text stringlengths 181 608k | id stringlengths 47 47 | dump stringclasses 3 values | url stringlengths 13 2.97k | file_path stringlengths 125 140 | language stringclasses 1 value | language_score float64 0.65 1 | token_count int64 50 138k | score float64 1.5 5 | int_score int64 2 5 |
|---|---|---|---|---|---|---|---|---|---|
Learn something new every day
More Info... by email
If there is not enough free water in the body, water that is not bound to any organelles or macromolecules, it can cause an excess of sodium in the blood, a condition known as hypernatremia. The free water deficit is the amount of water that the body is lacking that has brought about the hypernatremia. Hypernatremia can cause a variety of symptoms, and the severity of symptoms primarily depends on the underlying cause.
Hypernatremia is an excess of sodium in the blood, but is more typically due to a lack of free water than excess consumption of sodium. Normally, if there is even a small change in the amount of sodium in the blood, the thirst response will kick in and cause someone to consume water. Most of the time, hypernatremia is caused by people who can’t consume water on demand, such as the very old, infants, or people with disabilities. Not treating an underlying problem that causes a patient to lose a lot of water, such as excessive diarrhea or a disease like diabetes insipidus, can also cause hypernatremia.
There is a standard calculation to determine the amount of free water needed to reach the proper balance of sodium in the blood. Blood samples are taken to determine the ratio of sodium to blood, usually expressed as the amount of sodium in milligrams per deciliter of blood (NA+ mg/dl). Once this is found, that value is divided by a reference number that is indicative of the normal amount of sodium in the blood, usually 140 mg/dl, minus one.
The free water deficit is then calculated by taking the resulting value and multiplying it by the total weight of the body in kilograms. It is then further multiplied by a reference number, typically 0.6 for men and 0.5 for women, to attain the free water deficit. The reference number is multiplied by the body weight because it determines how much total body water there is. Using a man as an example, the formula would then look like this: 0.6 x Body weight (kg) x (current Na+ level/140 – 1) = free water deficit.
Once the value is found, the proper amount of water can be delivered either orally or intravenously. The key factor in rehydrating someone with hypernatremia is to go at the proper pace. If done too quickly, it can cause damage to the body, in particular the cells of the brain. Brain cells can easily swell and this can lead to seizures, brain damage, or death. The procedure to correct a free water deficit is best done in a hospital setting or with an experienced medical practitioner.
One of our editors will review your suggestion and make changes if warranted. Note that depending on the number of suggestions we receive, this can take anywhere from a few hours to a few days. Thank you for helping to improve wiseGEEK! | <urn:uuid:6aa1edc7-2355-49a1-940b-359693d3b50c> | CC-MAIN-2017-04 | http://www.wisegeek.com/what-is-free-water-deficit.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00060-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.941412 | 607 | 3.921875 | 4 |
The construction of a community-driven library in the Eastern Cape is one step closer to completion after a funding boost from a social impact initiative launched in 2019.
The roof of the Novulakuvaliwe Community Library, situated in Lusikisiki, is currently being completed, following a significant contribution from JT Comms, powered by Mindshare. This is one of the projects to receive funding from a new social impact initiative that has brought together JT Communication Solutions, a Johannesburg-based, 100% black owned media agency, and the global Mindshare media agency.
The library is a project of Nomkhubulwane Development Projects, an NPO based in the village of Mzizangwa. The NPO is fiercely committed to a development agenda that seeks to empower the rural community in which it exists - and provide sustainable development in areas such as in education, skills development, arts and culture.
With leadership from co-directors Zanele Ndlovu, Unathi Magubeni and Nosiphiwo Magubeni, Nomkhubulwane Development Projects is an outstanding example of South Africans themselves tackling the challenges and problems that face so many communities. The Novulakuvaliwe Community Library also provides a lesson in the passion that can drive community projects towards sustained impact: instead of waiting for a lumpsum cash injection, the team took an incremental approach to the building of the library, in order to get the work moving. Construction began on 20th September 2019, with contributions and donations from a network of friends and associates.
“We are motivated to play our role in rural development, especially in the community in which we exist,” says Ndlovu. “We realise that rural areas are being left behind in terms of development and there is a generation of children whose future is handicapped just because of the area they are born in, and our conscious couldn't let the status quo remain as such. We would like to make our contribution and hopefully inspire others to put much more focus on rural development.”
The Novulakuvaliwe Community Library will focus on two areas of underdevelopment in the rural community that it will serve - education and skills development. This is through an intervention that can start at the early childhood development phase in order to nurture the development of children. It is also a community-driven intervention that can provide library services and assist school going learners in their quest for knowledge - and provide skills development workshops to the unemployed and interested individuals.
Once complete, the library will be a centre for knowledge and research for the learners of Gwexintaba, Magwa, Mzizangwa and Goso Primary School and the community at large. The Novulakuvaliwe Community Library is prioritising fiction and non-fiction written in Xhosa so that the community can initially interact with books in their mother tongue. The books will cater for foundation phase learners, primary and secondary school learners, and also accommodate adult readers.
As part of the NPO’s belief in the power of partnerships of all sizes, Nomkhubulwane Development Projects has already secured books from the National Library of South Africa which will be delivered on completion of the library building structure. Book donations have also come from National Book Week (a South African Book Development Council initiative) and publisher, Jacana Media. In addition, the team will work with a librarian based at UNISA in establishing the library while the local office of the Library and Information Association of South African will assist with further insights into establishing and operating a library.
Along with the completion of the roof, January also saw donations for the construction of shelves. The next step is the plastering of the walls, ceiling material, painting of the walls and electrification of the building.
A new crowd-funding campaign has also been launched, to enable South Africans to get involved. Donations of over R1000 will be engraved on a plaque that will be placed on the wall by the entrance. You can donate here https://www.backabuddy.co.za/champion/project/community-library
“We have a team of capable and dedicated change agents who are passionate in empowering the rural community in which we exist,” concludes Ndlovu. “We are confident that this initiative will not only contribute now but also to future generations.”
For media interviews and enquiries or access to high res pics please contact JT Communication Solutions – email@example.com or (011) 788 7632
Issued and Supported by JT Communication Solutions powered by Mindshare and ECAfrica
We were born in Asia in 1997, a WPP start up with a desire to change the media world. Now we are a global network with 116 offices in 86 countries and billings of $16.5bn. We are the largest agency in GroupM, WPP’s Media Investment Management arm, which is the #1 media holding group globally with billings of $45.1bn (Source: COMvergence 2018). We aim to be our clients’ lead business partner, to grow their business and drive profitability through adaptive and inventive marketing. We do this through speed, teamwork and provocation because in today’s world everything begins and ends in media. We create new things and have fun doing it.
Visit us at www.mindshareworld.com and follow us on Twitter @mindshare and facebook.com/mindshare and LinkedIn.com/company/mindshare.
GroupM is the world’s leading media investment company responsible for more than $45B in annual media investment through agencies including Mindshare, MediaCom, Wavemaker, Essence and m/SIX, as well as the outcomes-driven programmatic audience company, Xaxis. GroupM creates competitive advantage for advertisers via its worldwide organization of media experts who deliver powerful insights on consumers and media platforms, trading expertise, market-leading brand-safe media, technology solutions, addressable TV, content, sports and more.
Entrepreneur Connect Africa #ECAfrica, is founded and powered by JT Communication Solutions to use digital disruption as a positive enabler to support entrepreneurship. We are a movement of entrepreneurs driven by shared business challenges and experience, with a desire to impact change and birth solutions that will positively drive entrepreneurship for African entrepreneurs in a global market.
Launched in 2014 as an online conversation to test how we can build digital ecosystems to connect with African entrepreneurs. This is a progression that is organically growing and shows that the ecosystem is evolving from a highly reactive networking and grounding itself as a proactive movement through the strength of the collaborative network where entrepreneurs can :-
About JT Comms
JT COMMUNICATION SOLUTIONS is a dynamic, 100% black owned media agency established in 2004, rooted in Africa with a global reach. The agency’s core business offering includes media relations, publicity, communications, reputation management, crisis communication, event and marketing solutions amongst others.
JT Comms continues to constantly evolve, remain organic and successfully scale its operations to a 360-degree digital agency and is a conduit in producing effective and relevant African content that’s definitive and packaged for digital penetration. The agency has launched new innovations such as hosting “Business Master Classes” and launching an online TV station, which hosts diverse projects such as ECAfrica, Bunnies in the Burbs and Amplifying African Excellence. JT Comms significantly differentiates itself from its competitors by being relevant and providing tailored solutions and a resource for media players in sourcing African content. @jtcomms - www.jtcomms.co.za | <urn:uuid:d20c86ae-79bd-4699-84e3-74c10c32ba71> | CC-MAIN-2022-33 | https://jtcomms.co.za/funding-boost-helps-construction-of-community-driven-novulakuvaliwe-library/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570977.50/warc/CC-MAIN-20220809124724-20220809154724-00477.warc.gz | en | 0.942978 | 1,600 | 1.742188 | 2 |
Orange Corners is an initiative of the Kingdom of The Netherlands that provides young entrepreneurs across Africa and the Middle East with the necessary training, mentorship, network, funding and facilities to start and grow their businesses. Specific focus is given to entrepreneurs creating innovative and sustainable solutions to local challenges and contributing to the UN Sustainable Development Goals. We partner with various stakeholders, including local, Dutch and international companies, universities, governments and other organisations. By using their local expertise, we can optimally support and strengthen the entrepreneurial ecosystem.
Orange Corners Nigeria invites applications for her 2021 edition of incubation programme for young entrepreneurs and start-ups in Lagos, Nigeria.
Are you a Nigerian young person, between the ages of 18 – 35? Have you seen a problem or issue that is really just an opportunity? Do you have an idea or solution that you are not quite sure how to articulate or implement but you’re passionate about and willing to see it through?
The program cost has been covered as scholarships by the government of the Kingdom of the Netherlands and their private partners. Therefore, signing up is free.
Their ambition is to develop and strengthen the entrepreneurship ecosystem in Nigeria. This ecosystem should enable youth to develop their business concept and become successful entrepreneurs, by providing them with the necessary opportunities, skills and access to markets.
The 3rd cohort of the Orange Corners Nigeria Incubation programme begins February, 2021.
There is a variety of benefits the program will offer you of which the most important ones are:
- Enterprise Management Training.
- Business Incubation & Advisory Services.
- Funding for prototype development & testing.
- Mentorship & Coaching
In order to meet the selection criteria you must be:
- Be an aspiring entrepreneurs from Lagos, Nigeria.
- Be between 18-35 years old.
- Have a validated innovative business concept, not more than <2 years old.
- The product or service responds to a local challenge in Nigeria.
- The product or service relates to the Sustainable Development Goals.
Budding entrepreneurs will be selected based on the:
- Social Impact.
- Clarity of Market.
- Sustainability & Scalability of the business idea.
- Competence of the entrepreneur/team.
What to Learn more about the programme?
Application Deadline: January 26th 2021 | <urn:uuid:32c53d12-420c-4a48-a528-b6ce33d539e2> | CC-MAIN-2022-33 | https://utibeetim.com/orange-corners-nigeria-incubation-programme-2021-for-young-entrepreneurs/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00072.warc.gz | en | 0.914834 | 501 | 1.703125 | 2 |
April 22, 2013 marks the fifth year since Clatsop Community Bank opened its doors in Seaside, Oregon. It remains the most recent Oregon-based bank to be chartered in the state. Founders of Clatsop Community Bank began raising capital for the proposed bank in 2007, just before the start of the recession. The bank opened in 2008 and has grown every year since, consistently logging the highest rate of growth among all banks in the Clatsop County market
. Today, the bank holds $57 million in deposits and $64 million in assets, and employs 16 people.
"I'm encouraged by our ability to grow even during very adverse economic conditions," said President and CEO Steve Ferber. "It leaves me very optimistic about our future as the economy recovers."
A recent study of community banks that were chartered before 2001, published by the Federal Reserve Bank of St. Louis, suggests that the economic recession provided a "real-world stress test" of the community bank business model. The study also suggests that successful community banks of the future will likely have similar characteristics as those of community banks that performed well during the financial crisis — namely, commitment to the local community; patient ownership; frugality; competence in underwriting credit; and loyalty to the bank's roots and constituencies.
While Clatsop Community Bank, chartered in 2007, is too new to have been included in the study, it demonstrates similar characteristics as those of older community banks that endured the financial crisis.
"With consistent management and continued adherence to our business model, we look forward to what the next five years will bring," said Executive Vice-president Joe Schulte.
Both branches of Clatsop Community Bank will serve refreshments in the lobby on Monday, April 22 in celebration of the bank's fifth anniversary.
Clatsop Community Bank is the only bank locally owned in Clatsop County, with offices in Astoria and Seaside, Oregon. The bank was recently named among Oregon's 100 Best Companies to Work For by Oregon Business magazine for the fourth consecutive year. | <urn:uuid:069880f2-72b0-4549-8bfd-e4508fd8b63a> | CC-MAIN-2017-04 | http://www.kast1370.com/index.php?option=com_content&view=article&id=2575:community-bank-marks-fifth-anniversary&catid=17&Itemid=637 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00566-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.967956 | 421 | 1.539063 | 2 |
The Water Resources Research Institute (WRRI) at the University of the Virgin Islands (UVI) is one of the 54 water resources research institutes established at land-grant universities throughout the United States and its territories.
WRRI was established in 1973 and operates under the Water Resources Research Act of 1984 as amended by Public law 101-397. Like other water resources research institutes, it receives partial federal funding provided through the U.S. Geological Survey. Additional funding is provided by UVI and through contractual projects. WRRI is a part of the Research and Public Service component of the University. | <urn:uuid:e0a27bcb-3527-488f-90bc-ba00f47cc9e0> | CC-MAIN-2017-04 | http://www.uvi.edu/research/water-resources-research-institute/default.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280872.69/warc/CC-MAIN-20170116095120-00308-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.94211 | 122 | 2.078125 | 2 |
Only a small part of the intelligence budget is made public; the bulk of the overall intelligence spending is contained within the DoD budget. Spending for most intelligence programs is described in classified annexes to intelligence and national defense authorization and appropriations legislation. Members of Congress all have access to these annexes, but must make special arrangements to read them.
Jurisdiction over intelligence programs is somewhat different in the House and the Senate. The Senate Intelligence Committee has jurisdiction only over the NIP but not JMIP and TIARA, whereas the House Intelligence Committee has jurisdiction over all three sets of programs. The preponderance of intelligence spending is accomplished by intelligence agencies within DoD and thus in both chambers the armed services committees are involved in the oversight process.
Other oversight committees are responsible for intelligence agencies that are part of departments other than DoD. Most appropriations for intelligence activities are included in national defense appropriations acts, including funds for the CIA, DIA, NSA, the NRO, and NGA. Other appropriations measures include funds for the intelligence offices of the State Department, the FBI, and the Department of Homeland Security. In the past, defense appropriations subcommittees have funded the intelligence activities of CIA and the DoD agencies (although funds for CIA have been included in defense appropriations acts, these monies are transferred directly).
Intelligence budgeting issues were at the center of the debate on intelligence reform legislation in 2004. On one hand, there was determination to make the new Director of National Intelligence (DNI) responsible for developing and determining the annual National Intelligence Program budget (which is separate from the JMIP and TIARA budgets that are prepared by the Secretary of Defense). The goal was to ensure a unity of effort that arguably has not previously existed and that may have complicated efforts to monitor terrorist activities. On the other hand, the intelligence efforts within the National Intelligence Program include those of major components of the Defense Department, including NSA, the NRO, and NGA, that are closely related to other military activities.
Some Members thus argued that even the National Intelligence Program should not be considered apart from the Defense budget. After considerable debate, the final version of the Intelligence Reform Act provides broad budgetary authorities to the DNI, but requires the President to issue guidelines to ensure that the DNI exercises the authorities provided by the statute "in a manner that respects and does not abrogate the statutory responsibilities of the heads of the Office of Management and Budget and Cabinet departments."
Constructing the Intelligence Budget
During the late 1990s the Intelligence Community instituted fundamental changes in the way it managed its budget resources, and more changes are on the way. During the 1995-1999 Intelligence Program budget reviews, the Deputy Secretary of Defense (DepSecDef) and the Director of Central Intelligence (DCI) decided that the current intelligence budget structure should be modified to reflect changes in US intelligence since the end of the Cold War and to institute management efficiencies in a reduced fiscal environment. A new focus on the customer being served was clearly needed.
Concurrently, the House Armed Services Committee (HASC) in its FY 1994/1995 Defense Authorization report, directed the Secretary of Defense to consider a new set of funding categories for intelligence in the Defense budget. It specifically requested a report that identified intelligence programs and activities which supported:
- Primarily national purposes.
- Primarily defense-wide, theater activities and the Unified commands.
- Primarily a single Service or Agency.
As a result of the above direction, a general review was conducted of intelligence activities. Subsequently, the DepSecDef, with the concurrence of the DCI, approved establishment of the Joint Military Intelligence Program (JMIP) on June 1, 1994.
With this change, resources for US intelligence activities are now set forth in the:
- National Intelligence Program (NIP) [formerly the National Foreign Intelligence Program (NFIP)].
- Joint Military Intelligence Program (JMIP)
- Tactical Intelligence and Related Activities (TIARA) funding aggregation.
The NIP was established by several Presidential executive orders (EO 11905 in 1976, EO 12036 in 1978, and EO 12333 in 1981), and subsequently codified in the Intelligence Organization Act of 1992. The DNI is responsible for developing and presenting to the President an annual NIP budget for national intelligence activities.
JMIP provides a more structured approach to the management of intelligence activities in order to:
- Focus on joint, Defense-wide initiatives, activities, and programs that predominantly provide intelligence information and support to multiple Defense consumers.
- Bridge existing programmatic divisions across Service/departmental and national intelligence lines to provide more effective and coherent intelligence programmatic decisionmaking.
- Support military intelligence consumers, i.e., warfighters, policymakers, and force modernization planners.
TIARA was constituted more than a decade ago and defined to be an aggregation of Defense intelligence, reconnaissance, surveillance, and target acquisition programs that are outside the NIP and that:
- Respond to operational commanders' tasking for time-sensitive information on foreign entities.
- Respond to national Intelligence Community tasking of systems whose primary mission is to support operating forces.
- Train personnel for intelligence duties.
- Provide an intelligence reserve.
- Are devoted to research and development of intelligence or related capabilities.
National Intelligence Program
The NIP is comprised of all programs, projects, and activities of the Intelligence Community designated jointly by the Director of Central Intelligence and the head of a United States department or agency, or by the President. Excluded are those portions of the Defense budget that are set aside for TIARA and JMIP.
Programmatically, the NIP incorporates all national-level intelligence, counterintelligence, and reconnaissance activities of the Central Intelligence Agency, the Department of Defense, and all civilian federal agencies and departments, as well as the Intelligence Community management structure. The NIP is comprised of two major components: national level intelligence programs within the Defense Department and those in federal departments and agencies outside the DoD:
- General Defense Intelligence Program (GDIP).
- Consolidated Cryptologic Program (CCP).
- DoD Foreign Counterintelligence Program (FCIP).
- National Geospatial-Intelligence Agency Program [NGAP] [formerly National Imagery and Mapping Agency Program [NIMAP] and initially Central Imagery Office Program (CIOP).
- National Reconnaissance Program (NRP).
- Special Activities, Navy Program (SpN).
- Central Intelligence Agency Program (CIAP).
- Department of State, Bureau of Intelligence and Research (INR) Program.
- Department of Justice, FBI Foreign Counterintelligence Program (FBI FCIP).
- Department of Treasury, Office of Intelligence Support Program.
- Department of Energy, Foreign Intelligence Program.
- Central Intelligence Agency Retirement and Disability System (CIARDS).
Community-wide NIP program
- Community Management Account (CMA).
The programs above are not organizations, but structures that manage resources for intelligence operations and activities. Organizationally, the NIP provides funding for the Central Intelligence Agency, an independent agency; a number of foreign intelligence and counterintelligence elements attached to the Department of Defense; and foreign intelligence and counterintelligence elements of the Department of State, Department of Energy, Department of Treasury, and the Federal Bureau of Investigation.
The component programs of the NIP are independently managed by officials known as program managers. They receive policy and fiscal guidance from the Director of National Intelligence and submit their individual budgets to the DCI through the Community Management Staff (CMS). Once they have been approved by the DNI, the ODNI consolidates them into a single NIP budget that is submitted to the Congress as a part of the President's budget. During execution, military and civilian organizations expend funds approved by the Congress, with the ODNI monitoring these expenditures and the DCI approving and managing requests for reprogramming of funds into, within, and out of the NIP.
Joint Military Intelligence Program
In light of the need for better integration of intelligence capabilities within a joint structure, the JMIP was established in Defense to:
- Provide efficiencies in management of programs and activities.
- Align decision authority with the customer served.
- Promote integration of NIP and Defense Intelligence by establishing single program managers wherever possible-across NIP and Defense Intelligence programs and activities.
JMIP was initially composed of four programs:
- Defense Cryptologic Program (DCP). Defense-wide cryptologic activities outside the NIP. Program manager: Director, NSA.
- Defense Imagery Program (DIP). Defense-wide imagery programs outside the NIP. Program manager: Director, CIO. [now under National Geospatial-Intelligence Agency Program [NGAP]]. ]
- Defense Mapping, Charting, and Geodesy Program (DMC&GP). Defense-wide MC&G activities. Program manager: Director, DMA. [now under National Geospatial-Intelligence Agency Program [NGAP]]
- Defense General Intelligence and Applications Program (DGIAP). For this program, the Director, DIA is the Program Coordinator for five Defense component programs. Each component focuses on a certain key area of joint support. The Program Coordinator works with each component to best integrate and utilize available resources. Further, the Program coordinator is the principal interface with the other JMIP, NIP, and TIARA program activities for the DGIAP. The component programs include:
- Defense Intelligence Agency Tactical Program (DIATP); Program manager: Director, DIA
- Defense Intelligence Special Technology Program (DISTP); Program manager: Deputy Assistant Secretary of Defense (Intelligence & Security)
- Defense Airborne Reconnaissance Program (DARP); Program manager: Director, Defense Airborne Reconnaissance Office [DARO was abolished in 2000, and it is not clear how this program is currently managed]
- Defense Space Reconnaissance Program (DSRP); Program manager: Director, NRO
- Defense Counterdrug Intelligence Program (DCIP); Program manager: Deputy Assistant Secretary of Defense (Drug Enforcement Policy and Support)
Each of the above programs currently consists of former TIARA or selected NIP programs (such as the U-2 and other airborne reconnaissance aircraft that were transferred to Defense due to realignment of general program responsibilities agreed to by the DepSecDef and the DNI) whose primary customer base was judged to be multiple Service, or Defense-wide.
Tactical Intelligence and Related Activities
TIARA is comprised primarily of many separate intelligence or intelligence-related capabilities that are essential for tactical operations conducted by the military forces of a single Service. Originally, the principal reason for aggregating these accounts was to identify those portions of the Defense budget to the Congress that specifically supported intelligence and intelligence-related activities outside the NIP. Today, it is more important to account for all intelligence capabilities on the battlefield in order to ensure that commanders at all levels can readily draw upon intelligence in times of crisis or conflict. Since many of the timely collection and exploitation capabilities are at the tactical level, it is essential that they be included in overall planning and programming which addresses national, theater/joint, and tactical support needs.
TIARA programs are designed, built, and/or operated by the Military Services and compete for funding with all other Service combat and combat support programs. As such, there is no resource "fence" placed around TIARA; rather they compete within the overall resource top line provided to the Service by the Department. It should be noted that the intelligence-related programs of the Advanced Research Projects Agency are also included in the TIARA aggregation due to the focus on Service tactical needs. Likewise, Special Operations Command (SOCOM) is included in TIARA rather than JMIP.
There is no single program manager for TIARA. Each Service uses its own management structure in overseeing and implementing TIARA efforts. TIARA is thus highly decentralized as compared to the NIP and the JMIP. This allows the Services greater flexibility in meeting and balancing their needs and responsibilities for supporting tactical operations.
The Under Secretary of Defense for Intelligence monitors, oversees, and coordinates TIARA activities for the Department. In certain areas, such as inter-operability of systems or information exchange, implementing standards are issued so that critical support can be provided across Service/joint command boundaries. Further, the USD(I) is responsible for recommending programmatic changes as part of his overall responsibilities within the Department's Planning, Programming, and Budgeting System (PPBS) process. However, there is no single program manager or program executive specifically for TIARA capabilities.
In summary, the composition of TIARA has changed significantly. While still based on the definition created over a decade ago, its focus under the recent reorganization of intelligence programs is on integral capabilities of the tactical commander. Through this realignment, the Department of Defense believed that much greater effectiveness will be achieved, and the Services/Defense Agencies can better focus on specific customers to meet their needs.
Department of Homeland Security [DHS]
The creation of the Department of Homeland Security [DHS] has further complicated the already complex challenge of understanding the intelligence budget. The DHS intelligence budget is probably in the range of $10 million, but if there was a desire to puff up the number, a number in the range of $1 billion could probably be aduced without breathing too hard.
Although the DHS budget is not classified, as is that of the rest of the intelligence community, it is a very dark shade of grey. For such a large agency, with a total budget of over $40 billion, the FY2005 budget request ran to only 64 pages, or about one and a half pages per billion dollars. In contrast, the FY2005 NASA budget request of $15 billion was supported by 378 pages of justification, or 25 pages per billion dollars.
There a total of 22 instances of the word "intelligence" in the sparse 64 pages of the DHS budget request, but it is far from self-evident whether these activities constitute part of the intelligence budget managed by the Director of Central Intelligence. Of the constituent agencies of DHS, only the Coast Guard intelligence budget would have been under the perview of the DCI prior to the formation of DHS. Many other agencies performed inteligence-like activities, but they were not part of the budget constructs under the DCI's supervision, nor is there any indication that they are now.
The U.S. Coast Guard is one of the five armed services of the United States and an agency within the Department of Homeland Security. The FY2005 funding request increases intelligence capacity and provides Coast Guard Maritime Safety and Security Teams underwater detection capability.
DHS is composed of five Directorates, one of which (the Information Analysis and Infrastructure Protection, IAIP, Directorate) is a member of the Intelligence Community. IAIP's mission to disseminate information analyzed by the Department to State and local government agencies and authorities and private sector entities brings to the post 9/11 federal government a capability for the security and protection of the nation's domestic assets that did not previously exist.
The DHS Information Analysis and Infrastructure Protection (IAIP) Directorate merges the capability to identify and assess a broad range of intelligence and information concerning threats to the homeland, to map threats against the nation's vulnerabilities, to issue timely warnings and advisories, and to recommend and take appropriate preventative and protective actions against any threats. IAIP has been generating information and intelligence requirements to support the DHS Intelligence and Warning and Threat Analysis functions. The Directorate is developing and maintaining DHS all-source information needs, as tasking or guidance to the intelligence community, law enforcement community and the private sector. The FY 2005 budget request was $865 Million, but it is difficult to imagine that this is all counted as part of the intelligence budget.
As the largest investigative arm of the Department of Homeland Security, US Immigration and Customs Enforcement (ICE) brings a unified and coordinated focus to the enforcement of federal immigration laws, customs laws, and, as of November 2003, air security laws. Investigations is responsible for investigating a range of domestic and international activities arising from the movement of people and goods that violate immigration and custom laws and threaten national security. Responsibilities also include the collection, analysis, and dissemination of strategic and tactical intelligence data in support of ICE and DHS.
The Transportation Security Administration (TSA) security focus is on identifying risks, prioritizing risks, managing risks to acceptable levels, and mitigating the impact of potential incidents. Sharing of information among agencies and stakeholders - including intelligence information - is a cornerstone of the risk management model. TSA continues to serve as the liaison for transportation security to the intelligence community and the intelligence sections of law enforcement agencies.
|Join the GlobalSecurity.org mailing list| | <urn:uuid:5a096df6-094a-4246-b63c-415c6212f6da> | CC-MAIN-2022-33 | https://www.globalsecurity.org/intell/library/budget/intro.htm | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00467.warc.gz | en | 0.934864 | 3,454 | 2.328125 | 2 |
Here we go with a list of… lists. This year we rounded up some of our favourite tech, tools, techniques and more – and now you can see all our favourites in one place. These are perfect for any musician looking to get insights on the best tricks and tips in the industry. If you’re after an extensive introduction into the world of Music Production & Sound Engineering or DJing, you can check out our full range of courses.
Plus, if you’re interested in learning how to make music like a pro, our online courses are jam-packed with this kind of content. To help you do this, we’re currently offering 25% off our selected online and LA and London practical courses until 31st December using the codes ONLINE25, LA25 and LONDON25.
Over the last decade, there has been an uplift in the number of tools and techniques DJs can use to play the tracks they love, organise their sound libraries and push their mixes to the next level. So, to give you an insight into the range of different softwares and apps that are readily available, we have rounded up some of the best DJ apps. Check them out below and take your pick – many of these are even free to use!
Over the last decade, autotune has evolved from a subtlety producers and engineers use to alter vocals and correct out of tune notes to a full-blown identity for certain musicians. Now, predominantly used in the realms of trap and left-field pop music, fans will even be able to identify an artist just by the way their distinct autotune sounds.
It’s been one of the most difficult years on record for a lot of us – especially if you’re a DJ or musician trying to finesse the pandemic. In this list, we cover a number of tips on how you can keep your mental health in check, even when the going gets tough. Here’s to 2021 – let’s look forward to being able to gig and make more music together.
If you’re feeling inspired by these tutorial videos, why not check out our Intro to Music Production course where you can get to grips with Ableton Live 10 and Logic Pro X? If you’ve mastered the basics already but want to brush up on your skills you should definitely consider enrolling on one of our highly-acclaimed Music Production & Sound Engineering Degrees. Production not your thing? We offer a range of different courses and degrees including DJ Courses, Singing & Songwriting Courses, Radio Courses, Music Industry Courses and more. Take your pick!
Register to Access Free Courses, Plugins, Projects, Samples & More
When you register with Point Blank, you access an array of free sounds, plugins, online course samples and much more! Simply register below and visit our Free Stuff page to get your hands on a range of exclusive music-making tools and tutorials provided by the team. Fill your boots!
This post is included in News, Round-ups | <urn:uuid:0f26b548-6a64-416a-9515-3e4d3a761465> | CC-MAIN-2022-33 | https://plus.pointblankmusicschool.com/top-3-round-ups-2020/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00066.warc.gz | en | 0.929282 | 628 | 1.625 | 2 |
McClane v. Boon
Annotate this Case
73 U.S. 244 (1867)
- Syllabus |
U.S. Supreme Court
McClane v. Boon, 73 U.S. 6 Wall. 244 244 (1867)
McClane v. Boon
73 U.S. (6 Wall.) 244
1. Where, pending a writ of error to this Court, subsequently dismissed, the defendant in error dies and the other side wishes to take a new writ, application should be made to the court below for the purpose of reviving the suit in the name of the representatives of the deceased. A writ of error can then regularly issue. A motion in this Court to revive the writ by suggesting the death and substituting the representatives as parties to the record is not regular.
2. If the court below should refuse an application such as that above contemplated, in the circumstances mentioned, then the writ may, from necessity, issue in the name of the representatives, in the usual way, serving on them the citation to appear at the next term.
On motion. Boon filed a bill in a state court of Oregon against McClane, to enjoin him from prosecuting an action at law to recover the possession of a lot of land for which a patent had been issued to McClane by the United States, and praying that the same might be held by McClane as trustee for the benefit of him, Boon. The court dismissed
the bill. On an appeal to the Supreme Court, that court reversed the decree, and rendered one for the plaintiff. McClane, the defendant, sued out a writ of error from this Court to the Supreme Court of Oregon, returnable December Term 1863, which was dismissed at the December Term 1866.
A second writ of error was issued July 29, 1867, returnable at the next term of the Supreme Court of the United States. On the 15th June, 1864, pending the first writ of error, Boon, the defendant in error, died.
Mr. Lander now made a motion, having for its object to revive the writ of error, by suggesting the death of Boon, and substituting the widow and heirs-at-law as parties to the record.
The parties described in the present writ of error, it will be observed, were the parties to the original suit, and the writ, therefore, was issued in the name of a dead man. | <urn:uuid:cdbf5d0e-af5c-4ba4-ae0a-8e67bd97806e> | CC-MAIN-2016-44 | https://supreme.justia.com/cases/federal/us/73/244/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721008.78/warc/CC-MAIN-20161020183841-00116-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.966114 | 511 | 1.515625 | 2 |
Aarnio studied at the Institute of Industrial Arts in Helsinki, and started his own office in 1962. The following year, he introduced his Ball Chair, a hollow sphere on a stand, open on one side to allow a person to sit within. The similar Bubble Chair was clear and suspended from above. Other innovative designs included his Pastil Chair (a beanbag-like molded armchair), and Tomato Chair (a seat molded between three supporting spheres). His Screw Table, as the name suggests, had the appearance of a flat head screw driven into the ground. He was awarded the American Industrial Design award in 1968.
Aarnio's designs were an important aspect of 1960s popular culture, and could often be seen as part of sets in period science-fiction films. Because his designs used very simple geometric forms, they were ideal for such productions. Eero Aarnio continues to create new designs, including toys and furniture for children. Eero Aarnio opened his official webshop and first Design Eero Aarnio Showroom, in Helsinki. There you can find Aarnio`s latest design, prototypes and latest news.
- "Eero Aarnio". Scandinaviandesign.com. Retrieved 2010-05-12.
- "A10905 Armchair, 'Pastilli', moulded fibreglass reinforced polyester, designed by Eero Aarnio, made by Asko Finnternational, Finland, 1968 - Powerhouse Museum Collection". Powerhousemuseum.com. 2009-01-22. Retrieved 2010-05-12.
- "Pionier des Kunststoffdesigns – Fakten über Eero Aarnio". www.eero-aarnio.com. Retrieved 2011-07-04. | <urn:uuid:14091155-fbab-432c-bbc3-d22bdd1ed9fb> | CC-MAIN-2016-44 | https://en.wikipedia.org/wiki/Eero_Aarnio | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721558.87/warc/CC-MAIN-20161020183841-00045-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.941473 | 367 | 1.773438 | 2 |
The below is a list of steps to start an EV charging station business.
1) Determine your EV charging station business location
- The location should be easily accessible and have a lot of traffic for potential customers.
- Near residential communities that have a high density of electric car ownership.
2) Assemble a team
- Partner with a property management company to deal with leasing and maintenance of the property for your EV charging stations.
- Work closely with local utilities and governments, as electric supply can vary by region or country.
3) Gather resources and financing
- Identify the capital you’ll need to start your business – this will include all equipment, startup costs, real estate fees, licenses, permits, insurance rates, etc.
What is an EV Charging Station?
An EV charging station is a facility that supports electric vehicles by providing them with charging points, which are usually strategically placed at supermarkets, shopping centers, and public areas.
EV drivers can recharge their vehicles quickly and conveniently. These charging stations also help reduce the rate of CO2 emissions by reducing fossil fuel consumption.
Electricity-powered vehicles have been around for a while now but they still face a number of setbacks in terms of manufacturing costs, battery performance, and environmental sustainability. However, as the world becomes more environmentally conscious and as battery costs go down, it is likely that we will begin to see an increase in their popularity as an alternative to petrol-powered cars.
Why is an EV Charging Station Important?
With more people driving electric vehicles, it is inevitable that there will be a need for more charging stations.
Some people may not think that an EV charger is necessary, because they may find it easier to just charge their car at home. However, many people who use public charging stations also keep a charger at home so that they can plug it in when they are at work or out of the house.
Ways to make Profit with Charging Station Business
The charging station business is a booming market with a lot of potentials. The prices of electric cars are going down, and more people are buying them. As a result, the demand for charging stations will increase as well.
Here are some ways you can make a profit from your charging station business:
- You can buy vacant land and build a charging station on it
- You can rent out parking spaces at an airport
- You can charge people to have their car charged, for example, they might have to pay an extra fee for recharging their car at night.
- You could lease out space in your garage or house as a charging station
Investment Requirements for Starting an EV Charging Station
The most important requirement for starting an EV charging station business is the location. The location can be a deal-breaker for any aspirant business owner.
There are three main types of charging stations: Level 1, Level 2, and Level 3. The first two are both home chargers that usually use 240-volt standard household current or 208-volt direct current respectively. The third type of charger is typically used at public locations like cafes and shopping centers where it may offer up to 50kW of power with plans for upgrades in the future.
The 4 Steps of the Process to Get Started
Despite the myths, there is a profitable future in EV charging.
The 4 layman steps of the process to get you started with EV charging station business right away are:
1) Assess your needs
- Find out what your hourly electric bill is
- Determine if the electricity you are using is renewable or non-renewable
- If non-renewable, find out how much you are spending on gasoline
- Determine if you are eligible for rebates for EV charging stations
A typical EV charging station will have multiple plugs for different types of electric vehicles to plug in and charge their batteries at once. These stations are generally placed near restaurants, malls, parks, etc., where drivers may want to spend time during long waits for their car’s battery pack to recharge before driving off.
3) Find customers
The electric vehicle market is booming and with it comes the increasing need for people to find places to charge their cars. The number of public charging stations is on the rise globally but there are still shortages in some cities. This leaves many drivers with no choice but to hunt down a parking space that can accommodate their electric vehicles.
The best way to replenish this shortfall is by targeting these drivers with your services which offer more convenience and privacy for people who own an electric vehicle.
Find new customers by presenting your selling points in a way that will resonate with this niche of customers – privacy and convenience when it comes to public chargers
4) Partner up with knowledgeable individuals
There are a lot of people who can know about the EV charging industry and be good partners. These people might be on the board of directors for a company, or they might work for an advisory firm. They may even work in public relations and be able to help you get your name out there.
Finding these partners can be done through networking events, conferences, and online forums. The important thing is that you need to find someone who knows about the EV charging industry and has similar needs as yours.
The scope of the EV charging station business is tremendous. The EV charging business is thriving with a forecasted $6.2 billion in revenue by 2021.
What are your thoughts?
