into your device to detect when you’re carrying it in your hand, pocket, or bag. Your device will remain unlocked unless you place it on a table, desk, or other flat surface. It may take up to one minute for your device to lock after you put it down. Tap the slider on the “Smart Lock On-body detection” screen to enable this method. Learning “Walk Patterns” This method only works on some Android devices. On some of the devices where this method does work, “On-body detection” learns the pattern of your walk and stores that data. If it detects a different walk pattern, your device will lock. Simply unlock it again and it will adapt to changes in your walk pattern. The stored data about your walk pattern is deleted if you turn off “On-body detection“. Trusted Places Smart Lock Method The “Trusted places” Smart Lock method uses the location of your device to detect when you’re in a trusted place, such as your home. A trusted place can be anywhere you can select on a map and you can define multiple trusted places. This feature requires that you enable location on your device, which drains the battery faster. Add Trusted Places To Google Maps Adding your home as a trusted place will keep your device unlocked while you’re at home so you don’t have to keep unlocking your device. Tap “Home” in the list and enter your home address on the Google map. To add another trusted place, tap “Add trusted place” and enter the address for that place. Trusted Devices Smart Lock Method The “Trusted devices” Smart Lock method allows you to unlock your device with trusted devices such as a smartwatch, a fitness tracker, or a Bluetooth headset. You must connect the device you want to use as a trusted device to your phone or tablet first before turning on the “Trusted devices” option. To add a trusted device, tap “Add Trusted Device” at the bottom of the “Add a trusted device” screen. Then, select whether the device is connected using “Bluetooth” or “NFC” (Near Field Communication). All the devices connected to your phone or tablet are listed. Tap on the device you want to use as a trusted device. Once you’ve set up one trusted device, you can easily make new devices that you connect to your phone or tablet trusted devices. You’re asked when the device is first connected. If you opt in at that point, then every time your phone or tablet connects to that device, it will be a trusted device. Trusted Face Smart Lock Method The “Trusted face” method uses the front-facing camera and facial recognition to detect your face when you turn on your device. This method is not as reliable as other methods and is also slower than entering a PIN or drawing a pattern. Someone who looks similar to you could be recognized as you by your device. This method is does not seem to be available on Samsung tablets, at least on the Samsung Galaxy Tab S2. Tap “Set Up” at the bottom of the screen. For best results when setting up this method, find a place indoors that’s not too bright or too dim and hold the tablet at your eye level. Trusted Voice Smart Lock Method The “Trusted voice” method allows you to keep your device locked while using “OK Google” commands to do things. It will only work with your voice. However, if someone sounds similar to you, or can imitate your voice, they could fool your device. When you tap on the “Trusted voice” option, you’re taken to the “OK Google” detection screen in the “Settings” app. Turn on the “Always on” option and the “Trusted Voice” option. If you have not set up “OK Google” yet, you’ll be asked to say, “OK Google“, three times so the system can learn your voice and create a voice model. Manually Lock Your Device When Smart Lock Is Enabled Sometimes you may want to lock your device while it’s unlocked with Smart Lock. To do this, turn the screen off, then turn it back on and tap the lock icon so it appears locked. Which Smart Lock method do you use? What works and doesn’t work on your device? Let us know in the comments.
<urn:uuid:35e4f3f1-9f31-4719-9f13-89442f58ab9c>
CC-MAIN-2022-33
https://trendblog.net/smart-lock-android/?amp
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00274.warc.gz
en
0.904787
1,670
1.914063
2
VICTORIA, B.C- More families across British Columbia will be able to access PharmaCare through an investment from the provincial government. The three year, $105-million funding program allows for reduced or eliminated deductibles and co-payments for lower-income households. “These are the first ever changes to Fair PharmaCare deductibles and co-payments since the program was created 15 years ago – a long overdue step forward in improving the health and lives of thousands of British Columbians,” said Health Minister Adrian Dix in a statement. “For example, as of Jan. 1, households earning up to $30,000 in net income annually no longer have a deductible, meaning the Province will help pay for eligible prescription drug costs right away.” Prior to the announcement, families earning a net annual income between $15,000 and $30,000 would have to pay between $300 and $600 in deductibles before Fair PharmaCare would provide coverage assistance. Data from the Ministry of Health has shown there is a link between low-income levels, deductibles, and decreased drug spending. It indicates families are having to choose between essentials like housing and food ahead of prescriptions. Families earning between $30,000 and $45,000 in net annual income will also benefit as deductibles and co-payments have been lowered. Seniors born before 1940 earning a household net annual income up to $14,000, and for the lowest income households earning up to $13,750, will no longer have to deal with Fair PharmaCare co-payments.
<urn:uuid:45556812-ed4d-4976-a810-380787c27ce4>
CC-MAIN-2022-33
https://www.mypowellrivernow.com/19209/news/fair-pharmacare-deductibles-co-payments-eased-for-lower-income-households/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00272.warc.gz
en
0.972639
330
1.648438
2
A gemstone is a piece of mineral crystal which, in cut and polished form, is used to make jewelry or other adornments. However, certain rocks (such as lapis ... Jun 6, 2013 ... ... answers your question, what are gemstones? Plus an insight into buying gemstones, the value of gemstones and how gemstones are formed. Dec 21, 2007 ... What is the difference between a mineral, a rock and a gemstone? You'll find some answers here. Do you know what a gemstone is? Gemstones have many different names. Sometimes, people call them gems. Sometimes, people call them jewels. Overview of what gemstones are and whether all minerals can be ... A question that is often asked is what are gemstones, can all minerals be gemstones? Detailed information and photos for over 100 gemstone varieties from around the Mar 19, 2012 ... When we speak of gemstones, we usually mean minerals that have been cut and polished. However, over the ages, humans have used a great ... Mar 6, 2015 ... Many people know that diamond is actually pretty common when it comes to gemstones (you can find millions of them in your typical candle ... Even the most general definition of a gem has many exceptions. Learn what qualities have been used to identify gemstones both scientifically and popularly. www.ask.com/youtube?q=What Are Gemstones&v=Vj2qtDuO9t8 Jul 7, 2015 ... http://www.cartoonnetwork.com/video/steven-universe/what-are-gems-short- episode.html Credit to the SU crew for making this, I had nothing to ...
<urn:uuid:7eb548df-339a-4c8a-b91b-c47e93779b1d>
CC-MAIN-2017-04
http://www.ask.com/web?qsrc=3053&o=102140&oo=102140&l=dir&gc=1&qo=popularsearches&ad=dirN&q=What+Are+Gemstones
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280761.39/warc/CC-MAIN-20170116095120-00096-ip-10-171-10-70.ec2.internal.warc.gz
en
0.886891
366
2.84375
3
"Annelies" is a music event unlike perhaps any you've been to before. It's the story of Anne Frank, who hid from the Nazis with her family for three years in an Amsterdam attic. They were eventually found and all died in Bergen-Belsen concentration Camp. Left behind though, was her diary, which revealed her intelligence and humanity in a particularly inhumane situation. It served as a catalyst for movies, and as San Antonio Mastersinger Chancey Blackburn explains, a piece of music. "We are performing it at the Holzman Auditorium in commemoration of the 75th anniversary of Krystallnacht, which was that night in 1938 when Nazis destroyed about 1,000 synagogues and businesses and killed several Jews and took many to death camps," Blakcburn said. Mastersingers Director John Silantien continued. "There are several movements that describe Nazis coming into the house and looking around downstairs and you can hear the breathlessness of the eight residents upstairs, holding their breath hearing these footsteps downstairs," Silantien said. D-Day didn’t come soon enough to save the Frank family, but they heard help was on the way. "The final movement is just so optimistic," Silantien said. "It’s Anne’s meditation. She says that even in the toughest of times if I can go up to the loft and see the blue skies I feel pure." The San Antonio Mastersingers perform "Annelies" on Sunday, November 10. Proceeds benefit the Holocaust Memorial Museum of San Antonio. - Learn more about the group and performance at: www.samastersingers.org
<urn:uuid:ea84e49f-11fc-4a1c-8111-5527313ce3a6>
CC-MAIN-2017-04
http://tpr.org/post/emotional-performance-mastersingers
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00444-ip-10-171-10-70.ec2.internal.warc.gz
en
0.971136
344
1.898438
2
Coco Chanel is an icon on its own, she is a woman to learn from and a fashion icon to admire. This September the V&A museum will present the first UK exhibition dedicated to the life and work of the one and only Gabrielle Chanel. Ph. Laura Chouette (Unsplash) It will showcase her development as a designer and the founding of the House of CHANEL, starting in Paris in 1910 with her first millinery boutique and ending in 1971 with her final collection. The V&A is preparing to host the UK's first major Coco Chanel exhibition. Coco Chanel’s Influence On The Fashion World Coco Chanel’s first priority was to create and design her own wardrobe, garments that will empower her and show her femininity. As a designer, she anticipated modern women's needs and wants by creating clothing that would fit an independent and active lifestyle. What makes her an admirable designer is her innovative approach to fabric, silhouette, and construction and the fact that she redefined women's fashion in the twentieth century. Her designs were something never seen before and considered revolutionary for her time - inspired by menswear at the time and the desire to emphasise comfort over constraints of then-popular fashion. Thanks to her garments women said goodbye to the days of corsets and hello to the new idea of feminine fashion. Ph. Laura Loveday (Flickr) Gabrielle Chanel. Fashion Manifesto Inspired by the Chanel Manifesto exhibited in Paris at the Palais Galliera in 2020 the exhibition will be re-imagined for the V&A. The date is the 16th of September 2023, just in time for London Fashion Week, when you can first enter the exhibition and admire the great life of the designer. Over 180 looks as well as the designer's signature and most famous jewellery, accessories, cosmetics, and perfumes will be featured. The exhibition explores Chanel’s unique approach to fashion design and how she redefined feminine elegance and keeps influencing the way women dress today. Prepare to see a few emblematic pieces like the famous 1916 marinière, the jersey sailor blouse, and of course the little black dresses. Suit by Gabrielle Chanel. Worsted wool crepe, silk satin lining. Paris, 1969 - Ph. Victoria & Albert Museum If you are a fan of fashion, it is a must for you to experience the Chanel exhibition in London. Save the date in your calendar and get your expectations in tact, for you will dive into the world of an astonishing designer and a woman. We can all add a little timeless piece of Chanel in our wardrobe and what better way to find yours than to step in the shoes of the great designer and feel the way she felt when revolutionising fashion. The best thing is it’s just in time for London Fashion week so more and more reasons for you to come down to London and give yourself the ultimate fashion experience. One of the biggest names in luxury fashion and sportswear combined forces and presented us with the capsule collection - the Louis Vuitton and Nike "Air ForceE 1" by Virgil Abloh. The world of luxury fashion and sportswear seem to be on opposite sides but they all stand for one thing: quality and style. This looks like a collection that is bound to have an impact on fashion history. It is not just a collaboration of two amazing brands, it celebrates a fashion icon's legacy and his culture, not something we see everyday. Ph. Jorge Franganillo (Flickr) A one-of-a-kind experience celebrates the Louis Vuitton and Nike AF1 collection. Between the 21st and 31st of May the exhibition took place in Brooklyn; everyone explored the world of Virgil Aboh. Featuring 47 styles of customised Air Force 1 sneakers with Louis Vuitton classic patterns altered and tweaked by Virgil Abloh. For the fans of Louis Vuitton and Nike this is a dream come true. Now let's see what makes this collection so special. Inside The Louis Vuitton And Nike Af1 Exhibition You arrive at the Greenpoint Terminal Warehouse in Brooklyn and you’re immediately immersed in the exhibition. Before your eyes is a reimagined orange Louis Vuitton branded entrance, completed with one of Virgil Abloh's recurring LV statues doing a handstand. The cloud-painted walls surround you, as you navigate the monogrammed treehouse and mirror maze containing Abloh quotes emphasising his philosophy of exploring innocent imagination and questioning fashion hierarchy. You make your way inside and you see the 47 physical and holographic sneakers placed in a continuous moving display. And then you learn that the movement is a powerful reference to their connection with hip hop culture. Now everything makes sense and it’s time to find your favourite pair. This dreamlike exhibition celebrates the reimagined Nike Air Force 1 sneakers and the visionary designer who created them. Virgil Abloh - The Inspiration Behind The Collection Virgil Abloh, who passed away in November last year, was a boundary-breaking figure in fashion, known for his vision on streetwear and his innovative approach to luxury. To those who know his work, this collaboration comes with no surprises. Virgil considered the Nike Air Force 1 to be a cultural symbol on its own, for him it’s an emblem of the streetwear community that he grew up in. The first ‘Air Force 1’ model was designed in 1982, but this collection also marks a special moment in the history of the sneakers because it is the first time the shoe is crafted outside of a Nike factory. The two icons came together and gave us the most authentic of high-end trainers. This is a collection like no other, and not because it combines two aesthetically opposite brands, we have seen that before, but because of its meaning. It honours a big name in the world of fashion, the one and only Virgil Abloh. Even if you can't make it to the exhibition in Brooklyn, you may stumble across other pop-up installations that will take place around New York City and the world throughout the year. Keep an eye for the next, one might end up being in your city and you wouldn’t want to miss it. While we are on the topic about pop up fashion events, Fashions Finest is organising a sustainable pop up event in London. The date is 18th of June and it’s all about sustainable clothes and accessories. If you happen to be around London and love sustainable fashion, we would love to see you there. Enduring brands that have withstood fleeting trends and loved from era to era don't come without their price tag, but is this why they are so expensive? Ph. Melanie Pongratz (Unsplash) We explore five of the most famous luxurious brands out there and how well they measure up on style, cost and quality over time. Curious? We cover Gucci, Hermes, Chanel, Burberry and Rolex. Designer brands are costly, but are any of them really worth the hefty price tag? In some cases, we think that they are. Designer items are an extra reach, a piece of the dream and if we’re honest, we’ve all paged through a glossy magazine and coveted the latest Jeffery Campbell boots; they’re gorgeous. The Chanel Milk Carton bag was calling your name or you found yourself staring at the iconic silk scarf worn by a supermodel on a Gucci campaign and wanted a piece of the silk pie. Some luxury brands offer a casual class like women’s Timberland boots compared to the iconic fancy of a Cartier bracelet. Either way at some point in our lives we’ve deliberated over a designer piece. Can a case be made for these items actually being worth the hefty price tag? In some instances, we think that it can. Let’s take a look at five designer brands worth the money and the item we think will give you the most value for money. Image by Mike Cabugao via Pexels Ph. James Ree (Unsplash) The House of Gucci was infamous long before the movie starring Lady Gaga and Adam Driver came out. Every designer in the world knows the story of Patrizia Reggiani and Mauricio Gucci; the whirlwind romance, the souring of the relationship, the eventual murder for hire. Despite this drama, Gucci has been one of the foremost luxury brands in the world almost since it was founded in 1921. Before all the drama that occurred in the film and after it, quality was and will always be Gucci’s primary concern. There is no doubt that their garments, especially the leather wares, are made to stand the test of time. Our particular favourite is the classic black and gold Gucci emblem belt. The simplicity of this item is one of the reasons it's worth the price tag; it's incredibly versatile and will go with most things in your wardrobe. The quality is the second reason; this belt will be an heirloom piece if you look after the leather. Ph. Tamara Bellis (Unsplash) Hermes is most well known and loved for its leatherware and iconic scarves. The company began in 1837 as a harness and bridle workshop for horses of rich and fabulous Parisian, and Hermes would go on to make saddles and even catered to the Tsar of Russia for a time. In 1918, when they produced their first leather golfing jacket, their journey into fashion began. Hermes only adorned the bodies of the most fashionable people in Paris until 1924, when they first established a presence outside of France. The label is most famous for its exquisite silk scarves and leatherwork, particularly the Birkin Bag. The Birkin came to be in quite an unusual fashion; on a flight from Paris to London, Jane Birkin was seated next to the executive chairman of Hermes, Jean-Louis Duman. She bemoaned the lack of bags well suited to young mothers, and Dumas sketched the Birkin up on the spot. The quality of the stitching and materials means that this bag is definitely worth the price tag. Ph. Laura Chouette (unsplash) Coco Chanel is undoubtedly one of the best-known women in fashion. It is her most iconic garment that we say is the one most worth its price tag; the Chanel Tweed Jacket. There have been more productions and iterations of this jacked than almost any in the world of designer brands. Some are cut to work as a suit and some are cut more along the lines of a modern, boxy blazer. Though there are a lot of color options, our personal favourite is the black tweed, as it is the most wearable. This jacket has been