Do write in the comment section below. | <urn:uuid:4a46e135-cbcc-46a2-9a42-d8f8806fd9ab> | CC-MAIN-2022-33 | https://www.matsonelectrical.co.uk/how-to-start-an-ev-charging-station-business/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00466.warc.gz | en | 0.964571 | 1,133 | 2.34375 | 2 |
Neptune.jpg 2,673pages on this wiki Add New Page Edit History Talk0 No higher resolution available. Neptune.jpg (240 × 215 pixels, file size: 9 KB, MIME type: image/jpeg) About File History Metadata The Neptune. Source Pirates of the Caribbean PocketModel game Appears on these pages of Neptune The Neptune was a Pirate ship. With 48 cannons in total, they prefer to battle the East India... See full list > Appears on these wikis of File:Scr00017.jpg Romanum Wikia REDIRECT File history Click on a date/time to view the file as it appeared at that time. Date/TimeThumbnailDimensionsUserComment current14:00, November 13, 2007240 × 215 (9 KB)Wanderingshadow (wall | contribs) Metadata This file contains additional information, probably added from the digital camera or scanner used to create or digitize it. If the file has been modified from its original state, some details may not fully reflect the modified file. Camera manufacturer NIKON CORPORATION Camera model NIKON D100 Exposure time 1/8 sec (0.125) F Number f/25 Date and time of data generation 18:31, September 12, 2007 Lens focal length 105 mm Orientation Normal Horizontal resolution 72 dpi Vertical resolution 72 dpi Software used Adobe Photoshop CS2 Macintosh File change date and time 10:21, September 19, 2007 Y and C positioning Co-sited Custom image processing Normal process Exposure mode Manual exposure White balance Manual white balance Digital zoom ratio 1 Focal length in 35 mm film 157 mm Scene capture type Standard Contrast Normal Saturation Normal Sharpness Hard Subject distance range Unknown Exposure Program Manual Exif version 2.2 Date and time of digitizing 18:31, September 12, 2007 Image compression mode 4 Maximum land aperture 3.3 APEX (f/3.14) Metering mode Pattern Light source Daylight fluorescent (D 5700 – 7100K) Flash Flash did not fire DateTime subseconds 10 DateTimeOriginal subseconds 10 DateTimeDigitized subseconds 10 Color space Uncalibrated Sensing method One-chip color area sensor Read more Fortune Hanyu Pinyin HMS Diamond Retrieved from "http://pirates.wikia.com/wiki/File:Neptune.jpg?oldid=22249" Ad blocker interference detected! Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected. | <urn:uuid:045993ef-3a02-4a33-aebd-4cd0c202d9ff> | CC-MAIN-2017-04 | http://pirates.wikia.com/wiki/File:Neptune.jpg | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00537-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.795462 | 550 | 2.296875 | 2 |
Osteoarthritis develops in a horse's hock when the cartilage in the joint breaks down. Normally, the cartilage keeps the two major bones of the horse's leg from rubbing against each other, but in an arthritic horse, the cartilage is replaced by new bone. This leads to stiffness, lameness and loss of flexibility. There are several exercises you can do with your horse to cope with its arthritis.
Before you exercise your horse, do some leg stretches for the animal. Take its leg in your hand and pull it forward until you feel the horse resist. Then push the leg up towards its belly as far as you can. Finally, pull the leg back as far as it will go. Hold the leg in each position for about 15 seconds. Gradually pull it slightly farther in the direction of the stretch as you hold it there. Try to do this every day. Just like humans, horses will better overcome their arthritis if they stretch consistently. Talk to your veterinarian about arthritis-relieving injections or supplements, like Legend or Cosequin, which can make these stretches more effective.
Turn your horse out to pasture instead of keeping it in a stall. This will allow it to walk and graze, rather than staying in one place for long periods. Movement -- even leisurely movement -- is much more beneficial for an arthritic horse than standing still. In fact, a lack of movement will actually worsen a case of arthritis. In a paddock or a pasture, the horse will have soft ground, which will take pressure off its joints, preventing further damage. In addition, it will be able to take slow steps, which compresses and releases the joint, keeping it healthy. Keep your horse inside only if the weather is very cold, as cold temperatures make arthritis worse.
Walk in Hand
Put a halter and lead rope on your horse and walk it around the barn or in an arena. Sometimes, when horses age, they get a little lazy, so they may need some encouragement to walk around. Walking is extremely beneficial for arthritis. It increases circulation, warms up the horse's body and encourages the release of joint lubrication. This prevents further stress on the joints and halts the advance of arthritis. It also helps the horse overcome existing damage by decreasing the pain of arthritis.
You may think that your horse will not be able to handle a ride if it has arthritis. It's true that it might not be able to race cross country or turn on a dime around a barrel, but it can still benefit from a ride with targeted exercises. Warm your horse up with a five-to-10 minute walk, then ask it to do some lateral movements, such as leg-yields. Increase the speed of your walk, then slow it down. Turn your horse in gradually smaller circles. Walk and trot over ground poles. These movements will encourage your horse to bend its legs in different directions, which will help loosen its joints and keep its arthritis in check.
- Photo Credit horse image by Penny Williams from Fotolia.com
How to Treat Horses With Hock Swelling
Applying cold water with a water hose directly on the swelling for several minutes is an easy and inexpensive way to treat...
Exercises to Relax & Strengthen the Horse's Back
The horse's back is not designed to carry a person, and asking it to carry a saddle and rider adds considerable weight...
Signs & Symptoms of a Horse Having Hock Problems
The hock is the large joint in the middle of horses' hind legs. This joint is similar to the ankle in people...
The Best Exercise Equipment for Arthritis
The best exercise equipment for arthritis is free motion pieces with cables, which allow the user to move the body and increase...
Warming Up Horses for Stretching
Lunging a horse is one of the best ways to warm up your horse for stretching. Learn more about how to warm... | <urn:uuid:527a161e-72fb-4f98-b8ca-233f349c9c39> | CC-MAIN-2017-04 | http://www.ehow.com/list_7840566_exercise-routines-arthritis-horses-hock.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281151.11/warc/CC-MAIN-20170116095121-00114-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.940417 | 810 | 3.03125 | 3 |
Sometimes while using the USB drive on your computer or laptop you may forget to remove it before you shutdown your computer.This can lead to a number of issues with your USB drive. You may also forget your USB drive with all your important data at any public place if you are using a computer at a public place. Today I have got an application for you named USB Guard which will notify you before shutting down your system and your USB drive or any external drive is still plugged in.
The application is very small and simple and does an important task to inform you about the USB drive before shutting down the system.The application doesn’t require any installation which means that you can even run it on the public computer. If you will shut down the computer and you get the notification about the USB drive that is plugged in the computer you can remove the USB drive form the computer using Safety Remove hardware option present in the system tray. After removing the USB drive successfully from the system you can use the power options present in the popup window to take the required action with the computer. The software will always be present in the system tray to monitor your USB drives. The software is designed to work with Windows XP, Windows Vista and Windows 7.
The USB Guard is an application which after being installed will sit in the system tray. The application will open the above pop up menu on right clicking the USB Guard icon in the system tray. The pop up menu will have options like Monitor the presence of these drives, Autostart with Windows, Check for updates, Check for updates at startup, Donate, Facebook Page, About and Exit. Out of all these options Autostart with Windows and Check for updates at startup are checked by default. The Monitor the presence of these drives option has options like USB Flash Drives, F: [Flash Drive], Hard Drives(i.e External). Autostart with windows option is checked by default due to which the software will launch every time you will start you system automatically. Check for updates options will check for any updates available for the software. Check for updates at startup option will be used in case you want to update your software to automatically check for updates as your system starts .
The above window will open as the notification window when you will try to shut down your computer with your USB drive still plugged to it. The window has options like Shutdown, Standby, Hibernate and Restart. | <urn:uuid:9dafbda3-9797-4cb4-a4b2-310330e1e01d> | CC-MAIN-2017-04 | http://www.troublefixers.com/never-forget-pen-drive-connected-to-a-pc-after-shutdown/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279489.14/warc/CC-MAIN-20170116095119-00010-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.914621 | 492 | 1.570313 | 2 |
'Today', tomorrow, and the next day: We'll keep pushing against inequities
Last Wednesday, when we first noted the fact that NBC's "Today" is using a gender-specific application for their "Modern Love" wedding application, we never thought it would tun into such a thing. We had assumed that same-sex couples were allowed to apply, and that the "bride" and "groom" specific terms were merely a mistake that'd be remedied by acknowledgment.
But as you might have already heard: It turns out the same-sex couples *are* shut out of this year's contest, since we gay folk cannot legally marry in NYC (even if our marriages are recognized there). The show says that budget cuts force them to hold the televised ceremony at their Rockefeller Center studio (shutting out nearby CT or other marriage-allowing jurisdiction), and that the marriage must be legally-recognized (shutting out a commitment ceremony).
This doesn't sit well with us. It also doesn't sit well with our pals at GLAAD, who've taken our initial posting and ran with it in the way that a national, fully-financed group can and should. Take action:
Gay and Lesbian People Need Not Apply: Call on NBC to Stop Today Show’s “Modern Day Wedding Contest” from Denying Gay and Lesbian Couples the Right to Participate
NBC sent GLAAD this statement regarding the 2010 Modern Day Wedding Contest:
“For the TODAY show wedding, the couple must be able to be legally married in New York, which is where the wedding will take place."
This is not a valid argument since New York State legally recognizes same-sex marriages licensed in other states. Same-sex couples can now legally obtain marriage licenses in Iowa, Connecticut, Massachusetts, Vermont, New Hampshire and Washington D.C. NBC is mistakenly equating the marriage license with the wedding celebration. Same-sex weddings are entirely legal in New York State. As long as the marriage license is conferred upon the same-sex couple by another state, New York State recognizes the marriage as a fully valid and legal one. NBC’s exclusion of same-sex couples from its contest is not motivated by the law, but bias against these couples.
The Today Show is awarding a wedding celebration, not a marriage license. If a same-sex couple won the contest, producers and the winning couple could easily work together to ensure that the couple properly obtained and complied with the requirements of a marriage license in one of the license-conferring jurisdictions. The full wedding celebration would then take place on the Today Show. Given these legal realities, GLAAD has urged NBC to amend its contest rules and allow same-sex couples to apply.
TAKE ACTION NOW [GLAAD]
**SEE ALSO: A Facebook effort
***UPDATE, 7/8: VICTORY!
comments powered by Disqus | <urn:uuid:9ec84096-ba37-4319-9a38-8040b1cbdfd9> | CC-MAIN-2017-04 | http://www.goodasyou.org/good_as_you/2010/07/today-tomorrow-and-the-next-day-well-keep-pushing-against-inequities.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283301.73/warc/CC-MAIN-20170116095123-00508-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.952975 | 601 | 1.828125 | 2 |
Online cognitive behavioral therapy may treat a wide range of psychological issues, including Obsessive Compulsive Disorder (OCD), bipolar disorder, social phobias and panic attacks. Online cognitive behavioral therapy techniques may help manage depression and anger as well. Most online cognitive behavioral therapy treatments involve a comprehensive program, typically conducted in several online sessions. Some types of online cognitive behavioral therapy will allow the individual to utilize worksheets that track his progress.
As an alternative to traditional cognitive behavioral therapy conducted in person, the online method offers the convenience of participating from the privacy of one's home. Behavioral therapy conducted online also allows a person to proceed at his own pace. Online behavioral therapy generally offers the feedback and assistance of an online therapist. The goal is to help the individual modify his behavior in an effort to overcome his problems.
Anger management is a type of online cognitive behavioral therapy that may benefit those with anger issues. This program may include tests that help identify the cause of anger. As a result, the individual is able to redirect negative anger into constructive behavior. The online therapy will also teach self-help techniques in dealing with anger.
Couples who experience marriage or relationship difficulties may find that online cognitive behavioral therapy helps bring them closer. This type of therapy can help a couple modify behavior that is detrimental to a relationship. By participating in an online program, couples can find solutions in a discreet manner, without having to deal with outsiders face to face. Many online therapy programs help couples achieve realistic goals, while keeping communication open and building mutual trust.
A widely used online cognitive behavioral therapy program is one designed for stress management. Reacting negatively to daily stress may cause physical issues, such as tension headaches and hypertension. Stress can also interfere with one's personal life, often threatening relationships. Finding effective ways to deal with stress can improve one's quality of life. Stress management therapy may include diet and exercise plans, as well as relaxation techniques and activities that promote wellness.
Those suffering from drug or alcohol dependency may enroll in online cognitive behavioral therapy for substance abuse. Unlike sessions conducted at a rehabilitation center, online programs offer more confidentiality. The goal is to is to help the person overcome his addiction by facing his problem head on. Meditation is often used in therapy, allowing the individual to control his compulsions and anxiety. | <urn:uuid:6c612313-d2aa-4e5c-aecc-6ccb397a69cb> | CC-MAIN-2022-33 | https://www.wise-geek.com/what-are-the-different-types-of-online-cognitive-behavioral-therapy.htm | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00275.warc.gz | en | 0.950177 | 466 | 2.765625 | 3 |
The latest news from academia, regulators
research labs and other things of interest
Posted: Aug 16, 2016
Hexagonal boron nitride semiconductors enable cost-effective detection of neutron signals
(Nanowerk News) One of the most critical issues the United States faces today is preventing terrorists from smuggling nuclear weapons into its ports. To this end, the U.S. Security and Accountability for Every Port Act mandates that all overseas cargo containers be scanned for possible nuclear materials or weapons.
Detecting neutron signals is an effective method to identify nuclear weapons and special nuclear materials. Helium-3 gas is used within detectors deployed in ports for this purpose.
The catch? While helium-3 gas works well for neutron detection, it's extremely rare on Earth. Intense demand for helium-3 gas detectors has nearly depleted the supply, most of which was generated during the period of nuclear weapons production during the past 50 years. It isn't easy to reproduce, and the scarcity of helium-3 gas has caused its cost to skyrocket recently -- making it impossible to deploy enough neutron detectors to fulfill the requirement to scan all incoming overseas cargo containers.
Helium-4 is a more abundant form of helium gas, which is much less expensive, but can't be used for neutron detection because it doesn't interact with neutrons.
A group of Texas Tech University researchers led by Professors Hongxing Jiang and Jingyu Lin report this week in Applied Physics Letters ("Realization of highly efficient hexagonal boron nitride neutron detectors"), that they have developed an alternative material -- hexagonal boron nitride semiconductors -- for neutron detection. This material fulfills many key requirements for helium gas detector replacements and can serve as a low-cost alternative in the future.
The group's concept was first proposed to the Department of Homeland Security's Domestic Nuclear Detection Office and received funding from its Academic Research Initiative program six years ago.
By using a 43-micron-thick hexagonal boron-10 enriched nitride layer, the group created a thermal neutron detector with 51.4 percent detection efficiency, which is a record high for semiconductor thermal neutron detectors.
"Higher detection efficiency is anticipated by further increasing the material thickness and improving materials quality," explained Professor Jiang, Nanophotonics Center and Electrical & Computer Engineering, Whitacre College of Engineering, Texas Tech University.
"Our approach of using hexagonal boron nitride semiconductors for neutron detection centers on the fact that its boron-10 isotope has a very large interaction probability with thermal neutrons," Jiang continued. "This makes it possible to create high-efficiency neutron detectors with relatively thin hexagonal boron nitride layers. And the very large energy bandgap of this semiconductor -- 6.5 eV -- gives these detectors inherently low leakage current densities."
The key significance of the group's work? This is a completely new material and technology that offers many advantages.
"Compared to helium gas detectors, boron nitride technology improves the performance of neutron detectors in terms of efficiency, sensitivity, ruggedness, versatile form factor, compactness, lightweight, no pressurization ... and it's inexpensive," Jiang said.
This means that the material has the potential to revolutionize neutron detector technologies.
"Beyond special nuclear materials and weapons detection, solid-state neutron detectors also have medical, health, military, environment, and industrial applications," he added. "The material also has applications in deep ultraviolet photonics and two-dimensional heterostructures. With the successful demonstration of high-efficiency neutron detectors, we expect it to perform well for other future applications."
The main innovation behind this new type of neutron detector was developing hexagonal boron nitride with epitaxial layers of sufficient thickness -- which previously didn't exist.
"It took our group six years to find ways to produce this new material with a sufficient thickness and crystalline quality for neutron detection," Jiang noted.
Based on their experience working with III-nitride wide bandgap semiconductors, the group knew at the outset that producing a material with high crystalline quality would be difficult.
"It's surprising to us that the detector performs so well, despite the fact that there's still a little room for improvement in terms of material quality," he said.
One of the most important impacts of the group's work is that "this new material and its potential should begin to be recognized by the semiconductor materials and radiation detection communities," Jiang added.
Now that the group has solved the problem of producing hexagonal boron nitride with sufficient thickness, as well as crystalline quality to enable the demonstration of neutron detectors with high efficiency, the next step is to demonstrate high-sensitivity of large-size detectors.
"These devices must be capable of detecting nuclear weapons from distances tens of meters away, which requires large-size detectors," Jiang added. "There are technical challenges to overcome, but we're working toward this goal." | <urn:uuid:393ab4e0-20e0-41ef-8ccb-91415639b46b> | CC-MAIN-2017-04 | http://www.nanowerk.com/nanotechnology-news/newsid=44240.php | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00225-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.938468 | 1,027 | 2.546875 | 3 |
GeoWINE: Geolocation based Wiki, Image, News and Event Retrieval
In the context of social media, geolocation inference on news or events has become a very important task. In this paper, we present the GeoWINE (Geolocation-based Wiki-Image-News-Event retrieval) demonstrator, an effective modular system for multimodal retrieval which expects only a single image as input. The GeoWINE system consists of five modules in order to retrieve related information from various sources. The first module is a state-of-the-art model for geolocation estimation of images. The second module performs a geospatial-based query for entity retrieval using the Wikidata knowledge graph. The third module exploits four different image embedding representations, which are used to retrieve most similar entities compared to the input image. The last two modules perform news and even t retrieval from EventRegistry and the Open Event Knowledge Graph (OEKG). GeoWINE provides an intuitive interface for end-users and is insightful for experts for reconfiguration to individual setups. The GeoWINE achieves promising results in entity label prediction for images on Google Landmarks dataset. The demonstrator is publicly available at http://cleopatra.ijs.si/geowine/. | <urn:uuid:cd657902-330b-46ce-aa1c-6e56c1df940c> | CC-MAIN-2022-33 | https://publica.fraunhofer.de/handle/publica/413343 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00470.warc.gz | en | 0.797302 | 290 | 1.820313 | 2 |
Introduction Study 1 (2 Peter 1:1-2)
When the apostle Peter wrote this letter he knew that his martyrdom was near. He had no illusions about what was coming upon the Church. The Roman Caesar Nero had already started his systematic persecution of the Church. By imperial decree being a Christian was a criminal offence and punishable by death. When Nero’s persecution became widespread throughout the whole of the Roman Empire the true followers of the Lord Jesus Christ suffered terrible atrocities. Some were torn apart by wild beasts in the arena while others were burnt alive on fiery crosses to light up Nero’s garden parties.
This persecution lasted from 64AD until around 67AD. During this time both the apostles Peter and Paul were martyred. Nero like many other emperors before him was an antichrist. Undoubtedly Nero was demon possessed and quite mad. It is common knowledge that he ordered Rome to be burned and then blamed the Christians for starting the fire.
As history shows us the persecution of Bible believing Christians continued virtually unabated under successive Roman Emperors right up until the time of Constantine when Christianity became the official state religion and Church attendance became compulsory, leading to the beginning of the great apostasy which will have its culmination in the great falling away of professing Christians during the reign of the Antichrist himself. History shows us that Pagan Rome became religious Rome and that the Popes or Pontiff’s of the Roman Catholic Church replaced the Roman Emperors but like the Caesars continued to persecute Bible Believing Christians. This is a fact of history.
Peter’s second letter was written against the background of the coming persecution
This letter is applicable to us in these last days because what came upon the Church under the hands of Nero will universally come upon the true Church in the last days under the hand of the antichrist. (Daniel 7:21 12:7) (Revelation 13:7) During the great tribulation the true body of Christ will experience in its last days what the Lord Jesus Himself experienced in His last days. (John 15:18-21) (Hebrews 13:12-14) Like the Lord Jesus His true followers will experience persecution, death, imprisonment and betrayal by many of its leaders and by many false brethren, backsliders and even by family members. (Luke 21:17-19) Before the Lord Jesus comes to rescue His body out of the Great Tribulation it will pass through a time of trial, testing and its hour of crucifixion but Like Jesus it will be resurrected, transfigured and raptured.
Persevering in holiness
Peter is writing to the same believers that he was writing to in his first letter. (3:1) Peter encourages the believers to persevere in their walk of holiness before the Lord. In the last days our Christian walk will be vital to our spiritual survival. In the Last Days lawlessness and rebellion will be so widespread both in the world and the professing Christian Church that the majority of professing Christians will fall away from their first love and backslide in wholesale lots. Remember what our Lord Jesus Christ Himself said, “Then you will be handed over to be persecuted and put to death, and you will be hated by all nations because of me. At that time many will turn away from the faith and will betray and hate each other, and many false prophets will appear and deceive many people. Because of the increase of wickedness (Lawlessness) the love of most will grow cold, but he who stands firm (endures or has endured) to the end will be saved” (Matthew 24:9-13).
The first main theme that runs throughout Peter’s letter concerns false teachers who secretly introduce seductive heresies. (2:1-3)
If we do not have right doctrine we will not have right conduct. Satan appears in two forms. When he is described as the dragon he is Satan the persecutor but when he is described as the serpent he is Satan the deceiver. If he cannot destroy the Church through persecution he will always revert to spiritual seduction coming from within the Church. Peter warns us about this. (2:1-3) The Lord Jesus and the apostles warned us about false teachers, backsliders and spiritual seduction and that this would be a conspicuous feature in the Church in these last days. (Matthew 24: 4, 11-13, 24) (Acts 20:29-32) (1 Timothy 4:1-2) (2 Timothy 4:3-4) (Jude)
Persecution is coming
In both of his letters Peter warns the Church of the coming persecution and history affirms that what he said would happen did happen and continued to happen down to the present time. It is common knowledge that there have been more martyrs in the twentieth century than there has been down through the history of the Christian Church. In most places in the world today true believers are being persecuted for their faithfulness to the Lord Jesus Christ. The Church in the West has been, by enlarge, spared persecution but it is coming. Persecution does not start with the secular authorities suddenly persecuting the Church. Persecution begins with our leaders betraying us by compromising the truth of the Bible and preaching standards of behaviour that fall short of the Biblical standards. This is precisely what happened in the time of Jeremiah when the leaders led the people astray. Ultimately the people themselves only wanted to hear what suited their desires and appetites. (Jeremiah 5:30-31 6:13-15)
The second main theme deals with the Second Coming of our Lord Jesus Christ.
If we do not have right doctrine that produces right conduct we will not be ready for Jesus return. In the last days there will only be two kinds of believers in the Church. There will be the “wise virgins” who are faithful and loyal to their spouse the Lord Jesus and the “foolish virgins” who are faithless and un-loyal to Him. Only those virgins who retain and replenish their oil supply (the Holy Spirit) will have light (the guidance of God’s Word) to see in the darkness (the Great Tribulation) but those who do not retain and replenish their oil supply will not have light to see in the darkness and will not be taken at the rapture but left behind. (Matthew 25:1-13)
Turning away from wickedness
As the scripture says, “God’s solid foundation stands firm, sealed with this inscription: “The Lord knows those who are His,” and,” everyone who confesses the name of the Lord must turn away from wickedness” (2 Timothy 2: 19). Peter tells us that we should live holy and godly lives and be looking forward to the coming of our Lord Jesus Christ because He is coming only for a bride that is spotless and clean and undefiled by the world. As the apostle John declares by the Spirit of the Lord, “Hallelujah! For the Lord God Almighty reigns. Let us rejoice and be glad and give him glory! For the wedding of the Lamb has come, and his bride has made herself ready. Fine linen, bright and clean, was given her to wear,” (Fine linen stands for the righteous acts of the saints” (Revelation 19:6b-8)
The elect will barely escape!
Just before Jesus returns to rapture the Church spiritual deception will be so great that even the very elect will barely escape. Peter tells us this in his first letter, “If it is hard for the righteous to be saved, what will become of the ungodly and the sinner?” (1 Peter 4:18) Many believers will be like Lot who, even though he was righteous, was so attached to this world that he had to be dragged out of the city of Sodom just before it was destroyed by fire. However, multitudes of professing Christians will be like lot’s wife who looked back and was destroyed because she yearned for this world. What happened to Sodom and Gomorrah in Lot’s time will happen again but on a worldwide scale. (Revelation chapters 8, 9, 15, 16)
“As a light shining in a dark place”
If we do not have a basic understanding of God’s prophetic purposes and how they are being carried out in these days we will be in darkness and ignorance where world events are concerned. In these last days we need to understand Biblical Prophecy because it will be “a light shining in a dark place” because without it all will be darkness and confusion. (1:19) Peters letter encourages us not only to be righteous but also to be more righteous and to continue to be righteous especially when we see the day of the Lord rapidly approaching. Right at the end of the book of Revelation we read, “Let him who does wrong continue to do wrong; let him who is vile continue to be vile; let him who does right continue to do right; and let him who is holy continue to be holy. Behold, I am coming soon! My reward is with me, and I will give to every-one according to what he has done” (Revelation 22:11-12). Most of the Biblical admonitions to live holy lives are given in the context of the Coming of the Lord. With these things in mind let us now deal with the letter itself.
(Vs.1) “Simon Peter, a servant and apostle of Jesus Christ,”
Peter begins his letter by declaring him self to be a servant and an apostle. He knew that he must be a servant before he was an apostle. True Apostleship is not dictatorial but serves others and leads by example. It certainly is not greedy for money. In his first letter Peter said, ”To the elders among you, I appeal as a fellow elder, a witness of Christ’s sufferings and one who will also share in the glory to be revealed. Be shepherds of God’s flock that is under your care, serving as overseers-not because you must, but because you are willing, as God wants you to be; not greedy for money, but eager to serve, not lording it over those entrusted to you, but being examples to the flock. And when the chief shepherd appears, you will receive the crown of glory that will never fade away” (1 Peter 4:1-4). The Church, i.e., the Body of Christ itself is built on the foundation of the apostles and prophets, with Christ Jesus himself as the chief cornerstone. (Ephesians 2:20)
True leadership is foundational and supports and upholds the building it does not rule from the top. Peter was a servant, literally “a bond slave” of Jesus Christ. He saw himself as one who had no rights of his own but was totally committed and sold out to his master the Lord Jesus Christ. He was a free willing slave and he served the Lord Jesus because he loved Him and not because he was under compulsion. He was eager to serve and not to dominate and was not greedy for money but willing to lead by example knowing that he would receive his reward from the chief shepherd the Lord Jesus Christ.
Peter also says that he is an apostle i.e., one who had been personally commissioned and sent forth by the Lord Jesus Himself to complete a specific task. This task is clearly seen in John’s gospel. (John 21:15-19) As an apostle he also had the authority to declare doctrine, to refute heresy and to write scripture. Jesus Himself had given Peter along with the other disciples this authority when He gave them the keys to the kingdom. (Matthew 16:18-19) There is no new doctrine today as the canon of scripture is complete and there is only a deeper understanding and revelation of the scriptures. Peter along with the others had the authority to unlock the truths’ of God’s Word and to teach them to others. Even though Peter had this authority conferred on him he still saw himself as a servant. This should be the attitude of a true leader whether he is a pastor, elder, prophet or teacher.
Before a man becomes a leader he must firstly be a servant and learn to serve others with the gifts and abilities he has received from the Lord. He must always be the servant of all. (Matthew 20:26) (1 Peter 4:11) (1 Peter 5:2-3) Peter along with the other eleven apostles was unique because he had seen Jesus Physically alive after His resurrection. Paul the apostle had not seen Jesus physically in the flesh but had experienced a personal encounter with Him. Paul had equal authority with the other apostles because he wrote much of the New Testament. There were other apostles as well but they did not write scripture. Today we still have apostles but they are primarily Church-planting missionaries. Peter continues…
“To those who through the righteousness of our God and Saviour Jesus Christ have received a faith as precious as ours.”
The faith that dwelt in the apostles is the same faith that dwells in us as believers. The apostle Paul said concerning this faith, “Know that a man is not justified by observing the law, but by faith in Jesus Christ or as the Greek text says,” by the faith of Jesus Christ”. So we, too, have put our faith in Christ Jesus that we may be justified by faith in Christ (by the faith of Christ) and not by observing the law, because by observing the law no one will be justified’ (Galatians 2:16).
This faith is the faith of Jesus Christ Himself fused together with our faith. As the scripture says, “He that is joined to the Lord is one spirit with Him” (1 Corinthians 6:17). This faith comes to us through the Lord Jesus Christ Himself consequently God credits the perfect righteous life of His Son to our account enabling us to be justified in His sight. God declares us to be righteous, not on the basis of our own righteous life because we have none, but only on the basis of Jesus perfect righteous life.
The apostle Paul also said, “That I may gain Christ and be found in him, not having a righteousness of my own that comes from the law, but that which is through faith in Christ (by the faith of Jesus Christ) the righteousness that comes from God and is by faith” (Philippians 3:8b-9).
So then the faith that dwelt in the apostles now dwells in us and it is a “like precious faith” as the KJV renders it. This faith is precious to us because by it God has declared us to be righteous in His sight even though we have been great sinners and rebels against Him. Only through faith in Jesus Christ and His blood that atoned for our sins can any of us be put right with God. (Romans 3:21-26) (Romans 5:1) Every spiritual blessing we have that proceeds from this faith in us come to us from God through the Lord Jesus Christ.
It is only through the Lord Jesus Christ and Him alone that we can receive the faith that justifies us before a Just and Holy God. This faith is precious and priceless because through faith we enter into God’s Kingdom. This faith also includes the idea of faithfulness that is to say if we have real and genuine justifying faith before God then it will change the way we live.
True faith produces faithfulness to Jesus Christ and works of righteousness. (James 2:14-26) How does this faith come to us? How does it grow and develop in us? Firstly, through reading and obeying God’s Word. (Romans 10:17) Secondly, it is developed in us through tests, trials and persecution. (1 Peter 1:5-7) (James 1:2-4) (Job 13:10) Thirdly, we must begin to act on the faith we already have. (Hebrews 11:6)
If we belong to Jesus Christ then God is treating us as He would treat Jesus Christ. We are all sons and daughters of God through faith in Jesus Christ and God is treating us as His children. We are joint-heirs with Christ and all that God has given to His Son He makes available to us. Do we need strength to fight temptation? Jesus has overcome every temptation known to man and will enable us to overcome it too.
Do we need perseverance in trials and tests? Jesus will give us His persevere through the power of His Holy Spirit. Do we need wisdom, sanctification and holiness? Jesus is our wisdom, righteousness, holiness and redemption. Do we need to complete God’s will for our lives? Well, He who has begun a good work in us will bring it to completion at the day of Jesus Christ.
We are God’s Children and what we will be has not yet been made known. But we know that when He appears, we shall be like Him, for we shall see Him as He is. Whatever we need whether it is in the spiritual or temporal realm it is available to us from God through the righteous life of His Son Jesus Christ credited to our account in heaven. As the scripture says, “Since we have now been justified by his blood, how much more shall we be saved from God’s wrath through Him! For if, when we were God’s enemies, we were reconciled to him through the death of His Son, how much more, having been reconciled, shall we be saved through his life! Not only is this so, but we also rejoice in God through our Lord Jesus Christ, through whom we have now received reconciliation” (Romans 5:9-11).
So then every blessing available to us from God comes through the righteous life of Jesus Christ and becomes ours through faith in Him. As the scripture says, “If God is for us, who can be against us? He who did not spare his own Son but gave him up for us all-how will he not also, along with him, graciously give us all things?” (Romans 8:31-32).
(Vs 2) “Grace and peace be yours in abundance through the knowledge of God and of Jesus our Lord.”
Grace is God’s undeserved and unearned favour that He bestows upon us and that leads us to faith in Christ. There is nothing we can do to earn God’s favour. As the scripture says, “You see, at just the right time, when we were still powerless (in sins’ grip) Christ died for the ungodly. Very rarely will anyone die for a righteous man, though for a good man someone might possibly dare to die. But God demonstrated his own love for us in this: While we were still sinners, (living in sin and rebellion) Christ died for us” (Romans 5:6-8). The word “Grace” is a Greek term of greeting while “Peace” is a Hebrew term of greeting. It is only when we experience God’s grace that we experience His peace. The word for peace used here is “Shalom” but it does not always imply the absence of conflict but a deep assurance that God is in control even when we may be in the middle of a crisis.
Peter includes both Jews and Gentiles in his greeting because they are all one in Christ Jesus. Notice that Peter tells us that God’s grace and peace are ours in abundance i.e., to say God is not stingy with His grace or His peace. As the scripture says, “In him we have redemption through his blood, the forgiveness of sins, in accordance with the riches of his grace that he lavished upon us with all wisdom and understanding” (Ephesians 1:7-8). And again it says, “How great is the love the Father has lavished on us, that we should be called children of God!”(1 John 3:1a)
The only way we can personally receive God’s grace and peace for ourselves is through our knowledge of the Lord Jesus Christ. This is not just knowing about Him but knowing Him personally and intimately. It is knowing what He knows, feeling what He feels and thinking what He thinks and knowing how He would speak and act in all the circumstances of our daily lives. How do we get this knowledge? It does not come overnight but through developing our personal relationship with Jesus Himself day by day through knowing His Word, the Bible.
The Lord Jesus Himself said, “If you continue (abide) in My word, you are my disciples indeed. And you shall know the truth and the truth will set you free” (John 8:31-32). Our personal relationship with Jesus is developed through His Word and through His Holy Spirit. Jesus Himself also said, “The Spirit gives life: the flesh counts for nothing. The words I have spoken to you are Spirit and they are life” (John 6:63)
We can read and study God’s Word from cover to cover but unless the Holy Spirit takes that word and makes it a living reality to our minds and hearts we will not believe. Developing our relationship with Jesus takes time, effort and perseverance because Satan is working around the clock to side-rack us into something else. It is so easy for all of us to loose our first love.
The Lord Jesus Himself is the Living Word of God and He is in the Bible from Genesis to Revelation. When we read and study the Bible we are feeding on Jesus Himself. (John 6:33-58) In the book of Revelation Jesus Himself is called the Word of God. (Revelation 19:13) If we want to experience God’s grace and peace in abundance then we must regularly feed on God’s Word. By doing this we will come to love and obey the Lord Jesus Christ. | <urn:uuid:bbe031ea-3352-4869-815c-8643f03f083e> | CC-MAIN-2022-33 | https://blowthetrumpet.com.au/a-like-precious-faith-2-peter-11-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00074.warc.gz | en | 0.969274 | 4,614 | 2.375 | 2 |
30 March 2012
30 March 2012
The University of the Sunshine Coast’s commitment to implementing and promoting best practice in sustainability will be reflected tomorrow night (Saturday 31 March) during Earth Hour.
USC’s large rooftop sign will be included when all campus lights, except those needed for security, are switched off from 8.30pm to 9.30pm.
This will be the fourth year that the University has participated in the global event, organised by conservation group WWF to symbolise people’s support for action on climate change and environmental preservation.
USC’s Sustainability Research Centre director Professor Tim Smith said the aims of Earth Hour matched the University’s mission to boost sustainability.
“We’re proud of trying to walk the talk, not just through campus operations and capital projects but through emphasising sustainability in our research and teaching programs across faculties,” Professor Smith said.
“Earth Hour is a great opportunity for everyone to reassess the amount of energy we’re consuming and to understand our consumption patterns, especially as costs increase.
“There are significant savings to be made from simply turning off power points.”
USC is currently working in partnership with the CSIRO on a three-year South-East Queensland Climate Adaptation Research Initiative. It also works with Sunshine Coast businesses, such as solar power provider Auzion, on research to enhance the environment, technology and services sector locally.
USC students are enrolled in Sustainability courses at undergraduate and postgraduate levels, and more than 20 PhD students are doing research in the field.
— Terry Walsh | <urn:uuid:fa24df01-7d26-49b8-b528-1416c246d405> | CC-MAIN-2017-04 | http://www.usc.edu.au/explore/usc-news-exchange/news-archive/2012/march/usc-to-switch-off-lights-for-earth-hour | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00471-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.94595 | 337 | 1.859375 | 2 |
Edmund Cannon Banking Crisis University of Verona Lecture 2
Plan for today • Brief review of yesterday • Opportunity for questions • Leverage in the banking system • Effect of limited liability • Systemic risk
Remember yesterday! • Banks are financial institutions that engage in “maturity transformation”: • Banks borrow short-term (a breve termine) • Banks lend long-term (a lungo termine) • Diamond-Dybvig model – banks are unstable (two Nash equilibria). • Potential solutions: • Central bank intervention (Bagehot) • Deposit insurance
What else is important about banks? Banks engage in maturity transformation. Another important feature of banks: Banks are leveraged. Nb other institutions are leveraged too:
Difference between equity and depositors/bondholders. • Depositors and bond-holders (should) have no risk. • They should not get back less than they deposit plus interest (no downside risk); • They will not get back more than they deposit plus interest (no upside risk). • Equity holders (sometimes referred to as capital): • Should bear all of the risk (upside and downside risk); • They get the residual (= profit).
Contrast this model with basic money supply model of banking (implications for macroeconomic models such as IS-LM)
Losses and leverage • Suppose a firm is levered by a factor of ten. • The firm can bear losses of up to 10% (=1/10) before equity is exhausted. • If leverage is twenty then the firm can only bear losses of 5%. • Leverage in 2007: • Goldman Sachs 25 • Lehman Bros 29 • Merrill Lynch 32
Is Leverage a “Good” or “Bad” Thing? Greater leverage allows more investment. Leverage allows risk to be shared in a particular way (equity bears more risk, bonds bear less risk) If assets are over-priced then short-selling helps correct the price – but short selling typically involves leverage. Too much leverage means that bond-holders are exposed to risk (which they are trying to avoid). Leverage results in limited liability for the equity holders: downside risk is borne by bond holders (or government). Leverage endogenises risk (Shin, 2009)
Limited liability and risk aversion: U = ln(W) In the bad state of the world the payoff to the risky investment is 1.1 – e. This might be less than one (negative return). But our utility function is not defined for negative utility (perhaps because consumption cannot be negative).
Limited liability and risk aversion • Even risk-averse agents may like riskier investments if they have limited liability. • Banking: excessive risk means bad outcomes fall on bondholders, depositors and the government (via insurance). • Limited liability may be one of the causes of the financial crisis (faulty incentives or bankers). • BUT: • Perhaps bankers are risk-neutral or risk-loving; • Perhaps bankers are irrational.
Reducing risks in banks • Banks might be required or choose to self-insure. • Ownership structure (partnerships) and competition. • Separate retail and investment banking: • USA: Glass-Steagall Act (1933), repealed 1999 • USA: Frank-Dodd Act (2010) • UK: Vickers Commission proposal (2010) • Capital requirements (Basel I, etc) • Supervision or Regulation • Modelling / measuring risk (Basel II, second tier) • Making information publicly available (Basel II, third tier)
Capital Requirements: Basel I, II, III Basel I: International agreement of 1988: implemented in 1990s. Capital requirement of 8% so leverage of 12½. Leverage is defined as ratio of capital (equity) to risk-weighted assets. The risk weights depend upon credit ratings, determined by credit rating agencies. Basel II and III changed the weights and ratios. USA introduced the “recourse rule” rather than Basel II (very similar).
Credit Ratings e.g. Moody’s
Problems with the credit rating industry • Ratings agencies have quasi-official status • ie when a bank justifies the risk on its balance sheet to a regulator it uses a recognised agency’s ratings. • Very few firms (Moody’s, Fitch, Standard & Poors) • Reputation • Needs to be officially recognised. • Too much reliance on ratings agencies. • Agencies are paid by the issuer of an asset (ie the borrower) not the purchaser of the asset (the lender). This creates an incentive problem.
Reducing Leverage • Both the regulated and the shadow banking system were constrained by lack of equity. • Savings glut from China, etc: large amounts of funds to invest. • Solutions: • Create new safe assets to put on balance sheet (securitisation: buy CDOs) • Move assets off balance sheet (conduits, sell CDOs) • Move risk off balance sheet by buying insurance (Credit Default Swaps)
Securitisation: Mortgages • US market is very different to Europe (where little securitisation) • Prime mortgages • Sold with strict underwiting standards; • Passed on to Fannie Mae / Freddie Mac (state sponsored); • Then sold as agency RMBSs. • Sub-prime mortgages • Sold with weaker underwriting; • Bundled together into securities by investment banks. • Sold on as RMBSs. • Difficult to work out quality of underlying mortgages.
Creating “safe” assets: Collateralised Debt Obligations (CDOs) Collateralised debt obligations are similar to SIVs except they lend long and borrow long (no maturity transformation); they are not open ended. Tett describes how these were pioneered by JPMorgan. When based on mortgages referred to as Collateralised Mortgage Obligations (CMOs) or Residential Mortgage-Backed Securities (RMBSs).
Reasons for creating Collateralised Debt Obligations (CDOs) (Simple situation) The bank acts as an intermediary but neither the asset nor the liability appear on the balance sheet. Therefore, this avoids capital requirements. The bank can create new financial assets with differing levels of risk (securitisation; tranching)
Simple Model • In this model there are two borrowers, X and Y. • Each borrower will either • Repay a loan of £100 (probability of 0.9) • Default and repay nothing (probability of 0.1) • (This model is not very realistic, but the maths is simple.) • We start by assuming that whether or not X repays is independent of whether or not Y repays.
Simple Model (continued) So there are three possibilities: Both borrowers repay (probability 0.81) Just one borrower repays (probability 0.18 = 0.09 + 0.09) Both borrowers default (probability 0.01)
Saving and borrowing without risk pooling (no FI) Loan Y has the same characteristics as Loan X.
Saving and borrowing with risk pooling (mutual fund) Each saver gets half of the money paid into the mutual fund.
Saving and borrowing with tranching (securitisation) So long as there is money available, the senior tranche gets paid (i.e., senior tranche gets paid first). The junior tranche only gets paid after the senior tranche
Discussion of Model • By pooling risky assets it is possible to reduce overall risk. • The underlying mortgage had a st.dev. of 30 • A mutual fund of two mortgages had a st.dev. of 21 • The senior tranche of a securitised CMO had a st.dev. of 10. • In the example the risky assets were uncorrelated. It is still possible to reduce risk in a mutual fund (equal sharing of assets) even if assets are positively correlated (so long as they are not perfectly correlated). The effect of correlation on the value of tranches is more complicated.
Securitisation • Pool a group of risky assets into a Special Purpose Vehicle. • The payouts of the SPV are then tranched: • Tranche 1 (Super-senior) gets first call on assets • Tranche 2 (Senior) goes next • Tranche 3 (Mezzanine) goes next • Tranche 4 (Junk) gets anything left. • Possible to create AAA-rated assets from underlying assets with a much lower credit rating. US: Special Purpose Entity; Eire: Financial Vehicle Corporation
Securitisation: Mortgages • US market is very different to UK (where little securitisation) • Prime mortgages • Sold with strict underwiting standards; • Passed on to Fannie Mae / Freddie Mac (state sponsored); • Then sold as RMBSs. • Sub-prime mortgages • Sold with weaker underwriting; • Bundled together into securities by investment banks. • Sold on as RMBSs. • Difficult to work out quality of underlying mortgages. • Pricing of any RMBS depends upon the correlation.
Nationwide House PricesRatio of first-time buyer houses to earningsSource: http://www.nationwide.co.uk/hpi/
Ratio of house prices to average earningsSource: Nationwide, National Statistics, author’s calculations
Measuring risk – Value at Risk (VaR) Obvious measure of risk is variance (or standard deviation). But that is a general measure – we want to deal with downside risk (when things go wrong).
Endogenous risk – the crash As asset prices fall (losses mount) leverage rises. Firms sell assets to reduce leverage. Firesale prices are an externality to other banks’ balance sheets (especially with mark-to-market pricing). | <urn:uuid:c20186ba-3695-4719-9360-594da6502b59> | CC-MAIN-2022-33 | https://www.slideserve.com/grace/edmund-cannon-powerpoint-ppt-presentation | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572581.94/warc/CC-MAIN-20220816211628-20220817001628-00071.warc.gz | en | 0.897385 | 2,050 | 2.859375 | 3 |
Saw-Whet Owls are common in the Northern Hemisphere, but hard to spot. They have a loud too-too-too call, so you're more likely to hear them. They are also one of the smallest owls in NA - about the size of a robin.
Owl Theme Classroom Decor Bundle: Name Tags, Word Wall, Teacher's Binder etc
Smarty Pants Owls Classroom Theme Pack: Create a fun and whimsical owl themed classroom with this quality décor set. These smart and quirky owls in their cute little pants are sure to capture the imagination of your students. By Pink Cat Studio | <urn:uuid:2f9240f0-6815-4765-b8ca-41d91e787876> | CC-MAIN-2016-44 | https://nz.pinterest.com/pin/381117187193100300/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719041.14/warc/CC-MAIN-20161020183839-00169-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.939298 | 132 | 1.765625 | 2 |
Window screens let you open your windows to let in a cool breeze while at the same time keeping crawling bugs and other unwanted pests outside. The screen in a frame is held in place by a thin strip of plastic called a screen spline. The spline holds the screen in a channel that goes all the way around the frame. A tool called a spline roller helps push the spline down into the channel. Spline comes in many shapes. Flat screen spline may take a little effort to install, but the process is similar to other spline types.
- Skill level:
- Moderately Easy
Other People Are Reading
Things you need
- Screen frame
- Screen material
- Screen spline
- Flat-bladed screwdriver
- Spline roller
Lay the screen on a flat surface with plenty of room, such as a table, workbench or concrete floor.
Stretch the screen out over the frame and roughly trim it to size.
Press the spline into one corner of the screen channel. Use the edge of a flat bladed screwdriver to ensure that the spline is inserted all the way into the channel.
Insert the spline roller into the channel. Follow the channel with the roller, pressing the spline into the channel as you make your way around the screen. Use the flat-bladed screwdriver to press the spline into the corners if needed.
Insert the pull handles in the channel at the bottom of the screen before rolling out the spline. Roll the spline over the handles to secure them in place.
Trim off the end of the spine when you've finished.
Tips and warnings
- Ensure that you have the right size spline roller for the job. If it's too large, it won't fit in the channel. Test by rolling the spline in the empty channel.
- 20 of the funniest online reviews ever
- 14 Biggest lies people tell in online dating sites
- Hilarious things Google thinks you're trying to search for | <urn:uuid:273b8225-8342-42d1-8003-e4850d601a47> | CC-MAIN-2017-04 | http://www.ehow.co.uk/how_6964428_install-flat-screen-spline.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280791.35/warc/CC-MAIN-20170116095120-00360-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.907622 | 416 | 2.4375 | 2 |
1.1 hr | .MP4 | aac, 44100 Hz, stereo | h264, yuv420p, 1280x720, 25fps | 589 MB
Genre: E-learning | Reginald Dawson | English
Firebase is a perfect complement to Ionic. While Ionic is a great tool for building the front-end, Firebase can power the back-end. With Firebase, we don't need to worry about provisioning servers or building REST APIs-with a little bit of configuration, we can let Firebase do the work.
In this course, we're going to build a recipe app called "Foodbook". We'll start by getting familiar with the Ionic components, and then we'll take it further as we create controllers and services with AngularJS.
Always check out my other posts, you find interchangable mirror if you want!
but Don't report my post, Enjoy! | <urn:uuid:f28abe8a-e4ad-4038-8862-3c7607ddf0d0> | CC-MAIN-2017-04 | http://gfxhome.co/518931-tutsplus-mobile-apps-with-ionic-and-firebase.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00215-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.712748 | 195 | 1.742188 | 2 |
Preparation of a report on the causes of the existing anomalies of the electrical installation of the RTPA in Gijón Technical College that are currently causing untimely failures in the protection mechanisms.
It includes the following works:
- Visual inspection of the current state of the installation, with the verification of the single-line diagrams of the switchboards and sections of installed lines.
- Verification and measurement of the system grounding system.
- Verification of the operation of differential devices failing more frequently.
- Realization of network quality measures through network analyzers at different points of the installation.
- Analysis of the results obtained from the work carried out in the field.
- Search for solutions to the defects found in the analysis of the results, with estimation of the cost of correcting them.
Technical Assistance for the diagnosis of the RTPA electrical network at Gijón Technical College.
Radio Televisión del Principado de Asturias RTPA.
Works start date
Project end date | <urn:uuid:035c654e-1df6-40c9-96f5-03bbc6636acc> | CC-MAIN-2022-33 | https://www.impulso.es/en/portfolio/asistencia-tecnica-para-realizar-el-diagnostico-de-la-red-electrica-de-rtpa/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00473.warc.gz | en | 0.848156 | 231 | 1.6875 | 2 |
NEW YORK, Oct. 28, 2020 /PRNewswire/ -- HealthCareInsider.com, a HealthCare.com company, today released a study showing a majority of American adults worry that getting sick could lead to financial troubles. The survey results show more than half (56%) of respondents are somewhat or very concerned that a health situation in their household could lead to bankruptcy or debt.
Read full survey results: https://healthcareinsider.com/majority-concerned-about-medical-bankruptcy-debt-254418
Nearly three in ten respondents (28%) reported having received a surprise medical bill in the past year (since October 2019). Of those who reported having medical debt, 65% had debts exceeding $1,000.
A portion of the U.S. adults has avoided going to the doctor or getting medical help because of cost worries. Just under half of the respondents (46%) postponed healthcare services in the past year. Of those who did, over three in ten (32%) respondents didn't seek healthcare services because they couldn't afford it.
"This survey data offers some insight into the harsh realities facing millions of Americans, as they face medical debt and surprise bills, and even avoid hospital visits," said Jeff Smedsrud, co-founder of HealthCare.com and head of its coverage business.
Despite some U.S. adults saying they lack health insurance due to cost, many are unaware they could qualify for financial help.
Over half (52%) of respondents didn't know whether you can receive an Affordable Care Act subsidy (a tax credit) to help pay for health insurance if you aren't eligible for Medicare. More than a third (39%) of U.S. adults contacted for the poll said ranked health insurance was their highest healthcare expense.
As COVID-19 continues to make its presence around the country, more than half (55%) of respondents said they were very or somewhat likely to use telehealth in the future.
When it comes to political affiliation, over four in ten (44%) pollees said they trust the Democratic Party most to ensure they and their family can obtain affordable healthcare. 28% trusted the Republican Party most. 12% said they trusted independents most to ensure they and their family can obtain affordable healthcare, and 13% were undecided.
Nearly six in ten (59%) U.S. adults reported they were somewhat or very concerned the Supreme Court will strike down the Affordable Care Act.
"There is plenty of speculation as to what's going to happen to the future of healthcare as Election Day approaches. The best thing you can do right now is take care of yourself and your loved ones. We advise families to lock in the best health insurance plan they can find right now that meets their budget."
MedicareGuide.com commissioned YouGov Plc to conduct the survey. All figures, unless otherwise stated, are from YouGov Plc. The total sample size was 1,414 adults. Fieldwork was undertaken on October 19-20, 2020. The survey was carried out online. The figures have been weighted and are representative of all US adults (aged 18-64). The margin of error is 2.61%, plus or minus.
HealthCareInsider.com, owned and operated by HealthCare.com, is a free resource for Americans to understand their Healthcare options better so that they can make the right choices. HealthCareinsider.com is a privately-owned non-governmental website that provides accurate, unbiased, and helpful content with the help of the company's network of Healthcare experts. The management team is comprised of health insurance industry veterans who have more than 50 years of combined experience. | <urn:uuid:a8fab5be-0824-4df6-9816-c62e98a5f9b9> | CC-MAIN-2022-33 | https://www.prnewswire.com/news-releases/healthcareinsidercom-study-highlights-majority-of-us-adults-concerned-about-medical-bankruptcy-debt-301161305.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00677.warc.gz | en | 0.972364 | 771 | 1.796875 | 2 |
Back in 1980, Audi unveiled its Ur-Quattro, which featured its Quattro all-wheel drive system, for Group B rally homologation purposes. In celebration of the 30th anniversary of the now famous all-wheel-drive setup, Audi created a modern-day interpretation of the famous Ur-Quattro to debut at the 2010 Paris Motor Show.
Audi wanted to maintain the Ur-Quattro’s heritage with the Quattro concept. As such, Audi used a modified version of the RS5 platform, keeping the engine forward of the passenger compartment. A bespoke body that resembles a mixture of the original Ur-Quattro and the modern RS5 rides on a shortened RS5 platform. The unique styling changes give the car a striking, muscular stance.
In addition to keeping the Ur-Quattro’s front-engine heritage intact, the Quattro concept forgoes the RS5’s 4.2-liter V-8 in favor of a turbocharged 2.5-liter I-5. The Quattro concept is also fitted with a six-speed manual transmission, rather than the seven-speed dual-clutch transmission found in the RS5. The engine puts out 408 horsepower and 354 pound-feet of torque using, of course, Audi’s latest Quattro all-wheel drive.
The Quattro concept, despite its modern amenities, tips the scales at 2900 pounds — some 900 pounds lighter than a standard RS5. The platform is all-aluminum and the body is constructed of carbon fiber. According to Audi, the weight savings enable the Quattro to do 0 to 62 mph in 3.9 seconds and still average 33 mpg. | <urn:uuid:fb00ef5c-0154-4e6c-a062-94648f9bf2ab> | CC-MAIN-2016-44 | http://www.motortrend.com/news/group-b-reborn-audi-plays-up-rally-heritage-with-quattro-concept-9031/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719677.59/warc/CC-MAIN-20161020183839-00561-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.862903 | 361 | 1.578125 | 2 |
Many small business owners use cash accounting instead of accrual accounting. In addition, they often run a number of personal expenses through their companies or ratchet up their contributions to company retirement accounts to increase their retirement savings and reduce their current taxes. Because of this, it is sometimes necessary to recast earnings. When you recast earnings, you adjust the earnings to reflect accrual methodologies or remove the impact of the additional expenses.
To recast is to cast anew or to reconstruct. When you recast earnings, you reconstruct your small business' earnings to appear as they would if the company was owned by investors and operated by professional management. This is sometimes necessary because many small businesses owners’ primary goal is to minimize taxes. Contrast this with public companies whose goal is to maximize profits and shareholder value.
You may need to recast your company’s earnings when you prepare to sell your company or when you seek a valuation to buy out a co-owner or business partner. Another reason to recast earnings is to show a prospective investor or lender that your company is more profitable than it appears. In addition, if you do not use accounting software, you likely use the cash accounting method. A bank or other party may prefer to see financial statements using the accrual accounting method because of the additional information these provide.
Except for the conversion from cash to accrual accounting, the most common items that lead to recast earnings are your compensation as an owner and personal expenses the company pays including automobiles, insurance, phones, travel, meals and entertainment. Additional items include above market rent you have the company pay when you own your company's building and maximum contributions you make to Keoghs, SEP-IRAs or individual 401ks. If you keep accurate records of these items, it is relatively easy to recast the profit and loss statement. If you do not, you may need to hire a forensic accountant to dig deep and determine the additional expenses.
Example - Part 1
A hardwood floor installer company sought a $500,000 bank loan to finance business growth. The bank denied the loan. The company, which uses accrual accounting, only shows $50,000 in profit on $3 million in sales. The company's sole owner tells the bank the profits are much higher than he has shown the past three years. To prove this, he engages a CPA firm to recast his company's earnings.
Example – Part II
The owner provides American Express receipts, insurance bills and pay stubs showing how he brought his entire family with him on business trips, paid for his Mercedes and its insurance and employed his immediately family. These receipts total $150,000. He also provides receipts showing a $40,000 contribution to his SEP-IRA plus an additional $20,000 contribution for his wife. Adding back these expenses increases his company’s profits to $260,000.
- Jack Hollingsworth/Photodisc/Getty Images | <urn:uuid:67548cd6-98d0-4830-8989-74717e6027b6> | CC-MAIN-2017-04 | http://smallbusiness.chron.com/recasted-profit-loss-67082.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00225-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.965098 | 609 | 1.960938 | 2 |
The firm of Metals successfully works in the metal market since May, 1993. The constantly extending range of metal plate, rolled iron and metal pipes provides the maximum satisfaction of the client's requirements. There are more than 100 metal-rolls names at the firm's storehouses every day.
The presence of branch line and frame crane at the main firm's storehouse (Egor'evskii street, 4) provides the quick processing of large metal quantity.
The firm realises the delivery of metal and pipes by means of motor transport (the kind of tracks is MAZ of 12 meters length by weight-lifting capacity of 16-18 tons).
Since 1996 the firm's information bureau prints "The REFERENCE BOOK of SUPPLY AGENT".
This reference book is intended, first of all, for managers of supply department, engineering personnel, bookkeepers of the different enterprises using the metal production in the operation, managers of corporations realising the metal-roll, employees of the enterprises and firms those are frequently confronted with problems of definition of exact weight and standard size of negotiated metal-roll and purchased metal-roll (by the foremen, forwarding agents, stockkeepers, storekeepers etc.)
This reference book enables to receive the most necessary information in a condensed form about steel grade, ferrous metals assortment, metae, electrodes. The different classifiers of steels and standards of lengths and ferrous metal assortment specific gravities, the extended information about metae are expounded therein. The references on updated all-Union State Standards, branch standards and technical specifications are given therein.
The publishing house "Firm of Metals limited" publishes a series "The Reference book of SUPPLY AGENT" since 1996. "The Reference book of SUPPLY AGENT" is constantly updated, periodic, scientific and technical edition on building and industry standards devoted to the following themes:
- Steel and alloy grades;
- Non-ferrous metals;
- Tube rolling;
- Cable production;
- Electric-bulb production;
- Window and door assemblies;
- Woodworking material.
The reference book includes the production and semi-finished products technical specification (sizes, mass etc.) on each theme necessary on project perform calculations, an order of materials, transportation and construction. The information in the reference book is basically given in the form of tables accompanied with schemes and pamphlets. The authors were guided by the original all-Union State Standards, branch standards, technical specifications, DIN in text.
The reference book is updated on the average two times per one year on each subjects with an allowance for the changes which are inserted into the standards and according to wishes of the consumers to expand an assortment of included products and materials.
"The Reference book of Supplier" is published in the following formats:
- А5 - as the most complete reference edition intended for the managers, middle managers and high managers of enterprises;
- pocket-book - is intended for use in "field conditions";
- on compact discs - is intended for use at the computerised offices and warehouses.
A series "Look before you leap..." is published in format А5 since 2002 in which the most frequently used in daily operation standards are assembled.
Moscow, 129515, Akademika Koroleva str., 13
Tel.: +7 495 502-91-40; +7 495 502-91-42 | <urn:uuid:f3953311-3ce0-4237-b9c4-ae9dce0020a5> | CC-MAIN-2022-33 | http://www.tdm.ru/english | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00477.warc.gz | en | 0.892677 | 789 | 1.585938 | 2 |
International Disability Advocacy Resource Exchange
The International Disability Advocacy Resource Exchange (iDARE) is a virtual exchange for people with disabilities across the United States and Russia. The program strengthens cultural and professional ties between both countries by promoting collaboration and dialogue surrounding accessibility, inclusion, and employment.
iDARE convenes participants virtually to help them develop intercultural awareness, digital literacy, and teamwork skills. Participants connect with overseas peers who champion the experiences of people like themselves. They then work together in international pairs to transform newfound insights into action by implementing small projects throughout Russia. Projects address everyday challenges faced by people with disabilities, including disability and employment, mapping accessibility and inclusive spaces, disability and the pandemic, and more. Concurrently, EF will support the production of a documentary film centering the experiences of participants and highlighting their personal journeys. With an emphasis on shared values and cooperation, iDARE helps to foster an environment of inclusion and partnership throughout the international community of people with disabilities. | <urn:uuid:c5442cd7-8683-420c-99b6-12df9ad37f96> | CC-MAIN-2022-33 | https://www.eurasia.org/project/international-disability-advocacy-resource-exchange/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00674.warc.gz | en | 0.930766 | 199 | 2.015625 | 2 |
Evaluate A Quantitative Study
Please see attached that is needed
Week 6 – Assignment
Depression & Cancer
Final Project, Part II: Evaluate a Quantitative Study
For Part II of your final project, you will comprehensively evaluate an article of your choice that reports on a quantitative study. (Remember, a quantitative study uses numbers as data.) Locate an article in the professional literature that addresses a topic you are interested in. Remember to use the Area of Interest interactive (Links to an external site.) to guide you in the selection process. The article you select should describe a quantitative study and should have all or most of the expected sections, either with their own headings or embedded in the article: Introduction, Literature Review, Methods, Results, and Discussion.
In writing your evaluation of the article, you will use Section 5.7 in your text. Do not simply tell what is in the article, but evaluate it using the questions in your text. Explain and justify your evaluation based on specific examples from the article.
Your paper should be 2100-2800 words in length (not counting the title, abstract, and reference pages) and comprehensively evaluate an article of a quantitative study. Use proper APA formatting and good writing and organization in your evaluation paper.
The following questions may help you in evaluating your articles, though you do not have to follow this format exactly.
i. Evaluate the Introduction and Literature Review.
· Do the researchers present an adequate rationale for conducting the study? Explain.
· What is the significance of the study? What difference will it make to the field?
· Is the literature review thorough and comprehensive?
· Do the researchers demonstrate any potential biases in the literature review?
· Are all-important concepts clearly defined by the researchers?
· Do the researchers clearly describe previous methods that are relevant to understanding the purpose for conducting this study?
ii. Evaluate the Purpose Statement and Hypothesis.
· Does the article clearly state the purpose statement?
· What is the purpose statement as expressed in the article?
· Is the purpose statement clearly based on the argument developed in the literature review?
· Are the variables of interest (i.e. independent and dependent) clearly identified in the purpose statement?
· What type of hypothesis is presented (alternative nondirectional, alternative directional, or null hypothesis)?
· Do the investigators provide a clear rationale for the direction of their hypothesis, based on the literature review?
· Is the hypothesis testable and falsifiable?
· Is the hypothesis stated with brevity and clarity?
iii. Evaluate the Methods Section.
· What type of sampling method is used? Is that appropriate?
· Are relevant demographic characteristics of the sample clearly identified?
· Do the methods of sample selection used by the researchers provide a good representative sample, based on the population?
· Are there any apparent biases in selection of the sample?
· Is the sample size large enough for the study proposed?
· Is a particular quantitative research design used (e.g. true experimental, quasi-experimental, etc.)? If so, what is it?
· Is the research design consistent with the purpose and hypothesis presented in the introduction?
· Are the independent variables clearly defined so that they can be replicated using the information provided in the procedures section?
· What are some of the potential threats to internal validity? How are they threats?
· What are some of the potential threats to external validity? How are they threats?
· Is there a clear and adequate description of the instrument (data collection measures) used?
· What types of measures were used in the study (direct observation, behavioral measures, self-report, etc.)?
· What are some of the potential problems or limitations with the types of measures used?
· To what extent are the instruments standardized, and what types of standardized scoring were used?
· Does the instrument appear to be appropriate for the sample?
· Is the reliability of the instrument reported? Is the reliability adequate?
· What types of validity are reported for the instrument used? Is the validity adequate?
iv. Evaluate the Results Section.
· What descriptive statistics were used? Do the researchers adequately describe the sample?
· What types of inferential statistics were used? Are the inferential statistics used adequate to answer the research hypotheses or questions?
· Is the analysis method clearly described?
v. Evaluate the Discussion Section.
· Do the researchers clearly restate the purpose and research questions?
· Do the researchers clearly discuss the implications of the findings and how they relate to theories, other findings, and actual practice?
· Do the researchers identify potential limitations of the study and the results?
· Do the researchers identify possible directions for future research?
vi. Remaining Questions.
· What aspects of quantitative methods do you still find challenging?
· Was there any information in the above list that you were not able to find in the article you chose?
In addition to your 2100-2800 word paper, upload a PDF copy of the article to the Dropbox.
Angela Luna-Meza, Natalia Godoy-Casasbuenas, José Andrés Calvache, Eduardo Díaz-Amado, Fritz E. Gempeler Rueda, Olga Morales, Fabian Leal, Carlos Gómez-Restrepo, & Esther de Vries. (2021). Decision making in the end-of-life care of patients who are terminally ill with cancer – a qualitative descriptive study with a phenomenological approach from the experience of healthcare workers. BMC Palliative Care, 20(1), 1–10. https://doi-org.proxy-library.ashford.edu/10.1186/s12904-021-00768-5
Howard Sharp, K. M., Fisher, R. S., Clark, O. E., Dunnells, Z. D. O., Murphy, L. K., Prussien, K. V., Vannatta, K., Compas, B. E., & Gerhardt, C. A. (2020). Long-term trajectories of depression symptoms in mothers of children with cancer. Health Psychology, 39(2), 89–98. https://doi-org.proxy-library.ashford.edu/10.1037/hea0000826
Niedzwiedz, C. L., Knifton, L., Robb, K. A., Katikireddi, S. V., & Smith, D. J. (2019). Depression and anxiety among people living with and beyond cancer: a growing clinical and research priority. BMC Cancer, 19(1), 943. https://doi-org.proxy-library.ashford.edu/10.1186/s12885-019-6181-4
Saracino, R. M., Aytürk, E., Cham, H., Rosenfeld, B., Feuerstahler, L. M., & Nelson, C. J. (2020). Are we accurately evaluating depression in patients with cancer? Psychological Assessment, 32(1), 98–107. https://doi-org.proxy-library.ashford.edu/10.1037/pas0000765.supp (Supplemental)
Kang, E., Keam, B., Lee, N.-R., Kang, J. H., Kim, Y. J., Shim, H.-J., & Jung, K. H. (2021). Impact of family caregivers’ awareness of the prognosis on their quality of life/depression and those of patients with advanced cancer: a prospective cohort study. Supportive Care in Cancer, 29(1), 397. https://doi-org.proxy-library.ashford.edu/10.1007/s00520-020-05489-8
Annunziata, M. A., Muzzatti, B., Bidoli, E., Flaiban, C., Bomben, F., Piccinin, M., Gipponi, K. M., Mariutti, G., Busato, S., & Mella, S. (2020). Hospital Anxiety and Depression Scale (HADS) accuracy in cancer patients. Supportive Care in Cancer, 28(8), 3921–3926. https://doi-org.proxy-library.ashford.edu/10.1007/s00520-019-05244-8
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more | <urn:uuid:cba78519-0eb5-4634-882c-1aa599be7bdf> | CC-MAIN-2022-33 | https://academiaessaywriters.com/evaluate-a-quantitative-study/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00672.warc.gz | en | 0.87077 | 1,993 | 2.5625 | 3 |
The National Assessment of Educational Progress (NAEP) is designed to measure what students across the nation know and can do in 10 subject areas, including mathematics, reading, writing, and science. The results of these tests are reported in the Nation's Report Card. There are two essential components of NAEP; main and long-term trend. Main NAEP provides useful information about student academic achievement at the national and state level. State-level results allow us to learn more about student achievement in Oklahoma, while also allowing for comparisons between our state and other states, regions, and the nation.
Long-term trend NAEP, administered every four years, is designed around math and reading content frameworks that have remained virtually unchanged since the early 1970's. This stability in frameworks is essential to long-term trend NAEP as it provides policy makers with information about student learning over time.
Rather than testing all students, NAEP statisticians carefully select a sample of students to represent the entire student population. Main NAEP is administered to students in grades four, eight, and twelve; however, samples for long-term trend are based on age (9, 13, and 17) rather than grade.
Test scores and questionnaire responses are always kept confidential. Results are never reported for individual students or schools. District-level results are only reported for select large urban areas across the nation.
Yes. Federal law requires that states and districts, receiving Title I funding, participate in the NAEP reading and mathematics assessments every two years. Other NAEP testing is optional and can be used for comparing our state to regions with similar demographics, all others states, and the nation.
|If you want to....||Visit....|
|Learn more about NAEP results||http://nationsreportcard.gov|
|View NAEP data for a particular state or contact your NAEP State Coordinator||http://nces.ed.gov/nationsreportcard/states|
|Access specific results for a grade level, subject, jurisdiction, and/or student groups||http://nces.ed.gov/nationsreportcard/nde|
|Find subject specific sample questions||http://www.nationsreportcard.gov/sample_questions.aspx|
|Download a Sample Question Booklet that contains sample test questions for NAEP assessments||http://nces.ed.gov/nationsreportcard/about/booklets.asp|
|Learn more about how policy is drafted for each NAEP assessment||http://www.nagb.org|
|Offer a comment or suggestion to NAEP||http://nces.ed.gov/nationsreportcard/contactus.asp| | <urn:uuid:a2d0ef7e-8c9b-413a-bea1-4088b78b256e> | CC-MAIN-2017-04 | http://sde.ok.gov/sde/national-assessment-educational-progress | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00394-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.910489 | 551 | 3.4375 | 3 |
The person who plays this card picks a random player and asks them to name a 픽스코어. The person with the wild card must list as many characters from the film as possible (up to five characters). The other player must then draw one card for each correctly named character!
How do you enjoy Disney Uno cars in this regard?
When you play your last card, you must cry “UNO” (which means “one”) to announce that you only have one card remaining. You must draw two cards if you do not cry “UNO” and are caught before the following player begins their turn. When a player runs out of cards, the round is ended.
In addition, is UNO a toy? Mattel, well known for its toys, had never had much success with games, but with Uno, Mattel not only got the game, but a gaming franchise. Uno was the ideal game to commemorate with a licence from any pop cultural phenomenon, from Disney to the NFL.
As a result, can you play virtual Uno?
This online version of the famous card game Uno With Friends allows you to play your favourite card game whenever and wherever you choose. Everyone, from grandparents to children, may enjoy a game of Uno with their friends.
In Toy Story 1, what does lotso do?
4 lotto tickets
In each round, be the first player to get rid of all of your cards and get points for the cards your opponents are still holding. Points are accumulated in rounds, and the first player to achieve 500 points wins. | <urn:uuid:df4fbd3b-890a-4888-af64-e716bac37c8b> | CC-MAIN-2022-33 | https://plants-magazine.co.uk/what-is-the-best-way-to-play-pixore-uno/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00071.warc.gz | en | 0.97453 | 342 | 1.53125 | 2 |
Offences against industrial property in Chile basically consist in forgery and usurpation, and unauthorized commercial use or exploitation in the case of patents, utility models and industrial designs, and counterfeiting, copying and usurpation, or use of counterfeit or copied trademarks.
Offences against industrial property (patents, utility models, trademarks and industrial designs) are dealt with according to the rules of ordinary criminal procedure and the evidence is considered according to equity.
Before a judgment can be made in such cases, the Head of the Department of Industrial Property must be heard as a means of providing the technical information on the issue brought before the court.
Offences against industrial property are considered to be "crimes", and the period in which criminal action may be brought is limited to 10 years.
Offences and penalties in respect of patents
Article 52 of the Industrial Property Law defines offences in relation to patents.
Firstly, the law punishes anyone who misleads another person by invoking the benefits of a patent which does not exist or which has lapsed; in other words, who claims to have a right which he does not in fact have, either because he never did have it or because it has lapsed.
Secondly, the law punishes anyone who without due authorization manufactures, markets or imports for the purpose of sale a patented invention. This means that the law requires anyone manufacturing, marketing or importing a patented invention to obtain an authorization from the patent holder, failing which he is guilty of a criminal act.
In this connection, it should be borne in mind that the manufacture, marketing or import must be for the purposes of sale. If the purpose is other than sale, such as private use or experiment, then no offence has been committed.
It should also be pointed out that by penalizing imports, Chilean law is not applying the principle of national exhaustion of industrial property rights, but simply penalizing the imports insofar as they constitute use without the authorization of the right holder. In the case of imports from the place at which the invention was used with the authorization of the holder, there is no infringement.
Chilean law also penalizes those who mislead through the use of a patented process. However, the use of a patented process for exclusively experimental or educational purposes is not an offence, an exception which is more explicit than in the case of product patents.
The copying of a patented invention is also an offence; in other words it is an offence to put an invention similar to a protected invention to use without the authorization of the right holder.
Finally, the law penalizes those who copy or make use of an invention for which an application is pending, provided the patent is ultimately granted. This rule makes it possible to prosecute anyone who misleadingly copies or uses an invention for which there is a pending application either for a product patent or a process patent, provided the patent is ultimately granted. Thus, the right holder is protected from the moment the application is filed and not from the moment the patent is granted.
In all of the above cases, the penalty is a fine which ranges from about US$4,822 to US$24,109, an amount which may be doubled in cases of second offence.
The maximum penalty under Chilean law for infringement of industrial property rights is in fact the seizure of the tools and implements used to commit the offence and the illegally produced objects, since this is done on behalf of the patent holder. There is no prison sentence for the infringement of industrial property law.
As regards provisional measures, the judge may order the immediate seizure of such goods, without prejudice to his authority to order such precautionary measures as may be appropriate.
In addition to these pecuniary penalties, persons convicted for infringing the rights of a patent holder must pay costs and damages.
As a prerequisite for penal action, all patented objects must carry an indication of the patent number, either on the product itself or on its packaging, visibly preceded by the word "patent ". This obligation does not apply to processes (patented).
Offences and penalties with respect to utility models and industrial designs
The offences and sanctions relating to infringement of utility models and industrial designs are essentially the same as for patents, with the exception of infringements relating to patent applications punishable after the patent has been granted.
Offences and penalties with respect to trademarks
Chilean law provides for five situations considered as infringements against trademark owners.
Firstly, the law penalizes those who misleadingly use a trademark identical or similar to another trademark already registered in the same class. This provision penalizes the unauthorized use of a trademark identical or similar to another already registered in the same class. The penalty is a broad one, in that it does not distinguish between equal or similar products and/or services as long as they are registered in the same class.
The law also penalizes those who use trademarks for deceptive purposes.
Thirdly, the law punishes those who use registered trademarks of the same class for any type of advertising. While this is a more specific type of delictual action, the idea is essentially the same as for the first case mentioned above.
The use of a trademark which is not registered, which has lapsed or which has been cancelled with the same indication that would be used for a registered trademark is also punished.
Finally, the law penalizes those who use packaging or wrapping displaying a registered trademark which does not belong to them and has not been deleted, except in cases where the marked packaging is used for product of a different class. This is a form of indirect protection for the packaging of products protected by a registered trademark.
In all of the above cases, and as in the case of patents, the penalty for infringement is a fine ranging from US$4,822 to US$24,109, which may be doubled in case of a second offence over the past five years.
The maximum penalty under Chilean law for trademark infringement is in fact the destruction of the tools and the implements used for counterfeiting or copying and the seizure of the illegally produced objects on behalf of the trademark holder. There is no prison sentence for the infringement of industrial property law.
As regards provisional measures, the judge may order the immediate seizure of the goods with a counterfeit or copied trademark, without prejudice to his authority to order such precautionary measures as may be appropriate.
In addition to these pecuniary penalties, persons convicted or infringing the rights of a trademark owner are liable for payment of costs and damages.
As a prerequisite for penal action, all registered trademarks used commercially must carry the symbol or the initials "M.R.".
Offences and penalties with respect to copyright and related rights
Under Chilean law, offences with respect to copyright and related rights are punishable by a pecuniary penalty or a prison sentence. In fact, a bill has been submitted which calls for even greater penalties for this type of infringement.
There is a general penalty for infringements of copyright and related rights consisting of a fine ranging from US$241 to US$2,410 which is applicable in the absence of a specific penalty, as we shall see further on.
When a court orders the payment of damages for infringement of copyright and related rights it may order, at the request of the injured party, the handing over, sale or destruction of the copies of the work produced or put into circulation and the materials for their production, and the seizure of the product recited, represented, reproduced or performed.
The court may also order, during the proceedings, the immediate suspension of the sale, circulation, exhibition, performance or representation of the work.
The judges have the authority to order, at the request of the injured party, the publication of the judgement, with or without the grounds on which it is based, in a journal, at the cost of the offender.
Finally, it should be pointed out that such offences are actionable publicly and the complainant has a right to half of the fine imposed.
The first specific penalty under copyright law concerns those who, without the authority to do so, use works belonging to others which are protected, whether published or unpublished, by:
- Public recording, radio or television broadcasting, representation, performance, reading, reciting, exhibition or, in general, any other means known or that becomes known;
- reproduction of the work by any process;
- adaptation of the work to another genre, utilization in any other form involving a variation, adaptation or transformation of the original work, including translation; and
- public performance through radio or television broadcasting, phonographic records, cinematographic films, magnetic tapes or any other material support which could be used in sound or voice recorders, with or without images, or by any other means.
The law also penalizes those who, without the authority to do so, use protected interpretations, productions and broadcasts of holders of related rights.
It also punishes those who counterfeit copyright protected works, whether literally, artistic or scientific, or publish, reproduce or sell them falsely displaying the name of the authorized publisher, removing or changing the name of the author or the title of the work or misleadingly altering the text. It should be noted that in Chile, the title of a work is also protected.
Those who are liable for payment of copyright or related rights on the performance of musical works and fail to provide performance notifications or falsify or alter them are also guilty of a criminal act.
The law also penalizes the marketing of books fraudulently published or printed or without the authorization of the copyright holder.
The above infringements are punishable by 61 to 541 days' imprisonment or a fine ranging from US$241 to US$2,410.
Falsification of the number of copies sold in the accounts relating to the publishing contract is also punishable by 541 days to 5 years' imprisonment.
The law provides for 61 to 541 days' imprisonment for those who, with the motive of gain, intervene in the reproduction, public distribution or introduction into the country and those who acquire or hold for the purposes of sale phonograms, videograms, phonographic records, cassettes, video cassettes, cinematographic films or computer programs.
Penalty for infringement of other categories of rights
Chilean law also penalizes infringements of other intellectual property rights, such as those relating to geographical indications, undisclosed information and protection of plant varieties.
The Law on Alcoholic Beverages in Chile defines at least three geographical designations with respect to spirits, one of which protects Chilean Pisco. The law provides for a fine of US$723 to US$7,233 for those who use this designation in violation of its requirements. This fine can be increased to US$14,400 in case of second offence. Similar penalties are applied to those who infringe the rules governing designation of origin with respect to wine.
There is no prison sentence for such offences.
Regarding undisclosed information, there is a series of imprisonment penalties for persons who disclose information that has been classified as confidential, especially information relating to industry or to business and commercial transactions.
Finally, Chilean law prescribes a fine ranging from US$241 to US$2,410 and prison sentences of 61 to 541 days for infringements of plant breeders' rights through the propagation or sale of reproductive material or the offering of such material for sale, or the distribution, importation or marketing thereof, a penalty which is doubled in case of second offence. | <urn:uuid:e1a02b7d-ad94-4cc6-b55d-0428e3c3ea26> | CC-MAIN-2022-33 | https://e-trips.wto.org/En/ChecklistOnIssuesNotifications/View/22 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00267.warc.gz | en | 0.943704 | 2,339 | 2.203125 | 2 |
Lots of variables go into what motivates students to practice. Students often weigh the perceived cost of spending time practicing versus participating in extracurricular or recreational activities. Peers and family have a tremendous influence on whether students have long-term performance goals that can motivate them to practice.
Instructional environment impacts student practice. There needs to be a good balance of repertoire requiring new skills and repertoire that does not require new skills. Adding repertoire or adding new challenges to existing repertoire can help maintain student interest as they prepare for performances. Getting creative has its rewards.
Both private and school orchestra teachers need to use instructional time to educate students how to practice every week. Practice that is focused, structured, and includes specific strategies will improve performance and motivate students to continue their music studies. They can truly learn to enjoy practicing if they discover that success is a result of their efforts.
“It’s a funny thing, the more I practice the luckier I get,” said Arnold Palmer. If students are encouraged and expected to practice productively, we will all be winners.