with us since the end of the Second World War; Chanel came up with it as a response to the return of corsetry. The shape was inspired by the jackets that Chanel would borrow from her aristocratic boyfriend. Image by Jean Pierre via Pexels Ph. Pete Pedroza (Unsplash) The epitome of smart, practical, and chic design lies in the Burberry trench. The style has been imitated year after year but never truly duplicated. The crux of the coat’s worth lies in the lightweight gabardine fabric, which Burberry founder Thomas Burberry invented in 1879. This trench has an illustrious history. It was worn by officers in the First World War when the epaulets were used to display rank, and the D rings held equipment. Aspects of this functionality are still reflected in the Heritage Trench. Burberry offers reproofing and repair services, which make their trench a very sustainable choice. Image by Antony Trivet via Pexels Ph. Antony Trivet (Unsplash) The longevity of a Rolex timepiece is what makes it worth your while, no doubt about it. A watch from Rolex isn't just a beautiful accessory but can actually be an investment if you look after it well and have it serviced when necessary. Because a lot of the brand’s appeal lies in its exclusivity, watch costs continue to rise. When you consider how many generations can own and wear one Rolex, the cost per wear goes down radically, and the price tag suddenly starts to make a lot more sense. The use of incredibly durable materials such as crystal and Oyster steel means that you have to to seriously mistreat a Rolex for it to become unusable. Since all Rolex timepieces are made with the same philosophy in mind and using the highest quality materials, any of them would be a good choice. If you select a piece from any of these five brands and you look after it well, you’ll have chosen a product that can last your lifetime and the lifetimes of your children and grandchildren. Doesn’t that sound like value for money? Kiyomila Cosmetics is a black owned botanical skincare and wellness brand which specialises in creating an array of natural, healthy, vegan products for individuals dealing with eczema, acne and hyperpigmentation. Carat23 & Zarya Azadi showcased their bag and clothing collection at Fashions Finest emerging designer AW22 London Fashion Week showcase 19th February 2022. Makeup: Academy of Freelance Makeup Artists (AOFM) lead #mua Mandy Gakhal Hair: Amy Tasker, Annie Berry Nails: Julie Bryan & team Creative Director: Tanya Beresford Lead stylist: Leighanne Krystal Assistant Stylist: Raahim Khan Student Stylists: College of North West London Photographer: VR Agency Fashion brand Pink House Mustique has launched a new luxury collection of stunning Lotty B silk pieces and pyjamas. A limited edition that invites you to treasure the handmade taste and private time. Eclectic and theatrical London-based interior design studio Jimmie Martin is sure to grab your attention with its mannequin lamp collection. Luxury textile designer, Araminta Campbell, a leader in her field launches her alpaca line as part of the Heritage collection, showcasing how luxury can be both stylish and sustainable at the same time. Media and retails are moving toward a more inclusive plan of action to reflect different backgrounds, stories and needs. Finally, the premium market is following the same route with the arrival of Untapped Creatives at Selfridges. Over the last few months, CEO of Fashions Finest, Deborah St Louis, has been working closely with the ladies at The Branding Initiative. It was a pleasure to finally get to meet her in person when we were both invited to #BeInspired at Bentley Birmingham for an evening of luxury cars and fashion for Female Entrepreneurs. Bentley Birmingham are leading the way amongst the luxury car industry in realising that the female empowerment movement represents women, globally, not only fighting for places on corporate boards but also in carving their own nichés as entrepreneurial superstars! And let me tell you, at the Bentley Birmingham ladies event, organised by Chameli Chowdhury, we met a fair few female entrepreneurs that are, for want of a better phrase, kicking ass! Upon arrival, we were greeted with a chilled glass of Ruinart champagne. The scene was set with pop up areas dedicated to fashion, jewels, art and a showcase of NSPCC Childline, Bentley’s choice of sponsored charity. Bentley aim with this event was to “combine inspirational names from the worlds of luxury style and fashion” and they didn’t disappoint! With only 20 Bentley dealerships across the UK and 4 of them managed by Sytner, Bentley Birmingham is switched on to what it means to use affiliate, attraction and digital marketing to increase exposure to the brand and broaden their client base. Marketing towards women is a smart move. Connecting luxury cars to other luxury items like fashion and jewels is an even smarter move! I mean, what other luxury car brand is so in tune with women in business that they showcase luxury shoes and handbags to match the car?! Meet “Purple Rain”, the stunning Bentley that comes with bespoke hand made shoes designed and crafted by Kate Spence. Kate designed for and managed the Jimmy Choo brand for seven years before establishing her own luxury couture footwear brand for women in 2012. Deborah St. Louis was especially keen to listen to the keynote from catwalk designer Alice Temperley of Temperley London, Deborah’s connections to London Fashion Week with Fashions Finest being the second largest off schedule event organiser for LFW. Throughout the summer Bentley Birmingham are exploring what inspires people and how that inspiration becomes a luxury item and creating something exquisite that perfectly balances form and function. Female entrepreneurs are the perfect target market to add huge value to that. What inspires us? What drives us? We’ll be interested to see what Bentley Birmingham come up with. What we would love to see is a catwalk show, showcasing up and coming designers, mixing new innovation traditional luxury. With more events lined up like that of #BeInspired, we have no doubt that this is going to be an interesting summer for Bentley! Deborah St Louis and Melanie Jones were delighted to meet Jenny Lee Holt at the event, a huge supporter of The Branding Initiative and fellow female entrepreneur and Director of Spectrum Telecoms. Together we browsed the cars, fashion and diamonds. Luxury bespoke jeweller S.P Green of Birmingham showcased some stunning pieces at the event and we had our beady eyes on a beautiful diamond and sapphire piece – blue and white to match our logo of course! What better way to spend a Friday evening?! Deborah St Louis and the ladies at The Branding Initiative would like to express huge thanks to Bentley Birmingham for the invitation. We look forward to working with you more over the coming months. For more information about Bentley cars, please contact Chris Gretton. For more information on The Branding Initiative, our services or our programs, please contact us here. Written by KellyAnn Schiavo - Co-founder of The Branding Initiative, Women in Business Ambassador & Blogger
<urn:uuid:7d824a93-3fdd-4854-ae7c-a4d1e6f2b623>
CC-MAIN-2022-33
https://www.fashionsfinest.com/fashion/itemlist/tag/Luxury%20Product
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00278.warc.gz
en
0.951328
3,835
1.851563
2
What do tech-savvy teachers do when school is cancelled? A. Sleep in B. Catch up on emails C. Use their children as guinea pigs D. Try out new web tools I am taking a wild guess that many of you chose E. ( unless you don’t have children) With the exception of losing power for a few days, I had no Internet. ( With the exception of my Blackberry Storm which allowed me to use the browser to search for places with generators in stock) Once the power returned, there was plenty of shoveling, enjoying time with the kids, and exploring some of the newest tools for educators out on the web. One of the tools that I will definitely make use of is Dabbleboard. I think that this can be used in an educational setting with many teachers finding ways to use this in their respective content area. I am going to be working with a teacher next week who was looking for just this for her 10th grade classroom. The chat feature will be something that the children can respond to questions by the teacher. It also has a cool feature where documents can be uploaded and particpants can annotate. I had read an article about IPod integration in schools awhile back and have been experimenting with an I Pod touch for a while now. I finally put that to the top of my list with extra time on my hands due to the snow. My first thought was to integrate this into the K-2 realm, so I brought in my guinea pigs: my daughter Presley who is 6 and my 4 year old daughter Elliot. After searching for the numerous educational free apps and downloading many of them, I wanted to get feedback from my 2 girls. Who would have ever thought that my 2-year old son would be the one who would use this the most. He quickly grabbed this from my daughters and has learned how to turn it on, unlock it, and find his favorite 3 or 4 games. Seeing him page through pages of apps is so funny with his little fingers. Not that he learning how to add or subtract, but this really hit home as to how children are learning and teaching themselves. This made me really sit back and think about how I should teach my students, but really think about what is in the coming future as a parent. Looks like expenive gadgets for birthdays and Christmas! (Photos taken by my 6-year old) Even though the schools were officially closed for a week in our area, the teacher in me came out as I to engaged my children with a few Discovery Streaming videos. With my children being under the age of 6, I found many choices ranging from Magic School Bus, to Grossology. ( Everyone loves Ms. Frizzle and about the science of farting and burping) In addition to all of the fun technology things I could engage my children in, I still made time to put on the snow gear and get outside with my kiddos like everyone should do once in a while. Even though it is 2010 and we are spoiling our children with toys of the future, we still have to remember how to have fun outside. ( Snow angels, snowmen, sledding and snowball fights)
<urn:uuid:d92d8733-84dc-41da-a1b9-24de15a6474c>
CC-MAIN-2016-44
http://blog.discoveryeducation.com/blog/2010/02/20/what-do-teachers-do-when-it-snows/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719027.25/warc/CC-MAIN-20161020183839-00301-ip-10-171-6-4.ec2.internal.warc.gz
en
0.981488
660
1.851563
2
About the Sustainable AI Lab Sustainable AI can be understood as having two branches; AI for sustainability and sustainability of AI. In order to fully understand the benefits and risks of AI, it is important to investigate both of these branches. While there is a growing number of publications directed towards AI for the Sustainable Development Goals, there is little research addressing the, often hidden, environmental costs of AI. For this reason, the Sustainable AI Lab creates a space for a group of excellent researchers of different fields to work, collaborate and exchange ideas on the environmental, social and economic costs of designing, developing and using AI across society. The questions to be explored span across multiple disciplines and levels of analysis, for example: the normative grounding of the value of sustainability; the strength of the concept of sustainability; how to measure environmental costs of AI; understanding the intergenerational impacts of AI; and, informing public policy guidelines for the green, proportionate and sustainable development and use of AI. Within the Lab we will be doing experiments which are always project based, with its own characteristics and with a multi stakeholder perspective. The lab is diverse, inclusive and international and the experiments are internally and externally driven. The principles of the Lab are highly connected to the Alexander von Humboldt foundation. We both strengthen Germany as a science location through international research exchanges. And we campaign for international understanding, scientific progress and development. About this website The website of the Sustainable AI Lab is taking the Sustainable Web Design Principles into account. This will evolve over time and is expressed in visual frontend and technological backend. We have made a conscious effort to choose a sustainable web hosting service. Our provider is HostEurope who promise: “Our data centres in Cologne and Strasbourg are operated for maximum energy efficiency with renewable electricity. The datadock in Strasbourg is Europe's greenest data centre.” In designing our website, we took measures to minimize energy consumption of our servers and of end users’ devices. We chose dark colors to reduce energy demand of screens. Graphics are kept simple by using only two colors and photos are displayed in grey-scale and have been compressed to ensure minimal file size. We are open about both our principles and their tangible consequences. We publish the transfer size of our page in kilobytes for a first visit. We explicitly refer to the Principles of Sustainable Web Design. We hereby raise awareness for the possibility of designing websites in a more sustainable way. By making our efforts transparent, we hope to inspire others. On our website, we transparently inform the visitors about who we are and what we do. By keeping its design minimal, we intend to make it as easy as possible for visitors to find the information they are looking for, thus reducing the time they need to spend on our page. We keep our website’s structure as concise as possible. While our website does not directly support an economy that nourishes people and planet, we hope that the information we publish does. By sharing our expertise, knowledge, and work publicly, we hope to have a regenerative impact. By keeping page weight low, we facilitate access to the information we provide, even in the circumstance of low bandwidth.
<urn:uuid:d2acd3f0-a0b2-475f-b7eb-b2f2eb656cda>
CC-MAIN-2022-33
https://sustainable-ai.eu/?page_id=93
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00274.warc.gz
en
0.932601
680
2.453125
2
Losing Fat But Not Weight On Keto If you are looking to lose weight or improve your health, keto diet plans might be for you. They are high in healthy protein, reduced in carbs, as well as full of nutrients. You are able to eat all the foods that you like, because they are broken down into ketones. It is an outstanding method to slim down and also remain healthy and balanced. Losing Fat But Not Weight On Keto Ketosis is the process of using ketones as your main source of power. It primarily functions by decreasing insulin levels, creating ketones, as well as increasing fat burning. There has actually been evidence that keto diet regimens can assist with weight management. Losing Fat But Not Weight On Keto Losing Fat But Not Weight On Keto A keto meal strategy can be adapted to meet your particular demands. Its main reasons for being made use of consist of: To minimize weight as well as preserve a healthy and balanced diet regimen. To handle weight reduction. To attain your ideal weight. Losing Fat But Not Weight On Keto One of the most integral part of a keto dish strategy is consuming the appropriate foods at the correct time. This is where the customized keto diet plan is available in helpful. It can give you with several techniques to assist you reach your weight management goals. It includes unique dishes created just for people attempting to melt fat and reduced their carbs. With a basic 8-week personalized meal strategy, you will learn just how to consume right to melt fat. Most people do not understand how much food they in fact consume. A diet regimen with a high carb level can be tricky since our body’s major resource of fuel is glucose, which is located in foods like pasta and also white bread. Ketone degrees often tend to drop as we age. When you eat smaller meals regularly, ketone levels stay up, resulting in enhanced energy and also boosted weight reduction. Keto meal intends get rid of all those bonus and also require you to consider what you are actually eating rather. For example, if you were to take a page from guide “The Atkins Diet”, you would remove all foods which contain polished sugar. Rather you can eat great deals of vegetables and also fruits, as well as starches like wild rice or potatoes. In addition, this diet regimen concentrates on fat loss, not carbohydrate burning. An appropriate ketogenic diet regimen is based upon all-natural components such as unsaturated fats, healthy proteins, vitamins, minerals and also amino acids. The ketones you melt are the gas your body requires to operate effectively. By increasing your metabolic process as well as burning fat, the ketones give you the energy you need to work out and go on with your daily activities. You must remember that any kind of fat burning program calls for technique, consistency and regular follow-up. If you do not stick to your strategy, you will quickly go back to your previous state of being overweight. If you intend to lose fat swiftly, there are a few other methods you can use. Cut out all the carbohydrates you are presently eating, and also boost your intake of healthy protein and unsaturated fats instead. These types of adjustments will aid you jumpstart your fat loss procedure, but to obtain lasting benefits, these adjustments need to be accompanied by normal physical activity. However, our health and wellness specialists often tend to dissuade individuals from complying with a low-carb diet. They think this diet plan will advertise keto influenza. This is since people that have keto flu feel weak, unsteady, tired, run-down, and normally unable to operate effectively in their lives. Nevertheless, it is very important to remember that when following any type of sort of diet, consisting of the keto diet plan, you require to eat healthy carbs in moderation. Consuming healthy and balanced carbs does not imply you need to quit eating pasta and bread! Rather, healthy and balanced carbs been available in various forms. As an example, you may eat yogurt or cottage cheese instead of routine gelato, due to the fact that they are filled with healthy proteins and vitamins. When following a customized keto diet, it is necessary to make certain you consume a wide variety of healthy and balanced foods. In this manner, your body starts to obtain the nutrients it needs in the appropriate amounts. For example, if you are adhering to a reduced carb diet, after that you should consume great deals of vegetables and fruits. Some other healthy foods you need to consume consist of lean meats, fish, and tofu. These types of foods assist to clean your digestion system, so they have the ability to soak up as well as utilize nutrients much better. Additionally, consuming by doing this aids your body begins to burn fat extra efficiently, because you are utilizing fewer calories. When you start to adhere to a quality keto diet regimen plan, you’ll notice a drastic enhancement in your energy levels, which will lead to an increase in your general health. You might also notice that you start to lose weight much more quickly which you have more endurance. Ultimately, keto diets advertise durable weight reduction. If you stick to the strategy as well as keep in mind to eat healthy foods, you can expect to lose concerning 2 pounds a week, generally. With this degree of loss, you’ll never feel starving again!