Adapted from Patti Fleer’s “You must teach your students how to practice” in the Fall 2011 issue of the Missouri School School Music Magazine. Used with permission.
Read Part 1 of this series.
To find specific teaching tips and classroom lessons, or to submit your own, visit My Music Class®.
—Gregory Reinfeld, October 26, 2011. © National Association for Music Education | <urn:uuid:71059ee4-e6a9-4904-8fee-962804353af9> | CC-MAIN-2022-33 | https://nafme.org/teach-your-students-how-to-practice-part-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00073.warc.gz | en | 0.937933 | 308 | 3.65625 | 4 |
By PDC’s Senior Weather
Specialist Glenn James
Tropical Cyclone 04W (Chaba) is located approximately 177 NM southwest of Hong Kong
Tropical Cyclone 05W (Aere) is located approximately 181 NM southeast of Kadena AB
Central East Pacific:
Afternoon satellite-derived surface wind data indicated that a small, well-defined surface circulation has formed several hundred miles southwest of the southern tip of the Baja California peninsula.
Showers and thunderstorms are limited, however, and further development of this system is not likely to occur while it moves westward at 10 to 15 mph over gradually decreasing sea surface temperatures and into a less favorable environment.
* Formation chance through 48 hours…low…30 percent
* Formation chance through 5 days…low…30 percent
>>> Northwest and Southwest Pacific Ocean, Indian Ocean, Arabian Sea
Tropical Cyclone 04W (Chaba)
According to the JTWC Warning number 10, sustained winds were 75 knots with gusts to near 90 knots.
Animated enhanced infrared satellite imagery depicts spiral bands of deep convection wrapping into a defined low level circulation center (llcc). Another image depicted formative banding wrapping into the llcc with a broad and fragmented microwave eye feature, although the image showed that small eye feature seen in earlier imagery has become more ragged and less defined within the last 6 hours.
Environmental conditions are favorable with warm sea surface temperatures, low (10-15 knot) easterly vertical wind shear and moderate to strong equatorward outflow.
TS 04W (Chaba) is forecast to continue tracking northwestward, being pushed toward the Chinese coast by the mid-level steering ridge currently over the northern Philippines. The system is expected to make landfall near the Luichow Peninsula near 24 hours.
As the ridge weakens and erodes from the west, TS 04W will turn into the resulting weakness in the ridge and turn more poleward after making landfall.
In the near-term, the system looks to potentially cash in on some divergent flow aloft, weakening the already low shear, which will allow for convective consolidation and intensification to a peak of 70 knots prior to landfall.
Some rapid intensification guidance is still triggering with this run, and thus it is still possible to see a slightly higher peak occur just prior to landfall as the system moves over shallow, warm coastal waters. Once ashore, the will rapidly weaken due to terrain interaction, ultimately dissipating over southern China by 48 hours.
Tropical Cyclone 05W (Aere)
According to the JTWC Warning number 7, sustained winds were 45 knots with gusts to near 55 knots.
Satellite imagery over the past six hours depicts a mass of flaring convection developed just east of the low level circulation center (llcc) but never consolidated over the llcc due to the persistent strong westerly winds aloft.
The environment is marginally favorable with divergent outflow offsetting high vertical wind shear.
Over the next 12 hours, the system is expected to take on a more northwestward track while maintaining an 10-12 knot speed of advance, moving through the Ryuku chain between 24 and 36 hours.
After crossing into the East China Sea, the system is expected to slow down as the steering pattern begins to shift, with an extension of the ridge building in across north of the system, across the Korean Peninsula.
The ridge extension pinches off as a separate area of high heights by 60 hours with an induced trough between this new ridge center over North Korea and the ridge southeast of Tokyo, enticing TS 05W to turn into the weakness in the ridge by 72 hours.
The system will then begin to pick up speed once more as it moves eastward along the northwest periphery of the ridge southeast of Japan. the system is expected to skirt the northwest coast of Kyushu then track along the northwestern coast of Honshu through the end of the forecast period.
While upper-level winds remain strong to the west-southwest of the system, the forecast fields call for a relaxation of the vertical wind shear gradient in vicinity of TS 05W, which should allow for some intensification over the next 24 hours before passing the Ryukus, though this will depend in large part on the ability of the vortex to consolidate
Decreased shear and increased poleward outflow into the base of an upper-level trough will allow for a short burst of additional intensification to a peak of 55 knots before increased shear, dry air entrainment and cooler sea surface temperatures conspire to weaken the system.
by 96 hours the system will begin to weaken more rapidly as the terrain of Honshu disrupts the low level inflow and shear continues to increase. | <urn:uuid:fc773210-8800-4b91-b202-e079967af8c8> | CC-MAIN-2022-33 | https://www.pdc.org/weather-wall-updates/tropical-cyclone-03e-4-2-2-2-2-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00670.warc.gz | en | 0.938786 | 993 | 2.328125 | 2 |
When considering Africa, one would not generally think of a relaxing, tropical climate. However, the Ivory Coast, located in West Africa, can offer just that. With a mainly flat landscape with a handful of mountain ranges, the Ivory Coast has an amazing climate during the winter time.
Most tourists visit the Ivory Coast for the national parks. Tai National Park, Comoe National Park and Mount Nimba Strict Nature Reserve are the country’s recognized national parks. Tai and Mt. Nimba cover the entire south west of the country.
The Ivory Coast is also the most expensive country in West Africa when it comes to accommodations and lodging. Food is inexpensive; however, cleanliness and hygiene are often questioned. Be sure to get vaccinated before any trip to this area.
The Ivory Coast is not an ideal place to travel for westerners however. The country is extremely influenced by the French, and non-French westerners are generally treated with contempt. The scenery and landscape may be beautiful, but western travelers should not expect much when it comes to tourism. The official language of the Ivory Coast is French, so one shouldn’t plan on staying long unless French is known fluently. Travel to the Ivory Coast is currently not recommended due to the climbing crime rates by unemployed youth and the growing epidemic of HIV/AIDs. | <urn:uuid:0a8aeea4-3981-405a-8a2c-88cbf62ac7ce> | CC-MAIN-2017-04 | http://famouswonders.com/africa/ivory-coast/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00156-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.968706 | 269 | 2.375 | 2 |
ما يقوله الناس - كتابة مراجعة
لم نعثر على أي مراجعات في الأماكن المعتادة.
طبعات أخرى - عرض جميع المقتطفات
Outlines of the History of England: For Families and Schools (Classic Reprint)
لا تتوفر معاينة - 2018
administration amongst ancient appears arms army arts authority barons became Britain Britons called Canute cause century character charter church civil clergy commons Conquest considered constitution continued court crown death determined died ditto duke earl early Edward effect engine England English event existing extended favour feudal forces foreign formed France German granted hands Henry immediate important influence institutions introduced island Italy John justice king king's kingdom lands language liberty London lord Louis March matter measures military natural never nobles Norman Normandy Northumbria observes origin parliament period Plan possessed practice present prince principles proceeded promised provinces received refused reign remained rendered resistance Roman Rome royal Saxon says Scotland soon steam subjects successful superior Table taken throne tion took towns Treatise vols whole
الصفحة 98 - John, the variations not being very material), " shall be taken or imprisoned, or be disseised of his freehold, or liberties, or free customs, or be outlawed, or exiled, or any otherwise destroyed ; nor will we pass upon him, nor send upon him, but by lawful judgment of his peers, or by the law of the land.
الصفحة 12 - Practical Mathematics. MATHEMATICS for PRACTICAL MEN ; being a Commonplace Book of Pure and Mixed Mathematics. Designed chiefly for the Use of Civil Engineers, Architects, and Surveyors. Part I. PURE MATHEMATICS — comprising Arithmetic, Algebra, Geometry, Mensuration, Trigonometry, Conic Sections, Properties of Curves.
الصفحة 9 - VALUING ARTIFICERS' WORKS; containing Directions for taking Dimensions, Abstracting the same, and bringing the Quantities into Bill, with Tables of Constants, and copious Memoranda for the Valuation of Labour and Materials in the respective Trades of Bricklayer and Slater, Carpenter and Joiner, Painter and Glazier, Paperhanger, &c. With 43 Plates and Woodcuts.
الصفحة 106 - As I am a man, as I am a Christian, as I am a knight, as I am a king!
الصفحة 106 - Norman nobles were compelled to make their election between the island and the continent. Shut up by the sea with the people whom they had hitherto oppressed and despised, they gradually came to regard England as their country, and the English as their countrymen. The two races, so long hostile, soon found that they had common interests and common enemies.
الصفحة 11 - WORKSHOP COMPANION. Comprising a great variety of the most useful Rules and Formulae in Mechanical Science, with numerous Tables of Practical Data and Calculated Results for Facilitating Mechanical Operations. By WILLIAM TEMPLETON, Author of " The Engineer's Practical Assistant, "&c., &c. Eighteenth Edition, Revised, Modernised, and considerably Enlarged by WALTER S. HUTTON, CE, Author of "The Works' Manager's Handbook," " The Practical Engineer's Handbook,
الصفحة 4 - DICTIONARIES has long been felt by the younger students in schools, and by the classical scholar who requires a book that may be carried in the pocket ; and it is believed that the present is the first attempt which has been made to offer a complete Lexicon of the Greek Language in so small a compass. In the volumes on ENGLAND, GREECE and ROME, it is intended to treat of History as a Science, and to present in a connected view an analysis of the large and expensive works of the most highly valued...
الصفحة 74 - To till the ground was to plough the sea: the earth bare no corn, for the land was all laid waste by such deeds; and they said openly, that Christ slept, and his saints. Such things, and more than we can say, suffered we nineteen winters for our sins.
الصفحة 99 - An equal distribution of civil rights to all classes of freemen forms the peculiar beauty of the charter. In this just solicitude for the people, and in the moderation which infringed upon no essential prerogative of the monarchy, we may perceive a liberality and patriotism very unlike the selfishness which is sometimes rashly imputed to those ancient barons. | <urn:uuid:d99fd343-8510-45b3-b4c0-8d0c79e02dc6> | CC-MAIN-2022-33 | https://books.google.com.eg/books?id=nWsBAAAAQAAJ&hl=ar&lr=&as_brr=0 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00474.warc.gz | en | 0.916516 | 1,054 | 1.976563 | 2 |
Since the 1970s, scientists have been trying to knot molecules together to create new, custom-made mechanical properties, which will give rise to new materials.
The idea of tying chemical knots first made an appearance in 1971 with the aim of creating new materials induced by the changes in mechanical and physical properties that would result from these interlocking structures. But it was not until 1989 that Jean-Pierre Sauvage, the French 2016 Nobel Prize winner in chemistry, succeeded. Scientists have subsequently worked hard at trying to form knots but it remains challenging: “To tie molecules together, you have to use metals that attach to the molecules and direct them on a very specific path forming the intersections that are needed to make knots”, explains Fabien Cougnon, a researcher in the organic chemistry at the University of Geneva (UNIGE), Switzerland. “But it is a complex process that often results in a loss of raw material of over 90%! The resulting amount of molecular knots is typically only a few milligrams at most, not enough to make new materials.”
Now, Cougnon and his team have developed a simple and effective technique for tying knots in molecules, and have for the first time observed the changes in properties that result from these interlockings. The results, which were published in Chemistry – A European Journal, open up new perspectives for designing materials and transferring information with molecules.
Hydrophobic molecules that tie together on their own
The chemists developed a new technique that makes it possible to easily create interlocked molecules. “We use fatty molecules that we soak in water heated to 70 degrees. Since they are hydrophobic, they try to escape the water at all costs, gathering together and forming a knot by means of self-assembly”, says Tatu Kumpulainen, a researcher in the Physical Chemistry Department in UNIGE’s Faculty of Sciences.
Thanks to this new technique, the team can make molecular knots effortlessly, and — even more importantly — without losing any material. “We transform up to 90% of the basic reagents into knots, which means we can consider a real analysis of the changes in the mechanical properties induced by the knots, which has never been done before!” notes Cougnon. Although they cannot choose how the molecules are knotted together, they are able to reproduce the same knot at will because the same chemical structure will always form an identical knot in aqueous environment.
Each knot has its own mechanical properties
To check the impact of their molecular knots, Cougnon and his team chose a family of molecules that all have similar characteristics: they absorb ultraviolet, are fluorescent and are highly sensitive to the general environment, especially the presence of water. “We created four knots, from the simplest to the most complex (0, 2, 3 and 4 intersections), which we compared to a reference molecule which constitutes their basis,” explained Cougnon. “To do this, we first used nuclear magnetic resonance (NMR) to observe the stiffness of the different parts of the knots and the speed and way they move relative to one another.” The scientists first observed a logical change in mechanical properties: the more complex the knots, the less the structures move.
The chemists subsequently used spectroscopy to compare the spectra of the four knots with each other. “We soon noticed that the looser single knots (0 and 2 intersections) behaved in the same way as the reference molecule”, continued Kumpulainen. “But when the knots are more complex, the molecules — which were tighter — changed their physical properties and color! Their way of absorbing and emitting light differed from the reference molecule.” This change in color means that the scientists can visualize the mechanical properties specific to each assembly, whether it is its elasticity, structure, movement, or position.
“We now want to be able to control these changes from A to Z so that we can use these knots, for example, as indicators for the properties of the environment”, says Kumpulainen. They also plan to build new materials, such as elastics, using the networks of knots now that there is no loss of material when making the intersections. “At last, we can consider transferring information inside a knot thanks to a simple change of position on a part of the knot which would be reflected throughout the structure and would convey the information”, concluded Cougnon.
Research article available at: K. Caprice, et al. Chemistry – A European Journal, 2020, doi.org/10.1002/chem.201905702 | <urn:uuid:c5647621-231d-4d2f-a8d5-60ffa96d0e87> | CC-MAIN-2022-33 | https://www.advancedsciencenews.com/tying-up-molecules-as-easily-as-you-tie-up-your-laces/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00666.warc.gz | en | 0.943364 | 957 | 4.09375 | 4 |
What makes Apple the world's number one brand?
A look at how the tech company has made itself the most valuable brand in the world.Peter Iantorno November 18, 2014
It has legions of fanatic followers who support the brand with more vigour than you could hope to see from the most devoted of sports fans. No matter what the cost, when the latest iThing is released it's pretty much guaranteed to sell out.
After whitnessing the mass hysteria that the release of the iPhone 6 caused earlier this year, it's no surprise that according to a study of the world's top 100 most valuable brands by leading consultancy Interbrand, Apple is top of the pile, ahead of the likes of Google, Coca-Cola, IBM and Microsoft.
But this isn't a list based on sales or profit. To be included in Interbrand's rankings, a company must be truly global, having transcended geographical and cultural boundaries.
In quantifiable terms, that means it must garner at least 30 per cent of its total revenue from outside its home region; it must have a significant presence in Europe, North America and Asia; it must have an expectation of long-term growth and it must be transparent in publishing details of its financial performance. When compiling the rankings, three main things were taken into account: 1. Finances
While it's not the only factor (otherwise the list would be made up solely of oil and gas companies and Chinese retail giants), finances play a pretty big part in deciding how a brand ranks overall, and with $37 billion in profit last year, Apple fits the bill.
2. Role of brand
This is where things start to get interesting and also where Apple it seems is head and shoulders above the rest. When a consumer makes a decision to buy a product, how much of that decision is down to the brand as opposed to other common drivers such as price, product features and convenience?
In the case of Apple, people will pay way over the odds and queue for hours to get their hands on one of its new products, which means the branding is a very important factor in their decision to buy.
3. Brand strength
Another point where Apple blows the competition out of the water, brand strength is the ability the brand has to create loyalty, therefore sustaining demand and profit for the long term.How do they do it?
There's no global brand with more loyal fans than Apple, but how exactly do they do it? When trying to answer that question you could point at a whole host of factors such as the detailed planning, research, amazing products, marketing or advertising and yes, all of those are important, but the success of the brand really all boils down to one key thing: ambition.
On September 9, 2014, Apple CEO Tim Cook held up a leather wallet and said, "our ambition is to replace this." Of course he was referring to Apple Pay - a service that enables consumers to buy items electronically using only their Apple device, which, as yet, hasn't really taken off. However, at that same press conference he launched the company's long-awaited Apple Watch, along with the new iPhone 6 and iPhone 6 Plus.
When you look at the range of products Apple has produced and all their uses, the vision behind them is very clear: the company is aiming to create its own ecosystem, where everyone's actions - from making a phone call, to checking the time or even paying for something in a shop - are linked to an Apple device. It's clear that with its current strategy of creating that all-ecompassing ecosystem, Apple's aim is for its products to become so ubiquitous that anyone who doesn't own one and isn't a part of Apple's world will begin to become isolated from mainstream society, and will have no option but to buy into it to stop themselves from being left out.
Now this may seem quite extreme, but with the huge amount of finance behind it, a brand stronger than any other and new and exciting products coming out every year, there's no reason why the Apple ecosystem won't soon become a reality.
Creating its own ecosystem for its users to live by? That's what makes Apple the world's number one brand. | <urn:uuid:112f22f9-0f88-496c-916c-c76a9e139260> | CC-MAIN-2017-04 | http://cms.edgardaily.com/en/life/2014/what-makes-apple-the-worlds-number-one-brand-8628 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00080-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.971402 | 861 | 1.539063 | 2 |
As part of our longterm personal project to further increase biodiversity at Swangleys, we have been working this year to qualify to enter Natural England’s Mid Tier Countryside Stewardship scheme. We have now been confirmed as successful and will start to put into place the first elements of an agreed programme.
So, over the next few months you might notice hedge and tree planting on the farm along with its associated protective fencing, preparation of wild flower seed beds and a number of other initiatives. As part of this, we will be planting or in-filling more than a kilometre of native species hedging. This work forms part of a longer term aim to take an active role in the UK’s forthcoming Environmental Land Management Scheme, once its details are released by Defra.
On a related theme, Knebworth’s resident ecologist and photographer, Matt Livesey, has been documenting wildlife on the farm since 2018 and in the wider area for far longer. Matt’s latest shot on the farm is these native grey partridges, photographed last month at Swangleys. You can see more of Matt’s work, and order prints, at https://www.mattliveseyphotography.com/ | <urn:uuid:b1d3f2ac-fa3e-4f6e-abc2-0e96caac247d> | CC-MAIN-2022-33 | https://www.swangleysfarm.co.uk/uncategorised/ecology-update-new-environmental-initiative-begins-this-winter/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00677.warc.gz | en | 0.931252 | 256 | 1.773438 | 2 |
Media coverage over potential financial misdealing at the Vatican is creating misperceptions about corruption, said the authors of an article published in a University of Notre Dame journal.
"We're worried about the perceptions that can be formed among the lay faithful by explosive headlines, headlines which sometime oversell the substance of what's known," one of the authors, Gladden Pappin, assistant professor of politics at Catholic-run University of Dallas, told Catholic News Service Dec. 18.
"We think it's important to understand that not everything involving the Holy See and finances is a conspiracy," he said, explaining why he and a colleague wrote the article published Dec. 16 in Church Life Journal by the McGrath Institute for Church Life at the University of Notre Dame.
Pappin and co-author Edoardo Bueri, a pseudonym for a real estate financier who did not want to jeopardize his work in London, suggested that the questions that have emerged about how the Vatican invests its funds are more political in nature.
They maintained that the Holy See, like other church and secular entities, must be able to invest funds in order to better carry out ministries or improve the services they offer.
The Vatican is both the spiritual and administrative center of a worldwide church, but also an independent state with a wide variety of government functions and an international diplomatic presence. It has no tax base, and it relies on investments as well as donations such as Peter's Pence.
"Liberal politics cannot conceive of the Church being a sovereign political entity with financial needs and goals like any other," Pappin and Bueri wrote. "And the press corps cannot think of any contribution to make other than to impose austerity through transparency. Until those elements change, the Holy See will have to navigate the political waters as best it can, while guarding the Church's patrimony for the generations to come."
Their article appeared as reporting about the Holy See's finances by secular and Catholic media has increased since Vatican police raided offices in the Secretariat of State and its financial oversight office Oct. 1. | <urn:uuid:0dd80efd-db21-43c2-a92a-19ab38bb23da> | CC-MAIN-2022-33 | https://international.la-croix.com/news/world/media-coverage-causes-misperceptions-on-vatican-finances/11530 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00476.warc.gz | en | 0.968897 | 422 | 1.945313 | 2 |
| | Ear Noises Question
I was hoping that someone could tell me...Is tinnitus something that if you have it, you know that you have it? Or can it be tricky to tell? I'm 23, and have listened to music quite loud in headphones at time while writing music and just to get away from things. I've recenltly, through a dulling of sounds episode, become VERY aware of my sense of hearing and the decibel levels around me.
Now, at night a hear a very faint (what I would describe as a digital chirping) sound in my right ear. It doesn't keep me up except that I'm very in tune to it and I'm focused on it like an eagle scout. In the beginning I think I heard it during the day, and rarely do I hear it in the morning. But I can't hear anything like it during the day at all. It's been like this for about a week.
I'm around computers all the time, both at home and at school. I've been filtering in high frequencies like you wouldn't believe lately (for sure from appliances and cpus and the like) so I can imagine some of my paranoia is imagined- - -
But, would there be any other types of ear problems that might cause strange sounds in your ears?
Thanks for any help!
[This message has been edited by madcat (edited 01-12-2003).] | <urn:uuid:4098f41f-1a29-4d49-8bc9-a595da206c5c> | CC-MAIN-2017-04 | http://www.healthboards.com/boards/hearing-disorders/57949-ear-noises-question.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00331-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.98662 | 299 | 1.953125 | 2 |
A six-core AMD CPU that's big on performance and easy on the bank account
The Intel Core i7 980X is Intel's latest six-core, 3.33GHz processor. It's also the fastest processor available to consumers.
Intel Core i5-661 is a CPU and graphics chip in one small package
CPUs in pictures
Intel yesterday had a fancy launch for its Core i3, Core i5 and Core i7 CPUs. With over a dozen vendors on hand to showcase their latest laptops, PCs and more, the event was the largest we've seen in some time and there was a suitably large crowd on hand to take it all in.
Broadwell-E—and its rumored 10-core CPU—pops up on Intel’s support website.
Every time Intel announces new Xeon chips, server makers waste no time in announcing new products.
Quantum computing is now within closer reach thanks to a major breakthrough in which scientists have demonstrated for the first time that a key building block can be assembled.
Intel has no plans to shelve its Celeron processor brand in 2011, the chip maker said Friday in response to a Taiwanese press report.
Intel is now offering its fastest dual-core Core i3 laptop processor to PC makers including Dell and Hewlett-Packard, which are selling laptops with the chip.
Intel Core i3, Core i5, and Core i7 CPUs have been around for over a year now, but some buyers still get stumped whenever they attempt to build their own systems and are forced to choose among the three. With the more recent Sandy Bridge architecture...
QUESTION: My Windows 7 Home Premium computer has a quad-core processor and 4GB of RAM. I've not found any advantage to using four cores. How can I use the processor more effectively and allocate different processes to the individual cores?
A few things have changed since the last time we completed a feature article on what to look for when buying a laptop, but the main thing we want to highlight for this particular article is processing technology. Intel has come along and redefined th...
For many of us computer users, a PC's CPU – or central processing unit – is an unseen device that we know little about. We’re bamboozled by numbers and frequencies ('gigahertz' or GHz) that do little to assist in our understanding of why one computer...
Whenever a hot new smartphone hits the market, one of the key specifications techies look at is its processor, which is primarily responsible for running the device's main computing functions and applications.
In honor of Towel Day, and the Glorious 25th of May, here are ten of our most favorite hacks featured in Geek Tech in the last five months, running the gambit from phone, car, and CPU mods. Read on for some great moments in geek!
With chip makers continuing to increase the number of cores they include on each new generation of their processors, perhaps it's time to rethink the basic architecture of today's operating systems, suggested Dave Probert, a kernel architect within t...
Whitepapers about CPUs
Continuous data growth coupled with a new generation of multi-core CPUs has placed new demands on storage systems. This whitepaper details why firms should consider moving from HDDs to higher-performance Flash media, with the adoption of new technology with a higher I/O intensity.
Most Popular Reviews
- 1 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 2 Sony Xperia XZ review: turbo-charged last-gen phone
- 3 Hisense Series 7 ULED 4K UHD TV review
- 4 Sony X9300D and X8500D UHD 4K TV review
- 5 Moto X Force review: Leading features from a mid-range phone
Join the PC World newsletter!
Latest News Articles
- Oracle takes Java copyright dispute with Google to appeals court
- Samsung sales, profits dive on Note 7 recall
- Dyn DDoS attack came from 100,000 infected devices
- These are the 3 big reveals from Microsoft's Surface event
- AI and robots aren't gunning for your job, White House economist says
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Google Pixel XL full, in-depth smartphone review: The new best Android phone
- Japan Robot, gadget and car expo slideshow
- Panasonic DX900U UHD 4K smart TV review: Best all-round TV ever?
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTOperations SupportNSW
- FTSolution Architect - Application IntegrationQLD
- FT.Net CRM Dynamics Developer LeadVIC
- FTCRM Developer - MS Dynamics CRMNSW
- FTMicrosoft Dynamics AX Manufacturing ConsultantACT
- CCCisco Wi-Fi Network Engineer - SurveyorNSW
- CCContract Analyst Programmer (HTML/JAVA/J2EE) 161025/AP/862Asia
- CCSenior Pega DeveloperVIC
- FTMicrosoft Dynamics AX Finance ConsultantWA
- FTWebSphere MQ Application SupportQLD
- CCMicrosoft AX Support AnalystsQLD
- FTMobile Delivery Manager / Studio LeadNSW
- CCProgress DeveloperQLD
- FTJava DeveloperNSW
- TPJava Developer -- ContractWA
- CCContract Analyst Programmer (Windows Server) 161031/AP/962Asia
- CCBusiness Case Developer - GovernmentNSW
- CCContract Analyst Programmer (J2EE/Oracle) 161031/AP/512Asia
- FTMicrosoft Dynamics AX Manufacturing ConsultantQLD
- TPBusiness AnalystQLD
- CCSoftware Engineer- Linux and DevOpsNSW
- FTSenior UX DesignerAsia
- CCSenior Siebel DeveloperACT
- CCSenior Android Developer (6 month contract)NSW | <urn:uuid:0985598f-b976-4893-b9a2-9e4c3ddb915d> | CC-MAIN-2016-44 | http://www.pcworld.idg.com.au/tag/cpus/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721141.89/warc/CC-MAIN-20161020183841-00416-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.899241 | 1,420 | 1.53125 | 2 |
Factors are defined as whole numbers that are multiplied together to produce another number. If a × b = c then a and b are known to be the factors of c.
Say you wanted to find the factors of 15. You would find all pairs of numbers that when multiplied together resulted in 15. We know 3 and 5 are factors of 15 because 3 × 5 = 15. Also, 1 and 15 are factors of 15 because 1 × 15 = 15. The factors of 15 are 1, 3, 5, 15.
You can also think about factors in the terms of division: The factors of a number include all numbers that divide evenly into that number, basically leaving no remainder. Consider the number 12. Since 12 is evenly divisible by 2 and 6, you can conclude that both 2 and 6 are the factors of 12.
How to Factor Numbers?
Factors numbers are calculated by trial division. Follow these steps to use trial division to find the factors of any given number.
First, you need to find the square root of the integer number n and round down to the closest whole number. Let's call this number s.
Start with the number one and find the corresponding factor pair: n ÷ 1 = n. So 1 and n are a factor pair because division results in a whole number with zero remainders.
Do the same with the number 2 and proceed to test all integers (n ÷ 2, n ÷ 3, n ÷ 4... n ÷ s) up through the square root rounded to s. You need to record the factor pairs where division results in whole integer numbers with no remainders.
When you reach n divided s and you have recorded all factor pairs you have successfully factored the number n.
Factors of 10
The factors of 10 are the numbers that divide the original number uniformly. Factor pairs of the number 10 are the whole numbers, which when multiplied together produces the original given number.
Factors of 10 are 1, 2, 5, and 10.
In the factorization method, first consider the numbers, 1 and 10 as factors of 10 and you need to continue with finding the other pair of multiples of 10 which gives the results as the original number.
Pair Factors of 10
To find the pair factors of the number 10, multiply the two numbers in a pair to get the original number as 10, such numbers are as follows.
If 1 × 10 equals 10, then (1, 10) is a pair factor of 10.
Similarly, let us find other different pair factors of 10.
2 × 5 equals 10, (2, 5) is a pair factor of 10
Therefore, the positive pair factors of 10 are (1, 10), as well as (2, 5).
How to Find the Factors of 10?
Learn the following steps given below to find factors of 10.
First, write the number ten
Find the two numbers, which give the result as 10 under the multiplication, say 2 and 5, such that 2 × 5 equals 10.
We know that the numbers 2 and 5 are the prime number which has only two factors, i.e., 1 and the number itself. So, we cannot further factorize.
The factors of 2 are equal to 2 × 1.
The factors of 5 are equal to 5 x 1.
Therefore, the factorization of 10 is written as 10 equals 2 × 5 × 1.
Finally, write down all the unique numbers which we can obtain from 10 equals 2 × 5 × 1.
Factors of Negative Numbers
All of the above information and methods generally apply to factoring different negative numbers. Just keep in mind that you need to follow the rules of multiplying and dividing negative numbers to find all factors of any negative numbers. For example, to find the factors of -6, we write them as (1, -6), (-1, 6), (2, -3), (-2, 3).
Factors are always defined as whole numbers or integers and never decimals or fractions.
Each and every even number will have number 2 as their factor.
All numbers that end with the number 5 will have 5 as their factor.
All numbers that are greater than 0 and ending with a 0 will have numbers 2, 5, and 10 as their factors.
Algebraic expressions can often be solved or simplified through factoring. | <urn:uuid:8848fb20-fd4b-4125-82b2-ba428ac584e9> | CC-MAIN-2022-33 | https://www.vedantu.com/maths/factors-of-10 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00072.warc.gz | en | 0.937443 | 914 | 3.953125 | 4 |
Wildlife at Twin Lakes
I’m lucky enough to have this park just outside my neighborhood that few people go to. Twin Lakes starts as a creek, then turns into a winding marshy area, that turns into a pond. Next to that is a man-made lake. Neither the marshy area nor the pond would be there if it wasn’t for beavers. There are roughly five dams at Twin Lakes. The tallest is four feet, and the longest is about 20 yards.
I’m fascinated by the beaver dams. How are they made exactly? How do they do such a great job of holding back water? As someone who built and maintains a stream and pond in my backyard, I can really admire their craft! I really want to see these guys at work!
I decided to get a trail camera with the hopes of catching them actually building the dam. I want to know specifics like how they move mud around and how they place sticks. Do they use their hands or just their mouth like a dog? I guess I could Google it, but some things I just like to discover on my own.
On the first try I got a coyote crossing the tallest dam that divides the pond from the lake. The first thing I learned, beaver dams are like bridges or easy crossing points for many kinds of animals.
Lots of Racoons are out there! They seem to be looking for some kind of food in the dam. These dams support lots of creatures in a variety of ways.
Alligator snapping turtle
Otters are here! I had no clue!
Another thing I learned is that wetlands really come alive at night.
While the beavers had created such a great environment for many animals, I still wasn’t able to find one!
There was this man vs beaver drama playing out where the pond spills out. This little bridge is an entryway into the park for many people. Beavers were flooding it by building a dam just downstream of it or trying to turn the bridge itself into a damn like you see here. This guy put in a lot of work keeping the bridge passable.
Finally, man and beaver reached an agreement when the beavers built the new dam just upstream of the bridge.
I decided to place my camera near this spot. Success!
Update: June 20th, 2021
You see the little bridge two videos up where a man is trying to remove the beaver dam on it?
That little dam is actually big enough to flood someone’s yard a little upstream.
So the city sent a backhoe in to remove a dam upstream from the flooded yard. But that dam doesn’t affect the flooded yard! Sadly, it just drained the pond. Below is that torn-down dam and the pond that it drained.
I happened to be there when they removed the small dam by the bridge. Removing this one did empty the flooded neighbors yard.
It took the beavers about a week to rebuild the dams as they were. | <urn:uuid:184ee7d0-18a9-4539-8ed7-e8abf8a4a492> | CC-MAIN-2022-33 | https://aaronheine.com/wildlife-at-twin-lakes/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00675.warc.gz | en | 0.977594 | 632 | 2.1875 | 2 |
London comedian and mathematician Matt Parker recently made this interesting video in which he analyzes each of the public parks and plazas that are named "Square" in Midtown and Lower Manhattan, with the purpose of finding which is the most mathematically correct "Square" shape.
Can you believe that many so-called "squares" in New York are actually triangles? I hunt down the square most deserving of its name.
Here's what he found:
- Times Square 40.7605364,-73.9881165 Triangle
- Greeley Square 40.7475166,-73.9902623 Triangle
- Madison Square 40.7417129,-73.9866145 Rectangle
- Union Square 40.7362828,-73.9934595 Rectangle
- Stuyvesant Square 40.7334896,-73.9846672 Square
- Washington Square 40.730503,-73.9959379 Rectangle
- Cooper Square 40.7274296,-73.9929123 Trapezium
- Tompkins Square 40.7268115,-73.9832778 Square
- Peretz Square 40.7226714,-73.9878349 Triangle
- Foley Square 40.7152103,-74.001972 A thing?
- Straus Square 40.7147475,-73.9910052 Triangle
- Kimlau Square 40.7140132,-73.9990492 Rectangle
- Coleman Square 40.712846,-73.9964231 Trapezium
- Hanover Square 40.7047231,-74.0104991 Triangle
Something wrong with this post? Let us know!
Shop Related Products…
As an Amazon Associate I earn from qualifying purchases. | <urn:uuid:fcb166a8-5307-42e3-9a3b-ca0754523ef7> | CC-MAIN-2022-33 | https://viewing.nyc/mathematician-analyzes-all-of-manhattans-named-squares-to-find-the-most-true-to-its-name/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00469.warc.gz | en | 0.870079 | 372 | 1.765625 | 2 |
Today is the 45th anniversary of the APL language as an actual computer system.
Today I released the WordPress plugin, “Simple Changed Files”. The plugin is as simple to use as its name implies, there are no configuration settings and a single action item under tools.
Use of the plugin is described on the Simple Changed Files page.
The code is written in Object Oriented PHP as an example of writing plugins in this style. Like Simple Access Control it’s well commented and was built with use as an example in mind. It was written using the Model View Controller pattern, even though that is overkill for something this small. However it does provide a small, clear working example of the use of the pattern. Feel free to pick it up and modify it to your requirements. I will be posting an annotated version of the code as a tutorial in the near future.
We had a power outage in South East Oakville this afternoon and it really brought home how much we rely on the constant supply of electricity. Julia had gone out and I was busy working on another WordPress plugin. The computers went down except for a laptop and a netbook, which lost their internet connection because the router was down. By the time she got home the sun was setting and we were discussing restaurants for dinner because we couldn’t cook. The gas heat would run, but the fan wouldn’t blow, so it could get pretty cold.
The mobile phones partially worked, but only over the cellular network since our wifi was out. The iPhone made a pretty good flashlight, Continue reading
Today I released our first public WordPress plugin, “Simple Access Control”. The plugin is as simple as its name implies, there is only one optional configuration setting and only one widget to control access.
Use of the plugin is described on the Simple Access Control page.
The code is written in procedural PHP so it can be followed by programmers at any skill level, it’s well commented and was built with use as an example in mind. Feel free to pick it up and use it or modify it to your requirements. I will be posting an annotated version of the code as a tutorial in the near future.
In 2005 my wife Julia and I founded Devondev Inc. to provide software and virtual assistance (VA) services. Between 2007 and 2011 we mainly provided VA services and web site development through Prime Admin Solutions. Starting in September this year we have expanded to provide WordPress customization using plugins and themes as well as consulting and custom database and content management development using PHP, Java, MySQL and Oracle.
This blog will be dedicated to news from Devondev and commentary on technical issues. | <urn:uuid:8498bfe9-72c5-4b78-ab75-f85930b8d998> | CC-MAIN-2017-04 | http://silvermapleweb.com/2011/11/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00333-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.960647 | 552 | 1.867188 | 2 |
Some 120 South Sudan immigrants deported from Israel landed Monday in the South Sudan capital Juba, with several saying they had come under pressure to leave and had been insulted.
The Israeli government announced the departure of the first charter flight on Sunday and said it would be carrying some 120 "illegal immigrants" who had agreed to be "voluntarily repatriated" back to South Sudan.
Those deported in the first wave of expulsions of tens of thousands of Africans were given around 1,000 euros ($1,250) per adult and 400 euros per child.
"They were telling us we have AIDS and that we are a disease. They were telling us a lot of bad things", said 30-year-old Mayuol Juac, who worked as a waiter in Eilat and Tel Aviv for five years.
"They say we are a disease, the cancer of Israel," Bol Duop, 25, who also worked in the hospitality sector for five years told AFP.
After being arrested three months ago and thrown in jail for a day on suspicion of being illegal, Juac had his visa confiscated and came under increasing pressure to leave.
"They took it from me and they said: 'You have just one week to leave, one week to leave the country!'"
"Those without papers they arrest them and put them in jail until their deportation. Then it is jail to the airport to Juba," Juac said.
Signup to our newsletter and follow us on Facebook and Twitter!
However South Sudan's Minister of Humanitarian Affairs Joseph Lual Achuil insisted, "People are not being deported".
"We have agreed with the Israeli government for our people to be peacefully and voluntarily repatriated," he told reporters at Juba airport on Monday.
South Sudan maintains good relations with Israel.
The links date back to the decades of civil war that pitted the South against the Khartoum government, dominated by Arab Muslims. South Sudan, peopled mainly by black Christians, proclaimed independence on July 9.
The deportees, who were interviewed before leaving Israel by representatives of South Sudan who wanted to check their nationality, for the most part said they were happy to be back home, even those who said they had been forcibly returned.
"Now I am happy I come back to my country. I see of course the country needs a lot of work. I don't see any progress , but we are to make the progress," Juac said. "We took independence to stay in it, not run away from it."
Bol Duop for his part is, for the first time in 15 years, heading back to his hometown of Akobo, in a far-flung corner of Jonglei, a state that was hit by a string of tit-for-tat cattle raids that left hundreds dead earlier this year.
"Now I come back, and I know nothing about Jonglei, nothing about Akobo. I heard about all the problems there, but I'll try it," he said.
Israel's interior ministry estimates there are more than 60,000 African immigrants -- mainly from Sudan, South Sudan and Eritrea -- in the country illegally. In May a protest against African immigrants degenerated into violence in the southern districts of Tel Aviv. | <urn:uuid:18540a2d-e1a2-4ef1-af3f-1f3ce8068b14> | CC-MAIN-2017-04 | http://www.yourmiddleeast.com/news/south-sudanese-deportees-recount-verbal-abuse-by-israel_7507 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00159-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.985047 | 672 | 1.554688 | 2 |
co-created by our community
League in a Box:
A guide on how to grow and support communities of intrapreneurs and change agents.
The Intrapreneur’s Guide
We believe intrapreneurs have a pivotal role in forging a better future. We wrote this book to help fuel a movement to change our broken systems through intrapreneurship. Learn the practice of managing by your wits, finding comfort in discomfort, and moving ahead all while creating change from within our most incumbent institutions.
The Intrapreneur’s Guide to Pathfinding is available on Amazon. Order your copy now.
the intrapreneur’s compass
The intention of this tool is to help you reflect on the key dimensions and questions that are fundamental for your intrapreneurial quest. It’s designed to be used as a practical companion for both solo intrapreneurs as well as for teams. The Compass was created alongside our book, The Intrapreneur’s Guide to Pathfinding, and can be used in conjunction with this or independently.
What is intrapreneurship?
how to intrapreneur?
Intrapreneurship in the public sector
In this short interview, intrapreneur, Pablo Suarez, shares why intrapreneurial skills are needed within the humanitarian sector and what can be gained from adopting an intrapreneurial mindset.
What is an Intrapreneur?
And what’s the difference between intrapreneurship and entrepreneurship? Find out how intrapreneurs define intrapreneurship across the globe.
Meet the League of Intrapreneurs
Last year, intrapreneurs from around the world gathered in the countryside of Germany to collaborate and support each other to prototype the future of work, cultivating more meaningful, innovative cultures for all.
Do you sense the potential for greater purpose and impact through your day job? Perhaps you’re already sitting on an idea, but need help getting it off the page? Heard about intrapreneurship, but not sure where to start? Then, the League online course is for you.
In this course, you will learn how to drive change and innovation from within your organization to make a positive impact. This course focuses on building your confidence and developing the skills required for successful intrapreneurship.
Intrapreneurs venture into uncharted territory daily; there is no roadmap for the journey we are on. Yet, we can capture and share learnings from experiments – big and small – across the world. Our Intrapreneur’s Toolkit – originally published in 2013 has been downloaded over 10,000 times! In 2020, we published an updated resource – The Intrapreneur’s Guide to Pathfinding – to incorporate all that we’ve learned since 2013 and to provide practical insights for intrapreneurs in the private, public and non-profit sectors.
Interested in checking out the original toolkit? You can download it here. But, don’t miss out on the updates in our Book and accompanying Intrapreneur’s Compass.
The intrapreneur’s ecosystem report
This business guide provides a framework for understanding the Intrapreneurship Ecosystem – the complex set of processes, practices, resources, and relationships which collectively serve to facilitate or inhibit intrapreneurship and social innovation.
It is a key output of the Intrapreneur Systems Challenge which was jointly hosted by The League of Intrapreneurs and Business Fights Poverty, with support from DFID, CEMEX, and The BMW Foundation.
THE SOCIAL INTRAPRENEUR
A Field Guide for Corporate Changemakers.
Published in partnership with The Skoll Foundation, Allianz and IDEO, this report presents a field guide to the world of social intrapreneurship – its challenges and opportunities – and draws on in-depth research undertaken by SustainAbility in twenty leading global corporations.
Saving the Rainforest through the Power of Cocoa
Katie Sims former Birdlife/RSPB
As part of her work with RSPB (The Royal Society for the Protection of Birds) in the protected area of Gola Rainforest in Sierra Leone, Kate was collaborating closely with forest communities to ensure that the wonders of chocolate become rewards for cocoa farmers who protect their rainforest and its wildlife.
Creating new pathways in social sector
Executive Director of CARE Atlanta Global Innovation Hub
CARE works in 95 countries around the world with the primary objective of alleviating poverty and advancing social justice. The initial work of the organization was sending packages and supplies to folks post WW2. Fast forward to today, CARE is now centered around poverty alleviation that cuts across many different programming areas such as education, financial inclusion, public health, advocacy, gender justice.
Co-creating with Indigenous Canadians
Ian Howatt of City of Edmonton
Edmonton has the fastest growing urban indigenous population in Canada. It is also the youngest. This demographic is over-represented in many socio-economic challenges: poverty, homelessness, suicide, underemployment. We recognize we as a city have to do more.
Getting kids moving with Nike
Sam McCracken, General Manager, Nike N7
When Sam embarked on his intrapreneurial journey – he wasn’t working in some high-powered executive office. He was working in a warehouse in Wilsonville, Oregon, when he had an idea. He said to himself, “I work for the biggest sports company in the world. I must be able to do something in my role at Nike to help my community.” He didn’t have a grand plan, he heard in a need in his community and believed he could help.
Join our mailing list to receive helpful resources, tools and inspiring stories of courage, collaboration and change each month. | <urn:uuid:a86a9be1-fd24-4367-b22b-6dc6899565e9> | CC-MAIN-2022-33 | https://www.leagueofintrapreneurs.com/resources/?add-to-cart=764113 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00667.warc.gz | en | 0.929998 | 1,258 | 1.648438 | 2 |
ICSOT Indonesia 2017
Jakarta, Indonesia, 14 - 15 November 2017
International Conference on Ship and Offshore Technology and more popularly known as ICSOT is a biannual conference and jointly organized by Indonesian universities and the Royal Institute of Naval Architects (RINA). The Conference was initiated at ITS in 2010 as part of 50 years anniversary of ITS and higher education in naval architecture in Indonesia, 100 years of PT DPS the oldest shipyard in Indonesia and 150 years of RINA. The second Conference was conducted at Pattimura University (Ambon) in 2012, the third Conference was held at Hasanuddin University (Makassar) in 2014, and the fourth Conference was held at Institut Teknologi Sepuluh Nopember (ITS) in 2015 as special conference in commemoration to the 10 years anniversary of RINA Indonesia. So far during the three conferences, delegates and participants come from UK, Sweden, Norway, Holland, Belgium, Turkey, Australia, Malaysia, Singapore, and Indonesia.
The next and fifth Conference will be held at Universitas Indonesia (UI) Depok - Jakarta on 14 - 15 November 2017. Similar to the previous conferences, the main objective of this year conference is to give opportunities to members of the international maritime industry to present and discuss the latest developments in marine research and technologies which could provide improvements and solution to the problems and challenges related to shipbuilding and offshore applications.
As the previous conferences, the theme is “Development in Ships Design and Construction”. Although the theme is limited to design and construction aspects, but the theme can be related and developed to other aspects such as hydrodynamics, marine safety, environment, material, fishing vessels, maritime logistics, etc.
Purposes and Benefits
The purpose of the conference is to invite researchers and engineers from many countries and discuss their progress of work. Thus, it is expected to increase the number of research collaboration both in national and international levels by exchanging information about research activities and progress conducted by all delegates and participants from various institutions at home and abroad.
The benefit of the event is to promote the work of delegates/presenters and as a media to exchange information on current research activities, in particular, in the field of ship design and construction. Thus, it is expected that the research activities can be increased quantitatively and qualitatively.
Five selected papers will be published in the Scopus indexed International Journal of Technology.
First Day : Prof. H. Mohamad Nasir, Ph.D., Ak. (Minister for Research Technology and Higher Education)
Conference Date and Venue
The conference date and venue will take place on:
Date : 14 - 15 November 2017
Venue : Balai Apung (Floating Hall), Universitas Indonesia (UI) Campus, Depok - Jakarta
Organizing committee consists of International Steering Committee (ISC) and Local Organizing Committee (LOC).
International Steering Committee (ISC)
- Chair : Dr. Sunaryo (Universitas Indonesia)
- Co-chair : Mr. Trevor Blakeley (RINA Chief Executive)
- Members :
- Prof. Richard Birmingham (Newcastle University)
- Prof. Atilla Incecik (University of Strathclyde)
- Prof. Jeom-Kee Paik (Pusan National University)
- Prof. R A Shenoi (University of Southampton)
- Prof. Nicholas Hutchins (University of Melbourne)
- Prof. Takeshi Shinoda (Kyushu University, Japan)
- Prof. Ru-Min Chao (National Cheng-Kung University, Taiwan)
- Prof. Adi Maimun bin Abdul Malik (Universiti Teknologi Malaysia)
- Prof. Yanuar (UI)
- Prof I Ketut Aria Pria Utama (ITS)
- Dr. Deddy Chrismianto (University of Diponegoro)
- Dr. Daeng Paroka (University of Hasanuddin)
- Dr. Marcus Tukan (University of Pattimura)
Local Organizing Committee (LOC)
- Chair : Dr. Agus Sunjarianto Pamitran
- Secretary : Firman Adinugroho ST. MT.
- Treasurer : Dr. Muhammad Arif Budiyanto
- Abstract submission deadline : July 31, 2017, In addition to abstracts, full papers can be submittted for review before September 22 2017:
- Please submit your abstract or paper to or
- Notification of abstract acceptance : August 18, 2017
- Full paper submission deadline : September 22, 2017
- Notification of full paper acceptance : October 6, 2017
- Payment deadline : October 15, 2017
- Indonesian delegates : IDR 3,000,000.00
- Indonesian student delegates : IDR 2,000,000.00
- International delegates : USD 500.00
- International student delegates : USD 400.00
Click to download: | <urn:uuid:1e00aac3-7f21-4997-b8ab-751b392f393c> | CC-MAIN-2022-33 | https://www.rina.org.uk/ICSOT_Indonesia_2017.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00071.warc.gz | en | 0.892046 | 1,049 | 1.664063 | 2 |
If you live in the Kootenays, is an Okanagan apple local? If you live in Vancouver, are Abbotsford strawberries local? What about a Gulf Islands oyster or an Alberta potato if you live in Atlin?
Until recently, the answer to all of these queries would have been 'no'.
But last month, the Canadian Food Inspection Agency (CFIA) changed the definition of local. It used to apply to food grown within 50 kilometres of sale. Now, any food produced in B.C. or within 50 kilometres of provincial borders is technically considered local and can be labelled as such -- but not all farmers and retailers are happy about it.
New label means new competition
"The new definition is totally nonsensical to me," says Nelson-area farmer Nettie Lack. "Local means the community. It means the neighbourhood. This is about the big boys getting in on the act and using 'local' as a form of marketing."
Lack runs the Kootenay Local Agricultural Society and farms eight acres of vegetables that she sells in the West Kootenay region. Her most important customer is the Kootenay Co-op store in Nelson.
The Kootenay Co-op's marketing manager Jocelyn Carver says, "the new definition means farmers in the immediate area will now have to compete with farmers across the province to provide food to customers who want to make a point of buying local food."
She says consumers will be misled by the new "local" designation because it is so watered down as to be meaningless.
"The definition of local," she says, "is meant to bring the beginning of the food chain and the end of the food chain together in a relationship based on mutual support. That way, small and medium size local businesses who often struggle to gain a bit of a foothold will get support from consumers who will seek them out.
"To call provincial or western Canadian food 'local' disadvantages the most challenged sector of an already challenged agricultural economy, which is small and medium sized growers," she says.
'True local defined'
The Kootenay Co-op is the largest independent natural foods retail cooperative in Canada, with annual sales of just under $11 million. It has 11,000 members. One of its stated priorities is to support small agricultural businesses in the region.
In response to the CFIA's definition change, the co-op has initiated a marketing strategy they're calling True Local. They've drawn the boundary of what they consider to be local on a map of the region. The co-op will tag food grown within those boundaries True Local on the shelves.
They kicked off the campaign with a rally in front of their store on June 1. About 45 people came out, including the local media and some high-profile speakers: B.C. Southern Interior NDP MP Alex Atamanenko, Nelson-Creston NDP MLA Michelle Mungall, and National Farmers Union president Colleen Ross.
Atamanenko wondered aloud why the CFIA first changed the definition and then announced that it would be holding public consultations about it later.
"Normally, when you have an existing policy you say, 'OK folks, we are thinking of changing the policy, so lets do some consultations across the country, let's talk to people like the co-op here, let's talk to the National Farmers Union, the Federation of Agriculture, all those representing farmers, and once we have done that, then let's lay out a policy.'
"Or are they just going to be talking to their friends like the Western Canadian Wheat Growers and Monsanto and CropLife to rubber stamp what they are doing?"
Rola Yehia, acting manager of consumer affairs for the CFIA, contacted by the Tyee, explained that her agency will be initiating a food labelling modernization initiative which will take up to two years and will involve public consultations. The change in the definition of local is part of that, she said.
Asked why the change came before the consultation, she said the new definition is an interim one, and that "we are trying the balance the needs of consumers and the industry."
Yehia said the definition change came on the advice of its consumer round table, a stakeholder group that includes the Consumers' Association of Canada.
Bruce Cran, president of the Consumers' Association of Canada, says Yehia is mistaken.
The definition change "never came up at any meeting I was at," he told The Tyee, "and I attend all those round-table meetings. I am a senior member of that round table."
Cran says he doesn't know who wanted the definition changed. "I have no idea where it came from," he said.
Local just one piece of the picture
The Kootenay Co-op and Atamanenko didn't necessarily like the old 50-kilometre definition either. Carver says that for a northern community with no farms in the area, or for someone living in a large metropolitan area, it was "so restrictive that it was almost asphyxiating" for small and medium sized food businesses.
Abra Brynne, a board member at the Kootenay Co-op and a staff member at Food Secure Canada, says a discussion of the meaning of local is long overdue. She says "local" is too geographically oriented and doesn't cover all the bases.
"We need to understand that anywhere on the planet good and bad practices happen -- environmental practices, humane handling of animals, how people are being treated -- they happen anywhere on the planet and that will be local to someone all of the time."
Brynne also thinks the discussion is too focussed on fruit and vegetables.
"We cannot assume that we can get everything within 50 or 100 or 200 kilometres, wherever they will draw that line on the map. I have seen comments on different news feeds where people say things like, 'I get all my food locally, in my back yard.' Well, I am highly sceptical they are meeting all their protein and oil needs and full dietary needs in their back yards."
Brynne also points out that small-scale or regional farmers, fishers, and processers "are fundamentally business owners and you have to factor in their economic viability in order to attain all those other values, and sometimes that means when fishing and farming happens in sparsely populated areas, they have by necessity to ship further distances."
Jon Steinman says the problem is the very act of labelling. He is a Nelson journalist and the producer and host of the Deconstructing Dinner radio show and forthcoming television series.
"People have chosen to look for a label to give them an assurance of what they are buying. The same way a label like 'organic' has become very commodified, we are starting to see that with "local."
Steinman says our relationship to food is driven by a "mental image of what we are eating. We eat with our heads. We fear certain foods and will only eat certain foods because of where they are from or what is on the label. That is a mental relationship. If we demand certain foods, food that is natural, we are going to see more and more labels and brands that use the word 'natural'. If we demand foods that are farm fresh we are going to see multinational companies come out with a label that says "farm fresh."
"What we are demanding is just an assurance through a label. We are not really demanding change in the food system, we are just demanding that we feel good about what we are buying."
Steinman says we should "absolutely abandon even recognizing the CFIA as an agency that has any interest in serving us. Let's move beyond having to rely on those labels and start developing relationships with our food producers and with each other and creating our own names and labels."
Like True Local, perhaps. A local definition of local.
Read more: Food | <urn:uuid:0307f9cb-3c7f-4545-bcdb-382b83f2b35d> | CC-MAIN-2022-33 | https://thetyee.ca/News/2013/06/13/Local-Food-Goes-Too-Far/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00667.warc.gz | en | 0.966213 | 1,641 | 2.265625 | 2 |
POSITIVE SAFETY CULTURES: Toyota and our turbulent times
As I write these lines, the “Toyota situation” is still unfolding.
First, there was apparently a problem with driver’s side floor mats — they could interfere with the function of the accelerator, in a worst-case situation, depressing it. This triggered the recall of many Toyotas.
Next, it became clear that an additional problem with the accelerators, probably an electronic problem, could cause inadvertent maximum acceleration, which cannot be overridden by the brakes. This problem has been implicated in several deaths and appears to involve eight models of Toyota, as well as some Lexus models. Toyota has recalled millions of vehicles (current count as I write, around 8.5 million).
The company shut down production in the facilities that make these models, and shut down sales of the affected models from all dealerships for an unspecified period of time.
And additional problems are trickling in — problems with brakes in particular.
Pounded by the pressThe situation is clearly catastrophic. News sources emphasize several key points:
First, the response from Toyota is perceived as slow and disorganized — possibly even actively deceptive. Management was, and still is, “behind the story.”
Second, Toyota officials are seen as complacent (as the #1 auto maker in the world). When Toyota’s CEO spoke recently before Congress, he acknowledged his company might have “grown too fast,” with the pursuit of market dominance coming at the cost of quality and safety.
Serious questions are being asked: Will Toyota ever fully recover from this disaster? If so, how many years might it take?
Lessons learned1) Organizations must grasp the notion that the environment of business is increasingly “turbulent.” Success essentially guarantees nothing. Changes in customers’ expectations, competitors’ products and services, federal and state regulation, relationships with suppliers, labor agreements, leadership direction, and so on, can suddenly impact any business. When things change, they change amazingly quickly. Complacency must be challenged and resisted. No company can run on autopilot. That invites extinction.
2) Image and reputation in the marketplace is central to an organization’s success. They must be built and protected at all costs. A company known for its quality, its culture of continuous improvement, and the durability and safety of its products must quickly and decisively act if anything might tarnish that image. A company known for its focus on customers cannot respond to a crisis by closing its doors and becoming internally focused. It cannot afford to be perceived as responding in a slow, piecemeal approach.
3) Effective risk management includes “crisis management” plans. How will management quickly and transparently fix the problem? Second, how will it manage public relations issues generated by the crisis (and public perceptions of the company’s response)? This crisis management process should not be formuladriven and rehearsed as to appear slick or robotic. But at the other extreme, it must not appear chaotic, unorganized, and haphazard.
4) Beware of coming off “tone deaf.” I recently saw two Toyota commercials on TV, acknowledging and reacting to the crisis. One featured soothing background music as an equally soothing voiceover says vague but comforting things about how “we are working to regain your trust.” This reminded me of the classic movie “2001: A Space Odyssey,” and the sequence in the film when the rogue computer, Hal 9000, having done some very bad things, reassures Dave, the one remaining astronaut that Hal hasn’t terminated, that his (Hal’s) recent “problems” were all behind them now.
The second commercial featured a reassuring mechanic, who said he and his family drive Toyotas, and that he is confident that with the actions the company is taking, they are safe. The final screen says “Toyota... moving forward.” Ouch.
It’s instructive, in light of Toyota’s problems, for all of us to recognize the extent to which the external and internal environments of our business are exposed to turbulence. How quickly the game can change. We need active, accurate mechanisms of risk management — early-warning systems to identify “off-normal” events and to capture and isolate error that could lead to catastrophic consequences. And we need concrete (yet flexible) plans for crisis management, to include handling the problem (first) and handling the PR surrounding the problem and our handling of it (second). In the tragic Toyota situation there are lessons for us all. | <urn:uuid:f78ff676-9cb4-4945-abff-276aaac21fc0> | CC-MAIN-2017-04 | http://www.ishn.com/articles/89670-positive-safety-cultures-toyota-and-our-turbulent-times | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281331.15/warc/CC-MAIN-20170116095121-00220-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.963989 | 984 | 1.515625 | 2 |
- However, while nationalism has a great deal to do with unity, its development is also accompanied by the identification of disparities. The Russian Empire in the nineteenth century is an excellent case in point. For Russians, nationalism was about more than just customs, language, and history, though these were important as well.
- 1 How did 19th century expressions of nationalism differ from earlier ideas of nationalism?
- 2 How did the development of nationalism change notions of political superiority in the 19th century?
- 3 How did improvements in transportation increase the economic power of nation-states at the end of the nineteenth century?
- 4 What role did nationalism play in the changes that occurred in Europe in the 1800s?
- 5 How did nationalism and the idea of nationalism emerge?
- 6 What is the best definition of nationalism quizlet?
- 7 How did nationalism affect the 19th century?
- 8 What was nationalism in the 19th century?
- 9 What were the reasons for the rise of nationalism during nineteenth century Europe?
- 10 What was an improvement in transportation during the early 1900s?
- 11 What was transport like in the 19th century?
- 12 How did transportation change in the early 1800s?
- 13 In which century did nationalism emerged in Europe?
- 14 How did nationalism change Europe?
- 15 How did nationalism emerge in Europe?
How did 19th century expressions of nationalism differ from earlier ideas of nationalism?
What were the differences between nineteenth-century demonstrations of nationalism and early notions of nationalism? Because of geographical remoteness, as well as linguistic and theological distinctions, individuals in the nineteenth century argued over who belonged to their respective nationalities. This right, on the other hand, was exclusively provided to a subset of inhabitants of nation-states.
How did the development of nationalism change notions of political superiority in the 19th century?
What role did the emergence of nationalism have in shifting perceptions of political dominance in the nineteenth century? Political hierarchies were established as a result of nationalism. It removed nations that shared linguistic commonalities as a basis for their existence. Each country had the illusion that they were all the same and that there were no distinctions between them.
How did improvements in transportation increase the economic power of nation-states at the end of the nineteenth century?
The advancement of transportation technology has made it simpler for nation-states to get RAW MATERIALS. Because of the Suez Canal, the cost of shipping goods between Europe and Asia has been reduced. As a result of the Second Industrial Revolution, a massive wave of migration occurred.
What role did nationalism play in the changes that occurred in Europe in the 1800s?
Nation-states were able to get raw materials because of advancements in transportation. Because to the Suez Canal, trade between Europe and Asia has become more affordable. With the Second Industrial Revolution came a wave of MIGRATION, which has continued ever since.
How did nationalism and the idea of nationalism emerge?
Answer: Nationalism and the concept of the nation-state originated among Europe’s culturally and geographically varied peoples during the Renaissance. As a result of industrialization and social development, a middle class comprised of businesspeople, working professionals, industrialists, laborers, and members of the working class arose.
What is the best definition of nationalism quizlet?
In its most basic definition, nationalism is described as “the commitment of a people to their ideals, traditions, and geographical location.”
How did nationalism affect the 19th century?
Nationalism had a vital role in the development of Europe during the nineteenth century. Various tiny states, such as Germany and Italy, were unified and converted into a country as a result of their shared national identity.
What was nationalism in the 19th century?
a strong sense of national pride and loyalty to one’s country desire on the part of a cultural or ethnic group to unite and become a nation
What were the reasons for the rise of nationalism during nineteenth century Europe?
A community’s desire to demonstrate its unity and independence gave birth to current-day European nationalism in the contemporary sense. The nineteenth century saw the beginning of a deliberate fight to bring nationalist ideals to fruition. People all around Europe had been inspired by the French Revolution, according to advertisements.
What was an improvement in transportation during the early 1900s?
During the nineteenth century in the United States, the discovery of the steam engine significantly enhanced commerce by water and spawned a new transportation industry—the railroad industry—that continues today. The use of electricity to power certain steam locomotives began around the turn of the twentieth century.
What was transport like in the 19th century?
At the turn of the twentieth century, most Americans and newcomers to the nation traveled mostly by horseback or on the rivers of the country. After a while, primitive roadways were constructed, followed by canals. The railways quickly became the backbone of the country, transporting people and commerce with increased efficiency.
How did transportation change in the early 1800s?
Produce was transported from the farms to the ports by tiny boats traveling through canals and rivers. Large steamships transported cargo and passengers from one port to another. Railroads were built to connect communities, making it possible for everyone to travel more quickly.
In which century did nationalism emerged in Europe?
The rise of nationalism in Europe began in the nineteenth century.
How did nationalism change Europe?
People gained a new feeling of identity and belonging as a result of the growth and spread of nationalism. This resulted in heightened competition between nation-states as well. Following Napoleon’s fall, numerous other European countries banded together in an attempt to revert to the old—conservative—ways of doing things.
How did nationalism emerge in Europe?
The first instances of nationalism may be traced back to which nations. France is the answer. It was during the French Revolution that the importance of the ideas of Liberty, Equality, and Fraternity was emphasized the most. | <urn:uuid:5b6059fa-bea5-4038-b9e2-7097873bb795> | CC-MAIN-2022-33 | https://tipsted.com/ideas/how-did-nineteenth-century-expressions-of-nationalism-differ-from-early-ideas-of-nationalism-best-solution.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00669.warc.gz | en | 0.97323 | 1,238 | 3.75 | 4 |
Instead of just hanging up every time “Sharon, your local Google specialist” calls, one person decided to create an artificial intelligence that is as effective at wasting telemarketers’ time as telemarketers are at annoying you.
The Jolly Roger Telephone Co. was created by Roger Anderson, and it's a robot that talks to telemarketers (or anyone you want) by starting with “hello?” and keeps the conversation going by responding during silent moments with affirmatives like “yeah,” “uh-huh,” and “right.”
See also: 50 Amazingly Epic Pranks
The fun part is when the telemarketer starts to get suspicious or says something confusing to the robot and it responds with a few different things, like telling “honey” it’s on the phone right now and asking the telemarketer to repeat, or going into a short story about how it just woke up and needs some coffee. Anderson records these calls and puts them on his blog for your enjoyment.
You can use his robot for yourself by following the instructions on his blog:
Anderson told Mashable he’s been working in telephones since the early ‘90s, and he started getting telemarketing calls on his landline four times a night.
“The reason why people are canceling their landlines is almost always because of telemarketers,” Anderson said. “It’s offensive to me that the telemarketing industry is killing off landlines.”
One day, Anderson said his 12-year-old son answered the phone, and when he hung up he said, “Dad, they said a bad word.”
After that, Anderson set up what is essentially a telephone spam-blocker, which effectively made all autodialing telemarketers hang up because they weren’t reaching a person. It wasn’t stopping the incoming calls though and wasn’t causing them enough pain.
Then he experimented with adding a small greeting that said “hello” a few times to get them to connect, and it worked. Autodialers tend to hang up unless they hear a human voice, at which point they’ll patch in a waiting telemarketer.
“So then I said, ‘OK, let’s see how far I can take this thing,’” Anderson said. “I sort of created an algorithm of noise and silence detection that just kept them going.”
And it works. He has been improving it over time, trying new phrases and things to keep people on the line as long as possible.
“Maybe the telemarketing firm will take you off their list for real when they realize that all they do is get burned by a robot every time,” he said.
Anderson’s robot is getting more popular as more people are finding it on the Internet, and although a voiceover IP service’s cost per call is almost negligible, as more people use it the cost does add up, so he set up a donation button on his blog.
He records every call but he's getting several hundred calls per hour so he doesn’t have time to listen to every call coming through. If you do connect a telemarketer with his phone robot, Anderson said to send him a message with the time you made the call and he can send you a recording.
“It is entertaining and hopefully serving a vital function for humanity,” Anderson said. | <urn:uuid:876e57e6-7a28-4a14-ad64-f1b0b34078b3> | CC-MAIN-2017-04 | http://mashable.com/2016/02/03/robot-annoys-telemarketers/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00140-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.971532 | 746 | 1.679688 | 2 |
Dialog, in which Eve convinces Adam to eat the tree of knowledge. God orders them out of the garden. They lament, and hope to work their way back to Heaven
The story of the expulsion from the Garden of Eden occupies Genesis 3.
Belden (who calls this a "mystery play") notes that the ending of this song is "curiously unbiblical," and links it with Mormon doctrine. That it is Mormon there is no doubt, and it is true that there is no evidence in Genesis that humans can ever return to the Garden (in ordinary Christian theology this is a form of the Pelagian heresy). But I've seen equally non-biblical statements in hymns used by most Protestant denominations. - RBW | <urn:uuid:57120835-8023-45ac-8747-775f25312c61> | CC-MAIN-2022-33 | http://www.folklorist.org/song/O_Adam | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00075.warc.gz | en | 0.956968 | 152 | 2.453125 | 2 |
If you’ve been inundated lately with bounced email from addresses you’ve never sent a note to, you’re experiencing the heartbreak of backscatter. Backscatter is an attempt by scammers to get you to read unsolicited email by sending it using your return address – forging it, which is simple – and then having you open the messages that mail servers innocently return.
I’ve received thousands of backscatter bounces in the last few weeks, even as my spam filters have worked relatively well. It’s irritating, because I have to handle it much more manually than any other unfiltered message. Sometimes there are commonalities in the bounces that make it somewhat easier to filter – for instance, the last time Adam Engst suffered a backscatter attack, most of the bounces came from Russian addresses, so he temporarily filtered mail from .ru domains to the trash until the problem died down, which it usually does.
Your return email address can be forged without any effort by anyone – including systems that let you forward links to other people from news sites – because return addresses aren’t registered in any fashion. DNS may control the use of domain names, but there’s no such similar method of looking up email addresses to validate them.
Four years ago, I wrote “Sender Policy Framework: SPF Protection for Email” (2004-03-2), an article about an independent effort to create a way to register authority for email return addresses via DNS. Microsoft, Yahoo, and AOL all got in the game in different ways, extending SPF, developing their own systems, deploying anti-forging rules, or adopting rules to prevent forged messages from arriving for their email users and customers.
But none of the efforts has emerged as a winner, and verifying return addresses is still only one of several pieces that would restrict spam of a con-game nature. It’s a shame that even with several companies handling hundred of millions of email accounts, the kind of cooperative work that would be required to improve several parts of the way in which Internet email still seems beyond our reach. | <urn:uuid:6d361178-00e9-4dd0-85d0-06c9055afb1b> | CC-MAIN-2022-33 | https://tidbits.com/2008/05/11/backscatter-simulates-spam/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00667.warc.gz | en | 0.960783 | 439 | 2.296875 | 2 |
I have read somewhere that all the different races of the world are all descendants from The Twelve Tribes of Israel. Is there any truth to this and if yes, can you please explain?
This is certainly not true. The Twelve Tribes of Israel are ancestors of the Jewish people. In fact at the time that they were born different races already existed (early Bronze Age), so they could not have been descended from them. | <urn:uuid:62bd19c9-8ecd-40e3-8783-e516d437468d> | CC-MAIN-2017-04 | http://ohr.edu/ask_db/ask_main.php/181/Q4/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00511-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.972861 | 86 | 2.203125 | 2 |
SHANGHAI — The plastics industry in China is growing at a faster rate than its gross domestic product, and BASF SE officials believe there is growing consumer demand for sustainable products.
With the April 23-26 Chinaplas trade show approaching, BASF introduced some of the innovations it will highlight there at an April 10 news conference in Shanghai.
Frithjof Netzer, senior vice president for performance chemicals in the Asia-Pacific, gave a broad trend forecast. He said some new products reflected the company’s intensified R&D activities in the region.
Netzer said Ludwigshafen, Germany-based company’s growth plans require it to answer the needs of Asia Pacific that may be different from in other markets.
Zheng Daqing, senior vice president business and market development for Greater China, said changing consumer needs in China especially are creating challenges for consumers in energy use, consumer product safety and waste management.
“With the latest plastics solutions, we are collaborating with our customers on innovations to address these challenges that are developed in Asia Pacific, for Asia Pacific and the world,” he said.
BASF’s product announcements spanned a wide range of applications, from polyurethane systems for shoe soles to antioxidants for linear low density polyethylene film.
The automotive market is important in China. At Chinaplas, BASF will showcase a new lightweight car seat concept developed with AP Solutions, an Incheon, South Korea, design and engineering firm.
Andy Postlethwaite, senior vice president performance materials for the Asia Pacific, said slim foam polyurethane can achieve a weight reduction of 20 percent compared to a standard car seat, and space reduction of about 20 millimeters.
“The entire automotive industry is under pressure regarding emission and fuel consumption,” he said. “One way to deal with that is to reduce the weight of the vehicle parts. And the more advanced we get, with plastics, the more parts we can replace.”
Two of the technologies that BASF showcased, coextruded PVC-polybutylene terephthalate window profiles with Ultradur and anti-run hosiery made with Elastollan thermoplastic polyurethane, were developed specifically for the Asia Pacific market at BASF’s year-old innovation campus in Shanghai. The company recently announced that it will make an additional investment in R&D in the region, with a commitment to increase R&D by 3,500 jobs by 2020.
Other new products included flame retardants for electronics and light stabilizers for agricultural film. Netzer said the company is driven by customer demand.
“We will do whatever our partners in the markets, what they require us to do in terms of further growth and bigger success,” he said.
He added: “They tell me they need ideas that bring down costs in their plants and they tell me they need ideas that increase success in selling products in the marketplace.”
Reporters pressed executives to talk about growing concerns among Chinese consumers about the chemical industry’s environmental and health record, but Zheng deflected the questions by stating that BASF is acting in accordance with local regulations and according to safety standards.
“We encourage enhanced understanding and dialogue. We think it shows people are more interested in the chemical industry and this is a good thing,” he said. | <urn:uuid:4c1f674a-6d9d-4d17-a13c-a1c688602dc4> | CC-MAIN-2016-44 | http://www.plasticsnews.com/article/20140410/NEWS/140419989/basfs-new-products-for-chinaplas-will-focus-on-rd-for-the-region | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988717963.49/warc/CC-MAIN-20161020183837-00373-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.948583 | 710 | 1.585938 | 2 |
I get many questions on how to properly socialize puppies, and the topic is important enough to discuss in detail. In addition, as part of my work with Chako Pit Bull Rescue, I see many puppies pulled from shelters that have a few strikes against them in the socialization department, especially those that were placed in isolation due to medical issues.
Many people underestimate the role proper socialization plays in a dog’s development. It is really important–and I mean really– to ensure that young puppies are regularly exposed to different and new things. They should frequently walk on different surfaces and be exposed to various sights, sounds, and noises every day, multiple times a day.
The prime socialization period for a puppy occurs during the first three or four months of her life. During this time, the puppy’s brain is developing rapidly and, as such, she’s learning about the world very quickly. However, there are complications to properly socializing puppies. It’s not as easy as thrusting them into different environments and hoping for the best.
For instance, puppies are incredibly vulnerable to picking up potentially fatal diseases. Parvo, for example, is quite prevalent in the environment and highly contagious, especially to puppies. A puppy’s immune system isn’t really fully mature until about four to six months (and, in some cases, a year). That is why puppies need a series of vaccinations every few weeks.
So, you shouldn’t just take your puppy to a park and let him or her romp around. Because of this immunity issue, many people keep their puppies isolated at home for the first four months. Unfortunately, isolation is one of the worst things for puppies. Puppies need stimulation. Their brains need to explore and learn about the world, not just about your house and backyard.
Additionally, some puppies go through what is called a “fear stage.” This is a period of time during the puppy’s development where things that scare them may impact them later on, either affecting them throughout their lives or resurfacing after they mature. In addition, some puppies go through a fear stage where suddenly things that were familiar to them become slightly scary, and they act unusually timid. A puppy may go through one, two, or no fear stages during his first 4-5 months.
Regardless of whether a puppy goes through any fear stages, puppies are particularly susceptible to having negative experiences carry life-long consequences. Of course, how negative those consequences are and what triggers a puppy’s fear will vary based on the puppy’s own genetic makeup. Some puppies are naturally more confident, resilient and brave. Other puppies are intrinsically more cautious, timid, and less resilient.
So, how do you properly socialize your puppy without risking death or lifelong phobias? Use the following guidelines:
Take your puppy out with you, but not to places where other dogs frequent. For example, hang outside a department store, on cement, and let your puppy take in the sights and sounds of the parking lot. Make sure your puppy is enjoying the experience. If your puppy seems uncertain, relocate to a calmer environment where there’s less stimulation. Always have lots of treats with you and, yes, please do let people (not other dogs) gently say “hello” to your puppy. Even puppies with medical issues, like Spunky Brewster shown below, need as much stimulation and enrichment as possible (Spunky was adopted through Chako Pit Bull Rescue; she’s shown below on one of her outings).
When planning outings with your puppy, time them around your puppy’s vaccination schedule. A vaccination isn’t really effective until about five days after delivered, and for puppies, vaccination effectiveness only lasts a few weeks. Five to twelve days after your puppy’s vaccination is the best time to take your puppy out to new public places, and you should take your puppy out somewhere new at least once every other day during this period.
Weigh the risks and benefits of every outing. To me, personally, the lifelong risk to a puppy of being too isolated during his first four months outweighs the slight risks of contracting a disease (assuming you are careful where you take your puppy).
Keep in mind that puppies under 8-9 weeks of age may not benefit at all from vaccinations (because maternal antibodies may inactivate the vaccine), so take EXTRA care with very young puppies; it’s best not to let them on the ground in public. You can, however, hold them and let them take in the sights and sounds.
If you take your puppy someplace a little riskier disease-wise (for example, to a friend’s yard for a BBQ, take a large thick blanket and an ex-pen. Spread the blanket on the ground outside, preferably on cement, and place the ex-pen on top of the blanket to hold it down flat). Never let your puppy walk around where other dogs frequently potty, and if you see droppings from other dogs, keep your puppy well away from the area.
Take your puppy to pet stores, but let him or her ride in the cart. If you’re really paranoid, you can put a blanket in the cart or wipe it down (note, alcohol wipes don’t kill the Parvo virus, but the likelihood of your puppy getting parvo from the inside of a shopping cart is slim).
Ensuring Positive Experiences with Other Dogs
Do not let dogs you don’t know interact with your puppy. You don’t know the vaccination or temperament history of the dog. Disease aside, having an unfamiliar dog bite your puppy is a great way to give your puppy a negative experience that could set him up to distrust dogs well into maturity.
Do set up supervised play dates between your puppy and other dogs or puppies that you know to be safe, properly vaccinated, and who will interact well with your puppy and help reinforce proper dog manners in your puppy. Be careful about letting your dog interact with other puppies unless you are reasonably sure her puppy playmates are free from disease (especially Parvo). Keep in mind that puppies can have the Parvo virus for days without showing symptoms. If setting up playdates between two puppies, it’s best to make sure both puppies receive baths prior to their interaction (you may gain a slight benefit in reducing the risk of one puppy contracting a disease or parasite from the other puppy).
Obstacle Courses and Puzzle Games
Set up little obstacle courses for your puppy. Lay an ex pen down flat and place tempting treats on it to encourage your puppy to walk over it. Lay a shower curtain down so your puppy walks on that new surface. Get your puppy used to walking on hard surfaces, soft surfaces, smooth surfaces, and rough surfaces. Let them work puzzle toys. Hide treats in boxes and let them push the box around or rip it up to get the treat.
Give your puppy different toys to play with–LOTS of different toys. Toys that are soft, hard, fuzzy, smooth, squeak, crinkle, etc.
Acclimate your puppy to things he or she is likely to encounter throughout life. Get your puppy used to riding in the car, safely of course. Take your puppy to your vet’s office every once in a while, but not for an exam (keep her off the floor). Just ask the staff to give her treats and say hello quickly so she doesn’t always associate the vet’s office with getting stabbed, poked, or prodded (make sure to ask your vet’s office in advance about the best times to drop by). It’s best to do this before the first time your dog will need to be stabbed with a needle at the vet’s office. You want the puppy’s first experience at the vet’s office to be fun.
Also, get your puppy used to grooming. Gently touch his feet and ears frequently. Teach him to enjoy handling by making it a positive experience (using high value treats can help).
If your puppy finds something scary or overwhelming, try to make the scary thing seem fun and happy, but if need be, end the outing or the encounter. Never force your puppy to interact with or approach something she finds scary (but a little gentle encouragement can help).
Puppies gain confidence by overcoming challenges or fear (so gentle encouragement to approach something a puppy is slightly wary of, combined with lots of praise and treats, can help your puppy build confidence).
Incorporate mini exercises into your puppy’s life to expose him to knew things and teach him how to overcome insecurity. For example, two or three times over the course of a couple months, open an umbrella you don’t care about, set it on the ground, and toss treats at it. Let your puppy explore.
If you have an older dog, it’s great to use the older dog to show the younger dog the ropes. For example, if your puppy is afraid of a big ball, and your older dogs thinks the big ball is just great, let the older dog go up to the big ball. Play with the older dog and the big ball. Make it seem like the most fun in the entire world. Your puppy is watching and learning, and odds are, your puppy will then decide the big ball is something that’s not going to eat him, and he’ll really want in on the fun. Monkey see, monkey do. Dogs do learn by observing.