<urn:uuid:ba50ea10-dfcf-4ae9-8246-b8b04bb898a2>
CC-MAIN-2022-33
https://kingstonstation.org/losing-fat-but-not-weight-on-keto/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00472.warc.gz
en
0.966813
1,105
1.828125
2
IBSAT 2012 is a computer based test unlike paper based that used to come earlier. The test is based on applicant's ability in quantitative techniques, data interpretation, Vocabulary analytical reasoning & reading comprehension. The number of questions and marking scheme were exactly the same. The difficulty level of the paper was again easy to moderate. Overall the feel of the paper was easy and doable. |Time allotted||2 Hrs.| |Total no. of questions||125| |Marking Scheme||Correct Answer: +1| |Number of choices||5| |Negative Marking||NO Negative Marking| |Expected cutoffs||Minimum expected cut off is 80% to get into ICFAI business school. IBS-Hyderabad: 68+ IBS-Bangalore: 65+ IBS-Mumbai: 65+ IBS-Gurgaon: 62+| |Sr. No.||Sections||Total Marks||No. of Questions||Level| |1.||Verbal Ability (synonyms/antonyms, Para jumbles, sentence completions, analogies, part error)||50||50||Easy to Moderate| |3.||Quantitative||25||25||Moderate to Tough| |4.||Data Interpretation & Data Sufficiency (bar graphs, pie chart and line graphs)||25||25||Easy to Moderate| Evaluation:: Questions of English usage were of easy to moderate level. Para jumbles were easy. The distribution of questions was:10 questions on synonyms and antonyms, 10 questions on Para jumbles, 10 questions on sentence completions, 5 to 8 questions on analogies, and rest were on finding error in sentences. Evaluation::The level of questions were very easy and were directly based on the information given in the passage. There were very less inference based questions. Evaluation::The section covered entirely every topic of quant. Level of few questions was difficult but nearly 80% of the questions were easily manageable. This section generally included basic concepts of maths. Evaluation::This section also covered entirely everything. Questions on data sufficiency were little tricky. Questions on Data Interpretation included bar graphs, pie chart and line graphs. The difficulty level for this was easy. Calculations were not tough and values were basically in whole numbers.
<urn:uuid:8087bbde-9969-4675-b2c2-073465eb85bb>
CC-MAIN-2016-44
http://mba.hitbullseye.com/others/ibsat-analysis-2012.php
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719677.59/warc/CC-MAIN-20161020183839-00559-ip-10-171-6-4.ec2.internal.warc.gz
en
0.946174
497
1.921875
2
AWS Identity and Access Management (IAM) is a web service that you can use to manage users and user permissions under your AWS account. This guide provides descriptions of IAM actions that you can call programmatically. For general information about IAM, see. For the user guide for IAM, see . NOTE:AWS provides SDKs that consist of libraries and sample code for various programming languages and platforms (Java, Ruby, .NET, iOS, Android, etc.). The SDKs provide a convenient way to create programmatic access to IAM and AWS. For example, the SDKs take care of tasks such as cryptographically signing requests (see below), managing errors, and retrying requests automatically. For information about the AWS SDKs, including how to download and install them, see the Tools for Amazon Web Services page. We recommend that you use the AWS SDKs to make programmatic API calls to IAM. However, you can also use the IAM Query API to make direct calls to the IAM web service. To learn more about the IAM Query API, seein the Using IAM guide. IAM supports GET and POST requests for all actions. That is, the API does not require you to use GET for some actions and POST for others. However, GET requests are subject to the limitation size of a URL. Therefore, for operations that require larger sizes, use a POST request. Requests must be signed using an access key ID and a secret access key. We strongly recommend that you do not use your AWS account access key ID and secret access key for everyday work with IAM. You can use the access key ID and secret access key for an IAM user or you can use the AWS Security Token Service to generate temporary security credentials and use those to sign requests. To sign requests, we recommend that you use. If you have an existing application that uses Signature Version 2, you do not have to update it to use Signature Version 4. However, some operations now require Signature Version 4. The documentation for operations that require version 4 indicate this requirement. For more information, see the following:
<urn:uuid:07eeb069-f876-4038-b5b5-959fd6af96b5>
CC-MAIN-2016-44
http://grepcode.com/file/repo1.maven.org$maven2@com.amazonaws$aws-java-sdk-osgi@1.9.38@com$amazonaws$services$identitymanagement$package-info.java
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720238.63/warc/CC-MAIN-20161020183840-00190-ip-10-171-6-4.ec2.internal.warc.gz
en
0.873759
435
1.882813
2
Sun Apr 10 18:06:37 EST 2005 KANSAS CITY, MO -- More people are dipping tobacco or marijuana in embalming fluid and smoking it for a body-numbing buzz and a fiery feeling in the lungs, drug enforcers say. During the last year, police have seen the abuse of enbalming fluid or "dank" spread from hard-core urban cultures to the suburbs. And morticians are reporting that kids are calling them requesting the liquid also called formaldehyde. "I know kids want to have fun, but these kids are really scraping the bottom of the barrel", said Greg Cullen, an owner of Cullen Funeral Home in Raymore, Mo., who has taken calls for the embalming liquid. Statistics of how many people are using dank are not available because the practice is too difficult to track. But workers at the Adolescent Center for Treatment in Olathe said 25 percent of their patients abused Dank users let the cigarettes or reefers dry after they dip them into the formaldehyde. The liquid, which carries a stench strong enough to permeate a five-room house, is used professionally to kill and preserve Cody, a 15-year-old recovering drug addict at the Olathe center, said dank provides a numbing high called getting "wet" or "stuck". "You don't feel anything", he said. "Somebody could punch you and you wouldn't know it. You feel like it's just your head floating around without your body." The thought of people smoking embalming fluid makes Overland Park Detective Mark Meyer shudder. He said it is a volatile chemical that burns fast and hot, much like gasoline. Some drug users believe it causes a burning feeling in the lungs. But some drug experts are skepticl about the reported dank buzz. Dan McCarty, chief forensic chemist of the Kansas City Regional Crime Lab, said any high from the drug may only be psychological. "The rumor is that this obnoxious smelling cigarette is giving off a high", McCarty said. "But I'm not sure that's true. I think it's just a But drug experts agree that the substance is dangerous. William Shaw, director of the Toxicology Laboratory at Children's Mercy Hospital, said small doses of formaldehyde break down key body proteins. That can cause lung irritation and spasms of the larynx, which could cause "I don't know that anyone knows how much embalming fluid a living body can absorb", Shaw said. Dank is not new to Kansas City's urban core, where it is called "therm" or "wet" and often mixed with liquid forms of PCP. The drug underwent a name change after it became more mainstream. The chemical poses a problem for police because it is legal. If police arrest someone, they have to do it because they are possessing an illegal Only those in the mortuary science business monitor embalming fluid. Formaldehyde, however, can be special-ordered from drug stores. Barbara Banks, assistant director of the Olathe treatment center, said the drug might be too bizarre to become as popular as crack. But she said its availability and low price might make it more attractive. She said dank houses are now appearing. "Kids like to experiment, sure, and this drug gives them a new feeling", Burks said. "But I hope it doesn't end up being a sensation". Christopher E. Jones, PhD DABFT, DABCC, DABFE, FACB More information about the Toxicol
<urn:uuid:0719e22d-c73a-49b5-9ad0-2477162878fb>
CC-MAIN-2017-04
http://www.bio.net/bionet/mm/toxicol/2005-April/000462.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00434-ip-10-171-10-70.ec2.internal.warc.gz
en
0.944337
782
1.773438
2
WASHINGTON (AP) — The White House and top House Democrats said Monday they will support a bipartisan bill to overhaul regulation of asbestos and other dangerous chemicals, clearing the way for the bill's passage in Congress and signature by President Barack Obama. House Minority Leader Nancy Pelosi, D-Calif., and two other high-ranking Democrats said they remain concerned that the bill limits states' ability to act aggressively on toxic substances. But changes made by Democrats in recent days ensure the measure will protect families and communities from toxic substances, Pelosi said in a statement with House Democratic Whip Steny Hoyer of Maryland and Rep. Frank Pallone of New Jersey, the senior Democrat on the House Energy and Commerce Committee. Hours later, the White House said it strongly supports the legislation, which would be the first overhaul of the Toxic Substances Control Act since it was approved in 1976. A vote is expected in the House as soon as Tuesday. "The bill is a clear improvement over the current TSCA and represents a historic advancement for both chemical safety and environmental law," the White House said in a statement. The proposal will require the Environmental Protection Agency to evaluate new and existing chemicals against a new risk-based safety standard that includes considerations for vulnerable people such as children and pregnant women, the White House said. The bill also establishes clear and enforceable deadlines for the EPA to act; increases transparency of chemical information by limiting unwarranted claims of confidentiality by chemical companies; and provides funding for the EPA to carry out "these significant new responsibilities," the White House said. Pallone had said last week he opposed an agreement reached by House and Senate negotiators, saying it was "weaker than current law." Pallone said he was especially concerned about provisions in the bill concerning state regulation of toxic chemicals. New Jersey and other liberal-leaning states such as California, Massachusetts and Vermont have moved aggressively to regulate chemicals, and Pallone and other critics feared the federal bill could block state efforts even as it imposed the first-ever national standards for tens of thousands of chemicals, including formaldehyde and styrene, that are used in homes and businesses every day. A proposal announced last week declares that any state law or rule in place before April 22 would not be pre-empted by federal law. The proposal also would allow states to work on some regulations while federal rules are being developed, a process that can take years. States that do not regulate chemicals closely would follow the federal standard. Pallone and Rep. Paul Tonko, D-N.Y., said last week that "it would be better for us to not act at all than to pass the deal" proposed by House and Senate negotiators. Pallone's opposition was especially notable, since the bill is named after a fellow New Jersey Democrat, the late Sen. Frank Lautenberg. In their statement Monday, Pallone, Pelosi and Hoyer said that Lautenberg "dedicated his career" to fixing the toxic-substance law, adding: "We honor his memory in this bipartisan legislation bearing his name." The measure "is not the bill Democrats would have written on our own, but it is a long-overdue step forward to protect families and communities from toxic substances," the three Democrats said. The statement by House Democrats comes as Democratic presidential candidate Bernie Sanders said he opposes the bill. While the legislation allows Vermont and other states to continue enforcing existing state regulations to keep adults and children safe from toxic chemicals, "it makes it more difficult for states to set new, stricter standards," Sanders said. "That makes no sense. Federal chemical regulations should be a floor, not a ceiling. States should not be stopped from going above and beyond minimum federal safety standards." Supporters say they hope to move the bill through Congress this week, with the goal of sending it to Obama's desk by Memorial Day.
<urn:uuid:7095f29b-e33a-4c73-bfdc-1c66081e805e>
CC-MAIN-2022-33
https://www.fox47news.com/news/national/white-house-backs-bill-to-overhaul-asbestos-regulation
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571911.5/warc/CC-MAIN-20220813081639-20220813111639-00465.warc.gz
en
0.969985
790
1.65625
2
Previous: The Evolution of Fairness A little north of Lillooet the Fraser River narrows, forming a series of rapids that run between rocky shelves. Below each shelf is a quiet eddy, where the salmon rest before attempting to leap upstream. These shelves are known as fishing rocks, where the migrating fish can be efficiently harvested with dip nets, a simple technology that has changed little over thousands of years. The highly productive fishery found in this stretch of the canyon became the center of the ancient Lillooet culture. The Fraser River cuts an impressive figure in southern British Columbia. (Photo by Alan Honick) There are 22 fishing rocks along that stretch of the river. Access to them is obviously desirable, and some form of ownership that enables individuals or groups to control that access clearly confers an economic advantage. We spent three days in the area, hosted by Brian along with Suzanne Villeneuve, a colleague of Brian Hayden's who has taken over active supervision of the research program. We were also graciously hosted by members of the Stl'atl'imx First Nations, whose ancestors built these ancient villages. They continue to fish from the traditional rocks next to the eddies, catching and preserving salmon in much the same way as their ancestors. Chief Arthur Adolph of the Xaxli'p First Nation took us to a spectacular overlook on the cliffs above the river. In this video, Chief Adolph explains how they manage access to the resource today.