In short, give your puppy at least one positive new experience every day for the first four months of his life. Carefully supervise your pup’s interactions and reactions to ensure your puppy isn’t too overwhelmed. By providing positive, new, and different experiences on a regular basis, you will set your puppy up for a lifetime of being better able to handle strange and potentially stressful encounters later in life. | <urn:uuid:96f56225-6242-4f6c-ab9b-b7033ae455e0> | CC-MAIN-2017-04 | http://blog.chako.org/how-to-properly-socialize-puppies/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00050-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.956702 | 2,064 | 2.46875 | 2 |
Day 2 :
Emagine Packaging Limited, UK
Keynote: Logistical packaging innovation for chilled fresh fish and seafood marketing systems to support the emerging circular economy
Time : 10:15-11:00
Richard Coles launched his packaging consultancy, Emagine Packaging Ltd, five years ago with sustainability as a core brand value. He has over 30 years R&D experience in the food manufacturing and packaging industries gained with leading organisations from across the agri-food supply chain. He was recently involved with two Ellen MacArthur Foundation scheme circular economy collaborative research projects on pack eco-innovation. He is an Associate in Packaging at the Natural Resources Institute, University of Greenwich, for its MSc programmes in Food Innovation and Food Safety & Quality Management. He is an Associate Lecturer in Innovation & Design for the Open University. He is an Editor/Writer of book called “Food and Beverage Packaging Technology”.
Packaging’s logistical role in food marketing systems is becoming increasingly complex, especially in the modern retail environment that sources product from a highly globalized marketplace. This paper highlights packaging’s strategically important role from a circular economy perspective, an appreciation of which can enable retailers, brand owners and packaging suppliers derive competitive edge whilst improving their sustainability credentials. In particular, these key stakeholders are under intense pressure to take action and help address the increasingly urgent challenges posed by single-use plastics waste and growing marine pollution concerns. These concerns include, amongst others, the increasing threat to wildlife and human seafood supply chains. Globally, 95% of plastics packaging material value is lost to the economy after a short first use and 32% of plastics packaging escapes collection systems. In response, several leading UK food retailers and brandowners have announced policies to reduce their plastics footprint. In addition, the EU has launched its new plastics strategy which seeks to integrate plastics into the circular economy. This development has been given added impetus by China’s National Sword policy that imposes restrictions on the importation of recyclate with more than 0.5% contaminant. The paper will explore what scope exists in packaging logistics of chilled fresh fish and seafood to introduce biomaterial and reusable packaging as alternatives to single-use expanded polystyrene (EPS), or Styrofoam, packaging. This requires particular regard to protection from the hazards of transportation and invites consideration of the potential for new packaging systems and materials by challenging existing practices and involving collaborative partnerships.
- Food and Beverage Packaging | Material Science and Technology | Advances in Packaging
BioComposites Centre - Bangor University, UK
Tanja Cirkovic Velickovic
Ghent University Global Campus, Incheon, South Korea
Flood Creative, USA
Renée Whitworth is a Brand Design Consultant with over 20 of experience. She is the CSO for Flood Creative where she is responsible for the strategic foundation of all visual and verbal positioning, brand identity and packaging design projects for clients that range from the Fortune 100 to entrepreneurial brands. Her key to success is the constant monitoring of industry and cultural trends and applying those insights to client businesses such as: Accel Foods, Campbell’s, Colgate-Palmolive, General Mills, Georgia Pacific, Kimberly Clark, Kraft, Nestle and Unilever among many others.
In this session author will cover the basics on the traditional tools used by researchers to measure design effectiveness as well some established theories as to how consumers see and process brand and packaging design elements. More recently, however, social media, on-line shopping and other factors have changed consumer’s ability to process images at a rapid rate. Technology has had both positive and negative effects not just on the business of retail but also on brand design. While some can and may agree that design is purely subjective, this session will cover the ways researchers, marketers and designers use what can be measured for optimal results whether there is a real store shelf or not.
Institute of Materials Research and Engineering - A*STAR, Singapore
Xu Li is a Senior Scientist at Institute of Materials Research and Engineering (IMRE), Agency for Science, Technology and Research (A*STAR), Singapore. He finished his PhD in Polymer Chemistry in the Department of Chemistry, National University of Singapore in 2001. He is an Adjunct Associate Professor of the Department of Chemistry, National University of Singapore from 2012. He has published more than 100 research papers and filed 15 international patents of which some of the patented technologies were successfully adopted by industries. As a Principle Investigator, he is now leading a research team on polymeric materials development for various applications, including controlled release, bioimaging, energy storage and food packaging.
The main purpose of packaging is to protect the packed products from contamination and maintain high quality level of the products over sufficient period during distribution, storage, sale and use. Products especially for perishable foods are highly sensitive to oxygen. However, conventional transparent plastic films have poor oxygen barrier property and the technologies in the market to improve packaging’s oxygen barrier usually lead to high equipment investment, high energy consumption, and low transparency. To overcome these issues, two technologies have been developed by our group. For the first transparent oxygen-barrier packaging technology, natural source silicate nanomaterials have been successfully introduced into polymer matrix to produce gelatinous coating suspensiion and such developed coating suspension can be applied onto plastic films to produce laminated films with high oxygen barrier. The key technology here is to align all the plate-like silicate nanomaterials in one orientation along the plastic substrate such as PET film to create high efficient torturous path against oxygen molculaes, which is simply implemented via standard doctor-blade coating process. This process is compatible with the standard coating and lamination process applied in plastic film industries. With this technology, transparent polymer films with oxygen transmission rate less than 0.5 cc/m2 day have been achieved. The other technology is to introduce active component, such as the oxygen scavenger to remove the residue oxygen in the headspace of food packaging. Iron-based nanomaterials with high oxygen scavenging property have been developed and integrated into coating suspension to prepare transparent coating. Such transparent coating can achieve oxygen scavenging capacity about 8.8 cc/100 cm2. It can be applied to pack paste food or liquid food, which it is impossible with oxygen scavenger in sachet.
Kocaeli University, Turkey
Guralp Ozkoc has received his PhD degree in 2007 at the Polymer Science and Technology Department, Middle East Technical University. He worked as a PhD intern at DSM Research in 2005, in The Netherlands. He started as Assistant Professor in Kocaeli University, Department of Chemical Engineering in 2008. He had Chaired the Polymer Science and Technology graduate programme for six years from 2011 to 2017. He has supervised 25 MSc thesis and 10 PhD thesis. He holds five patents and he is the author of many international scientific papers and proceedings.
In this study, the biodegradable blends of thermoplastic starch/poly(butylene adipate-co-terephtalate) (TPS/PBAT) and oxidized thermoplastic starch/poly(butylene adipate-co-terephthalate) (OTPS/PBAT) were melt compounded in the presence of styrene-acrylic multi-epoxidized polymeric compatibilizer. The need for OTPS is to balance the hydrophilicity. The compatibilizer is used to enhance the interfacial properties and the phase dimensions. The TPS/PBAT, OTPS/PBAT and the compatibilizer ratio were selected as material parameters. The TPS/PBAT and OTPS/PBAT blends with and without compatibilizer were characterized by tensile, impact tests; differential scanning calorimeter (DSC), thermogravimetric analysis (TGA) and Fourier transform infrared spectroscopy (FTIR). The rheological behavior was investigated by means of oscillatory rotational rheometer. The morphology investigated by means of scanning electron microscopy (SEM). It was founded that the multi-epoxide compatibilizer improved the mechanical and rheological properties of the blends.
Institute of Crystallography – CNR, Italy
Rocco Caliandro has obtained his PhD from the University of Bari working in High-Energy Physics at CERN. Since 2001, he is a Researcher at the Institute of Crystallography of CNR, where he leads a group devoted to structural characterization of bio-macromolecules by x-ray techniques. His research activities are carried out by using synchrotron light sources to carry out x-ray diffraction, x-ray absorption spectroscopy (XAS) and small angle x-ray scattering (SAXS) experiments on proteins and crystalline materials. He has published about 130 scientific publications (H-index=25; number of citations=4375, average citations per article=34.7, source ISI web of Knowledge) in international journals with high impact factor.
The great antimicrobial and antioxidant potential of enzymes makes them prone to be used as active packaging materials. Major drawbacks are connected to the use of enzymes freely dispersed in solution, due to reduced protein stability. The immobilization of enzymes on solid supports to create biocatalytic interfaces has instead been proven to increase their stability and efficiency. A recombinant fungal laccase isoform was tested as potential antitoxin agent for food packaging. It has been successfully immobilized in its active form into hydrogel films. The recombinant enzyme, coupled with a proper laccase-mediator system, was effective in degrading widespread and very hazardous mycotoxins such as aflatoxin M1 and aflatoxin B1. As a second food packaging solution, advanced materials composed of hydrogel layers coated on hydrophobic membranes were used to grow lysozyme crystals as antimicrobial agent. The overall catalytic efficiency of the new antimicrobial biofilm was increased by a factor two compared to the pure enzyme dissolved in solution at the same quantity, and a 60-times lower amount of lysozyme was necessary to achieve a comparable antimicrobial activity.
Kocaeli University, Turkey
Semin Ozge Ozkoc has completed her PhD from Middle East Technical University. She worked at Biological and Environmental Engineering Department of Cornell University as a guest Researcher during her PhD as a part of NSF-TUBITAK joint project. She worked in a European Union project (EUROFIR, FP 6 project) as a PhD student and as a Reasearcher. She has published more than 15 papers in international and national reputable journals. She has written two book chapters with her colleagues in reputable international publishers.
Celiac disease is a chronic small intestine disease which occur by autoimmune mechanism and is induced by prolamin proteins that wheat, barley and rye have. The most effective known treatment for celiac disease to date is a gluten-free diet. In gluten-free bakery products, low amount of ingredients that can hold water, lack of gluten in the formulation and use of starch-rich ingredients cause inferior product quality and shelf-life. Edible films and coatings are getting increasing interest and are one of the important topics of food packaging. These biodegradable films can improve quality, shelf-life and safety of products by protecting foods from physical, chemical and biological deteriorations. In this scope, gluten-free films were produced by dry process with a laboratory scale twin-screw microcompounder. In the film formulation, corn starch, gelatin, glycerol and co-plasticizers, tributhyl citrate (TBC), triisodecyl citrate (TIDC) were used. In the shelf-life study, color, water content, texture profile analysis, peroxide value and differential scanning calorimetry (DSC) analysis were done at wrapped gluten-free cookies after 1 hour, 28 days, 56 days and 84 days of storage. Wrapping of gluten-free cookies with gluten-free edible films provided more crisp, less staled cookies compared to unwrapped cookies. Use of edible films improved quality of gluten-free cookies by decreasing weight loss and retarding oxidation during storage.
Institute of High Pressure Physics - Polish Academy of Sciences, Poland
Aleksandra Drozd-Rzoska has completed her PhD in 1998 from University of Silesia, Actually, she is the Researcher in the Institute of High Pressure Physics PAS, Warsaw, Poland. She has published more than 100 papers in reputed journals, few patents related to foods and related under pressure, Co-Editor of two books.
In glass forming systems, including low molecular weight liquids, resins and polymers, the increase of pressure (P) most often increases that glass temperature (Tg), i.e. dTg/dP>0 notwithstanding, there is a notable minority of systems where the opposite behavior takes place, i.e. dTg/dP<0 This contribution presents the uniform way of portraying both mentioned cases, indicating that the maximum of Tg(P) may be a general feature although it can be hidden in the negative pressures domain or under extreme pressures Subsequently, the issue of the isothermal, pressure parameterization of viscosity (h(P)), relaxation time (t (P)), electric conductivity (s(P)), …in the previtreous domain is addressed First, the generalized pressure counterpart of the Vogel-Fulcher-Tamman (VFT), able to penetrate also into negative pressures domain, is discussed Second, the preference for the critical like description for some glass formers (including selected polymers) is shown Finally, the new explanation for the puzzling problem of the inflection phenomenon for previtreous effects of mentioned properties (h(P), t(P)), s(P)) is presented. The discussion is supported by experimental dependences obtained via the broad band dielectric spectroscopy studies up to extreme 22 GPa We stress the significance of results obtained for the fundamental insight into the glass transition phenomenon, considered as one of grand challenges of contemporary physics, and also for variety of applications – including ones dealing with ‘plastics’/polymers and foods packaging.
National Taiwan University of Science and Technology, Taiwan
Chyau Huiy Jang has completed her Bachelor of Science degree in Industrial Design in 2016 from National Cheng Kung University. Currently, she is in her second year pursuing her Master’s degree in Industrial and Commercial Design in National Taiwan University of Science and Technology, focusing on food packaging design.
Ongoing trends to promote a healthy and higher quality lifestyle have led to the importance in the study of consumer insights towards food packaging. As the marketplaces have grown, visual appeal of the packaging design increasingly competed for consumers’ attention. The use of graphic elements can enhance a product’s overall perception. Packaging effectiveness is associated with how consumers comprehend the content message and perceive the product quality. In this study, two experimental stimuli (novel and conventional classic) were manipulated on a packaging design. The purpose of this research was to explore novel and conventional classic packaging design prototypes in the marketplace and how consumers perceived effective packaging design with an analysis of event-related potential (ERP), measure of brain responses by means of electroencephalography (EEG). The experiment was conducted with 120 packaging design samples. Whether familiar or unknown to the consumers, packaging design prototypes in the marketplace showed: brand name, color combination, layout, typography, and the usage of imagery through photography or illustrations. Analysis of event-related potentials indicated that for novel and conventional classic packaging design, N1 was involved in the visual discrimination processing and spatial attention; P3 was involved in the novelty and affective processing; and N400 was involved in response to familiarity detection. Through this research, new findings can contribute and provide reference on how to obtain better result design guidelines in order to create an effective packaging design. | <urn:uuid:1f068e23-a96a-4697-86c1-97db612224ac> | CC-MAIN-2022-33 | https://foodpackaging.foodtechconferences.org/2018/scientific-program.php?day=2&sid=4932&date=2018-07-17 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00271.warc.gz | en | 0.939378 | 3,376 | 1.632813 | 2 |
It was the 213th Tuesday of 2022. If you were born on this date your birthday numbers 8, 1 and 2022 reveal that your life path number is 6. Your zodiac sign is Leo with a ruling planet Sun, your birthstone is the Peridot and Sardonyx, and your birth flower is the Gladiolus. You are 10 days old, and were born in 2020s, in the middle of Generation Alpha. The generation you are born into makes an impact on your life. Swipe up to find out what it all means.
→ August 1, 2022 was a Monday
→ Zodiac sign for this date is Leo
→ This date was 10 days ago
→ 2022 was the Year of the Tiger
→ In 2023, August 1 is on Thursday
People born on this day will turn 1 in exactly .
If you were born on this date:
You have been alive for . You were born in the Year of the Tiger. Your birth sign is Leo with a ruling planet Sun. There were precisely 0 full moons after you were born up to this day. Your billionth second was on will happen sometime on April 9, 2054.
→ You’ve slept 3 days or 0.01 years.
→ Your next birthday is away
→ You’ve been alive
→ You were born in the Year of the Tiger
→ You have been alive 241 hours
→ You are 14,465 minutes old
→ Age on next birthday: 1 years old
You were born on a Monday
August 1, 2022 was the 213th Tuesday of that year. It was also the 213th day and 8th month of 2022 in the Georgian calendar. The next time you can reuse 2022 calendar will be in 2033. Both calendars will be exactly the same.
There are left before your next birthday. Your 1st birthday will be on a Tuesday and a birthday after that will be on a Thursday. The timer below is a countdown clock to your next birthday. It’s always accurate and is automatically updated.
You’ve slept 33% of your life!
Assuming you’ve been sleeping 8 hours daily since birth. Here is how much time you’ve spent sleeping so far:
You’ve slept 0.01 years of your life.
You’ve slept 0 month of your life.
You’ve slept 0 week of your life.
You’ve slept 3 days of your life.
Did you know you have taken approximately 201,600 breaths since your birth? Moreover, using 80 beats per minute as average, your heart has beaten over 1,152,000 times. You have also blinked over 244,800 times in your lifetime.
#1 Song on your birthday
The number one song in the US on the day of your birth was [Not available]. No song matches found.. (Billboard Hot 100 – August 1, 2022). Ask your parents if they remember this popular song.
Celebrities born on August 1, 2022
You share a birthday with We could not find a celebrity that shares a birthday with you. However, we update our database constantly, and invite you to check back later to see if we found someone with the same birthday..
We have over 150,000 celebrities in our database. We will continue to update this list with matching birthdays, so bookmark this page and check back often. You can also find out all celebrity birthdays born on August 1, 2022.
What happened on August 1st
Below are some of the most important historical events that happened on 1 August 2022.
527 – Justinian I becomes the sole ruler of the Byzantine Empire.
1086 – Results of the Domesday inquiry presented to William the Conqueror in Salisbury (the date of compilation and the Great Domesday are historically contestable).
1774 – Joseph Priestley, English theologian, chemist and author discovers oxygen by isolating it in its gaseous state.
1834 – Slavery abolished throughout the British Empire - Slavery Abolition Act 1833 comes into effect.
1958 – US atomic submarine USS Nautilus begins 1st transit of North Pole "operation Sunshine".
Sports in 2022
NBA – Golden State Warriors beat Boston Celtics (4 - 2) to win the NBA Finals.
NHL – Colorado Avalanche defeated Tampa Bay Lightning (4 - 2) to win the Stanley Cup.
NFL – Los Angeles Rams beat Cincinnati Bengals (23 - 20) to win Super Bowl LVI on February 13, 2022 in Inglewood, CA.
MLB – The 2022 World Series will take place after the regular season concludes in late September or early October to win the World Series.
Your life path number is 6
So what does your birthday really say about you and what does your life path number mean? On the next page, we’ll explain what your birth sign, ruling planet, age generation, birthstone, and birth flower mean — and more!
Continue to the next page to discover the answers to the most important questions about your birthday. | <urn:uuid:9c0c0594-7eef-433d-8d82-5570066dc088> | CC-MAIN-2022-33 | https://www.birthdayanswers.com/date/august-1-2022/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00673.warc.gz | en | 0.959424 | 1,048 | 2.03125 | 2 |
RUSSIA RELIGION NEWS
Monitoring news media reports about religion in Russia
countries of CIS
Copyrighted material. For private use only.
If you quote material, please credit the publication from which it
came. It is not necessary to credit this Web page for any print use of
the material. If any electronic reproduction is made, please
the URL: http:www.stetson.edu/~psteeves/relnews/
of News Items
Links to Useful
ALEXIS II CONDUCTED WORSHIP IN POKROV MONASTERY
Mir religii, 2
Tuesday morning Pariarch Alexis II of Moscow and all-Rus led the
festival divine liturgy in the Pokrov convent of Moscow. Around
9:15, Moscow time, the patriarch was met at the gates of the cloister
by a large crowd of Orthodox believers who greeted the primate of the
Russian Orthodox church (RPTs) with the proclamations "Christ is risen"
and "Many years."
Against the background of the festive peeling of bells and the singing
of the women's convent choir, Alexis II entered the main cathedral of
the cloister where the service began. The cathedral of the
Resurrection in Pokrov convent, where Alexis II celebrated the divine
liturgy, was unable to accommodate all who wished to enter.
According to reports from RIA Novosti, around 1,000 believers gathered
in the church. About another 2,000 persons worshipped in the yard
of the cloister, where the service was broadcast on a large screen.
The patriarch greeted the audience with the joyful paschal proclamation
"Christ is risen."
An unusual atmosphere of animation and joy ruled within the convent. At
the entrances to the cloister one could catch sight of a multitude of
festively dressed people rushing to the service with flowers.
Also in festive robes were dozens of clergy who concelebrated the
liturgy with the patriarch.
Before the beginning of the liturgy Alexis II venerated the relics of
St. Matrona of Moscow, who is buried in the Pokrov church [church of
the Protection of the Virgin] of the monastery.
The line of believers who came to venerate the saint's relics with
traditional flowers wound for hundreds of meters beyond the gates of
the cloister. Now approximately 3,000 persons were located in the yard
of the convent, where those desiring to do so continued to arrive for
venerating the relics.
This year, on 2 May, the Russian Orthodox church celebrates the 55th
anniversary of the death of St. Matrona of Moscow, whose relics are
located in Pokrov monastery.
Matrona Nikonova was born in 1885 in the village of Sebino in Tula
province, into a poor family. The girl was blind from birth, but God
granted her spiritual vision. From her early years Matrona was
acquainted with human intents and sins and she predicted natural and
social disasters. Through her prayers people received healings from
diseases and consolation in their sorrows, according to the vita of the
In 1925 St. Matrona resettled in Moscow. She would receive up to forty
persons as day. Her aid to people was selfless. Matrona prayed for
victims and she stressed that it was not she that helped, but
God. St. Matrona died 2 May 1952. According to her vita, before
her death she said: "Everyone, everyone, come to me and tell me
about your life and your sorrows and I will see you, listen, and help
you." In the autumn of 2004 the bishops' council of RPTs
canonized Matrona of Moscow as a church-wide saint. (tr. by PDS,
posted 2 May 2007)
Religion News Current News Items
MOSCOW PATRIARCHATE CONDEMNS MEDIA SPREADING RUMORS ON PATRIARCH'S
Interfax, 1 May 2007
The Russian Orthodox Church has exposed a reason behind rumors on
drastic health deterioration of Patriarch Alexy II of Moscow and all
Russia and is indignant over attempts by a number of journalists to use
rumors in their work.
"The Patriarch lives a tense life devoting himself to serving people.
He, as well as every one of us, has the right to remain alone and to
take care of the health sometimes, several times a year. However, some
do not respect the right," Archpriest Vsevolod Chaplin, deputy head of
the Moscow Patriarchate Department for External Church Relations, told
Interfax on Tuesday.
Speaking about origins of rumors, the archpriest said: "Someone from
the Russian 'best society' wanted to speak with the patriarch about his
problems, as usual the most important in the world; however, he was not
allowed. This generated a rumor: if he does not speak with me, things
are very bad The rumor was spreading among officials and diplomats for
a couple of days, and then thanks to admirers of hot sensations, the
rumor got on the Internet," he said.
Then, "a mean and dirty campaign began," the archpriest said. For
example, one 'parareligious' website "was posting materials every hour
that the unification with the Russian Orthodox Church Outside Russia is
under a threat," he said.
"Such publications go as following: dear foreign priests, do not come
to Moscow, because chekists in budenovkas and with Mausers will sign a
canonic communication act instead of the Patriarch. And of course a
famous near-Moscow komsomolets in its declining years began to spread
rumors on the health of the Patriarch, distorting statements made by
religious figures and materials of various media organizations," he
The priest said that the journalist writing such materials was not
embarrassed by the fact that representative of the Church came up with
"absolutely clear comments."
"The person is unlikely to repent his main sins, lies and attempts to
pit religious figures, at a confession, which does not help him," the
Archpriest said, recommending the journalist "to ask a psychiatrist for
a piece of advice."
"I am certain that there are people among Orthodox doctors, who will
help him free of charge. However, should the issue deal with demons,
other help is required in this case," he said.
PATRIARCH ALEXY II PHILOSOPHIC ABOUT RUMORS OF HIS "DEATH"
Interfax, 1 May 2007
Patriarch Alexy II of Moscow and All Russia ‘treated philosophically’
the rumors about his ‘demise’, Sergey Kravets, director of the Orthodox
Encyclopedia church research center, told Interfax.
‘I inform you that I am still alive’, these were the words, according
to Kravets, with which the patriarch greeted him the day after
disturbing news appeared in some mass media.
Alexy II’s first reaction to these rumors was ‘a sincere astonishment
at the incompetence of some journalists’, Kravets said adding that ‘the
patriarch began to wonder even more why the false report continued to
be replicated even after the official refutation’.
‘Significantly, Patriarch Alexy, contrary to what has been reported
about him recently, has never undergone coronary artery bypass
grafting, nor has he survived an apparent death, though some wrote
there were even two of them. In other words, the only truth was that
the patriarch’s name is Alexy’, Kravets remarked.
He said on May 1 the patriarch, as was expected, would return to Moscow
and already on May 2 his rather tough schedule of divine services and
working meetings would begin.
He also shared his opinion that ‘the mass media which put the patriarch
into an intensive therapy ward and hastened to ‘bury’ him should
apologize to the primate’.
Kravets described the rumors as ‘absolute nonsense’. ‘We will find out
if there was a malicious intent. But I would remind my colleagues that
they should learn to use the freedom of information they enjoy, not to
turn it into a phantom’.
In conclusion, Kravets noted that ‘in popular belief, if a rumor seeks
to ‘bury’ a person, it means he will live a long life’. (posted 1 May
Religion News Current News Items
RELIGIOUS ORGANIZATIONS REQUIRED TO SUBMIT ACCOUNT OF ACTIVITIES
From Slavic Legal
An audit form for religious organizations has been issued by the
government of the Russian federation. Religious organizations are
required to submit an account of their activity no later than 1 June
In accordance with a decree from the government of RF, No. 213 of 10
April 2007, a form has been issued for giving an account of the
activity of a religious organization, and information about the
leadership and the composition of administrative bodies of a religious
organization, expenditure of financial resources by a religious
organization and its use of other property, including what has been
received from international and foreign organizations, foreign
citizens, and persons without citizenship, for the year 2006.
It is now clear that the deadline for submitting these accounts is 1
June 2007 and it will not be postponed any longer. We recall that
previously religious associations were required, like all ngo's, to
submit a detailed annual accounting of their activity, including
persons participating in services and other kinds of events and
financial actions. Leaders of major denominations have noted
frequently that this is impermissible interference in their activity.
Even though this document was worked out taking into account the
opinions of representatives of religious associations, a number of
provisions can be interpreted ambivalently. Thus, for example, it is
not quite clear whether an organization must give an account regarding
all of the property that it used or only that which was acquired by the
organization in the past year. And there are rather many of such
provisions. Considering that only a month and a half remains
until the deadline, religious organizations have to figure out urgently
the true intent of the authors of the audit form in order that they
will not, God forbid, make mistakes in filling it out. Because
then any organization could arbitrarily be accused of violation of
legislation and undergo liquidation on that basis. (tr. by PDS,
posted 1 May 2007)
[tr. note: this audit form was published 18 April 2007 in
Rossisskaia gazeta. It is available through the Slavic Legal
. The following is a translation of the items that
are to be entered into the lines on the form]
1. Forms of activity in accounting period in accordance with
1.1 Basic forms of activity (indicate
by check mark)
1.1.1 Conduct of religious rituals,
sacraments, and ceremonies
1.1.2 Religious education
1.1.3 Dissemination of religious teachings directly or through mass
1.1.4 Cultural-educational activity
1.1.5 Distribution of religious items and literature
1.1.7 Charitable activity and other activity in sphere of social
1.2 Other activity (list)
2. Sources of acquired property (indicate by check mark)
2.1 Received from Russian legal entities
2.2 Received from foreign legal entities
2.3 Grants, technical or humanitarian aid from foreign states
2.4 Income from manufacturing activity
2.4.1 Commodities, labor, services
2.4.2 Other (list)
2.5 Other acquisitions
3. Information about expenditures of financial resources,
including those received from international and foreign organizations,
foreign citizens, and persons without citizenship
3.1 Total expenses for accounting period
3.2 Forms of expenditures of financial resources received from
international and foreign organizations, foreign citizens, and persons
3.2.1 Expenses for basic activity
3.2.2 Expenses for wages
3.2.3 Expenses for obtaining basic resources
3.2.4 Expenses for construction, repair, and reconstruction
3.2.5 Taxes, duties, and other fees
3.2.6 Other forms of expenditures of financial resources (identify)
22.214.171.124 Humanitarian aid
4. Information about use of other property acquired from
international and foreign organizations, foreign citizens and persons
4.1 Basic resources (identify)
4.2 Other property (identify, grouped by type)
Appendix: information about leadership and staff of
administrative bodies of a religious organization (list A)
Accuracy and completeness of information confirmed:
Authorized person of the religious organization appointed (elected) in
accordance with charter:
Religion News Current News Items
Orthodox burials for Russian leaders
THE HOLY TOUCH
by Andrei Zolotov, Jr.
Russian Profile, 30 April 2007
The last contribution that Boris Yeltsin made to building a new Russia
was that he inadvertently gave the country a new ritual of state
funeral. What we all saw on Wednesday was an important step in the
formation of a new canon. Future leaders may introduce some changes to
it, but the precedent and the frame of reference are now set.
No longer will Russian leaders lie in state at the Hall of Columns of
the House of the [Trade] Unions – Moscow’s former Nobility Assembly,
where Lenin’s body was first displayed in 1924 and where all subsequent
Soviet leaders lay in state. And no longer will they be buried near
Lenin’s Mausoleum in Red Square – in the necropolis of the Soviet elite
whose future is at present being debated.
Instead, on Wednesday the whole world watched the solemn beauty of the
Orthodox Christian burial service, with CNN and BBC commentators using
epithets like “grandiose” and “majestic” to describe the proceedings.
Everybody has pointed to the fact that the funeral service was taking
place in the Christ the Savior Cathedral, which was rebuilt under Boris
Yeltsin as a symbol of the extraordinary revival of Russia and the
Orthodox Church after the demise of the Communist era.
Similarly to Yeltsin’s own life and rule, the reconstruction of the
cathedral was a controversial venture, and far from everyone was happy
with it. But today it stands as a monument to our recent history and
the desperate attempts to reconnect, however inconsistently, with our
“Boris Nikolayevich’s fate reflected the dramatic history of the 20th
century,” Patriarch Alexy II wrote in a message read out in the
cathedral before the service. Yeltsin felt “the people’s will for a
free life” and helped to make it happen, the patriarch wrote, recalling
Yeltsin’s kind treatment of the Russian Orthodox Church and his own
personal relationship with the former president. “For the first time in
more than 100 years, we are sending off the head of the Russian state
in a church, with prayer,” he wrote.
Yet, despite their long-standing personal relationship, Patriarch Alexy
chose not to interrupt his treatment in Switzerland to give Yeltsin the
last blessing. The fact that the head of the Russian Orthodox Church
goes several times a year to an unidentified Swiss clinic is never
publicly announced, but it is widely known in church circles. He
telephoned Yeltsin’s widow, Naina, and sent two official messages. But
the funeral itself was led instead by three senior bishops:
Metropolitan Yuvenaly, who presided and read the patriarch’s message,
and Metropolitans Kirill and Kliment, who are both seen as potential
successors to the patriarch.
It is hard to say whether the reason behind the patriarch’s absence was
just his state of health and the importance of the ongoing treatment
after the exhausting Lenten and Easter services and ahead of the
historical reconciliation with the Russian Orthodox Church Abroad
scheduled for May 17. Perhaps. But the fact remains that the head of
the Russian Orthodox Church was away at a historical moment, when the
eyes of the whole world were fixed on his church. Or maybe this
decision added a subtle detail to the ritual being formed today – that
a funeral conducted personally by the sitting head of the church is
reserved only for the royals and possibly a head of state who died in
office, not in retirement?
Much has been said about the monarchist instincts of most Russians and
the authoritarian character of Yeltsin’s 1993 constitution, which made
the Russian presidency more powerful than Tsar Nicholas II was after
1905. Yeltsin himself was rumored to refer to himself as Tsar Boris and
was depicted as such by many cartoonists. Interestingly, this
monarchist tendency was delicately reflected in the service, too.
While thousands of Russians filed past the casket to pay their
respects, the Book of Psalms was read overnight, as befits laymen, over
Yeltsin’s coffin by Moscow seminarians – and not the Gospels, as
tradition prescribes for priests and the emperor.
But in a layman’s funeral service broadcast worldwide on Wednesday (the
last rites for clergy are different), the priests prayed not “for the
repose of the soul of Boris, the servant of God,” which would be the
case in an ordinary funeral, but, using a formula that sounded odd to
the ears of Orthodox Christians, for the “first President of Russia
Boris Nikolayevich.” I don’t know if those who prepared the service
were thinking about it, but the use of the patronymic form of the name
in Russian Orthodox liturgy used to be reserved solely for royalty.
That’s how the emperor and his immediate family were commemorated in
the liturgy before the revolution – by their name and patronymic. It
has never been done since then.
The honor guard and the gun carriage recalled the past funerals of
Soviet leaders. But the site was not Red Square, but Novodevichy
Cemetery – the country’s most esteemed place of internment, where
Nikita Khrushchev was buried in near secrecy in 1971, seven years after
he was ousted from the country’s top post. Priests, family members and
the sitting president followed the carriage, not Politburo members. And
the carriage itself was draped not in Communist red, but in the
white-blue-red tricolor of present-day Russia. It was a new ritual, yet
a very organic one.
Watching Yeltsin’s funeral, I recalled the only time I saw Boris
Nikolayevich up close, at the Cathedral of Christ the Savior on Easter
in 1996. It was Easter Vespers, a short festive service in the evening
on Easter Sunday, which that year fell on April 14, and was the first
service conducted on the main floor of the cathedral just two years
after its reconstruction had begun.
The walls were already up, but none of the decorations were in place.
Carpets were placed on concrete floors and, amid the immense grey walls
and iron rods sticking out, the continuous chant of “Christ is Risen! –
Indeed He is Risen!” sounded with particular joy.
For me, it was also the day of my engagement. As my wife-to-be and I
were leaving the church, the bodyguards were making way for a giant man
with a heap of white hair. He was indeed a head taller than the crowd
around him. “Look, Yeltsin!” I told my bride. She couldn’t believe it.
Much has changed in Russia since then – for better and for worse. The
cathedral’s interior, reconstructed according to the old designs,
shines today with marble, paintings and gilded decor. Two empty thrones
are the latest addition – for the tsar and tsarina. And in the middle
of it stood the coffin with Yeltsin’s body, covered by the traditional
shroud depicting Golgotha and the Russian national flag, brought back
by Yeltsin in 1991. The choir intoned “Christ is Risen!” and
“Memory Eternal!” Eternal indeed! (posted 30 April 2007)
Religion News Current News Items
Concern over patriarch's health
PATRIARCH BETWEEN LIFE AND DEATH
Gazeta.ru, 27 April 2007
Rumors about the death of the head of the Russian Orthodox church,
Alexis II, are being spread by the Internet. According to news media
information, the patriarch experienced two clinical deaths and expired
on Friday in a Swiss clinic. The patriarchate categorically
denied this report; they said in the church that the head of RPTs is in
Switzerland for scheduled treatment and will soon return to Moscow.
On Friday, soon after the report of the death of Mstislav Rostropovich,
the Russian internet carried a report that Patriarch Alexis II of
Moscow and all-Rus had died in a Swiss clinic. Blogs reported even the
time of death, 15:35 Moscow time. It was also reported that the church
will not make this news public earlier that Saturday. Soon information
appeared on several news sites on the internet. A bit later reports
appeared in news media that Alexis II had not died on Friday, but had
experienced clinical death twice and is in critical condition.
The Moscow patriarchate categorically denied reports of Alexis II's
death as well as of his critical condition.
The patriarchate expressed surprise that "such information has appeared
from somewhere." "Recently the patriarch confirmed the schedule
for events following divine liturgy on the next day," Vladimir
Vigiliansky, director of Moscow patriarchate press service, told
In fact, the head of RPTs left some time back for scheduled treatment
in Switzerland. According to Gazeta.ru's source, persons accompanying
the patriarch reported that the head of RPTs is alive. They said that
they were astonished when people began calling them Friday morning from
Russia and persistently inquired about the state of Alexis II's health.
Somewhat later ITAR-TASS news agency, citing the patriarchate's
information, reported that on Friday Alexis II called his aides and
confirmed that he intends to return to Moscow on 1 May.
According to schedule, on 2 May he is supposed to conduct divine
liturgy in the Pokrov monastery in Moscow on the occasion of the 55th
anniversary of the death of St. Matrona of Moscow. On 5 May the
patriarch is scheduled to celebrate the divine liturgy, a prayer
service, and a requiem on the day of the Synaxis of the New Martyrs of
Butovo Prison at Butovo Polygon.
Almost simultaneously with these assurances information appeared on
news services that the patriarch had expressed condolences upon the
death of musician Mstislav Rostropovich.
Reports about problems with the patriarch's health have appeared in
news media for a long time. The patriarch has suffered from heart
disease and has had several heart attacks. Information appeared in the
press that he lost consciousness several times in public during trips
In October 2002 there was news that when Alexis returned from
Switzerland, appearing in recovered health, he inspired the Orthodox
community. During a visit to Astrakhan to mark the occasion of the
400th anniversary of the local diocese, the patriarch felt ill and was
hospitalized for recovery in a local hospital. The next day Alexis was
transferred to a clinic in Moscow. At first it was thought that His
Holiness had experienced a crisis of hypertension, but later it was
reported that Alexis II had undergone a minor heart attack, which led
to problems with a brain hemorrhage.
In the first half of 2003 the patriarch was hospitalized twice.
According to official information, that was for a cold. Doctors then
gave assurances that there was no reason for concern about the
patriarch's health. It later became known that in April Alexis ii had
suffered a serious case of flu, complicated by bronchitis.
Following that illness the patriarch seldom conducted services and he
was even unable to attend the Paskha evening service.
In the summer of 2004, it was reported, Alexis II had a stint inserted
into his aorta at a German clinic. After ceremonies connected with the
return of the Tikhvin Mother of God icon to the motherland, Alexis felt
sick and was immediately hospitalized. The patriarch did not attend the
250th anniversary of St. Serafim of Sarov in Kursk on 20-21 July.
The communications service of the Department of External Church
Relations of the Moscow patriarchate refrained from comment for some
time. But in the end it reported that the patriarch suffered heart
arrhythmia and needed rehabilitation treatment.
The patriarch's last public appearance was at the time of the Paskha
divine liturgy in the church of Christ the Savior. Some news media then
reported that the head of RPTs had been ill during the day.
There was concern about the health of the patriarch because of his
absence from the funeral of the first president of Russia, Boris
Yeltsin, held on 25 April. On the day of Yeltsin's death the
patriarchate announced that Alexis II would not interrupt his vacation
to return to Moscow. (tr. by PDS, posted 30 April 2007)
Russian original posted
on site of Credo.ru
, 28 April 2007
HEAD OF RUSSIAN ORTHODOX CHURCH FEELS WELL--OFFICIAL
Interfax, 27 April 2007
The entourage of the head of the Russian Orthodox Church Patriarch
Alexy II has dismissed rumors alleging that his health has deteriorated.
"The rumors about the deteriorating condition of the Patriarch are
untrue. His Holiness is in satisfactory condition," Sergey Kravets,
head of the Orthodox Encyclopedia church research center, told Interfax
He said the patriarch was on holiday abroad where he is receiving
health-improving treatment. "The treatment of the patriarch proceeds
successfully and literally several minutes ago he confirmed the
schedule of his services for May," he said.
Kravets also said that the patriarch had extended his condolences to
the families and friends of Mstislav Rostropovich, the world-famous
cellist and conductor, and Kirill Lavrov, theater and film star and
artistic director of the Tovstonogov Drama Theater in St. Petersburg,
both of whom died on Friday.
In his turn, the Moscow Patriarchate representative reproached some
journalists with ‘idle talk’ concerning a deterioration of the
patriarch’s health. ‘The rumor about it is no more than an invention on
those who seek after sensation. We believe it immoral’, he stressed.
He also noted that ‘the patriarch is staying in contact with his people
in Moscow and discuss working matters with them’. (Posted 30 April 2007)
PATRIARCH ALEXIS II TO RETURN TO MOSCOW TUESDAY
30 April 2007
Patriarch Alexis II of Moscow and all-Rus will return to Moscow on
Tuesday, 1 May, after a scheduled medical examination and vacation
abroad. On the next day, 2 May, he will celebrate the liturgy at the
Pokrov convent in Russia's capital.
The directory of the press service of the Moscow patriarchate, Fr
Vladimir Vigiliansky, told RIA Novosti, that the wave of
unsubstantiated rumors about the critical condition of the patriarch's
health that spread on the Internet in recent days is "simply shocking."
"Especially disturbing are those news media reports that appeared even
after official rebuttal of the rumors about the illness or even the
death of His Holiness and after confirmation of the schedule for his
upcoming liturgies," Vigiliansky stressed.
He said that such a news campaign could be viewed as even having evil
intent, aimed at interrupting the signing of the Act on Canonical
Fellowship between the Russian Orthodox Church Outside Russia and the
Moscow patriarchate. The signing of the historic document is scheduled
for 17 May of this year.
As reported earlier, Alexis II's regular vacation included a scheduled
medical examination in Switzerland and thus he missed the funeral of
Russia's first president, Boris Yeltsin.
Last Friday the patriarch confirmed the schedule of divine liturgies
for coming days. On 2 May he will celebrate the divine liturgy at the
Pokrov convent on the memorial day and 55th anniversary of the death of
St. Matrona of Moscow, whose relics are preserved in the Pokrov
cloister. On Saturday, 5 May, Alexis II will celebrate the divine
liturgy and a prayer service and requiem on the Day of the Synaxis of
New Martyrs of Butovo. On 6 May, the memorial day of the holy martyr
St. George the Conqueror, the patriarch will celebrate the liturgy in
the church of St. George in Victory Memorial Park (Poklonnaia
gora). (tr. by PDS, posted 30 April 2007)
Religion News Current News Items
If material is quoted, please give credit to the publication from
which it came.
It is not necessary to credit this Web page. If material is transmitted
electronically, please include reference to the URL, | <urn:uuid:8d4d766e-4729-40a7-8777-ee610913f577> | CC-MAIN-2017-04 | http://www2.stetson.edu/~psteeves/relnews/0704a.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00339-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.954473 | 6,420 | 1.890625 | 2 |
There are a million listicles out there about books people are dying to see made into movies, but what if things were the other way around? Have you ever wanted to gain psychological insight into a movie character you felt was really interesting on screen, but left you craving more? We’ve picked out 7 original screenplays with SUPER interesting characters that we would love to learn more about through their stories retold as books.
Cruel Intentions is technically a book already; the ‘90s classic is based on Les Liaisons dangereuses by Pierre Cholodos. However, the movie we all know and love is QUITE different from the 18th century French novel. No smallpox included in this cult classic. It’s so complex, that we already have two separate ideas going on for a book. First, how did Kathryn become so manipulative? We want to hear all the juicy details of that complicated story. Secondly, we want to know everything that was ever written in Sebastian’s journal. It would give us a better glimpse into his mind and as to how he fell in love with Annette.
So which writer would you pick to pen Cruel Intentions: The Novel?
The Grand Budapest Hotel
The Grand Budapest Hotel had some elements inspired from the works of Austrian writer Stefan Zweig. However, seeing as this film starts off with a young girl reading from a book, which turns into the film, we guarantee that it would be a perfect novel. Perhaps a backstory to Monsieur Gustave and his courtships with older women? Or how Zero landed a job as a lobby boy after immigrating to the Republic of Zubrowka? Really, the opportunities here at endless, and each main character could potentially have a standalone novel.
This film is a cult classic, a tragic comedy-drama full of moral ambiguity. Taking place in the iconic setting of Bruges, two hitmen are forced to face their demons after one accidentally kills a child during a botched assassination job. We think this would make an amazing novel because of its psychologically complex characters and witty dialogue; if what the characters are saying is so funny and insightful, imagine what they are thinking.
Who would not want to learn more about Life Extension and how it came be? It is a very high possibility that the whole company had a rocky and scandalous start, which would be perfect for a novel and probably has one morally ambiguous founder. We would also love to hear more about David and Julie’s relationship, which was probably a roller coaster of emotions. Let’s not forget about the night David becomes disfigured and the aftermath of it before he slipped into his lucid dream. Julie’s such an intense character on her own as well, that it would be great to get a peek into her mind when she finds out about Sofia.
Full Metal Jacket
Stanley Kubrick’s creative genius has never been questioned. But there has been times in his films where we have wished to know more on specific characters or places. We wish we could have gotten a complete glimpse into Pyre’s mind as it slowly unravels after the extreme torment he is forced to receive by his peers. It would definitely be a dark and twisted novel about the unravelling of the mind that would keep up you up late at night.
The concept of Birdman is brilliant, and we would love to get an actual glimpse into the heyday of Riggan Thomson and the bird-like vigilante. The downward spiral of his fame and the inner voice of Birdman would be enthralling in the written word. Perhaps even a glimpse into Sam’s mind where she watches her father lose his grasp on reality.
We want to know exactly how and why this virus was released onto the world. How did humanity survive underground? How was time travel created? This movie left us with so many questions that we desperately need answered. What about Brad Pitt’s character of Jeffrey Goines? How did he become so radicalized? How was did young James Cole deal with witnessing the shooting in the airport? While some of these questions may be answered in the new 12 Monkeys TV series, we’re still hoping this also turns into a series of novels.
One of 2015’s best films had a fantastic story line that would make a terrific science fiction novel about the threat of artificial intelligence on humankind. How were Ava and Kyoko built and programmed? What were Ava’s true intentions? Again, there are many thoughts running through our mind as to what plot points a novel would focus on. Looks like this would become another series that delves into the world of Blue Book and its other softwares.
Playster, a new subscription service providing on-demand ebooks, audiobooks, music, movies and games. The company was founded in 2014 and already has partnerships with some of the world's largest publishers and distributors. You can follow the latest news and updates to Playster on Facebook and Twitter.
Get even more book news in your inbox by signing up for our newsletter: http://eepurl.com/mHTVL.
The views, opinions, and beliefs expressed by guest writers are their own and do not necessarily reflect those of Girl Who Reads.
Girl Who Reads is an Amazon advertising affiliate; a small commission is earned when purchases are made at Amazon using any Amazon links on this site. Thank you for supporting Girl Who Reads. | <urn:uuid:85f49943-acc2-41bb-b435-781585c8f99c> | CC-MAIN-2017-04 | http://www.girl-who-reads.com/2016/03/movies-that-should-be-turned-into-books.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280718.7/warc/CC-MAIN-20170116095120-00412-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.978632 | 1,125 | 1.515625 | 2 |
Napoléon "Nap" Lajoie (/ˈlæʒəweɪ/; September 5, 1874 – February 7, 1959), also known as Larry Lajoie and nicknamed "The Frenchman", was an American professional baseball second baseman and player-manager. He played in Major League Baseball (MLB) for the Philadelphia Phillies, Philadelphia Athletics (twice), and Cleveland Naps between 1896 and 1916. He managed the Naps from 1905 through 1909.
Lajoie was signed to the National Leagues's (NL) Phillies in 1896. By the beginning of the twentieth century, however, the upstart American League (AL) was looking to rival the supremacy of the NL and in 1901, Lajoie and dozens of former National League players joined the American League. National League clubs contested the legality of contracts signed by players who jumped to the other league but eventually, Lajoie was allowed to play for Connie Mack's Athletics. During the season, Lajoie set the all-time American League single-season mark for the highest batting average (.426). One year later, Lajoie went to the Cleveland Bronchos where he would play until the 1915 season when he returned to play for Mack and the Athletics. While with Cleveland, Lajoie's popularity led to locals electing to change the club's team name from Bronchos to Napoleons ("Naps" for short), which remained until after Lajoie departed Cleveland and the name was changed to Indians (the team's present-day name).
Lajoie led the AL in batting average five times in his career and four times recorded the most number of hits. During several of those years with the Naps he and Ty Cobb dominated AL hitting categories and traded batting titles with each other, most notably coming in 1910, when the league's batting champion was not decided until well after the last game of the season and after an investigation by American League President Ban Johnson. Lajoie in 1914 joined Cap Anson and Honus Wagner as the only major league players to record 3,000 career hits. He led the NL or AL in putouts five times in his career and assists three times. He has been called "the best second baseman in the history of baseball" and "the most outstanding player to wear a Cleveland uniform." Cy Young said, "Lajoie was one of the most rugged players I ever faced. He'd take your leg off with a line drive, turn the third baseman around like a swinging door and powder the hand of the left fielder." He was elected to the National Baseball Hall of Fame in 1937.
By Dean Hanley
Page : 1 | <urn:uuid:6525c872-d0d0-4ac5-8962-da5467b1c57c> | CC-MAIN-2016-44 | http://www.deanscards.com/Nap-Lajoie-Baseball-Cards | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720475.79/warc/CC-MAIN-20161020183840-00353-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.979905 | 544 | 1.921875 | 2 |
James R. Barth, Auburn UniversityJohn S. Jahera Jr., Auburn University
Alabama's banking industry includes nearly 150 different banks with more than 1,300 branches located throughout the state. All banks are now privately owned, and the largest banking area in the state is Birmingham. Banks play an important role in the economic development of states by taking deposits through checking accounts and savings accounts and then lending these funds to consumers to purchase goods such as homes and automobiles or to small businesses to help fund their operations.
Available data indicate that only 31 banks were operating in Alabama in 1875, but that number grew to 107 by 1900. In that year, the total assets of the banks were $41 million, with about half that amount in state-chartered banks and the other half in federally chartered banks. The existence of both types of bank charters is referred to as "dual banking," and this practice continues to the present. The state-chartered banks are regulated primarily by individual state banking departments, and the federally chartered banks are regulated primarily by the U.S. Office of the Comptroller of the Currency (OCC). The OCC was established in 1863, and the Alabama State Banking Department was established more than a half century later in 1911.
The operations of both types of banks and the ways in which they are regulated and supervised are quite similar today. Both types, moreover, offer deposits that are insured by the Federal Deposit Insurance Corporation (FDIC). This federal government agency was established during the Great Depression to protect depositors from losses in the event of a bank failure. The primary purpose of deposit insurance, however, is to prevent depositors from "running" on banks. When depositors become concerned about the safety of their deposits, they might run to banks to withdraw their funds, which could send otherwise financially healthy banks into insolvency by forcing them to sell assets at depressed prices to meet deposit withdrawals. Banks of course do not actually keep enough cash on hand to allow all depositors to withdraw their funds at once. Instead, they try to earn profits by using the individuals' deposits to make loans to other individuals and businesses. So a "run" on a bank can deplete the actual cash a bank has on hand very quickly and thus force it to sell good assets such as loans to get additional cash.
As a result of the Great Depression and more recent financial crises, it is widely acknowledged that well-functioning banking systems are vital for financial stabilityand economic development. When banking systems function poorly, credit is either not adequately available or is misdirected to less productive uses. In such situations, the result is not only an increase in the likelihood of a banking crisis but also slower economic growth than would otherwise occur. More generally, banking systems that perform well contribute in important ways to economic development, reducing income inequality, alleviating poverty, and promoting financial stability. This is true of the banking sector in Alabama as well as those in the other states and in other parts of the world.
Fortunately for people living in Alabama, the banking industry has performed relatively well throughout its existence when compared with the entire U.S. banking industry. According to the FDIC, as of March 2011, 135 commercial banks operated in Alabama with total assets of $223 billion and more than 42,790 employees. In addition, Alabama was home to nine savings institutions with $4.1 billion in assets and 1,209 employees. Approximately 90 percent of the assets are in state-chartered banks with the primary regulator being the Alabama State Banking Department. Nationwide, Alabama ranks 15th in term of total assets, higher than all southeastern states except for North Carolina, which ranks second with $1.7 trillion in total assets, and Georgia, which ranks thirteenth with $269 billion in total assets. Alabama's relatively high ranking results from the strategy of many Alabama banks to expand into other states through mergers and acquisitions, allowing them to increase their total assets and serve more customers.
The biggest bank in Alabama as of March 2011 was Regions Bank, which was established in 1871, accounting for nearly 56 percent of total banking assets. AmSouth Bank merged with Regions in 2006, following the 2004 acquisition of SouthTrust Bank by Wachovia, a North Carolina banking organization. Wachovia was subsequently merged with Wells Fargo at the end of 2008. All the banks within that organization then took the Wells Fargo name. With such consolidation, relatively few banks account for the vast majority of the assets in Alabama's banking industry. This trend is not unique to the state, as consolidation has been happening throughout the United States in recent years as banks merge and acquire other banks. More importantly, recent research finds that increased consolidation does not necessarily imply less competition in banking and therefore need not harm customers of banks through higher prices.
The most recent data indicate that in 2011 the FDIC-insured banks in Alabama had a return on assets (ROA) of 0.31 percent and a return on equity (ROE) of 2.32 percent. These figures compare to an ROA of 0.87 percent and an ROE of 7.75 percent, respectively, for all FDIC-insured institutions. ROA is considered a measure of the overall profit a bank is earning on its assets. Those assets include all types of loans and investments in securities (stocks and bonds). ROE is a measure of the rate of return to the stockholders who have become its owners. Both ROA and ROE for Alabama's banks were lower than for all banks in the United States. However, this difference is largely the result of the equity capital-to-asset ratio for Alabama banks being much higher than the same ratio for all U.S. banks (15.1 vs. 10.4 percent). This ratio represents the investment by shareholders in the bank in proportion to the total assets of the bank. This means that for every six dollars in assets there is approximately one dollar in equity capital. The higher ratio means that Alabama banks are in a stronger position to handle economic slowdowns that could result in losses. The fact that Alabama banks have higher equity capital ratios means that there is greater investment by shareholders, which contributes to making the banks more able to handle risk.
Alabama banks generally have been viewed as conservative lenders, making loans mainly to customers who are better able to repay. Over time, this conservative lending strategy has helped protect most Alabama banks from major losses during periods when the economy has been in a slump. Of course, economic activity always has up and down periods, referred to as business cycles, that lower the profitability of all banks during the downturns, including banks in Alabama; when severe enough, the down cycle can even cause some banks to fail. This occurred during the worldwide financial crisis that began in 2007. A number of banks in the state failed as the crisis led to record home foreclosures and a collapse in real estate values. Most notable was the failure of Colonial BancGroup, which failed in August 2009; it was the sixth largest bank failure in the United States at the time. Colonial had grown rapidly, expanding operations into Florida, Georgia, Texas, and Nevada. The branches and deposits of Colonial were sold to BB&T Corporation, a large North Carolina-based banking organization.
Over time and especially in recent years, some Alabama banks have expanded beyond their borders, and outside banks have entered Alabama. As a result of these developments, of the banks operating in Alabama with the largest market shares (accounting for 59 percent of total deposits as of June 30, 2010), all have more deposits outside the state than within the state. This development is not surprising given that two of the banks (Wachovia and Royal Bank of Canada) have acquired smaller banks within Alabama and the other two banks (Regions and BBVA Compass) have expanded outside of the state. As a sign of the times and future developments, one of the largest banks in Spain, Banco Bilbao Vizcaya Argentaria SA (BBVA) acquired Compass Bank for $9.1 billion in September 2007. These developments simply reflect the fact that globalization is affecting Alabama and other states in many different ways.
The growing consolidation within the banking industry has been facilitated by the Riegle-Neil Interstate Banking and Branching Efficiency Act of 1994. This federal legislation overrode state law by allowing banks outside individual states to purchase existing banks in other states, but it did not allow banks in individual states simply to open branches in other states, without purchasing an in-state bank. Alabama has not permitted branching within the state by out-of-state banks. One should expect to see even greater consolidation within banking throughout the United States, including Alabama. Banks welcome consolidation because they now compete not only with one another, but also with nonbank financial institutions such as securities firms, insurance companies, and hedge funds, as well as capital markets more generally. Through consolidation, banks become larger and are able to offer a wider range of services at better prices to consumers. As the banking industry has changed with regulatory changes, there is greater competition from nonbank financial service firms. The consolidation has allowed banks to be more competitive with these other firms. Despite this situation, Alabama banks will continue to be an important factor in facilitating continued economic growth and development in the state.
Two major organizations represent the banking sector in Alabama. The Alabama Bankers Association was organized in 1890 to represent the interest of banks in Alabama. The association provides assistance to banks through educational programs and information. The Community Bankers Association of Alabama also promotes sound banking practices through education and other services to their member banks, which are typically smaller banks. Both organizations are very active in the state of Alabama in terms of promoting safe and sound banking practices.
Curtis, Wayne C. Establishing and Preserving Confidence: The Role of Banking in Alabama, 1816-1994. Montgomery: Alabama Bankers Association, 1994.
Superintendent of Banks. Annual Report for Fiscal Year Ending September 30, 2007. Montgomery: State of Alabama, State Banking Department, 2007.
Welcome to your free, online resource on Alabama history, culture, geography, and natural environment. This site offers articles on Alabama's famous people, historic events, sports, art, literature, industry, government, plant and animal life, agriculture, recreation, and so much more. | <urn:uuid:149c1db5-9676-4d70-8b72-7989612f77f6> | CC-MAIN-2017-04 | http://www.encyclopediaofalabama.org/article/h-1660 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284405.58/warc/CC-MAIN-20170116095124-00034-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.968613 | 2,103 | 2.828125 | 3 |
Pros and cons of Unlocked Phones
In the modern times, the usage of mobile devices has increased drastically in nearly every country on the globe. Similarly, the number of mobile phone manufactures has also increased due to the demands of telephone. Cell phones launched not many years ago is completely distinctive from what you'll get today. Today's handsets have exclusive features and facilities in order to meet the demands of an individual. The two varieties of phones are locked and unlocked phones. This document will provide valid info on advantages of unlocked phones. These units have its advantages and disadvantages as with any other phone available for sale.
Among Locked and Unlocked Phones
A locked cell phone in concert with one particular provider. A locked cellular phone in concert with CDMA technology and unlocked mobile phones work without CDMA technology. The visible difference backward and forward is locked handsets could have an inbuilt Sim, which can't be removed or replaced. Customers with all the locked services won't be able to alter the SIM cards in their phone. However, in the case of unlocked services, customers can switch the particular SIM card with another in accordance with his needs. The handsets using locked services can not be unlocked at anytime. For example, when your contract with your CDMA supplier ends, it automatically locks the cellular phone. The CDMA services usually are not compatible with SIM cards.
Features of Unlocked Phones
The crooks to have various benefits as it is compatible with SIM cards. A lot of people prefer to buy such a cellular phones as a result of varieties offered to choose. One of many advantages of this type of phone may be the availability to use the same hand phone while switching networks. If you are moving to another country, you need to use the identical phone by replacing the Sim with a local network. This can not be completed with the CDMA technology. This is the major reason to why you can get the unlocked handset. In case you don't like service of an network provider, it is possible to replace the card, this particular service is just not provided with locked services.
Disadvantages of Unlocked Phones
The main disadvantage of such a phones is the price of the handset. You'd probably turn out paying several hundreds of dollars. You can find possibilities of getting discounts or reductions while buying locked handsets being that they are specially designed for the specific company. A lot of the CDMA providers sell their handsets for lesser price due to the contract the consumer has together with the company. The most recent phones with newest features can be sold at minimum cost and you can include the price in your monthly installments. In the event of the unlocked handsets, you will need to purchase it which has a onetime payment irrespective to the features and manufacturer.
Almost all of the most advanced technology handsets are launched on unlocked phones. Simply because a persons vision customers have on the phones. The best places to purchase a copy handsets are generally websites or local stores. You will get discounts or reductions on your purchase from a web-based store. | <urn:uuid:2b3fc64d-2c33-4b99-8c60-409aa30e8fb4> | CC-MAIN-2017-04 | http://cellmaniac1.weebly.com/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00047-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.958295 | 619 | 1.820313 | 2 |
Today’s offering in our Timeless Essay series affords readers the opportunity to join Ross Lence as he unravels the myths that obscure our understanding of the Declaration of Independence. —W. Winston Elliott III, Publisher
It is not accidental that the Greek word for history (historia) is a derivative of the verb meaning to narrate what one has learnt, for all history is, in some manner or other, the relating of tales about a people. Now as we all know, some stories are more dramatic than others; some are more accurate; and some, dare we say it, are more important. The most important tales for any people are those told about the beginnings of their political society and the forming of the body politic, beginnings which are often blurred with the society’s conception of virtue, piety, and the gods. Thus, Plato begins The Laws, his political treatise par excellence, with the old Athenian stranger asking his two interlocutors: “Tell me, gentlemen, to whom do you give the credit for establishing your codes of law? Is it a god, or a man?” Cleinias’ response is very determined: “A god, sir, a god—and that’s the honest truth.”
This apotheosis of the beginnings of political society is universal: All societies shroud their founders and their nascent mores in their respective myths and symbols. America is no exception. Benjamin Franklin stood in the rain flying a kite. Betsy Ross was at home knitting a flag. George Washington chopped down a cherry tree and would not tell a lie—even about throwing a dollar across the Potomac. And make no mistake about it: How these myths are told and to whom, when, and where, are all critical questions because it is through these myths and symbols that a society transmits its values and beliefs, or, in the language of Eric Voegelin, comes to know itself as a people. Propriety dictates, therefore, that we not tell our children that Benjamin Franklin would not recognize lightning if it struck him in the head; that Betsy Ross was really a very simple lady, doing her very best to reproduce the Union Jack; or that George Washington was an unsavory, unstable character at best, having never psychologically adjusted to either his red hair or his wooden teeth. To tell our children these things would be to destroy their creed, to tread on their dreams. In the final analysis, failure to transmit the proper myths and symbols will weaken—if not destroy—the moral fiber of any nation.
One of America’s most cherished symbols, of course, is the Declaration of Independence, and its Promethean author, Thomas Jefferson—a document and a man whom subsequent generations have blurred together in a myth of no mean proportion. It is the immediate task of this essay to unravel that myth so we will know what we teach our children when we encourage them to embrace its principles and commitments. Fortunately, our task is not as difficult as it might have been because, unlike the case of so many of our other myths, we have in this instance something tangible—a written document—which can be analyzed using the methodology Willmoore Kendall called a “universal confrontation with the text.” Put simply this methodology contends that by focusing our attention on the precise language of the document, we can ascertain what Jefferson told us and thereby identify the basic presumptions and convictions of the Declaration of Independence.
Two points should be emphasized before embarking upon this enterprise. First, this approach will tell us little about Jefferson the man, Jefferson the politician, or Jefferson the statesman. It will, however, give us at least a preliminary look at Jefferson the philosopher, no mean task given Jefferson’s aversion to cosmic philosophy—an aversion reflected in part by the fact that his political thought lies scattered up and down in his political pamphlets, state papers, and innumerable letters and addresses. Furthermore, while the object of the Declaration was, as Jefferson put it, “Not to find out new principles, or new arguments never before thought of… but to place before mankind the common sense of the subject…. [I]t was intended to be an expression of the American mind, and to give to that expression the proper tone and spirit called for by the occasion,” it should not be forgotten that the Declaration was in large part the product of Jefferson’s own hand and that he himself proclaimed it as one of his three major contributions to American political thought.
Second, it should be emphasized that the methodology to be employed here requires a firm commitment to analytic rigor, for the pitfalls of textual analysis are multiple. Even the most cursory examination of the secondary literature on the Declaration reveals the varied and conflicting interpretations to which the document has been subjected. On the one hand, the Declaration of Independence is “that immortal emblem of Humanity” and on the other, a false doctrine founded upon “glittering and sounding generalities;” it is both “one of the most revolutionary political papers ever written” and one of the most conservative legal documents ever composed; its central theme or intent is the “doctrine of free statehood as a universal right,” “the absolute independence of the individual,” the pursuit of happiness, and equality for all men; at one and the same time it announces the birth of one nation, one people, – and thirteen separate and independent colonies. Most—if not all—of the confusion here could have been avoided had the authors attempted to make their theses compatible—or at least not inconsistent—with the manifest tenor of the document as a whole, instead of rending words, phrases, sentences, or even paragraphs, out of context to project their own preferences or biases.
There are literally hundreds of books, pamphlets, and articles by scholars, polemicists, or apologists who in one manner or other consider the historical and political manifestations of the Declaration and /or its author, Thomas Jefferson. It is not the purpose of this essay to review either that secondary literature or even the many primary works of Jefferson himself. Rather, our purpose here is fourfold: (1) to offer a preliminary analysis of the major objective and general format of the Declaration of Independence; (2) to articulate and answer the critical question left unresolved by the Declaration; (3) to identify the fundamental right of the people in their collective capacity; and (4) to indicate how the basic presumptions and convictions underlying this right of the people not only controlled the fashioning of the natural rights doctrine of the Declaration and the twenty-eight charges against the King, but also integrated the Declaration into a single, coherent statement of political commitments and beliefs.
The Call for Independence
The War of Independence had begun long before the Second Continental Congress issued its declaration justifying separation from Britain. After the “Boston Tea Party” on December 16, 1773, and Parliament’s passage of the “Intolerable Acts” in January of the following year, the colonies moved steadily toward independence. Open hostility erupted at Lexington and Concord on the 19th of April, 1775, and in his proclamation from the Throne in August of that same year, George III declared that open and avowed rebellion existed in the colonies. Radical leaders throughout the colonies, especially in Massachusetts, were convinced that the only alternative to independence was tyranny. Inspired by Thomas Paine’s Common Sense, which first appeared in Boston in January of 1776 and circulated rapidly throughout the colonies, many colonists agreed with Paine’s conclusion “that nothing can settle our affairs so expeditiously as an open and determined declaration of independence.”
Although the Continental Congress urged on May 15, 1776, that the people in the several colonies suppress the authority of the Crown and seize control of the colonial governments, Congress was still reluctant to press for total independence, for there was considerable opposition, especially in the middle colonies, to an official declaration of separation. As political and civil affairs continued to degenerate, however, the Virginia Convention would suffer delay no longer and instructed its delegate to the Continental Congress to propose independence—an instruction fulfilled with Richard Henry Lee’s Resolution for Independence on June 7, 1776. Lee’s resolution was referred to a Committee of Five, consisting of Thomas Jefferson, John Adams, Benjamin Franklin, Roger Sherman, and Robert Livingston, with instructions to draft a declaration should one be required. The Committee of Five submitted its draft of the Declaration on the 28th of June, and the Congress declared the independence of the American colonies on July 2, 1776. Two days later the Congress officially adopted the document which we today call the Declaration of Independence.
The Declaration: Its Major Objective and General Format
The Declaration of Independence as we know it, then, was a statement approved and publicly distributed by the Continental Congress which (1) announced a course of action, and (2) justified the decision to undertake that action. Its main objective was not to declare American independence per se (for that action had been taken two days earlier), but to promulgate that decision and to clarify the causes which had impelled separation from Britain. In other words, the Declaration of Independence is not really a declaration of independence at all; it is, rather, an announcement and formal justification of that decision.
The general format of the Declaration consists of three easily differentiated parts: (a) an introduction, consisting of a statement of purpose and a concise summary of the general political principles of democratic governments (Part I, including the title and the first and second paragraphs); (b) an enumeration of the specific grievances against George III (Part II, comprising charges [i]–[xxviii]); and (c) the concluding paragraphs, one dealing with George III, one with Parliament, and one with the formal proclamation of separation (Part III, including paragraphs , , and respectively). Interestingly enough, the format of the Declaration seems to parallel the three parts of any traditional essay—an introduction, a body, and a conclusion—thus lending support to the hypothesis that the American Declaration of Independence does indeed constitute a coherent whole. Let us begin our analysis, then, by examining each of these parts separately.
The Introductory Statement of Purpose
The Declaration opens with these words: “In CONGRESS, July 4, 1776. A DECLARATION By the REPRESENTATIVES of the UNITED STATES OF AMERICA, In GENERAL CONGRESS Assembled.” Immediately following this title is the introductory paragraph that is so familiar to Americans:
When in the Course of human Events, it becomes necessary for one People to dissolve the Political Bands which have connected them with another, and to assume among the Powers of the Earth, the separate and equal Station to which the Laws of Nature and Nature’s God entitle them, a decent Respect to the Opinions of Mankind requires that they should declare the causes which impel them to the Separation.
The title and opening paragraph of the Declaration confirm our earlier observation that the major objective or immediate purpose of the document is to announce the causes which have necessitated the separation from Britain. This is a document, in other words, whose central concern is not the rise of government, nor its maintenance, but its dissolution for good cause. Furthermore, we learn: (1) that there are two peoples involved here, presumably one the British and the other the Americans; (2) that there has been a severing of the political bands between them; and (3) that this separation does not require the concurrence of both parties, but is an act of one People.
Now if the decision to dissolve the political bands which connect two peoples is a collective one, (as the language indeed suggests: “they should declare the causes which impel them to the separation”), and if the people who are to exercise this right of altering or abolishing the government must do so in their collective capacity, then there must be a decision-making rule for determining what course of action is to be taken. In the final analysis, there is but one of three alternative rules available: unanimous consent, majority rule, or minority rule.
That the colonists did not believe that unanimous consent was necessary to justify resistance to governmental authority is obvious, for many colonists remained loyal to George III and the British Parliament throughout the War of Independence. This historical evidence aside, however, the Declaration itself confirms this fact, for there is no mention of unanimity anywhere in the text. In fact, we know that it was not until some time later that the Declaration was unanimously agreed to (July 19, 1776, to be precise), and that it was at that time that the Congress ordered the now unanimous Declaration engrossed on parchment with a new title to reflect its unanimity, a title much more familiar to our ears: “In CONGRESS, July 4, 1776. The unanimous Declaration of the thirteen united States of America.” The members of Congress affixed their names to this parchment copy of the Declaration on August 2nd, and in January of the following year, Congress ordered the reprinting and distribution of the Declaration, bearing both its new title and the names of the original signers.
It is significant, of course, that while unanimity on the issue of independence was important to the members of the Continental Congress—important enough at least to warrant a change in the title of the Declaration itself, the only change made after its adoption on July 4, 1776—it was not required to dissolve the political bands of the body politic. In actual fact, the decision in the Committee of the Whole was far from unanimous: Pennsylvania and South Carolina voted against independence, Delaware was divided, and New York abstained because of previous instructions to its delegates. The question arises, of course, if unanimous consent is not the decision-making rule for the altering or abolishing of government, then what is? The Declaration gives us no answer at this point but moves to an affirmation of democratic principles and beliefs to which the colonists are committed.
The Introductory Statement of Principles and Beliefs
This brings us then to the second paragraph of the Declaration and the famous proclamation of self-evident truths. The first three of these truths are so familiar that there is hardly need to repeat them: (1) that all men are created equal; (2) that the creator has endowed all men with certain unalienable rights, and (3) that among these rights are the rights of life, liberty, and the pursuit of happiness. Instead of clarifying the conditions of this natural equality or elaborating upon these natural rights, however, this single, introductory sentence continues its enumeration of self-evident truths, adding one about the institution of government and another about its dissolution: (4) that governments are instituted to secure the natural rights of man; and (5) that whenever any form of government becomes destructive of the ends for which it was instituted, it is the right of the people to alter or abolish it.
Of the first three self-evident truths we are told virtually nothing. By implication, however, we may assume that their application is meant to be universal, for it is not the equality and rights of Englishmen, or Americans, that is in question here, but the equality and rights of all men. On the other hand, when the focal point of the enumerated truths shifts from each and every man to men living together in civil society, clarifying or qualifying conditions immediately surface. Thus, in addition to claiming that governments are instituted among men for securing of certain rights, the Declaration also adds that governments derive their just powers from the consent of the governed. What constitutes just powers or consent of the governed is not clear, but what is clear is that these notions are integral factors in the institution of government itself. Furthermore, by the time we arrive at the last truth enumerated two additional tests or requirements have been established which must be met before the dissolution of government can be justified: (1) the institution of a new government; and (2) the alteration of existing conditions in such a way as is likely to maximize the safety and happiness of the people.
The first of these tests is very clear from the language of the text. In the three passages of the introductory paragraphs where the dissolving, altering, or abolishing of government is mentioned, it is always done within the context of instituting anew. Thus, the text reads:
When…it becomes necessary for one People to dissolve the Political Bands…and to assume…the separate and equal Station….
[W]henever any Form of Government becomes destructive…it is the Right of the Peopleto alter or to abolish it, and to institute new Government…
But when a long Train of Abuses and Usurpations…evinces a Design…it is their Right, it is their Duty, to throw off such Government, and to provide new Guards for their future Security.
The second requirement or test is more enigmatic—for no people would knowingly and willingly change their condition from bad to worse. The focal point here, however, seems to be “the people,” for it is “their Safety and Happiness” which are to be secured, by whatever means “as to them shall seem” best. Presumably, the people referred to here are the same people who have the authority to alter or abolish government in the first place, and if the Declaration does not require unanimity for the dissolution of government, then obviously unanimous consent is also not required in the formulating and fixing of public policy.
Who, then, are these people who have the authority to alter or abolish government and to direct its ordinary operations? The Declaration does not say at this point, but it does tell us that these are a prudent people who will not change their government for light and transient reasons, being more willing to suffer, while the evils are sufferable, than to right themselves through force of arms. When, however, the abuses and usurpations against their rights have been persistent, general, deliberate, and with bad motive—when, in other words, a long train of abuses and usurpations evinces a design to bring them under an absolute despotism—then they will stir and provide new guards for their future security.
Then in one succinct sentence, the Declaration links all these earlier remarks about democratic principles and democratic governments to the list of grievances against the King. The closing sentence of the second paragraph makes it clear: (1) that the history of the present King is—has been and will continue to be—a history of repeated injuries and usurpations, and (2) that the object of all these repeated injuries and usurpations is the establishment of an absolute tyranny. The King has done more than simply wronged the colonists: He has attempted to set up a system of absolute despotism over them. An enumeration of his acts will confirm this to all candid observers. The list of grievances is designed to show, then, that such a state of tyranny exists, not that any (or even all) of the grievances per se would be sufficient to justify resistance to government.
The Grievances Against George III
At long last, we arrive at the heart of the Declaration—the enumeration of the pernicious acts of George III and his attempt to establish an absolute tyranny over the American colonies. Now for many readers of the Declaration, of course, this list of grievances is nothing more than a tedious compendium of rhetorical charges which have quite appropriately yielded to the force and power of the language and principles of the opening paragraphs. How ironic that the list of grievances which forms the body or middle of the essay and contains more than all the rest should have fallen into historical obscurity. These grievances were, to repeat, the very reason the Declaration was written and promulgated—to justify the severing of the political bands with Britain—and it was with good reason that the pamphleteers, John Lind in his An Answer to the Declaration of the American Congress and Thomas Hutchinson in his Strictures upon the Declaration of the Congress at Philadelphia, made these grievances the focal point of their respective criticisms.
A preliminary analysis of the twenty-eight charges against the King is obviously no mean task. If we return to the language of the Declaration, however, we find an initial clue as how best to proceed: “The History of the present King of Great-Britain is a History of repeated Injuries and Usurpations, all having in direct Object the Establishment of an absolute Tyranny over these States.” The Declaration, in other words, divides what is to follow into three general categories: (1) those grievances associated with the “injuries,” or abuses of constitutional powers; (2) those associated with the “usurpations,” or the exercise of power that others have a right to; and (3) those settled and malicious acts of George III which prove the design to establish tyranny. Under such a scheme [i]–[xiii] constitute the “injuries,” [xiv]–[xxii] the “usurpations,” and [xxiii]–[xxvii] the proofs that the King is tyrannical. Furthermore, the language clearly suggests that while the King is responsible for certain injuries and is indeed a tyrant (for the pronoun “He” used to introduce grievances [i]–[xiii] and [xxiii]-[xxvii] clearly refers to George III), someone else must bear the burden of usurpation. In some cases, the specific reference is unclear. In other cases, we may be surprised at the ranking, such as the relegation of the issue of taxation, the initial cause of unrest in the colonies, to a mere seventeenth place in the list of colonial grievances. It is not important that we resolve these issues at this point but merely acknowledge the fact that—the historical validity of the charges aside—there may indeed be some critical thought buried within the language and ordering of the grievances against George III.
The Closing Paragraphs
The twenty-eighth charge against the King is found in the first of the three concluding paragraphs. This last charge is in a real sense not only a summary of all the previous charges, but is the fulfillment of the objective of the Declaration itself. In short, George III is a tyrant, unfit to be the ruler of a free people, and for this reason, the American colonies have found it necessary to sever the political bands with Britain.
Instead of closing, however, the Declaration reiterates, in yet a second concluding paragraph, that the colonists have not been rash in their actions, but have tried repeatedly to secure redress for their grievances through channels other than separation. The colonists have not only vainly pleaded with the King, but they have also fruitlessly appealed to the British people themselves. The colonists have warned the British people of Parliament’s attempts to extend unwarranted jurisdiction over the colonies; they have cited the circumstances of the colonizing of America; they have called out for justice, a virtue common to all English-speaking peoples. All this has been for nought, for the British people have also been inattentive to their cries. And once again, we hear the charge of usurpation, and once again, it is evident that usurpation per se is not the cause of severance, but usurpation uncontrolled and uncontrollable. Necessity and compulsion are indeed the parents of the decision to separate from Britain.
At last, in a sort of anti-climatic fashion, we arrive at the closing paragraph to hear what we knew all along: The political bands between Britain and the American colonies are hereby dissolved. But now something is made clear which may not have been clear before: The authority to declare independence is vested in the people alone, for we are told all this is done “in the Name, and by the Authority of the good People of these Colonies.”
The Critical Question: Who Are the People?
Obviously, we have passed over innumerable inherent questions or tensions in this preliminary analysis. The most frequent source of question or controversy, of course, is the list of self-evident truths, especially those relating to the capacity and rights of individual men. In what sense, for example, are all men created equal, and does the Declaration’s use of the past tense of the verb “to create” mean that men are no longer equal? If life, liberty, and the pursuit of happiness are among the unalienable rights of man, then what are some of man’s other unalienable rights, and are those rights enumerated more important or significant than those not enumerated? And what do the rights to life, liberty, and the pursuit of happiness mean, who is to define them, and how are conflicts between the rights of one man and those of another to be resolved?
While this list of secondary questions or concerns is long indeed, at a number of points in our preliminary analysis of the Declaration we encountered one question of an enduring nature; namely, what does the Declaration mean when it refers to “the people”? I call this question of what constitutes “the people” the critical question, for unless this question can be meaningfully resolved, the American Declaration of Independence—that symbol par excellence of Revolutionary America—is reduced to half-baked mumbo jumbo. One cannot talk meaningfully about the unalienable rights of man, the right to resist tyrannical government, consent of the governed, or the just powers of government, if one does not know who has the authority to alter or abolish the government which fails to meet its commitments. Nor can one believe the grievances against the King are more than rhetorical nonsense if the people he has injured and whose power he has usurped cannot be defined. In providing an answer to this critical question of what constitutes “the people,” then, we shall construct the parameters within which not only to resolve these second-order questions but also to integrate the natural rights doctrine of the Declaration with the grievances against George III.
The task of determining what the Declaration means when it refers to the people is complicated, of course, by the fact that the Declaration nowhere makes its meaning explicit. Nevertheless, if the single reference in paragraph two to the natural rights of man is excluded for the moment, it becomes obvious that all references to either the people or the colonists are in collective terms. Thus, in the text:
- “One people” dissolves the political bands connecting the colonies and Britain and decency requires that “they should declare the causes which impel them to the separation.”