<urn:uuid:0fc9b13a-6885-4c4e-b707-9db98a7b59d7>
CC-MAIN-2022-33
https://psmag.com/social-justice/fishing-rocks-45689
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00672.warc.gz
en
0.967961
314
3.0625
3
How panicking BBC bosses ordered a re-write of Elizabeth Taylor and Richard Burton documentary because it contained 49 uses of the F word - BBC 4 programme re-written because of copious swear words - Tempestuous pair met on set of Cleopatra film and became lovers - Their romance captured in major new drama The tempestuous relationship between Elizabeth Taylor and Richard Burton still has the potential to shock almost four decades later. A major new BBC drama about the Hollywood lovers had to be re-written because it was littered with too many swear words. BBC bosses panicked when they received the first draft of ‘Burton and Taylor’ which will be broadcast tomorrow night on BBC Four because it contained 49 different uses of the F word as well as a reference to the c word. One source close to the production, which stars Dominic West and Helena Bonham Carter said bosses ordered a re-write to edit out the swearing Taylor and Burton, who married and divorced each other twice over - both swore like troopers particularly during their spectacular off-screen bust-ups. But producers thought the language in the original script was too blue even for a drama to be broadcast at 9.00 pm. One source close to the production, which stars Dominic West and Helena Bonham Carter said: 'The BBC thought the language in the production was a problem and William Ivory the writer was asked to remove a lot of the swearing. 'Bosses said "Billy we love the script but we simply can’t have 49 f***s and a c-word". 'Billy was just trying to capture the rhythm of their speech and simply hadn’t realised just how much swearing he had included in the script.' The toned down version of the screenplay still doesn’t pull any punches and it may still strike some viewers as too risque. The tempestuous pair - who married twice - became lovers on the set of the film Cleopatra Both characters, who became lovers on the set of the film Cleopatra, use the f word including in one scene where they row and Taylor slaps her husband around the face. He tells her to stop ‘f***ing hitting him’ and she says she will when he ‘f***ing apologises’ In another scene Burton uses the c-word to describe the critics who have just savaged the production of Private Lives in which they are both starring. The drama focuses on the couple’s decision to star in a 1983 production of Noel Coward’s comedy about a divorced couple. Although the two stars, who made eleven films together, are no longer lovers they can’t help but reminisce about their previous sex life. In one scene set in a hotel room Burton bemoans the fact that he is getting older and that he struggled to ‘get his sword of his sheath and wave it about a bit’ during a recent production of Camelot. Taylor, seen here with Burton, is portrayed as still being deeply in love with the actor and desperate to rekindle their romance A delighted Taylor tells him 'Not like you Richard,' before she is told off for having the mind of a ‘collier’. Taylor then asks her former husband 'How do you f*** anyway? You can barely move?' He replies: 'There are ways and means my love. 'Remember that train we took to New York and we lay there and let the rocking of the carriage do the job.' In a flashback scene, set ten years earlier Burton asks his wife why she is dressed like an ‘over-ripe tart’ while they are preparing to exercise in a hotel room. She replies: 'I thought maybe we could screw afterwards,' and then bemoans the state of her breasts. She tells Burton: 'I am holding my bosom. Its bouncing up and down. Richard I am 40 years of age. They are 40 years of age. They have gained a certain amount of elasticity.' A besotted Burton tells her: 'You are so gorgeous. Your tits are gorgeous, your arse is gorgeous, your legs, your belly, Did I mention your tits? Let’s just screw.' She tells him: 'We can be extra vigorous.' Taylor is portrayed as still being deeply in love with Burton and desperate to rekindle their romance. She is resentful of Burton’s new found love for actress Sally Hay who he would eventually marry during the run of Private Lives. For his part Burton wants to re-assure that Taylor she will always have place in his life even though he realises he most move on. He tells her: 'I will always love you Elizabeth, as long as I live. But us together it will destroy me. I can’t do it. That is what I had to say to you. That is why I did this bloody job.' Dr Frances Warner, an Emeritus Fellow at Oxford University, who was a close friend of Burton’s and who organised the couple’s second wedding reception said: 'I think that was the case. He did try and move on and eventually he did. 'He and Elizabeth remained in constant contact and they did telephone each other a lot. 'But all of that was understood by Sally who supported him and was an actual saint.' Jose Eber, the Beverly Hills-based hair stylist who was one of Taylor’s friends said the fact that she swore a lot simply added to her appeal. He said: 'So what. She was a real person who was passionate about life.' 'She said what she wanted to say and I applaud her for being herself.' Most watched News videos - Kitesurfer unaware of great white shark swimming below - Gloria Williams waves extradition for kidnapping Kamiyah Mobley - Disgusting moment cyst puss eruption covers cell phone - Enraged kick-boxer strikes husband's mistress NINE times - 2017's luckiest man: Pedro Grendene Bartelle win's $3.5m - NYPD searching for six teens who beat up a woman in Brooklyn - Sheep attack shepherd after being frightened by a car in Germany - Man takes his cat Weston Sledding in the snow - Legal implications for Gloria Williams who kidnapped Kamiyah Mobley - She's falling for him? Girl gets 'pushed off ledge in prank' video - Black PhD student is beaten and cuffed by police - Huge dress rehearsal for Donald Trump's inauguration ceremony The comments below have not been moderated. The views expressed in the contents above are those of our users and do not necessarily reflect the views of MailOnline. We are no longer accepting comments on this article.
<urn:uuid:55d18a62-52cb-4d27-86a1-b02a9423c260>
CC-MAIN-2017-04
http://www.dailymail.co.uk/news/article-2372113/How-panicking-BBC-bosses-ordered-write-Elizabeth-Taylor-Richard-Burton-documentary-contained-49-uses-F-word.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00219-ip-10-171-10-70.ec2.internal.warc.gz
en
0.969934
1,413
1.5625
2
Connect with us Kyrgyzstan Flash Appeal 2010 On 10 June 2010, a major outbreak of violence between ethnic Kyrgyz and Uzbeks in southern Kyrgyzstan triggered a severe humanitarian crisis, affecting 1 140 200 people. In just three days, the bloodshed, looting and destruction spread from Osh – the epicentre of the conflict – to the city of Jalal-Abat and neighbouring districts, also home to a significant Uzbek minority. Social tensions and political instability began to intensify in April, when violent demonstrations led to 84 deaths and the deposition of Kyrgyzstan’s ruling party, followed by the establishment of an Interim Government. Approximately 375 000 people have fled the conflict zones and around 20 percent of the displaced population has sought refuge in neighbouring Uzbekistan. Tens of thousands are concentrated at the border awaiting passage. Women and children are among the most affected groups and comprise 80 percent of refugees. As of 16 June, the official death toll reached 187, which is expected to rise significantly once a full assessment of the situation is possible. The ongoing crisis is exacerbating already critical levels of food and economic insecurity affecting the country. More than one in five people live on less than USD 1.25 per day. Damaging global and local factors (e.g. the financial crisis, food insecurity, and natural disasters) have significantly reduced the capacity of the country and its people to cope with internal and external shocks. The Kyrgyzstan Flash Appeal 2010 was launched on 18 June and seeks over USD 71.1 million to address the emergency needs of more than one million people affected by the conflict, including 300 000 internally displaced persons (IDPs) and up to 765 300 direct and indirect victims, such as those remaining in the affected areas and host communities. The Appeal will be revised in one month as the situation unfolds and further assessment results become available. Challenges facing food security and agriculture Agriculture is paramount to household food security and income generation in Kyrgyzstan, particularly among the extreme poor. The sector provides a livelihood to around 30 percent of the labour force, which continues to have the highest incidence of poverty. The ongoing displacement, looting of farming assets, destruction of infrastructure, disruption of markets and border closures threaten to increase food insecurity among this highly vulnerable group. In the most affected areas, many are forced to kill their livestock in order to feed their families. Unattended crops are dying as displacement and insecurity have prevented farmers from irrigating their vegetables, orchards and other crops. If unable to harvest wheat in July, farmers will lack sufficient seed for the next planting season. Poor farmers were already struggling to recover from increased food costs and natural disasters, including the flood that hit southern Kyrgyzstan in early June. Without timely support, these families risk losing their primary means of sustenance and falling into longer-term hunger and destitution. Within the Food Security and Agriculture Response Plan of the Kyrgyzstan Flash Appeal 2010, the Food and Agriculture Organization of the United Nations (FAO) seeks USD 2.7 million to support the emergency needs of farming families most affected by the crisis. With donor support, FAO aims to provide time-critical assistance to restore food production and agriculture-based livelihoods, through the provision of quality seeds, farming tools, fertilizer, livestock and technical support. FAO and the World Food Programme are co-leading the Food Security and Agriculture Cluster to ensure a coordinated and effective response, targeted to the most vulnerable families.
<urn:uuid:d71fd707-5600-4963-803f-28d5084b0f8a>
CC-MAIN-2017-04
http://www.fao.org/emergencies/appeals/detail/en/c/149379/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00302-ip-10-171-10-70.ec2.internal.warc.gz
en
0.948322
717
2.265625
2
Location: Hellyer County Park - Velodrome Group Picnic Area Discover the natural world with your senses to reveal the beauty around you! Join park interpreter Luke to explore the park’s sights, sounds, and textures. Parents/guardians and their young children participate together in activities designed to deepen your connection to the natural world. Appropriate for children ages 3 to 7 and their guardians. Please note that we require at least one parent/guardian to attend and participate in the program with their child(ren).
<urn:uuid:ec725d5d-16e0-4d2b-94c7-3032718e0b65>
CC-MAIN-2022-33
https://parks.sccgov.org/events/looking-and-listening-closely-nature-1
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00466.warc.gz
en
0.936771
106
1.609375
2
Packing Your Own Things Effectively To Lower Your Bill This is a series of general rules to follow that in my experience is the difference between cost effective and stress free, and well you can probably guess the alternative. 1. If it can be in a box... It SHOULD BE IN A BOX. Boxes are the be-all and end-all of moving. The key is they can be stacked. Small 2 cubes for dishes (wrapped in packing paper, see video), and big boxes for everything else. 4 cube and wardrobe boxes. That's pretty much it. Big boxes = Less trips to the truck = Faster. Tiny liquor boxes, or random sizes of random boxes you have accumulated are actually very time consuming because they don't stack as well. Either on dollies or on the truck in the load. Once again they also require more trips to the truck. You want larger boxes of relatively uniformed sizes. 2. No loose Items. I like to tell people this. " It takes just as long for me to carry that floor lamp and this little bag of loose stuff to the truck as it would to wheel 200lbs of boxed items... but the boxes would be easier because they're on wheels." This is typically an hourly service, do not under estimate how much longer it takes if there are things still laying around. Anything tall/ skinny like bed rails or shovels/rakes or brooms tape them up in bundles of 4 or 5. Not too many that it gets awkward, but enough that it's worth picking up. Lamps are an issue, take the shade off and get it in a wardrobe with some clothes/ blankets, tie the cords, or at least have them set aside with the shade off. Tall floor lamps do not move well, collapse if possible, or at least pack the glass type shades. Kitchen appliances go in the bottom of larger boxes while packing near the kitchen, they will take the weight. Electronics can be.. can you guess? that's right in boxes too. Put one in, drop something soft, then something flat, then another one(eg. amplifier,tea towels,cutting board, dvd player) until at the top of the box then fill the sides in with towels or paper or anything you have. 3. boxes Must Be Tight. The concept of using boxes gets kind of wrecked when they are not full. There are 2 things that determine where in the load the box goes: 1. how heavy it is. 2. How loose it is. The heavier the lower in the load, the looser the higher in the load. A box that has 1 heavy item in it has to move up in the load because it will ruin the structure of the tier being stacked, thus creating more risk to the more fragile items in the middle because of it's weight. This concept directly applies to dollies as well. If we cant stack it, it may as well stay loose. The items just mentioned can be in bins as well. Try to avoid bins that either have lids that will not stay on, or are too big to fit though doorways sideways. ALL garage items do well in bins. The garage typically gets loaded last and that section of the load is dirty, with sharp, loose objects. ALL liquids should be in bins, If there is a leak the rest of the load doesn't get ruined. All drawers stay in everything. Some clothes can stay in dressers but anything small and loose has to be removed. This is because many of these items are put on end to move or even upside down in the load. 6. Label, Label, Label. The fastest unload is to put all of your boxes right back in the immediate room to entry way, however if distributing throughout the house if there are no labels it becomes a nightmare. Everything needs to be handled more than once this way because we cannot stack dolly loads that are all in 1 location, thus increasing your bill. Preparation for the Movers Arrival Other things you can do to speed things up 1. clear hallways in front entry area 2. no vehicles in driveway 3. Any items possible moved as close to the loading point as possible Make the Process Even Faster... 1. While you are packing box by box stack them in the first immediate room to the entry way. This way we can draw from the boxes quickly and mix them with furniture as we go. This is the fastest way to move. (keep in mind sofas need to be accessible, they are the 1st thing on the truck) 2. Pull things slightly away from the wall. 3. Disassemble yourself if possible. When people ask me if I will take everything apart and put it back together again this is what I say: " I work for you today. I can do anything and everything you need me to do. Hell I will build you a new deck when we get there but at minimum of $100 per hour it may not be cost effective." That being said, most bed frames are not a big deal. We do them daily so of course we are fast at it. You know if you have anything that is brutally time consuming (like ikea). Just keep in mind that moving quotes do not include extraordinary circumstances. 4. Take the mirrors off your dressers and disconnect the table top from its base. Not taking the table apart is sloppy work for a mover. The table comes apart for a reason, it's designed to move that way.That dresser is the first thing we want out of that bedroom. It creates space in the room to maneuver the bed and its the best base in the house to stack on. This website is a constant work in progress, I sincerely hope this is helpful. I also appreciate any feedback, good or bad. Good luck with whoever you choose and I hope to hear from you! Dan Edwards, Owner/operator Pro Service Moving Inc.
<urn:uuid:699ecf12-261a-45b7-8fed-77e150885a86>
CC-MAIN-2022-33
https://www.proservicemoving.ca/how-to-pack-for-a-move-in-Edmonton?mid=0
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00669.warc.gz
en
0.945804
1,249
1.609375
2
Online air ticket booking system is the process of reserving tickets from online. This system is a latest concept. This system provides all options to book tickets from online from any location. Administrator has permissions to add, delete, modify, update latest flights information he also manages timings of flights and manages user’s information. User Module: User can search for best option based on fares and services. Based on best option user can book and cancel tickets. Online Air Ticket booking Project Aim: Main aim of online air ticket booking system is to develop a application which can make work easy for users to get detailed information on ticket booking and allow users to book tickets from any location. Functionality in Airline Reservation System: Users should register with application and book tickets by selecting best fairs from different services. After booking tickets users will get conformation message with printing option. Functionality of administrator: Admin can add latest flight details and he can manage users information and look after the maintenance of the system. Functionality of Online air ticketing cancellation: Users can cancel tickets before the cut of time. Users are refunded with money with few deductions. MCA students can download few related projects which are implemented in same software requirements. Students can develop air ticketing software application where users can integrate it in to any site as a plugin and users can perform online booking from any website. Requirement for developing this project: Online Air ticket booking system project can be developed in asp.net, vb.net and java. Project code provided here is developed in asp.net platform using C# programming language and MS Access back end database.
<urn:uuid:80d60c74-ee78-4ae1-ab55-8224a3b959c3>
CC-MAIN-2017-04
http://projectseminar.org/asp-net/asp-net-projects/online-air-ticket-booking-system/198/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280483.83/warc/CC-MAIN-20170116095120-00298-ip-10-171-10-70.ec2.internal.warc.gz
en
0.894105
339
1.601563
2
In my 2015 book release, The Way Things Oughta Be, I offer numerous chapters with analyses and suggestions for improving the world, whether it be politics, science, education, criminal justice, family issues, love and romance and so much more. At the very end of the book, I present a chapter titled, “Afterthoughts” which is a list of one-liners, without essay or analysis. I thought some folks might be interested…so I extracted this chapter and created a short blog. (With the author’s permission, of course) See what you think. Sometimes, a simple answer can identify a question. According to your author, here are a few one-line reflections on – The Way Things Oughta Be: - Smart people should think twice about the long-range consequences before blanketing their bodies with tattoo ink. - Parents who sit with their kids at restaurant tables engrossed with tablets and smart phones tell me they’ve lost the ability to communicate. - I’m a fan of space travel, but I also wonder if the enormous costs outweigh the benefits, and those billions of dollars could not be better funneled to more pressing needs. - Abolish car alarms. They are useless costs added to the price of an auto. - Schools, libraries, and other public properties should ban boys from wearing pants below their butts and exposing underwear. There is nothing wrong with standards. - The term “African-American” is a misnomer that fails to account for all the indigenous Arabs and whites who also come from Africa, which, after all, is a continent, not a country. - Non-citizen immigrants who arrive here and express hate for America should be given a one-way ticket back to their native country. - If a public employee refuses to pledge allegiance to the United States he or she should not be employed by the taxpayer. - The Pledge can easily be recited minus “under God” for anyone who so chooses, and should not be politicized. - Enemies in foreign countries with whom we are engaged in combat are not entitled to American civil rights. Advising them of their “rights” is an absurdity that benefits the enemy and not America. - Very little quality attention is paid to the problems of severe mental illness in America, which causes more grief, money and peril than we realize. - Unaccounted-for minorities, or other human categories that don’t seem to matter, include – mentally ill, prison inmates, returning ex-cons, and homeless. - Restaurants should post warning signs that advise parents they will be asked to remove loud and misbehaving children from the premises. - Telephone solicitations, political messages, and other nuisance calls that disturb millions, including the infirmed, should be declared a federal crime not protected by the First Amendment. - Young men and women who adorn their faces with multiple piercings should realize they are creating a gross distraction from their otherwise good looks. - Can anyone articulate a reason why the federal government needs a Department of Education? - English should be deemed, by act of Congress, as the official language of the United States, while at the same time encouraging bi-lingual education in schools and special education. - No veteran who honorably served his or her country should be allowed to live homeless. - I have a name. Please don’t call me “Man.” “The Way Things Oughta Be” is a comprehensive book of unique ideas about a myriad of topics. Signed copies available at my web site: www.marshallfrank.com or via Amazon.com
<urn:uuid:33f5b7cc-8a1c-4b5a-ae31-fb80a7d1e612>
CC-MAIN-2022-33
https://marshallfrank.com/category/sports/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00071.warc.gz
en
0.934484
778
1.890625
2
During an appearance on the LITA Top Technology Trends panel in 2014, I was discussing privacy of patron data, and mentioned that I thought it was a good idea for libraries to run Tor nodes on library servers. So when the Library Freedom Project launched their Tor in Libraries project, I was totally behind them…I even did a Tor workshop for Librarians for their workshop at ALA Annual in San Francisco. If you aren’t familiar with Tor, I recommend reading the Wikipedia article. The TL:DR version is that Tor is a protocol and a network that is currently the best mechanism that we have for accessing information on the Internet anonymously. There are a few ways that one can use Tor, ranging from using an operating system that routes all your Internet traffic over the Tor network to just using the Tor browser, which just anonymizes your web traffic. The way that Tor anonymizes your traffic is through a combination of encryption and blind routing, When you initially connect to the Tor network, the connection is encrypted in much the same way that the connection to your bank would be, via a public key encryption system. When you make a request for a website through the network, the Tor protocol bounces the request from one network node to the next, encrypting the traffic at every hop. Once the traffic gets a couple of hops away from the originating computer, it’s impossible to know where the request came from. Eventually the traffic exits the Tor network, back onto the regular old Internet, and gathers what you asked for, then reverses the process to get back to you. The result is that, under ideal conditions, it is completely impossible to track or trace what’s being transmitted via Tor. For Tor to continue to operate, it needs two sorts of nodes….relay nodes that act as the “bouncing” nodes for inside the network, and exit nodes that are the places where the traffic goes out of the encrypted Tor network and back onto the regular Internet. You need both, although a ratio of more relay nodes to fewer exit nodes is fine. The traffic that goes across relay nodes is completely anonymous…from the perspective of both the network and the individual server, it is just a random string of binary code. Only at the exit nodes does the traffic decrypt, and thus exit nodes bear the brunt of all of the requests going across the network. The traffic for the broader network all has to squeeze itself through exit nodes, and the fewer exit nodes there are, the easier it is for them to be monitored…although you can’t tell where the requests for the information came from without advanced knowledge. So why am I talking about Tor? Because I wanted to set up the story that broke last week about the first library in the US to publicly go live with a Tor relay (a middle relay) getting pressured by their local police to turn it off. The police were, in turn, pressured by the US Department of Homeland Security. From the original article on the event: In July, the Kilton Public Library in Lebanon, New Hampshire, was the first library in the country to become part of the anonymous Web surfing service Tor. The library allowed Tor users around the world to bounce their Internet traffic through the library, thus masking users’ locations. Soon after state authorities received an email about it from an agent at the Department of Homeland Security. “The Department of Homeland Security got in touch with our Police Department,” said Sean Fleming, the library director of the Lebanon Public Libraries. After a meeting at which local police and city officials discussed how Tor could be exploited by criminals, the library pulled the plug on the project. “Right now we’re on pause,” said Fleming. “We really weren’t anticipating that there would be any controversy at all.” He said that the library board of trustees will vote on whether to turn the service back on at its meeting on Sept. 15. That’s tomorrow, for those keeping track at home. Why do I think that libraries should be running Tor nodes? I had a long discussion about this on Twitter recently, but let me use the freedom of more than 140 characters to try and talk through my thinking on this. Tor is, currently, the best option that people have for anonymous speech on the Internet. It is possible to create accounts without using your real name, it’s possible to use wifi at coffeeshops and your local library to prevent your IP from being recorded…but for real anonymity of network traffic, nothing beats using Tor. Anonymous speech is important because it is a necessary component of the freedom of speech. The US Supreme Court has ruled again and again that the right to anonymous speech is a protected part of the First Amendment, saying in McIntyre v. Ohio Elections Commission: Anonymity is a shield from the tyranny of the majority…It thus exemplifies the purpose behind the Bill of Rights and of the First Amendment in particular: to protect unpopular individuals from retaliation…at the hand of an intolerant society. Libraries have been concerned over time with the Freedom to Read, but to doubt the role of the library in the Freedom of Speech in the US is to fundamentally misunderstand the Library (and possibly speech itself). Speech is a necessary precursor to Reading, as creation is a necessary precursor to consumption. Libraries are and should be cornerstones of free expression in the United States, and have worked to provide access to the tools of speech for years and years. For the Department of Homeland Security to use the boogie-man of “bad things happen on Tor” as a lever to get the relay turned off is the worst sort of fear mongering. Any tool can be a weapon, and any communications mechanism can and probably will be used to enable illegal activity. There is enormously more illegal activity on the open Internet, and yet libraries everywhere provide open and robust access to the Internet via both terminal and wifi. To paint Tor as a haven for thieves and drugs and child pornography is to misunderstand not only the Tor network but to, in my opinion, to mistake the forest for the trees. Yes, tools can be used for immoral and illegal things. But that does not make the tool either immoral nor illegal. The only rational explanation for the DHS pressuring the library to shut down their Tor relay node is that the DHS doesn’t want individuals, including US citizens, to have more robust mechanisms for anonymous speech. Per the US Supreme Court’s rulings on the links between anonymity and freedom of speech, this indicates to me that the DHS is actively attempting to prevent free and open speech on the Internet. That is not ok with me, and it absolutely should not be ok with libraries. If you have made it this far, please visit the EFF’s Take Action page on this effort and sign.
<urn:uuid:d9abf2f0-fcb2-4019-ba62-59f7ec025e5f>
CC-MAIN-2022-33
https://jasongriffey.net/2015/09/14/tor-libraries-and-the-department-of-homeland-security/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00477.warc.gz
en
0.948106
1,407
2.46875
2
If you’re ‘lucky’ to have had an official celiac diagnosis, do you feel as though you have received adequate follow-up from your doctor? Follow-up care is important for testing for t-TG antibodies, ensuring vitamin and mineral levels are normal and anything that tested abnormally prior to diagnosis has gone back within the normal range. It’s also important to ensure that patients are sticking to and coping with their strict gluten free diet. Recent research suggests that the follow-up care celiac patients are receiving is often inadequate and inconsistent. Researchers at the Mayo Clinic in Minnesota collected data on 122 patients with biopsy diagnosed celiac disease between 1996 and 2006 to look at what kind of follow-up, if at all, they received between 6 months and 5 years after diagnosis. Patients were classified according to how the American Gastroenterological Association (AGA) categorizes follow-up procedures. From 1 to 5 years after diagnosis, the number of people receiving follow-up appointments decreased each year. Of the 113 patients who were followed up for more than 4 years, only a third of them received follow-up to the level recommended by the AGA. Personally, I received a follow-up one year after my diagnosis. I had bloods done to check my iron levels and liver function were back to normal but I’ve never been tested for antibodies or had my vitamin and mineral levels checked. Three years into my diagnosis I don’t get any kind of follow-up at all. What kind of follow-up did you receive after your diagnosis? Do you receive adequate check-ups or are you left to cope with it on your own?
<urn:uuid:dfa162e3-2fcd-428e-b687-6dacd0a99382>
CC-MAIN-2017-04
http://www.triumphdining.com/blog/2013/01/31/inadequate-follow-up-after-celiac-diagnosis/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281419.3/warc/CC-MAIN-20170116095121-00486-ip-10-171-10-70.ec2.internal.warc.gz
en
0.977119
347
1.875
2
Frequently Asked Questions Here are some common questions you may have about hearing loss and hearing aids: Hearing loss is something that is a very personal problem and it’s something that can slowly lead to alienation. We know that when someone is isolated the next step is going to be depression and depression that’s being caused by something that has a simple solution. Can you hear conversations but have difficulty understanding them? Do you find yourself sitting closer to people in order to participate in conversations? Do others ask you to lower the TV or radio? If you’re over the age of 50 and you answered yes to any of these questions, you may already be suffering the symptoms of hearing loss and should have a hearing evaluation. New Generation Hearing offers many tests to determine if you do in fact have hearing loss and the type and degree. You must first determine where you feel you’re having the most difficulties with hearing. Since the person who has the hearing loss isn’t the only one that suffers it’s important to also discuss the issue with close family members. Based on that information, New Generation recommends a solution that is appropriate to try and resolve the situation; a hearing aid that is comfortable and will provide the hearing needed to communicate with the people around you. Ever walk out of a night spot after hearing loud music and feel like your head is in a bucket? This is a type of hearing loss. It’s called temporary threshold shift and what’s happening is you’ve exposed your nerves to the point of exhaustion and they can no longer respond properly. By the next day you generally feel fine, but what you don’t realize is that you don’t recover 100% of what you lost that night; you recover 99%. So if each time you are exposed to that type of noise you only recover 99%, hearing loss can build overtime. Best practices is to wear invisible hearing protection. As the level of technology increases, hearing aids become more automatic and have more features to help you communicate in difficult listening situations. For example, instead of using two channels to separate sound for processing, a hearing aid with advanced technology may have eight or more channels. This splits the signal into even smaller frequency bands and therefore offers a higher resolution of signal processing. In addition to the basic hearing aid technology, each major hearing aid manufacturer offers several levels of advanced digital technology. More advanced technologies translate to greater benefits. Bluetooth compatibility is a wireless feature that enables hearing aids to connect to mobile phones and other devices that use Bluetooth. Bluetooth technology has the ability to improve the signal to noise ratio and eliminate feedback from the microphone because the signal bypasses the microphone and directly enters the hearing aid’s processor. Although fairly specific in its application, wind noise reduction can make a world of difference for those who spend time enjoying outdoor hobbies, like golfers and boaters. Wind noise reduction is an advanced hearing aid technology that detects the impact of the wind blowing across the hearing aid microphones and avoids or reduces the amplification of it. The staff at New Generation Hearing Centers has knowledge base that comes from years of having worked with people who are hearing-impaired. Dr. Joseph K. Durán and his sister, Yvette Durán Someillán grew up around people who are hearing impaired and that gives them a more empathetic approach towards their patients. The team at New Generation tailors hearing solution based upon their patients’ needs, budget and lifestyle. It’s important to find a specific solution to your hearing needs both functionally and economically. Sometimes insurance will help offset the costs of hearing aids. At New Generation Hearing Centers we offer financing to facilitate the purchase of equipment; we don’t want costs to be the obstacle between you and the rest of the world. Technology in hearing aids is evolving rapidly and we’re able to hone in on some of the major problems we had in the past. Hearing aids can now manage background sounds to really make speech pop when it counts and allows the person who is experiencing hearing loss follow conversations easily. There is also Bluetooth technology that integrates with other equipment such as cellphones. New Generation offers our patients the ability to simply bring the instruments in and we’ll take care of it; it is part of what we offer our patients. We not only offer the best hearing solutions, but also help maintain the equipment so hearing aids keep functioning for the length of their life. Some hearing aids have a feature that allows them to “learn” your preferences. By logging volume control settings and program preferences for certain sound environments, the hearing aids can begin to make these changes automatically when the environment is detected. Over time, this reduces your need to make manual adjustments. Binaural processing means a pair of hearing aids communicates wirelessly with each other. This technology mimics the brain’s ability to process information coming from both ears and helps reduce manual adjustments. It is most commonly used to keep the hearing aids operating synchronously or to stream auditory signals from one hearing aid to the other. Imagine sitting in a typical busy restaurant, having dinner with friends. Sounds are coming from all directions, such as dishes clanking, people talking and laughing at other tables and waiters rushing about. You’re wearing your new hearing aids and listening to a friend who is sitting across from you at the table. She’s telling a joke. Your hearing aids are simultaneously reducing impulse noises like silverware clanking onto a plate (impulse noise reduction), reducing the whir of the ventilation system above (digital noise reduction), suppressing the voices of the people at the tables behind you (directional microphone system) and storing information about the listening environment to be saved for later fine-tuning (learning features). They’re doing all of this automatically while amplifying and shaping the speech signal from your friend. You are free to relax and enjoy the punch line.
<urn:uuid:2edf09c5-677e-4ea5-8244-ef383d44546e>
CC-MAIN-2022-33
https://www.newgenhearing.com/frequently-asked-questions/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571234.82/warc/CC-MAIN-20220811042804-20220811072804-00074.warc.gz
en
0.945891
1,219
2.359375
2
The application of microelectronic circuitry, high performance processors, and improved algorithms based on advanced mathematics has resulted in innovative new methodologies to acquire and process image data, permitting visualization, quantification, and functional analysis of tissues and organs. This 4-course online graduate Certificate Program in Biomedical Engineering, offered by UMass Lowell's Department of Electrical and Computer Engineering through the Division of Online and Continuing Education, provides engineering professionals with an interdisciplinary approach to learning about the principals and applications of imaging technology as they relate to the medical industry. Note: The University is no longer accepting applications to this program. - EECE.5110 Medical Diagnostic Imaging - EECE.5600 Biomedical Instrumentation Electives (choose 2): - EECE.5100 Digital Signal Processing - BMBT.5000 Introduction to Biomedical Engineering & Biotechnology - BMBT.5120 Medical Image Processing - BMBT.5160 Basic Pinciples of Nuclear Magnetic Resonance Imaging - BMBT.5170 Embedded System Design in Medical Systems Gainful Employment Disclosure Information Completion rates, median loan debts and program costs are outlined for each certificate program. Graduate Certificate Gainful Employment Disclosure Information BMBT.5000 Introduction to Biomedical Engineering & Biotechnology Team-taught introductory course that emphasizes a multidisciplinary approach to current topics in the range of academic disciplines and gives students their first exposure to faculty research areas. The course, as mucha as possible, will involve faculty from within Biomedical Engineering and Biotechnology. The course, as much as possible, involves faculty from all participating campuses. Speakers from industry are also invited to present topics of contemporary importance. 3 credits. BMBT.5120 Medical Image Processing The focus of Medical Image Processing will be on post-acquisition medical image processing. We will cover techniques for processing n-d medical images. There will be an engineering emphasis rather than rigorous investigation of algorithms and theory. There will be homework or projects that will require use of software tools such as (Image) (for fundamentals), Matlab or ITK (for filtering). Mimics (for segmentation). 3 credits. BMBT.5160 Basic Pinciples of Nuclear Magnetic Resonance Imaging The goal of this course is to provide the student with a general understanding of the physical principles of magnetic resonance imaging (MRI) and the instrumentation used to create a magnetic resonance image. This goal will be sought without deep exploration of any particular physical science or mathematical discipline. Background knowledge in freshman-level science and mathematics courses is assumed. The topics to be covered in this course include: 1) theoretical and experimental aspects of MRI and their application to problems in medicine and biology, 2) physical principles underlying the generation and detection of the nuclear magnetic resonance signal, 3) MRI instrumentation, and 4) Nuclear magnetic resonance relaxation parameters and how they affect contrast in a magnetic resonance image. 3 credits. Prerequisite: CSCE Graduate Restrictions BMBT.5170 Embedded System Design in Medical Systems This course covers the design principles of embedded systems including both the hardware and software aspects. We will introduce the design methodology and cost effectiveness of embedded systems. We will discuss the microprocessor, memory and storage subsystems. The interfacing between the computer system and medical instruments will be reviewed. Firmware, operating systems,programming tools will be considered. The course will have a lab component that includes hands-on exercises of embedded Linux (or RTEMS) in an online virtual laboratory environment. 3 credits. EECE.5100 Digital Signal Processing Review of Z-Transforms and solutions of linear difference equations. Digital filter structures, parameter quantization effects and design techniques. FFT and Chirp Z-Transform methods. Discrete Hilbert Transforms, minimum-phase sequences and their application to Homomorphic Signal Processing and calculation of Complex Cepstrum. 3 credits. Prerequisite: CSCE Graduate Restrictions Special Notes: a.k.a IB.510 EECE.5110 Medical Diagnostic Imaging This course covers the physics and electrical engineering aspects of how signals are acquired from which images will be formed, and the principal methods by which the signals are processed to form useful medical diagnostic images. Modalities studied include: x-rays, ultra-sound, computed tomography, and magnetic resonance imaging. The principles of signal processing via Fourier transform will be reviewed. Noise and other artifacts that degrade the medical diagnostic of images are considered. MATLAB is heavily used in simulation and verification. 3 credits. Special Notes: a.k.a IB.511 EECE.5600 Biomedical Instrumentation A survey of biomedical instrumentation that leads to the analysis of various medical system designs and the related factors involved in medical device innovation. In addition to the technical aspects of system integration of biosensors and physiological transducers there will be coverage of a biodesign innovation process that can translate clinical needs into designs. A significant course component will be project-based prototyping of mobile heath applications. The overall goals of the course are to provide the theoretical background as well as specific requirements for medical device development along with some practical project experience that would thereby enable students to design electrical and computer based medical systems. 3 credits. Prerequisite: ECE senior/grad or BMEBT stude
<urn:uuid:493a4746-846c-4d18-bc40-6c835f34b8a0>
CC-MAIN-2016-44
https://continuinged.uml.edu/certificates/biomedical-engineering-certificate-program.cfm
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719843.44/warc/CC-MAIN-20161020183839-00291-ip-10-171-6-4.ec2.internal.warc.gz
en
0.893301
1,113
1.625
2
Champsochromis spilorhynchus is a species of fish in the cichlidae family. It is found in Malawi, Mozambique, and Tanzania. Its natural habitat is freshwater lakes. From Wikipedia, the free encyclopedia, Champsochromis Spilorhynchus Photo/Map © Ad Konings and Cichlid Press Used with Permission Photograph © Copyright Carsten K. Larsen Used with Permission Page last updated on
<urn:uuid:26fba485-9ba2-4378-9c59-17d58ea00921>
CC-MAIN-2022-33
https://www.malawicichlids.co.uk/champsochromis/champsochromis-spilorhynchus/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00476.warc.gz
en
0.784134
102
2.203125
2
One of the things that often comes up in talking about getting the set up right on a bass is fret dressing, or polishing. There are two times this should happen to a bass: Before it leaves the factory. If the frets become overly worn from use (usually years of use). Posts tagged set up So, to the business of setting up a Bass Guitar. Tuning aside – do start with that first! – string height is the number one adjustment on a bass. There are all sorts of reasons that string height adjustment is needed, from changing string type and fret wear to changing weather conditions and playing style. This will be a mini series of posts – although I may put everything under this one post too. How do you set up your bass guitar? Obviously the ideal is to have a professional do it for you – you can’t be a skilled hand and experience to get the perfect set up. However, […]
<urn:uuid:25e7de77-deea-4ae7-b4a6-1cb1751f3d59>
CC-MAIN-2017-04
http://bassguitarblog.com/tag/set-up/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280483.83/warc/CC-MAIN-20170116095120-00296-ip-10-171-10-70.ec2.internal.warc.gz
en
0.957301
191
1.664063
2
the of a pawnbroker, especially one where unredeemed items are displayed and sold. the premises of a pawnbroker also pawn-shop, by 1763, from pawn (n.1) + shop (n.). noun 1. a receipt given for goods left with a pawnbroker. noun 1. a receipt for goods pawned [paw-paw] /ˈpɔˌpɔ/ noun 1. a tree, Asimina triloba, of the annona family, native to the eastern U.S., having large, oblong leaves and purplish flowers. 2. the fleshy, edible fruit of this tree. 3. . /ˈpɔːˌpɔː/ noun 1. a variant of papaw, papaya n. see papaw. [paw] /pɔ/ noun 1. the foot of an animal having claws. 2. the foot of any animal. 3. Informal. the human hand, especially one that is large, rough, or clumsy: Keep your paws off my property. verb (used with object) 4. to strike or scrape with the paws or feet: a dog pawing the door. […] [paw-tuhk-it] /pɔˈtʌk ɪt/ noun 1. a city in NE Rhode Island.
<urn:uuid:d0561ffb-52f7-45c8-93ff-0dfec512fe3c>
CC-MAIN-2016-44
http://definithing.com/define-dictionary/pawnshop/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718285.69/warc/CC-MAIN-20161020183838-00105-ip-10-171-6-4.ec2.internal.warc.gz
en
0.814988
298
2.40625
2
Estimated reading time: 7 minutes Couponing is incredibly popular these days. We all know that using coupons can save us money on groceries and other necessities. There are other benefits of couponing. When done right, you and others can enjoy the perks. The Benefits of Couponing and Its Impact on Others! Why you should be using coupons. It is more than just savings. Couponing is incredibly popular these days. In fact, it is the easiest way to save money. Everyone is searching out ways to find the best deals. Not only can couponing help your family savings on your grocery budget, but it can also help others. Yes, others. Making a positive difference not only for your family but others as well. The first gesture of affecting our community starts with one insignificant piece of paper; the coupon or sense we are now in the 21st century, the promo code. This coupon, whether in digital form or paper, signals a savings response and a willingness to give. In fact, we all want to give, but providing for our family’s needs often comes first. Saving money can help provide the needs of daily living to one’s own family. Over time you can then help benefit the needs of other families. What are some benefits of couponing? How do these benefits positively affect the lives of others? Sense of Accomplishment Many people get a great deal of joy out of couponing. They love knowing that while the rest of the population may have paid full price for an item, they have paid only 25 or 50 percent of the total price. Helping save for their family’s needs and priorities is a big accomplishment. Being able to be financially responsible and use shifty budgeting strategies is always a win/win. The Saving Benefit Everyone knows that it can be hard to save for big items. Whether you want to buy a new house or a new car, you need to have a significant amount of money to do so. Even though you have a savings account that you try to put a certain amount of money into each month, you tend to fall short. However, coupons really help with that. Let’s say you had originally planned to spend $200 on groceries this week, but coupons bring it down to $100. Now, you can take that extra $100, and put it in your savings account. Put it towards purchasing the bigger items you will need. Fun Fact; Studies have found that there is likely going to be a surge in coupon redemptions, resulting in the couponing market reaching $91 billion by the year 2022. You can read more about 7 Statistics That Show How Shoppers Are Using Coupons To Save Money In 2021. Showing children the value of money, especially before they are old enough to have their own jobs, is a trying task. Through the use of coupons, you can begin to teach them. For example, younger children can help you browse through the weekly circular sales ad and find corresponding coupons for that specific item. When you send older children to the store, send them with a packet of coupons to use for the purchases. Explain how if they are saving up for an item, it will be easier to do if they consider the use of coupons. Show them what they would have paid prior to coupons and the savings they accomplished by using them. As a result, children and teenagers may become more frugal with their money. They also will understand the value of money. Coupons are Available Sometimes, it’s easy to reach a goal one day but falls short the next. Coupons are so readily available that people are almost always able to keep up with their efforts. Most now offer digital coupons, which makes it easy. No more searching through newspapers and clipping out coupons. They are now readily available to you. Even if they are shopping online, finding a coupon is as simple as typing in the name of the store followed by the phrase “coupons” or “coupon codes.” If you are not sure where to find coupons for a physical shop, just search online. Many people are really invested in couponing. In fact, some online communities exist where people just get together to discuss all the incredible deals they have found. (Like on Inspiring Savings – wink wink) Are you ready to learn more about couponing? Be sure to check out our couponing 101 section to get started. You can also check out this post on The best Coupon Blogs – Top Money Saving Sites To Save You Money One of my favorite things about couponing is being about to save my family money, but more importantly, it also allows my family to give back to our community. Items that we find, that are relatively inexpensive or even free we buy and then donate to a family in need. More recently we have taken on the task of filling hunger boxes for children in need over a school break. Those boxes can easily cost $50 to fill, but with the use of coupons, we have spent $15-25 dollars. Each box contains enough food to feed one child in need for the week while school is not in session. Which gives us an opportunity to fill more hunger boxes with food. I have also had the pleasure to help support an entire school giving back by filling Captain’s Food Pantry. We did it all with parent/community support and couponing. When people make the decision to start using coupons and to stop paying full price for many items, they are going to notice significant changes. They will have more money saved up, and they will feel better about their accomplishments. In turn, they will want to show others how to coupon, save money, and give back to their community.
<urn:uuid:a321c54e-394a-4441-ad1d-2c131c7ac8af>
CC-MAIN-2022-33
https://www.inspiringsavings.com/benefits-couponing-impact-others
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00667.warc.gz
en
0.962661
1,203
1.71875
2
In my previous blogs I’ve mentioned “secure passwords” several times. But what actually makes a good password, and how can I test it? You need a good password in instances where you can’t use a password manager (such as Lastpass). Obviously you can’t type in a 43 character monstrosity every time. A good password has three qualities: - Difficult to crack - Easy(ish) to remember - Easy(ish) to type Number 1 is obviously crucial, but if 2 isn’t met you will end up writing it down. And some passwords are so hard to type (3) that you just hate them after a while. Dos and don’ts for passwords - Do not use a pattern. If it’s easy for you, hackers will think of it. E.g. - Do not make substitutions such as 0 for o and 3 for e. It just makes it harder to type (and remember) and won’t slow a computer down. And for good passwords they are just painful to remember. Don’t bother with them. Use a longer password instead. - Never use simple phrases such as “iloveyou” as cracking software will only take seconds - Never use dates or names relating to you or your family - Do use long passwords. The longer the better. Ideally 20 or more characters. - Do use long phrases that mean something to you (and not others), including spaces. The password “I love my Friday football with a beer” is a much more secure password than “&v3*JLCFf&Gt^499”. And by an incredible factor of 1040. And which would you rather remember! A good site to test your password on is: https://www.grc.com/haystack.htm ZEN are always happy to give you advice on all security matters, including but not limited to the choice of good passwords and implementation of password managers.
<urn:uuid:19fe434f-db57-4015-9dab-78ac0a05def0>
CC-MAIN-2022-33
https://www.zen.net.au/what-makes-a-good-password/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573667.83/warc/CC-MAIN-20220819100644-20220819130644-00073.warc.gz
en
0.929673
443
2.375
2
Multilingual literature are flourishing globally. The literature was born in need to tell stories about one self, others and about the world to better understand about the universe we live in. The children’s literature carries a message and their perspective to look the world. Multilingual literature helps children speaking different language access to literary resources and increase the horizon and have a global point of view. Multilingual literature are flourishing globally. Multilingual literature helps children speaking different language access to literary resources and increase the horizon and have a global point of view. Bengali-Swedish writer Anisur Rahman’s have authored several children’s literary works in Bangladesh and Scandinavia, who also sits in the board of the Swedish Writers’ Union and promotes multilingual and multicultural literary works worldwide. His diverse literary works include prose, poetry, novel, short story and books for children. His plays have been presented on Swedish Radio Theatre, NRK Norwegian Radio Theatre and at theatres in Bangladesh, Sweden, Armenia, Georgia and Norway. Educated at Dhaka University and Stockholm University, a full-time writer Anisur works for Uppsala Centre for Literature as its Project Leader and leads creative writing programs. He is heavily involved in literary cultural debates in media houses. In this episode, I have invited Anisur Rahman to talk about his work of literature promotion and importance of multilingual literature specially in Asia.
<urn:uuid:03623380-46ba-44c2-a3d8-746cbd00b8eb>
CC-MAIN-2022-33
https://www.devkumarsunuwar.com.np/multilingual-literature-helps-children-increase-their-horizon-and-have-a-global-point-of-view-says-bengali-swedish-writer-anisur-rahman
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571745.28/warc/CC-MAIN-20220812170436-20220812200436-00476.warc.gz
en
0.960131
287
2.65625
3
One of the most mythic aspects of pregnancy that nearly everyone talks about, or has a story or two about are the odd food cravings that women go through. Since it is something that is happening to me on a daily basis, I felt the need to talk about it, because, for one thing, I find it fascinating that no one is really sure what causes the intensity of the food longings that women get during pregnancy. One explanation that is given is that the body lacks something as the child grows, and so the woman’s body triggers a hunger in her for a food that contains the missing nutrient(s). It is a sensible enough supposition, this explanation, and is usually the one that I myself will give for my sudden, uncontrollable desire for whatever food has taken my fancy. There is nothing wrong with that explanation, per se, mind you, except when you take into account that some unlucky few women have intense cravings guiding them to eat dirt, powdered laundry detergent or sand. One could blithely say that these women are severely malnourished and obviously lack an essential mineral or two that can be found in the inedible item of choice, but that seems to me like cravings gone awry. Which leads me to the other guidance system that may be at work when it comes to cravings: hormones. Now, pregnant women get really weary of hearing about hormones, because it seems as though they are at fault for everything in the pregnant woman’s world. Have hot flashes? Hormones are the cause. Your breasts hurt? Hormones are at work. Falling prey to sudden intense fits of rage or worse, sobbing fits that come from nowhere? Hormones again. In fact, a pregnant woman can easily come to the conclusion that hormones are the root of all the weirdness that invades her world. And, really, it pretty much is true. So why couldn’t cravings be some byproduct of the ocean of hormones that a woman’s metabolism is steeped in during pregnancy? It seems just as logical as some sort of nutritive lack, and really, the answer may be a combination of the two–the woman lacks a nutrient and so the hormones get to work and make cravings. (They way that hormones work is a complex set of chemical reactions and interactions–and really, the amount that is known about how exactly women’s hormones work is miniscule–our body chemistry is just that complex. I know that it is complex, but sometimes, I have to admit to visualizing the hormones as these black-leather clad little molecules with whips, going about my body, shouting orders and wreaking havoc. So, I have a weird imagination. It’s probably the fault of some hormone or another….) The other interesting thing about cravings is that they happen to most women during pregnancy, most to the point that I should probably say all, but then some woman who had a perfect pregnancy and sailed through with no side effects or complications would probably post and say, “Oh, I never had one of those.” And they are different, not only with every woman, but in each different pregnancy. Which leads women to making assumptions about the baby they are carrying. For example, when I was pregnant with Morganna, I craved two things continually: cheese, and Huy’s garlic sauce. The cheese I explained away as a need for calcium, and the garlic sauce–which I always said I would eat on whatever Chef Huy felt like putting it on, including an old shoe or a dead rat–well, I never could figure why my liking for it became an obsession when I was pregnant. Later, however, I decided that I was carrying a kid who really liked cheese and garlic. And, sure enough, when Morganna was allowed to eat cow-milk based foods–she gravitated over to cheese immediately, and never looked back. And when she was about two, there was the incident where she grabbed a head of garlic out of a bin at a local Middle Eastern grocery store and amused the owner by nearly sticking it up her nose. She loudly inhaled, sighed and said, “Darlic! Mmmm. Darlic! Mordanna love darlic.” (She had problems with the “g” sound at the time, obviously.) So what am I craving now? Vegetables. Many of which are not in season yet, but my body really doesn’t much care about that. It still wants tomatoes. And eggplants. Squash, sweet potatoes, and beans. Avocados. Greens–especially kale and collards, but also gai lan, choi sum, bok choi and chard. Fermented vegetables are great, too–kim chee is fast becoming an obsession again. (That was the case for the last pregnancy, the one that ended in a miscarriage.) Tofu and miso and edamame and other soy products are also appealing strongly to me these days, but even more so–I have been wanting beans and corn. I guess it is because I am having aversions to meat, that I am seeking so much vegetable protein. Though, every day, I eat a little bit of meat, just nowhere nearly as much as I normally would, and I am still having issues eating beef much at all. I did eat a hot dog yesterday–a great handmade all beef frank in a natural casing that snapped under my teeth, with spicy mustard, onions, chili sauce and slaw on top. It was great, though what I loved the best was the slaw. It was not too sweet–I hate sugary slaw, but it wasn’t all mayonnaisey and slimy, either. I hate gloppy slaw. But it was lightly salty, a little sweet, kind of tart, very cabbagey with just enough mayo to hold it all together. Go figure. I eat a hotdog and rave about the damned slaw. I am beginning to believe that this kid that I am carrying was a Buddhist monk in his last life and just doesn’t want to give up on the veggies. Zak thinks otherwise. He is of the opinion that once the kid is out, and no longer breastfeeding or being spoon-fed, that it’ll become a junk-food junkie, just as a reaction against all the healthy stuff I fed it from the time it was a blastocyst. Oh, well. If that is the case, at least I know I -tried-. But be that as it may–I am finding these cravings to be fascinating and find myself wondering what other women crave? And what do they abhor–because the darker side of the food cravings, the shadow, are the food aversions. With me, I am finding that while I don’t reject sweets totally, I am finding it easier to ignore them than when I am not pregnant. And, of course, there is my inability to eat much in the way of meat. But what of everyone else? What do other women crave and avoid? And are these cravings culturally bound, or not? Sorry, the comment form is closed at this time.
<urn:uuid:6f142014-892c-46fe-be99-243f090708a3>
CC-MAIN-2016-44
http://www.tigersandstrawberries.com/2006/04/28/considering-cravings/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719041.14/warc/CC-MAIN-20161020183839-00169-ip-10-171-6-4.ec2.internal.warc.gz
en
0.977194
1,524
1.578125
2
Sir, – The Road Safety Authority has noted the doubling of child road fatalities ("Warning over road safety as children return to school", August 28th). They include a long list of actions to protect young pedestrians and cyclists. So far, so good. Sadly, not a single one of these recommendation is addressed at drivers. The clear implication is that child pedestrians and cyclists and their parents are solely responsible for road safety. The chief executive even suggests that children should get “streetwise”. This message follows the theme of previous Irish road safety campaigns, warning the public that walking and cycling are inherently dangerous and that anyone engaging in such risky activity should dress up like a Christmas tree. The result is to frighten people back into cars. Because inactivity is a greater threat to public health than sudden accident, this approach is harmful. Would it be too much to ask the RSA to run a campaign reminding drivers to look out for those few schoolchildren who walk or cycle and to perhaps join them by getting out of their cars once in a while? – Yours, etc, Cllr OSSIAN SMYTH, Monkstown, Co Dublin.
<urn:uuid:70110f35-52b4-4c33-8755-31202ac8357e>
CC-MAIN-2022-33
https://www.irishtimes.com/opinion/letters/children-and-road-safety-1.1911027
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00273.warc.gz
en
0.968391
244
2.25
2
- Research article - Open Access Incidence of skin and soft tissue infections in ambulatory and inpatient settings, 2005–2010 BMC Infectious Diseases volume 15, Article number: 362 (2015) The emergence of community-associated methicillin-resistant S. aureus was associated with dramatically increased skin and soft tissue infection (SSTI) incidence in the first few years of the 21st century in the U.S. However, subsequent trends are poorly understood. We examined ambulatory and inpatient data of over 48 million persons years aged 0–64 years from the HealthCore Integrated Research Database (HIRD) between 2005 and 2010. Data were extracted from medical, pharmacy, and eligibility databases. We quantified SSTI incidence, type, and complications and comparative incidence trends for urinary tract infections (UTIs) and pneumonia. A total of 2,301,803 SSTIs were identified. Most SSTIs (95 %) were treated in the ambulatory setting and most (60 %) were categorized as abscesses or cellulitis. During the study period, SSTI incidence remained relatively stable from 47.9 (95 % CI: 47.8–48.1) cases/1,000 PY in 2005 to 48.5 cases/1,000 PY (95 % CI: 48.3–48.6) in 2010). Persons aged 45–64 years had the highest incidence of both ambulatory-treated and inpatient-treated SSTIs (51.2 (95 % CI: 51.1–51.3) and 3.87 (95 % CI: 3.84–3.90) cases/1,000 PY, respectively). SSTI complications such as myositis, gangrene, and sepsis occurred in 0.93 % (95 % CI: 0.92–0.94 %) and 16.92 % (95 % CI: 16.87–16.97 %) of ambulatory-treated and inpatient-treated patients, respectively. SSTI incidence was approximately twice that of UTIs and tenfold of that of pneumonia. Among our large, diverse population of persons less than 65 years, SSTI incidence 2005 through 2010 has remained relatively constant at approximately 4.8 SSTIs per 100 person years, suggesting that previously observed increases in SSTI incidence remain sustained. Skin and soft tissue infections (SSTIs) are a common reason to seek medical care in the United States (U.S.), and worldwide [1, 2]. SSTIs can lead to complications with significant morbidity, including hospitalization, surgical procedures, bacteremia, and death [3, 4]. Reports from the early 2000s suggest that SSTI incidence in the U.S. was rising. An investigation using data from the National Ambulatory Medical Care Survey and National Hospital Ambulatory Medical Care Survey found that visits for SSTIs to U.S. physician offices, hospital outpatient departments, and emergency departments increased by 50 % between 1997 and 2004 . U.S. emergency department visits for SSTIs increased from an estimated 1.2 million visits annually in 1993 to 3.4 million in 2005 . Data from the Healthcare Cost and Utilization Project National Inpatient Sample (HCUP) found that hospital admissions for SSTIs increased by 29 % during 2000–2004 . There was no similar rise noted for other infectious diseases . SSTIs constituted the most rapidly increasing reason for hospitalizations between 1997 and 2007, with stays for skin and subcutaneous tissue infections rising 90 % for men and 75 % for women . Increases in SSTI incidence appear to be driven by the dramatic increase in community-associated methicillin-resistant Staphylococcus aureus (CA-MRSA) skin infections [1, 2, 5]. However, since this time there are few subsequent data on whether incidence of SSTIs in both ambulatory and inpatient settings has peaked, stabilized, or continued to rise. Additionally, there are no investigations that have taken a holistic approach to quantifying SSTI incidence in both the ambulatory and inpatient settings. To better understand trends in SSTI incidence, we reviewed administrative claims data within a large database of commercially insured members, who have full medical and pharmacy eligibility. We performed an observational retrospective cohort study utilizing administrative claims data. Data included medical and pharmacy claims from the HealthCore Integrated Research Database (HIRD). The HIRD data environment includes linked medical, pharmacy, and eligibility data from 14 health plans in the US, and includes health maintenance, point-of-service, preferred provider organizations and indemnity plans located in the northeastern, southeastern, mid-Atlantic, Midwestern, and western regions of the US. Data from the HIRD has been used previously in multiple incidence and cost studies [7–10] and includes information on over 48 million person years from 2005 to 2010. For purposes of this analysis, we included all persons with at least one day of enrollment within the health plan. All data were handled in compliance with the Health Insurance Portability and Accountability Act (HIPAA) of 1996, and a limited dataset was used for the analyses. The limited dataset contained the fields of interest specific to the study including eligibility, medical and pharmacy information for the specified cohort during the study period and limits the amount of protected health information (PHI) in the dataset. Due to the fact that this research is observational in nature, with no intervention conducted on human subjects, and the research involves the analysis of existing administrative claims data, which is accessible by the investigators in such a manner that subjects cannot be identified, directly or through identifiers linked to the subjects, the study was approved as an exempt investigation by the Institutional Review Board at the Los Angeles Biomedical Research Institute at Harbor-UCLA. SSTI incidence rates were obtained from the overall HIRD population. To calculate incidence, all SSTI episodes from 01/01/2005 through 12/31/2010 were included. Patient selection was defined as patients who had ≥1 medical (inpatient, emergency room [ER] or outpatient) claim with an ICD-9 diagnosis code for an SSTI between 01/01/2005 and 12/31/2010. The earliest occurrence was defined as the onset date for the first (index) SSTI episode. Any two consecutive claims for SSTIs or their complications within 30 days of each other were considered part of the same SSTI episode. A new SSTI episode therefore occurred if a SSTI claim was preceded by at least 31 days without any claim for SSTI or complication. Second, incidence rates were then calculated by dividing the number of all SSTIs during the study period by the person-years (PY) contributed by each member during the calendar year. To assess whether potentially observed trends in SSTI were related to changes in the HIRD population or our methodology, we assessed annual incidence of two common infections occurring in the ambulatory and inpatient settings, pneumonia and urinary tract infections (UTIs) from 2005 to 2010, for which we hypothesized there would be no significant changes in infection incidence. ICD-9 codes for SSTIs (Table 1) were identified based on definitions from previous investigations utilizing administrative claims data for identification of SSTIs [1, 2, 4, 5]. If an SSTI episode had claims with multiple clinical diagnoses for SSTIs, a hierarchy was implemented to categorize the type of SSTI episode and the infection was categorized as the more severe infection. The following categorization hierarchy, based on clinical judgment, was used (starting with most severe): (1) infection due to device or graft; (2) surgical site infection; (3) non-healing surgical wound; (4) decubitus ulcer; (5) mastitis; (6) cellulitis/abscess; (7) erysipelas; (8) other skin and soft tissue infections; (9) furuncle/carbuncle; (10) impetigo; and (11) folliculitis. We also used ICD-9 codes to identify pneumonias (481.xx, 482.xx, 483.xx, 485.xx and 486.xx) and UTIs (590.xx and 599.0) employing the same rules for SSTI claims outlined above, in which claims within 30 days of each other were considered to be part of the same episode. ICD-9 codes were based on pneumonia and UTI definitions from previous investigations utilizing administrative claims data [11–13]. Because of limitations of the HIRD extraction process, we used data on pneumonia and UTIs from 2005 to 2009. Classification of SSTI episodes Ambulatory-treatment vs. inpatient-treated of SSTI SSTI episodes were classified as ambulatory-treated or inpatient-treated depending on where the first claim of the infection episode occurred. SSTIs whose first claim occured in the ambulatory care setting but resulted in a hospitalization were considered to be inpatient-treated. For ambulatory-treated infections, the proportion of episodes with a hospitalization was calculated. Further, any inpatient stay containing a clinical diagnosis of SSTI or its complications as one of the hospital discharge diagnoses during the infection episode was also captured. For inpatient-treated infections, we calculated re-hospitalization rates as the proportion of infections that had a subsequent hospitalization related to SSTI or its complications during the infection episode. Complicated SSTIs vs. uncomplicated SSTIs All SSTI episodes were categorized as either complicated or uncomplicated, based upon prior definitions [14, 15] in which complicated SSTIs were defined as a ICD-9 code diagnoses of severe SSTI or by the presence of a significant comorbid condition. Categories of severe SSTI diagnoses are detailed in Table 1. Comorbid conditions present during the pre-index period made any SSTI a complicated infection. These conditions included (a) chronic kidney disease; (b) chronic liver disease; (c) alcohol or drug abuse; (d) peripheral artery disease; (e) neuropathy; (f) diabetes; (g) obesity; and (h) compromised immune system (see Table 1 for ICD-9 codes). Complications of SSTI episodes Further, we examined relatively commonly described SSTI complications or sequelae . These complications included lymphadenitis (ICD-9: 683.xx); myositis (ICD-9: 728.0x); necrotizing fasciitis (ICD-9: 728.86); gangrene (ICD-9: 040.0x, 785.4x); osteomyelitis (ICD-9:730.xx); bacteremia (ICD-9:790.7x); endocarditis (ICD-9:391.1x); and septicemia or sepsis (ICD-9: 038.x, 040.82, 785.52). An SSTI occurrence was considered to have a complication if the complication occurred during the infection episode. Based on clinical experience, osteomyelitis was flagged as associated with an SSTI if it was preceded by an SSTI claim within 90 days. Statistical comparisons were made using the chi-squared test and Cochrane-Armitage test, as appropriate. All analyses were performed using SAS 9.2 (Cary, North Carolina). A p value of p < 0.05 was considered to be statistically significant. There were a total of 2,301,803 SSTIs in both the ambulatory and inpatient settings between 2005 and 2010. The vast majority (95 %) of SSTIs were diagnosed in the outpatient setting (ambulatory-treated; 45.73, 95 % confidence interval (CI): 45.67–45.79 episodes per 1,000 PY) vs. 2.19 (95 % CI: 2.17–2.20) episodes per 1,000 PY that were inpatient-treated (Table 2). The age group with the highest incidence of SSTIs was 45–64 years in both the ambulatory-treated (51.23 SSTIs per 1,000 PY, 95 % CI: 51.12–51.34) and the inpatient-treated SSTIs (3.87 SSTIs per 1,000 PY, 95 % CI: 3.84–3.90; Table 2). In the ambulatory-treated SSTIs, differences in SSTI incidence were relatively modest between this group and the younger age groups; SSTI incidence among those ages 0–17 years and 18–44 years was 43.51 (95 % CI: 43.40–43.63) and 42.85 (95 % CI: 42.77–42.94) SSTIs per 1,000 PY, respectively. However, among inpatient-treated SSTIs, incidence differences were more pronounced. Incidence was 0.91 (95 % CI: 0.89–0.93) and 1.64 (95 % CI: 1.62–1.65) SSTIs per 1,000 PY among those ages 0–17 and 18–44, respectively, compared to 3.87 (95 % CI: 3.84–3.90) SSTIs per 1,000 PY among those age 45–64 (p < 0.0001). The clinical diagnosis of abscess or cellulitis was the most common SSTI, representing 57.32 % (95 % CI: 57.26–57.38 %) of SSTIs overall; 57.62 % (95 % CI: 59.90–60.03) in the ambulatory-treated and 51.13 % (95 % CI: 50.71–51.55) in the inpatient-treated groups (Table 3). The remaining cases of SSTIs (ambulatory and inpatient combined) were comprised of folliculitis (12.00 %, 95 % CI: 11.96–12.04 %)), impetigo (6.61 %, 95 % CI: 6.58–6.64 %)), furuncle (3.29 %, 95 % CI: 3.26–3.31 %)), mastitis (2.25 %, 95 % CI: 2.23–2.27 %)), surgical site infection (2.19 %, 95 % CI: 2.17–2.21 %)), decubitus ulcer (5.28 %, 95 % CI: 5.25–5.31 %)), device or graft (1.21 %, 95 % CI: 1.19–1.22 %)) and other (unspecified cases of SSTI; 9.25 %, 95 % CI: 9.21–9.29 %)). Distributions of SSTI type stratified by ambulatory-treated and inpatient-treated SSTIs are further outlined in Table 3. For inpatient-treated SSTIs, several categories of SSTIs had higher proportion of diagnosis than compared to their proportion in the ambulatory-treated group. These categories included surgical site infections (19.86 %, 95 % CI: 19.81–19.91 %)), SSTIs associated with devices or grafts (12.58 %, 95 % CI: 12.54–12.62 %)) and decubitus ulcers (9.66 %, 95 % CI: 9.62–9.70 %), p < 0.0001 for all comparisons) (Table 3). Overall, rates of complications of SSTIs including lymphadenitis, myositis, necrotizing fasciitis, gangrene, osteomyelitis, bacteremia, endocarditis, septicemia and sepsis, were 1.16 % (95 % CI: 1.15–1.17 %) in the outpatient-treated SSTIs and 23.28 % (95 % CI: 23.02–23.54 %) in the inpatient-treated SSTIs (Table 3). Additional complications of SSTIs and proportion patients of re-hospitalized stratified by initial SSTI category and treatment location are detailed in Table 3. Temporal trends in SSTIs are summarized in Fig. 1. Despite a slight decrease from 2005 to 2007, SSTI incidence remained relatively unchanged from 2005 to 2010, from 47.94 (95 % CI: 47.79–48.09) to 48.46 (95 % CI: 48.31–48.61) SSTIs per 1,000 PY. In this time period, the incidence of uncomplicated SSTIs also remained relatively stable from 27.34 (95 % CI: 27.23–27.46) to 27.45 (95 % CI: 27.33–27.57) SSTIs per 1,000 PY, as did complicated infections 20.57 (95 % CI: 20.47–20.67) to 20.99, (95 % CI: 20.88–21.09) SSTIs/1,000 PY. Although all trends were statistically significant (p < 0.0001 for all comparisons), the magnitude of change was relatively small. In our comparative examination of other common infectious diseases from 2005 to 09, we found an incidence of UTIs, ranging from 17.31 to 19.95 infections per 1,000 PY during the study period, and incidence of pneumonia ranging from 4.59 to 5.03 per 1,000 PY during the study period (Fig. 2). We performed an examination of both ambulatory- and inpatient-treated SSTIs as part of a single investigation in a large cohort of patients. We analyzed data from an administrative database and identified over 2.3 million SSTIs between 2005 and 2010. We found that the incidence of SSTIs is substantial and approximately twice of that of UTIs and tenfold of that of pneumonia. In our study period, on average, over 4 SSTIs occurred per 100 persons aged 0–64 years old annually. We also found that SSTIs were about twenty times more likely to be ambulatory-treated than inpatient-treated. Finally, our findings suggest that the rapid increase in SSTI incidence observed earlier during this Century [1, 2, 5] has leveled off, and SSTI incidence has been relatively stable across our study period. We used ICD-9 codes to identify SSTI occurrences, which is a research identification method similar (or identical) to previous SSTI investigations [1, 2, 5]. While diagnosing SSTIs using ICD-9 coding has limitations (i.e., potential misclassification, coding errors), we observed that our SSTI incidence was comparable to other studies that used different administrative claims databases. Hersch et al. estimated outpatient infections in the U.S. and found that the visit rate among patients aged 18–44 years increased from 13.1 visits per 1,000 population in 1997 to 27.1 in 2005 . Their 2005 estimates compare to our findings of 42.9 ambulatory-treated infections per 1,000 population per year between 2005 and 2010 in this age group. However, they used data from the National Ambulatory Medical Care Survey, which did not sample non-physician clinician visits in office-based practices, which may in part explain their lower incidence . Edelsberg et al. found that an estimated 289,715 admissions occurred for SSTIs among patients aged 45–64 years in 2004 . Our estimate of SSTIs with inpatient-treated of 3.9 per 1,000 PY in the 45–64 age category represents about 277,000 episodes during 2004, based on U.S. census population estimates for this year . These results suggest that our findings of SSTI incidence are valid in comparison to other investigations employing claim-based methodologies. Finally, our SSTI incidence over the study period of 47.9 SSTIs/1000 person years is also similar to that the 49.6 SSTIs/1000 person year rate found in a population of Kaiser Permanente Northern California patients from 2009 to 2011 when analyzing electronic medical records and administrative databases . Our study is novel as it compares SSTI incidence to other common infectious diseases. The reasons for these comparisons were twofold. First, if a trend was noted SSTI incidence, we wanted to ensure that these represented true incidence changes rather than secular changes in the HIRD population or other methodological factors. However, SSTI incidence changes observed were relatively modest and likely represented year to year fluctuations rather than true trends observed between the late 1990s and 2005 in other populations [1, 2, 5]. The second reason for comparing SSTI trends to other common infectious diseases is descriptive. We chose pneumonia and UTIs given they are relatively common infections seen in both inpatient and ambulatory settings and affect both children and adults. We found an SSTI incidence approximately twice of that of UTIs and 10 fold of that of pneumonia. The UTI incidence of 17.3–20.0 UTIs per 1,000 PY is comparable to findings from outpatients <65 years in Veteran Administration (VA) clinics in 2001. Among females, our UTI incidence was 31.43 UTIs/1,000 PY (data not shown), which is comparable to the estimated 55.1–60.6 UTIs per 1,000 PY in VA clinics . Among males, UTI incidence was 5.23 UTIs/1,000 PY (data not shown), which is comparable to the estimated 16.7–22.7 UTIs per 1,000 PY men . Our lower rate may be related to the fact that the VA does not care for children, in which the incidence of UTI is very low [11, 12], and the VA population may not be representative of insured adults. When these facts are considered, the rates may be more comparable. Our pneumonia incidence we found was comparable to ICD-9 code data from the very large MarketScan Commercial database, in which the pneumonia incidence of 4.89 episodes per 1,000 PY among those aged 18–64 is comparable to our incidence of 4.10–5.03 per 1,000 PY. Our study has several strengths. First, we studied trends in a demographically diverse population that included a very large group of persons with and without significant co-morbidities. Second, the time period of our investigation was novel in that it examined SSTI incidence in the period after a rapid rise in SSTIs that occurred in the first 5 years of the 21st Century [1, 2]. Third, we used databases that included both inpatient and outpatient treated SSTIs. Previous large studies in the U.S. captured skin infections only in ambulatory settings, and used sample sizes that were a thousand-fold smaller than the present research to create estimates of SSTI [1, 19]. SSTI investigations in hospitalized patients that used HCUP data utilized a stratified random sample of only inpatient stays for SSTI [5, 6]. Unlike these previous efforts, our investigation directly measured SSTI rates rather than analyzing a subset of cases or a convenience sample. There are limitations to our investigation. First, due to the nature of the commercially insured data used, we did not include persons over 65, the majority of them who utilize a Medicare or fee-for-service reimbursement model instead of commercial insurance plans. If we were able to quantify SSTI incidence in older Americans, it is likely the rates of infection would be substantially higher in this age group compared to younger persons. Older Americans typically have a higher prevalence of co-morbidities associated with increased risk for SSTI and they have a higher risk of many other infections probably due co-morbidities and declines in host defenses [21, 22]. Second, we did not have microbiologic correlations for each SSTI. Thus we could not assess if the relationship between CA-MRSA trends and SSTI incidence in our cohort. Nevertheless, other investigations have shown that CA-MRSA appears to be the primary cause of increasing community-associated SSTI incidence in the beginning around 2000 [23, 24]. Third, although we were able to categorize diagnoses of skin infection by clinical type, the accuracy of these designations is unclear as diagnoses were derived from billing codes that may or may not have reflected accurately the pathology of the actual infection seen by clinician. Fourth, our designation of uncomplicated and complicated may not necessarily be consistent with definitions used by others [14, 15]. Regardless, there is no standardized definition distinguishing complicated from uncomplicated infection and, when developed, such distinctions may only be useful for clinical trials in which clinicians are prospectively determining definitions based on clinical presentation . Finally, our study population is selected from all the U.S. regions and some regions are more represented than others. However, overall the HIRD population is geographically diverse and covers most regions of the U.S. In summary, we found that SSTI incidence between 2005 and 2010 has remained relatively constant, suggesting that with previously observed increases in SSTI incidence have now been stabilized. The SSTI incidence remained relatively steady among both ambulatory-treated and inpatient-treated infections as well as among both complicated and uncomplicated infections. Between 2005 and 2010, approximately 4.8 SSTIs requiring medical attention annually occurred per 100 person years among those aged 64 years and younger. Given the high incidence of SSTIs, interventions to prevent SSTIs would have great potential to reduce disease morbidity and health care utilization. Community-associated methicillin-resistant Staphylococcus aureus Healthcare Cost and Utilization Project Health Insurance Portability and Accountability Act HealthCore Integrated Research Database International Statistical Classification of Diseases and Related Health Problems, Ninth Revision Protected health information Skin and soft tissue infection Urinary tract infections Hersh AL, Chambers HF, Maselli JH, Gonzales R. National trends in ambulatory visits and antibiotic prescribing for skin and soft-tissue infections. Arch Intern Med. 2008;168:1585–91. Pallin DJ, Egan DJ, Pelletier AJ, Espinola JA, Hooper DC, Camargo CA. Increased US emergency department visits for skin and soft tissue infections, and changes in antibiotic choices, during the emergence of community-associated methicillin-resistant Staphylococcus aureus. Ann Emerg Med. 2008;51:291–8. Carratala J, Roson B, Fernandez-Sabe N, Shaw E, del Rio O, Rivera A, et al. Factors associated with complications and mortality in adult patients hospitalized for infectious cellulitis. Eur J Clin Microbiol Infect Dis. 2003;22:151–7. Lipsky BA, Kollef MH, Miller LG, Sun X, Johannes RS, Tabak YP. Predicting bacteremia among patients hospitalized for skin and skin-structure infections: derivation and validation of a risk score. Infect Control Hosp Epidemiol. 2010;31(8):828–37. Edelsberg J, Taneja C, Zervos M, Haque N, Moore C, Reyes K, et al. Trends in US hospital admissions for skin and soft tissue infections. Emerg Infect Dis. 2009;15:1516–8. Levit K, Wier L, Stranges E, Ryan K, Elixhauser A. HCUP facts and figures: statistics on hospital-based care in the United States, 2007. 2009. Kessler RC, Coulouvrat C, Hajak G, Lakoma MD, Roth T, Sampson N, et al. Reliability and validity of the brief insomnia questionnaire in the America insomnia survey. Sleep. 2010;33(11):1539–49. Kim SY, Schneeweiss S, Liu J, Daniel GW, Chang G, Garneau K, et al. Risk of osteoporotic fracture in a large population-based cohort study of patients with rheumatoid arthritis. Arthritis Res Ther. 2010;12(4):R154. Lee TA, Chang C-L, Stephenson JJ, Sajjan SG, Maiese EM, Everett S, et al. Impact of asthma controller medications on medical and economic resource utilization in adult asthma patients. Curr Med Res Opin. 2010;26:2851–60. Phillips S, Delorenze GN, Quesenberry C, Willey VJ, Niemcryk SJ, Wells K, et al. Epidemiologic study of ariprazole use and the incidence of suicide events. Pharmacoepidemiol Drug Saf. 2010;19(11):1124–30. Griebling TL. Urinary tract infection in women. In: Litwin MS, Saigal CS, editors. Urologic diseases in America. 2007. p. 587–620. Griebling TL. Urinary tract infection in men. In: Litwin MS, Saigal CS, editors. Urologic diseases in America. 2007. p. 621–45. Bonafede MM, Suaya JA, Wilson KL, Mannino DM, Polsky D. Incidence and cost of CAP in a large working-age population. Am J Manag Care. 2012;18(7):380–7. Food and Drug Administration. Guidance for industry. Uncomplicated and complicated skin and skin structure infections-developing antimicrobial drugs for treatment. Draft guidelines 1998 [monograph on the internet]. Rockville: Health and Human Services, Food and Drug Administration, Center for Drug Evaluation and Research 1998 [cited January 11, 2011]; 1998. Available from: http://www.fda.gov/ohrms/dockets/98fr/2566dft.pdf. Stevens DL, Bisno AL, Chambers HF, Everett ED, Dellinger P, Goldstein EJ, et al. Practice guidelines for the diagnosis and management of skin and soft-tissue infections. Clin Infect Dis. 2005;41(10):1373–406. Hing E, Hooker RS, Ashman JJ. Primary health care in community health centers and comparison with office-based practice. J Community Health. 2011;36(3):406–13. U.S.Census Bureau, Population Division. National Population Projections Released 2008 (Based on Census 2000) [monograph on the Internet]. Washington, U.S.Census Bureau 2008 [cited 2008 Jan]. 2008. Available from: https://www.census.gov/population/projections/data/national/2008/summarytables.html. Ray GT, Suaya JA, Baxter R. Incidence, microbiology, and patient characteristics of skin and soft-tissue infections in a U.S. population: a retrospective population-based study. BMC Infect Dis. 2013;13:252. McCaig LF, McDonald LC, Mandal S, Jernigan DB. Staphylococcus aureus-associated skin and soft tissue infections in ambulatory care. Emerg Infect Dis. 2006;12(11):1715–23. Capitano B, Leshem OA, Nightingale CH, Nicolau DP. Cost effect of managing methicillin-resistant Staphylococcus aureus in a long-term care facility. J Am Geriatr Soc. 2003;51:10–6. Chong C, Street PR. Pneumonia in the elderly: a review of the epidemiology, pathogenesis, microbiology, and clinical features. South Med J. 2008;101:1141–5. Wenger JD, Hightower AW, Facklam RR, Gaventa S, Broome CV. Bacterial meningitis in the United States 1986: report of a multistate surveillance study. The bacterial meningitis study group. J Infect Dis. 1990;162(6):1316–23. King MD, Humphrey BJ, Wang YF, Kourbatova EV, Ray SM, Blumberg HM. Emergence of community-acquired methicillin-resistant Staphylococcus aureus USA 300 clone as the predominant cause of skin and soft-tissue infections. Ann Intern Med. 2006;144(5):309–17. Moran GJ, Krishnadasan A, Gorwitz RJ, Fosheim GE, McDougal LK, Carey RB, et al. Methicillin-resistant S. aureus infections among patients in the emergency department. New Engl J Med. 2006;355(7):666–74. O’Sullivan CE, Baker MG. Proposed epidemiological case definition for serious skin infection in children. J Paediatr Child Health. 2010;46(4):176–83. We wish to thank Maria Perry M.P.H. and Ella Nkhoma for thier assistance with the statistical analysis, and Margaret Kelly for proof reading. This work was supported by GlaxoSmithKline. Publication of these results is not contingent upon the sponsor’s approval or censorship of the manuscript. Dr. Miller reported receiving grant support GlaxoSmithKline and consulting fees from Pfizer, Durata Therapeutics, and GlaxoSmithKline. Drs. Eisenberg, Chang, and Singer, Mr. Luthra, Ms. Wallace and Ms. Fang are employees of HealthCore, an independent contract research organization that has received research funding from GlaxoSmithKline for this study. Drs. Eisenberg, Chang, and Singer, Mr. Luthra, and Ms. Wallace and Ms. Fang are all shareholders of Wellpoint. Dr. Suaya were employees of GlaxoSmithKline group of companies and held shares of GlaxoSmithKline at the time of the study. Acquisition of data: DFE, C-LC, AW, CF, JS. Analysis and interpretation of data: LGM, DFE, HL, C-LC, YW, RL, AW, CF, JS, JAS. Drafting of the manuscript: LGM, DFE, JAS. Critical revision of the manuscript for important intellectual content: LGM, DFE, HL, C-LC, YW, RL, AW, CF, JS, JAS. Statistical analysis: LGM, DFE, HL, C-LC, YW, RL, JAS. All authors read and approved the final manuscript. Loren G. Miller and Jose A. Suaya contributed equally to this work. About this article Cite this article Miller, L.G., Eisenberg, D.F., Liu, H. et al. Incidence of skin and soft tissue infections in ambulatory and inpatient settings, 2005–2010. BMC Infect Dis 15, 362 (2015). https://doi.org/10.1186/s12879-015-1071-0 - Soft Tissue Infection - Necrotizing Fasciitis - Veteran Administration - National Ambulatory Medical Care Survey
<urn:uuid:0f8ad206-988b-4665-afe7-b466dfce0358>
CC-MAIN-2022-33
https://bmcinfectdis.biomedcentral.com/articles/10.1186/s12879-015-1071-0
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00272.warc.gz
en
0.915075
7,645
2.25
2