- It is “the Right of the People” to alter or abolish government and to institute another in its place which “to them shall seem most likely to effect their Safety and Happiness.”
- It is “in the Name, and by the Authority of the good People of these Colonies” that “the Representatives of the UNITED STATES OF AMERICA” do “solemnly Publish and Declare” independence, dissolving “all political connections” between the American States and the British Crown.
As we have already indicated in our preliminary analysis, there are only three collective decision–making rules available to a people: unanimous consent, majority rule, or minority rule. There are also three points at which the people may collectively participate in the decision-making process: the origin, the operation, or the dissolution of the government. These alternatives are best conceptualized in a matrix such as this:
Our preliminary analysis of the text of the Declaration has already established, of course, that in both the case of the dissolution of government and in its ordinary operation, “the people” does not mean all people, for decisions may be made in either of those cases without unanimous consent. Let us examine each of the sections of this matrix separately, beginning with the dissolution of government—for the dissolution of government for just cause was, as has been noted, the central concern of the Declaration.
“The People” and the Dissolution of Government
While it is true the Declaration avoids any explicit references to either a majority or a minority, the language of the last paragraph of that document as drafted by Jefferson and as adopted, unchanged by Congress, declares that the decision for independence is done “in the Name, and by the Authority of the good People of these Colonies.” Not even the authority of the Continental Congress (no insignificant minority of the population) is sufficient to justify a severing of the political bands with Britain. A Congress unwilling to claim such authority for themselves would certainly be unlikely to acknowledge the claims of any lesser minority. The implication to which the language of the Declaration leads us, then, is that a majority alone has the right to dissolve the government. Thus,
The Declaration’s equation of “the people” with a majority of the community for the purposes of the dissolution of government is consistent with the antecedent thought of the colonists found in the political pamphlets which circulated in the colonies in the years immediately preceding the separation from Britain. Time and again, the American pamphlets argued that while each man has a right to decide for himself when his own preservation is called into question, only the majority can decide if political society has been dissolved. Thus, to cite just one example, Samuel West argued not only did the right of exercising political power belong to a majority, but also the minority must, of necessity and right, submit to the decisions of that majority.
When legislators have enacted a set of laws, which are highly approved by a large majority of the community, as tending to promote the public good, in this case, if a small number of persons are so unhappy as to view the matter in a very different point of light from the publick, tho’ they have an undoubted right to shew the reasons of their dissent from the judgment of the publick, and may lawfully use all proper arguments to convince the publick of what they judge to be an error, yet if they fail in their attempt, and the majority still continue to approve of the laws that are enacted, it is the duty of those few that dissent, peaceably and for conscience sake to submit to the public judgment…. It is the major part of the community that have the sole right of establishing a constitution, and authorizing the magistrates; and consequently it is the major part of a community that can claim the right of altering the constitution, and displacing the magistrates.
When the issue is to alter or abolish the government, the minority is absolutely bound by the wishes of the majority. The right to throw off government and to provide for the safety and happiness of the people is a right which belongs “not [to] a few disaffected individuals, but the collective body of the state.”
This position that the right to alter or abolish government is a right of the community as a whole is consistent not only with the antecedent thought of the Declaration, however, but with the language and thought of many of the state constitutions and bills of rights written during this same period as well. The 1776 Constitution of Maryland, for example, opens with a declaration of rights in which the first right or truth enumerated is ‘That all government of right originates from the people, is founded in compact only, and instituted solely for the good of the whole.’ As a consequence, ‘whenever the ends of government are perverted and public liberty manifestly endangered… the people may, and of right ought, to reform the old or establish a new government.' The Pennsylvania Constitution, also written immediately after the colonists proclaimed their independence, is even more explicit than in the Maryland Constitution:
That government is, or ought to be, instituted for the common benefit, protection and security of the people, nation or community; and not for the particular emolument or advantage of any single man, family, or sett of men, who are a part only of that community; And that the community hath an indubitable, unalienable and indefeasible right to reform, alter or abolish government in such manner as shall be by that community judged most conducive to the public weal.
Or in the words of the Massachusetts Constitution adopted during the War of Independence:
Government is instituted for the common good; for the protection, safety, prosperity, and happiness of the people; and not for the profit, honor, or private interest of any one man, family, or class of men: Therefore the people alone have an incontestible, unalienable, and indefeasible right to institute government; and to reform, alter or totally change the same, when their protection, safety, prosperity, and happiness require it.
Much of the confusion of what constitutes a people could well have been avoided, of course, had those who drafted and signed the American Declaration of Independence used the language found in the Virginia Declaration of Rights adopted by the Virginia Convention on June 12, 1776. Even if Thomas Jefferson had not seen the Virginia Declaration (a possibility which seems highly unlikely given the fact that the Virginia document had been in circulation among the members of Congress from the very earliest days of June and had appeared in the Pennsylvania Evening Post of June 6 and in the Pennsylvania Gazette of June 12), it is significant that no member of Congress who had seen that document insisted upon a clarification of what constitutes the people, for the Virginia Declaration of Rights, unlike the Declaration of Independence, is most explicit—a majority alone has the right to alter or abolish government.
That government is, or ought to be, instituted for the common benefit, protection, and security of the people, nation, or community; of all the various modes and forms of government, that is best which is capable of producing the greatest degree of happiness and safety, and is most effectually secured against the danger of maladministration: and that, when any government shall be found inadequate or contrary to these purposes, a majority of the community hath an indubitable, inalienable, and indefeasible right to reform, alter, or abolish it, in such a manner as shall be judged most conducive to the public weal.
There are many reasons which could be advanced as to why Jefferson and the other signers of the Declaration of Independence did not adopt the language of the Virginia document. These speculations aside, however, the question immediately arises whether “the people” means “a majority” in the cases of the origin and/or operation of government as well. Let us return to our analytic matrix focusing our attention this time on the ordinary operation of government.
“The People” and the Ordinary Operation of Government
Our preliminary analysis of the last self-evident truth announced in the Declaration led us to conclude that the same people who have authority to alter or abolish government also have the authority to organize government and fix public policy “in such form, as to them shall seem most likely to effect their Safety and Happiness.” From our analysis of the dissolution of government, then, we can, by extrapolation, easily complete our analytic matrix for the case of the operation of government. Thus,
Although this commitment to the doctrine of majority rule in the ordinary operations of government may not appear revolutionary to Americans today, this concept—the concept of a sovereign people—provides another link in the integration of the natural rights doctrine of the Declaration and the grievances against George III. In that the natural rights doctrine is also a central concern in the institution of government, however, it seems appropriate to complete our analytic matrix prior to our discussion of a sovereign people.
“The People” and the Origin of Government
Although the fourth and fifth self-evident truths of the Declaration specifically refer to the institution of government, as has been shown the focal point of concern of the fifth is actually the dissolution of governments and rights and powers of a sovereign people. It is not inappropriate, therefore, to confine our analysis to the other self-evident truths, especially the fourth which reads as follows: “That to secure these Rights, Governments are instituted among Men, deriving their just Powers from the Consent of the Governed.”
As was indicated earlier, just powers and consent of the governed are clearly integral factors in the institution of government. Furthermore, when we combine the fact that this fourth enumerated truth specifically refers to the rights of life, liberty, and the pursuit of happiness—rights which presumably all men have—with the fact that the theory being expounded here is that of the social compact, the question of unanimity is immediately raised again. Although the majority may have the right to decide whether to alter or abolish an existing government, each and every man would seem to have an individual right to decide for himself whether to join with others under a new government, for once government is dissolved each man returns to the state of nature and is at liberty to give or withhold his consent to any new government.
Furthermore, it is not insignificant in our analysis here that the man who gave the theory of the social contract its clearest articulation was John Locke—the only moral philosopher whom Jefferson included in his list of “the three greatest men that have ever lived.” The language of the “sagacious Mr. Locke,” “whom the Americans have appointed their political apostle” was very precise:
For when any number of Men have, by the consent of every individual, made a Community, they have thereby made that Community one Body, with the Power to Act as one Body, which is only by the will and determination of the majority. For that which acts, any Community being only the consent of the individuals of it, and it being necessary to that which is one body to move one way; it is necessary the Body should move that way whither the greater force carries it, which is the consent of the majority: or else it is impossible it should act or continue one body, one Community, which the consent of every individual united into it, agreed that it should.
Locke’s colonial disciples found his claim that all just governments have their beginning in the consent of the governed wholly compatible with their political experience.
If unanimous consent alone can make a government just and obligate the individual to the dictates of law, then under no pretense of right could those Americans who remained loyal to George III be bound by the directives of the Continental Congress and the other provincial assemblies. It was this very reason which led Peter Van Schaack to challenge the authority of the provincial convention of New York, arguing “that you cannot justly put me to the alternative of choosing to be a subject of Great Britain or to this State, because should I deny subjection to Great Britain, it would not follow that I must necessarily be a member of the State of New York.” Furthermore, Van Schaack even identified the document from which he claimed to have deduced his political principles—the American Declaration of Independence:
The declaration of independency proceeded upon a supposition, that the constitution under which we before lived was actualy dissolved, and the British government, as such, totally annihilated here. Upon this principle, I conceive that we were reduced to a state of nature, in which the powers of government reverted to the people, who had undoubtedly a right to establish any new form of government they thought proper; that portion of his natural liberty which each individual had before surrendered to the government, being now resumed, and to which no one in society could make any claim until he incorporated himself in it.
That the signers of the Declaration of Independence were unconvinced by the claims of Van Schaack and the other loyalists is, of course, evident in the penalties imposed by the Continental Congress upon those who did not support the American cause. In the case of Queen’s County of New York, for example, the inhabitants—and a majority at that—refused to send deputies to the convention being held in the colony. This led Congress to claim that the inhabitants of Queens’ County had “deserted the American cause” and that “those who refuse to defend their country should be excluded from its protection, and be prevented from doing it injury.” The Congress further ordered that the names of all those who had voted contrary to its wishes be published and denied the offenders the right to travel outside the County of Queens on punishment of three months confinement.
Similarly, the good people of Massachusetts refused to grant the arguments of the western towns of the county of Berkshire that the disruption of the political connections with Britain had terminated all legitimate authority within the colony and returned men to the state of nature where each man was at liberty to give or withhold his consent as he saw fit. The provincial assembly of Massachusetts not only proclaimed themselves the legitimate heirs of political power, but roundly denounced the inhabitants of Berkshire as rebels. Even when the conflict between them had been resolved, the language of the provincial assembly announcing the concordat did not yield the point of who had held the lawful power: “That all riots, routs, and unlawful assemblies committed…within the said county of Berkshire…be and hereby are pardoned.”
The grounds on which the leaders of the Revolutionary movement rejected the claims that men were at liberty to give or withhold their individual consent to new governments—a claim that would make unanimous consent necessary for the institution of government—was founded upon a fundamental distinction between government on the one hand, and society on the other. Society was primary and did indeed require unanimous consent to come into being; government, on the other hand, was created by a simple majority of those united together into society. Thus, “that great and immortal reasoner,” Mr. Locke, had argued: “And thus that, which begins and actually constitutes any Political Society, is nothing but the consent of any number of Freemen capable of a majority to unite and incorporate into such a Society.” The dissolution of government through an alteration of the legislative power or a violation of the public trust involves the dissolution of government alone. Society remains intact. This fact is critical in that if men do not return to a state of nature, they are presumably still “a people,” who may once again structure the legislative power in such a way as to secure their mutual safety and happiness. Thus, “that prince of philosophers” Mr. Locke claimed:
When the Government is dissolved, the People are at liberty to provide for themselves by erecting a new Legislative, differing from the other, by the change of Persons, or Form, or both as they shall find it most for their safety and good. For the Society can never, by fault of another, lose the Native and Original Right it has to preserve itself, which can only be done by a settled Legislative, and a fair and impartial execution of the Laws made by it.
It was this very reasoning that William Whiting used in his Address to the Inhabitants of the County of Berkshire Respecting Their Present Opposition to Civil Government. In his refutation of the Berkshire claims, Whiting argued that although the Declaration of Independence had destroyed the political connections with Britain, the people of Massachusetts had not returned to the state of nature, but had found it necessary to place the legislative power anew. And because the majority of the colony had acquiesced to the provincial assembly, the inhabitants of Berkshire were obligated to honor the decision of the majority. “No revolution in, or dissolution of, particular constitution or forms of government, can absolve the members of the society from their allegiance to the major part of the community.”
Thus, while, the governments in the thirteen colonies had been dissolved, the social bands among the colonists remained undisturbed. Men had not returned to the state of nature at all. On the contrary, they now found themselves responsible for the exercise of political power as well, for in the words of the Declaration itself: “the Legislative Powers, incapable of Annihilation, have returned to the People at large for their exercise; the State remaining in the meantime exposed to all the dangers of invasions from without, and convulsions from within.”
In that the “People at large” clearly cannot mean a minority of the population, our matrix is now complete and looks as follows:
There can be no doubt, then, what the American Declaration of Independence means by “the people.” Whether we consider the original, extent, or end of government, the answer is the same: The majority alone has the right of political power. No people could be more sovereign, be more free.
The Fundamental Right of the People: The Right to Share in the Legislature
The majoritarian implications of this analysis will undoubtedly bother some, for on the surface at least, the Declaration’s commitment to the natural rights of man seems at radical variance with the doctrine of majority rule. While it is true that there is only one reference in the Declaration to these natural rights of man, this reference occurs in no inconspicuous place and forms an integral part of three of the self-evident truths of that document:
- That all men have certain unalienable rights;
- That among these rights are the rights of “Life, Liberty, and the Pursuit of Happiness;”
- That governments are instituted among men to secure these rights.
Those who find the Declaration’s commitment to the doctrine of majority rule troublesome in light of these references to the unalienable rights of man are not apt to find much solace, however, in the writings of Thomas Jefferson. With the single exception to “the afflicting oppression…from an unjust majority in Connecticut,” Jefferson never seemed to deviate from his position of 1782 in his Notes on Virginia: “The lex majoris partis [is] founded in common law as well as common right…. [It] is the natural law of every assembly of men, whose numbers are not fixed by any other law.” When a majority carried Jefferson and the Republicans to power over his political foes, the Federalists, Jefferson announced in his Inaugural Address that while the majority “to be rightful, must be reasonable,” republican government required “Absolute acquiescence in the decisions of the majority,” for this is “the vital principle of republics, from which there is no appeal but to force.” And as late as 1817, when commenting on the instability and despotism of the French Revolution, Jefferson again noted:
The first principle of republicanism is that the lex majoris partis is the fundamental law of every society of individuals of equal rights; to consider the will of the society enounced [sic] by the majority of a single vote as if unanimous, is the first of all lessons in importance, yet the last which is thoroughly learnt. This law once discarded, no other remains but that of force, which ends necessarily in military despotism.
On the other hand, if we turn our attention to the text of the Declaration once again, we find the clue necessary to resolve this dilemma. In addition to the unalienable rights of man, the Declaration also speaks in the fifth grievance against the King of the “Rights of the People,” rights which are somehow related to representative institutions: “He has dissolved Representative Houses repeatedly, for opposing with manly Firmness his Invasions on the Rights of the People.” Furthermore, a closer look at the grievances reveals that the fundamental right of the people has already been boldly announced: the fundamental right of the people is “the Right of Representation, a Right inestimable to them, and formidable to Tyrants only.” So “essential and indisputable” is this right that the colonial assembly of Massachusetts argued in a letter to Governor Hutchinson “that a people under any form of government, destitute of it, is destitute of freedom.” Life, liberty, property, consent—none of these can be secure without this right. “Hence, [it] is deducible [that] representation… being necessary to preserve these invaluable rights of nature, is itself, for that reason, a natural right, coinciding with, and running into that great law of nature, self–preservation.”
The reason this right of representation was so fundamental to Americans was that it constituted the very essence of liberty itself. Thus, Richard Price, whose Observations On The Nature of Civil Liberty was printed and reprinted on both sides of the Atlantic no fewer than twenty-eight times in the course of 1776, argued that while liberty could be divided into four categories (physical, moral, religious, and civil), there is one common theme in all its manifestations: “the idea of Self–direction, or Self–government.” To the extent that “a force stands opposed to the agent’s own will,” to that extent is he in servitude to someone else. Thus, liberty in any civil society is the power of that society “to govern itself by its own discretion,” and slavery is brought about by “any will distinct from that of the Majority of the Community, which claims a power of making laws for it, and disposing of its property.” Because the people cannot regularly or conveniently gather together in large states, however, government must be delegated to the representatives of the people, and the will of the majority designated by a majority of those representatives, appointed by, and subject to, a majority of the community. In the final analysis, “as long as that part of a government which represents the people is a fair representation; and also has a negative on all public measures, together with the sole power of imposing taxes and originating supplies, the essentials of liberty will be preserved.”
The most comprehensive statement of the right of representation prior to independence appeared in a pamphlet of 1774 entitled A Declaration of The People’s Natural Right To A Share In the Legislature. Its author, Granville Sharp, opened his pamphlet with a sixty-page preface in which he attempted to demonstrate that reason, human conscience, and the laws of nature are, in fact, indistinguishable. Through his reason and conscience, man is able to distinguish good from evil, and it is this capacity which distinguishes him from the brutes. This knowledge of good and evil, in turn, allows him to recognize that the claim of Parliamentary omnipotence is “A kind of Popery in Politics,” for “no Power on earth is tolerable without a just limitation.” Because it is impossible to maintain any limit where the laws are not formulated by the elected representatives of the people, nothing could be more treasonous than “to attempt to deprive any free British Subjects of their natural Right to a Share in the Legislature.”
We need not depend upon the antecedent thought of the pamphleteers alone, however, to confirm the Declaration’s commitment to this fundamental right of the community, for this fact is also confirmed in other public documents of the Continental Congress. Thus, in The Address to the Inhabitants of Quebec, Congress provides us not only with an enumeration of the fundamental rights of the community, but with a rank ordering of these rights as well. Without question, “the first grand right is, that of a people having a share in their own government, by their representatives, chosen by themselves.” This right is fundamental because it is the major “bulwark surrounding and defending their property.” Second, “the next great right is that of trial by jury.” In The Address, these two rights—the right of representation and the right to trial by jury—conclude the list of great rights. The third right enumerated is simply designated as “another right” which “related merely to the liberty of the person.” Obviously, if this third right refers merely to the individual, then the first two great rights must refer to something else being the whole community, or the people. It should also be emphasized that this right of liberty does not mean the right to do whatever one wishes to do, but the right of habeas corpus. The fourth and fifth rights go almost unnoticed. The fourth right is that of holding lands by the tenure of easy rents and “the last right which we shall mention” is none other than the freedom of the press.” These, then, are the essential rights “without which a people cannot be free and happy,” the most critical being the right of the people to share in the legislative power.
The Unalienable Rights of Man
If we now turn to reconsider the Declaration’s reference to the natural rights of man within the context of the fundamental right of the people to share in the legislature, we see the two extremes of the dilemma more clearly: absolute, individual rights on the one hand and “absolute acquiescence in the decisions of the majority” on the other. The solution to this dilemma is complicated, of course, by the almost total silence of the Declaration on the nature of the rights of men. All we are explicitly told is that these natural rights are unalienable and that governments are instituted to secure them.
In fact, the precise language of the Declaration, combined with its obvious commitment to representative government, makes an individualistic interpretation of these rights suspect, for “to secure” means to define as well as to protect, and government cannot protect what cannot be defined. If we further require that these rights (among which are life, liberty, and the pursuit of happiness) be defined by each individual, we shall have returned to the requirement of unanimous consent for the operation of government, because by controlling the liberty of some individuals to secure the rights of others, government would, by definition, be acting in a manner destructive of the rights of at least one individual. Thus, all governments ought to be altered or abolished, for in acting in a manner destructive of the rights of at least one individual, government would also, by definition, be acting in a manner destructive of the rights of man. Such a conclusion is obviously in sharp conflict of the very sentence which follows the enumeration of self-evident truths: “Prudence, indeed, will dictate that Governments long established should not be changed for light and transient Causes; and accordingly all Experience hath shown, that mankind are more disposed to suffer, while Evils are sufferable, than to right themselves by abolishing the Forms to which they are accustomed.”
Furthermore, while the Declaration is silent on the matter of how “absolute” these unalienable rights are, the antecedent thought of the Declaration found in the political pamphlets of the Revolution makes an absolutist interpretation of these natural rights suspect as well. Nowhere was the absolutist approach more vehemently denounced and nowhere more vehemently denied than in the case of man’s natural right to liberty. In his What think ye of the Congress now?, for example, the American loyalist, Thomas Chandler, bitterly attacked the American patriots, those “bear house gentry” who have perpetrated “a long train of such infamous abuses” upon true liberty that no one and nothing (including freedom of the press) is secure. John Drinker challenged the representative authority of Congress and the other ad hoc assemblies, arguing that no man is either actually or virtually represented and that all decent men have been denied access to the legitimate governments of the colonies. Government has, in fact, succumbed to “economic robbery,” and American liberty is indistinguishable from anarchy and licentiousness. As Isaac Wilkins observed: The dictates of the Congress are “to be enforced by their High Mightinesses the Mob, to the utter subversion of all Law, and the total destruction of LIBERTY.”
The American patriots, however, equally opposed unrestrained liberty. Thus, while openly admitting that “submission becomes a fault, and resistance a virtue” when the rulers abuse their powers, Peter Whitney vehemently denounced those people who “run into the most excessive licentiousness” under the guise of liberty, and who are guilty “of the most lawless, unjust, and tyrannical proceedings.” Echoing this denunciation, John Zubly warned against those “querulous, factious and licentious” men who have come “to despise all government and have attempted to sow discord and disorder in church and state alike.” “Liberty, my brethren, is a precious and inestimable jewel, and ought to be used with the utmost caution and delicacy. It may be as much abused as government and power, leading into measures equally tyrannical and oppressive.” To prevent this, liberty must be carefully blended with law, for without law “there would soon be no liberty at all…and right, justice, and property must give away to power.”
Law, liberty, and natural rights, then, are inseparable. All men, by nature, have rights (both alienable and unalienable), rights which are natural because they come to man “from the constitution of nature itself without the intervention of any human contrivance, institution, compact or deed.” But once a man enters into civil society with other men, “the community who have power from the consent of every member, [may] by laws…prohibit the exercise of a particular right inconsistent with the welfare of the whole.” And this right to regulate the natural rights of man is especially important in the case of his unalienable rights, for the conflict created by each man’s attempt to secure his own person and properties was the immediate cause of men joining together in civil societies in the first place. Thus, Hamilton in his The Farmer Refuted quotes Blackstone’s Commentaries:“[As] the principal aim of society is to protect individuals, in the enjoyment of those absolute rights…[so] the first and primary end of human laws, is to maintain and regulate these absolute rights of individuals.” In essence, then, the unalienable rights of man—including among others, the rights of life, liberty, and the pursuit of happiness, the right to private judgment, the right of conscience (often referred to as the right of religion), the right of marriage, and the right to associate and communicate with other individuals—are unalienable not because they are beyond regulation, but because no man can cease to pursue them even if he wanted to, and no man or society of men can long be happy where these rights of the individual are frequently and repeatedly violated. The test to be used in the regulation of these rights is, nevertheless, the happiness of the society, not the happiness of the individual, for “as the whole is more valuable than any part, so the security of every particular person ought to be consulted, and provided for, only so far as is consistent with the welfare of the whole…. Where public security requires anything as necessary to be done, there a Private Injury ought to be no Bar against that which appears necessary to the Public Good.” This commitment to the public good as the measure of public policy pervades the literature of the Revolution and is reflected in John Adams’ much circulated pamphlet on the nature of government: “That form of government which communicates ease, comfort, security, or, in a word, happiness, to the greatest number of persons, and in the greatest degree, is the best.”
This same measure—accordance with the public good—is the test to be used in the decision to disturb government. The American patriot, Andrew Eliot, had warned his American brethren as early as 1765 that ambitious men are everywhere spreading “jealousies and suspicions” to destroy confidence in even the best of rulers:
The rulers of a people are seldom so happy as to please all who are under their authority: They have often personal enemies; or crafty and ambitious men find fault with government because they are not in place: They had need be wise as serpents as well as harmless as doves to counterwork the machinations of such men, to give no occasion of offense to those who seek occasion, or to prevent the bad effect of the misrepresentation that they will industriously spread.
The people at large, however, are not apt to be duped by the machinations of these few, for those “discontented men, who think nothing right but what they do themselves” and who attempt “to raise suspicions of evil designs, and of schemes that never entered into any one’s head but their own…may possibly prevail to raise tumults and disturbances; but very often they fall into the pit digged for others.” Even if the grievances are real, the people “will make allowances for mistakes, and even for faults” in their rulers. In fact, “it is not easy to effect a general opposition, even where they have the most pernicious designs.” It is prudence which keeps the people’s right to resist government from becoming a vehicle for perpetual rebellion. Thus:
Most certainly people ought to bear much, before they engage in any attempts against those who are in authority; they ought to consider their rulers are frail and fallible men, who are liable to mistakes and faults, when their general aim is good and right; they should overlook their errors, and even their vices, if they are not such as tend directly to overturn the state, and to bring distress and ruin on the whole community. Better a particular person, yea many individuals should suffer, than to encourage civil broils and a public disturbance.
In the final analysis, then, the unalienable rights of man can only be understood within the broader concerns of the public good and the rights of the political community in general. In other words, while the Declaration assumes the existence of certain individual rights which government is obligated to recognize and protect, it also assumes that the validity of these claims will be measured in terms of the security and happiness of the people in general and that government will not be disturbed until the mischief has grown so general that little or no alternative remains to the resistance of authority.
The Grievances Against George III
But here it will be raised as a mighty objection that the people collectively will have no concern for the individual until the state of affairs has grown so severe that many an innocent man has perished. An examination of the grievances against George III within the context of the people’s right to share in the legislature, however, reveals that the specific violations of the rights of man have been included without making any particular individual the basis of any of the charges. Furthermore, all of the tests which a prudent people will require before disturbing government have been met. First, the grievances have been general. It is “the Rights of the People” he has invaded; it is “the Lives of our People” he has destroyed; it is the petitions of the people he has rejected; it is “the good people of these Colonies” who have suffered the injuries and usurpation of King and Parliament.
Second, the injuries and usurpation of George III have been persistent. He has repeatedly dissolved the colonial legislatures for opposing his pernicious designs; “he has refused for a long time” to allow others to be elected in their place; he has combined with Parliament in many cases to deprive the colonists of the fundamental right of trial by jury; he has answered the colonists’ “repeated Petitions… by repeated Injury.” Even now, he persists in his attempt to enslave the American colonies by calling upon “foreign Mercenaries to compleat the Works of Death, Desolation, and Tyranny” already begun.
Third, the acts of oppression on the part of the King and the British Parliament have been deliberate. The violations of the rights of the people have not been the result of mismanagement or poor judgment, but “rather the machinations of a conniving mind. The King has not just forgotten to care for his loyal subjects in the American colonies: he has “utterly neglected” their needs and has adamantly refused to consent to laws “the most wholesome and necessary for the public good.” He has repeatedly tried to force his will upon the colonies by attempting to undermine their “Representative Houses.” He has even “combined with others” to alter the legislative power of the colonies.
And finally, the designs against the rights of the people have been with bad motives or intentions. George III does not seek the safety and happiness of the people. On the contrary, the “direct object” of all his injuries and usurpations is nothing other than “the establishment of an absolute Tyranny over these States,” a tyranny already begun with the declaration of war against the American colonies. In short, the natural rights of man have been incorporated in the capacity and natural right of the American people to self-government, for no man is safe where popular government is insecure. This, then, is the critical presumption or conviction which controlled the fashioning of the American Declaration of Independence, and it is within this framework that the accusations against George III can be most meaningfully understood: (1) his interference with the colonial representative institutions ([i]-[viii); (2) the violation of separation of powers ([viii]-[xii]); (3) the placement of the supreme power of the community in a tribunal superior to the immediate representatives of the people ([xiii]-[xxii]); and (4) the attempt to alter the legislative power of the colonies through barbarous acts of force ([xxiii]-[xxvii]).
The injuries, the usurpations, all these were sufferable, until the pernicious acts of George III threatened the very foundations of self-government. It is most appropriate, therefore, that the twenty-eighth charge against the King—which in a real sense marks the end of the American Declaration of Independence—concludes “A Prince, whose character is thus marked by every act which may define a Tyrant, is unfit to be the Ruler of a free People.” A people who do not control their government, cannot be free, cannot be happy, for popular control of government alone distinguishes liberty from slavery, taxation from robbery, and just government from tyranny and oppression.
This essay in our series of “Timeless Essays” was first published here in May 2012. Books on the topic of this essay may be found in The Imaginative Conservative Bookstore. Republished with gracious permission from Political Science Reviewer (Fall 1976).
- Plato, The Laws, translated by Trevor J. Saunders (Harmondsworth, Middlesex, Eng.: Penguin, 1970), p. 45.
- Thomas Jefferson, The Writings of Thomas Jefferson, “Letter to Henry Lee, May 8, 1825,” edited by Albert Ellery Bergh (Washington, D.C.: Thomas Jefferson Memorial Assoc., 1907), 16:118-119.
- Abraham Lincoln, The Collected Works of Abraham Lincoln, 2 vols., “Address at Lewistown, Illinois, August 17, 1858,” edited by Roy P. Basler (New Brunswick, N.J.: Rutgers University Press, 1953), 2:547.
- Rufus Choate, Works of Rufus Choate, 2 vols., “Rufus Choate to the Maine Whig State Central Committee,” edited by Samuel Gilman Brown (Boston: Little, Brown, 8c Co., 1862), 1:212, 215.
- James A. Van Osdol, Sketches from our Constitutional History, rev. ed. (Anderson, Ind.: Herald Publishing Co., 1935), p. 27.
- Robert Ginsberg, “The Declaration as Rhetoric,” A Casebook the Declaration of Independence (New York: Crowell, 1967), p. 234 (hereafter cited as Casebook); Otto Vossler, “The American Argument,” trans. and ed. by Robert Ginsberg in Casebook, p. 154; and Thad W. Tate, “The Social Contract in America, 1774-1787, Revolutionary Theory as a Conservative Instrument,” The William and Mary Quarterly, Third Series, XXII, no. 3, July 1965, p. 386.
- Alpheus Henry Snow, The American Philosophy of Government (New York: G.P. Putnam’s Sons, 1921), p. 40.
- Robert G. Ingersoll, “1776. The Declaration of Independence,” The Ghosts and Other Lectures (Washington, D.C.: C.P. Farrell, 1882), p. 169.
- Herbert Aptheker, The American Revolution: 1763-1783, (New York: International Publishers, 1960), p. 104.
- Adrienne Koch, Power, Morals, and the Founding Fathers: Essays in the Interpretation of the American Enlightenment (Ithaca, N.Y.: Great Seal Books, 1961), p. 26.
- Richard Frothingham, The Rise of the Republic of the United States (Boston: Little, Brown, & Co., 1872), p. 554; Sydney George Fisher, The Struggle for American Independence, 2 vols. (Philadelphia: J.B. Lippincott Co., 1908), 1:460-465; and George Bancroft, History of the United States, 10 vols. (Boston: Little, Brown & Co., 1860), p. 474.
- Edward Dumbauld, The Declaration of Independence and What it Means Today (Norman, Okla.: University of Oklahoma Press, 1950), p. 33.
- Thomas Paine, Common Sense (Philadelphia, 1776), p. 77.
- I have included in the Appendix a copy of the broadside edition of the Declaration (published in Philadelphia by John Dunlap, July 4, 1776 by order of the Continental Congress). I have taken the liberty of numbering the parts and the paragraphs in the margins for convenience in referring to the text. Throughout this essay all citations to the Declaration are taken from this broadside edition unless specifically stated to the contrary. For a preliminary analysis of the majority and the question of political power, see my essay “The American Declaration of Independence: The Majority and the Right of Political Power” in George J. and Scarlett G. Graham’s forthcoming volume, Founding Principles of American Government: Two Hundred Years of Democracy on Trial.
- Samuel West, A Sermon (Boston: Printed by John Gill, 1776), pp, 18-19 (emphasis added).
- Ibid., p. 27.
- Francis Newton Thorpe, ed., The Federal and State Constitutions, Colonial Charters, and Other Organic Laws, 7 vols. (Washington, D.C.: Govt. Printing Office, 1909), 3:1686-1687.
- Ibid., 5:3082-3083.
- Ibid., 3:1890.
- Ibid., 7:3813.
- “Letter to John Trunlbell, February 15, 1789,” reprinted in Merrill D. Peterson’s Thomas Jefferson (New York: The Viking Press, 1975), pp. 434-435.
- William Wemms, defendant, The Trial of William Wemms… (Boston Printed, London reprinted, [1771?]), p. 146.
- Ambrose Serie, Americans against Liberty (London, 1776), p. 26.
- John Locke, Two Treatises of Government, edited by Peter Laslett (London: Cambridge University Press, 1970), 11:96 (emphasis concerning the individual added).
- Henry C. Van Schaack, The Life of Peter Van Schaack (New York: D. Appleton & Co., 1842), pp. 72-73.
- Worthington Chauncey Ford, ed., Journals of the Continental Congress, 1774-1789, 34 vols. (Washington, D.C.: Government Printing Office, 1904-1937), 4:25.
- E. Ames and A. Cheney Goodell, eds., The Acts and Resolves, Public and Private, of the Province of Massachusetts Bay, 21 vols. (Boston: Wright and Potter, 1869-1922), 5:932.
- Resistance not Rebellion. In which The Right of a British Parliament to Tax the American Colonies, is fully considered, and found unconstitutional... (Old Bailey, London, MDCCLXXV), p. 18.
- John Locke, Two Treatises of Government, 11:99 (emphasis concerning the majority added).
- Gad Hitchcock, A Sermon... (Boston, 1775), p. 38.
- John Locke, Two Treatises of Government, 11:220, (emphasis added).
- William Whiting, Address to the Inhabitants (Hartford, Conn.: Printed by Watson and Goodwin, 1778), pp. 10-16 and 25-26.
- Thomas Jefferson, The Writings of Thomas Jefferson, edited by Paul Leicester Ford (New York: G.P. Putnam’s Sons, 1892-1899), IX:29.
- Ibid., 111:230.
- Ibid., VIII:4.
- Ibid., X:89.
- The Speeches of His Excellency Governor Hutchinson (Boston, 1773), p. 350.
- Richard Price, Observations On The Nature of Civil Liberty (London, 1776), pp. 3-11.
- Granville Sharp, A Declaration Of The People’s Natural Right To A Share In the Legislature (London, 1774), xxix—xxxvii, pp. 28-30.
- Journals of the Proceedings of the Congress, “The Address to the Inhabitants of Quebec” (London, 1775), pp. 69-71.
- Thomas Chandler, What think ye of the Congress Now? (New York, 1775), P. 5.
- John Drinker, Observations (Philadelphia, 1774).
- Isaac Wilkins, Short Advice (New York, 1774), p. 11.
- Peter Whitney, The Transgression (Boston, 1774), pp. 17-18,53-54.
- John Zubly, The Law of Liberty (Philadelphia, 1775), p. 26.
- Francis Hutcheson, A System of Moral Philosophy, 1:293.
- Thomas Pownall, The Administration of the Colonies, p.87.
- Alexander Hamilton, The Farmer Refuted, p. 88.
- Essay upon Government, pp. 47-49.
- John Adams, Thoughts on Government, p. 5.
- Andrew Eliot, A Sermon, pp. 14-15, 43-47, 58.
In Congress, July 4, 1776,
By the REPRESENTATIVES of the
UNITED STATES OF AMERICA
In GENERAL CONGRESS Assembled.
When in the Course of human Events, it becomes necessary for one People to dissolve the Political Bands which have connected them with another, and to assume among the Powers of the Earth, the separate and equal Station to which the Laws of Nature and of Nature’s God entitle them, a decent Respect to the Opinions of Mankind requires that they should declare the causes which impel them to the Separation.
We hold these Truths to be self-evident, that all Men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty, and the Pursuit of Happiness—That to secure these Rights, Governments are instituted among Men, deriving their just Powers from the Consent of the Governed, that whenever any Form of Government becomes destructive of these Ends, it is the Right of the People to alter or to abolish it, and to institute new Government, laying its Foundation on such Principles, and organizing its Powers in such Form, as to them shall seem most likely to effect their Safety and Happiness. Prudence, indeed, will dictate that Governments long established should not be changed for light and transient Causes; and accordingly all Experience hath shewn, that Mankind are more disposed to suffer, while Evils are sufferable, than to right themselves by abolishing Forms to which they are accustomed. But when a long Train of Abuses and Usurpations, pursuing invariably the same Object, evinces a Design to reduce them under absolute Despotism, it is their Right, it is their Duty, to throw off such Government, and to provide new Guards for their future Security. Such has been the patient Sufferance of these Colonies; and such is now the Necessity which constrains them to alter their former Systems of Government. The History of the present King of Great-Britain is a History of repeated Injuries and Usurpations, all having in direct Object the Establishment of an absolute Tyranny over these States. To prove this, let Facts be submitted to a candid World.
[II] [i] He has refused his Assent to Laws, the most wholesome and necessary for the public Good.
[ii] He has forbidden his Governors to pass Laws of immediate and pressing Importance, unless suspended in their Operation till his Assent should be obtained; and when so suspended, he has utterly neglected to attend to them.
[ii] He has refused to pass other Laws for the Accommodation of large Districts of People, unless those People would relinquish the Right of Representation in the Legislature, a Right inestimable to them, and formidable to Tyrants only.
[iv] He has called together Legislative Bodies at Places unusual, uncomfortable, and distant from the Depository of their public Records, for the sole Purpose of fatiguing them into Compliance with his Measures.
[v] He has dissolved Representative Houses repeatedly, for opposing with manly Firmness his Invasions on the Rights of the People.
[vi] He has refused for a long Time, after such Dissolutions, to cause others to be elected; whereby the Legislative Powers, incapable of Annihilation, have returned to the People at large for their exercise; the State remaining in the mean time exposed to all the Dangers of Invasion from without, and Convulsions within.
[vii] He has endeavoured to prevent the Population of these States; for that Purpose obstructing the Laws for Naturalization of Foreigners; refusing to pass others to encourage their Migrations hither, and raising the Conditions of new Appropriations of Lands
[viii] He has obstructed the Administration of Justice, by refusing his Assent to Laws for establishing Judiciary Powers.
[ix] He has made Judges dependent on his Will alone, for the Tenure of their Offices, and the Amount and Payment of their Salaries.
[x] He has erected a Multitude of new Offices, and sent hither Swarms of Officers to harrass our People, and eat out their Substance.
[xi] He has kept among us, in Times of Peace, Standing Armies, without the consent of our Legislatures.
[xii] He has affected to render the Military independent of and superior to the Civil Power.
[xiii] He has combined with others to subject us to a Jurisdiction foreign to our Constitution, and unacknowledged by our Laws; giving his Assent to their Acts of pretended Legislation:
[xiv] For quartering large Bodies of Armed Troops among us:
[xv] For protecting them, by a mock Trial, from Punishment for any Murders they should commit on the Inhabitants of these States:
[xvi] For cutting off our Trade with all Parts of the World:
[xvii] For imposing Taxes on us without our Consent:
[xviii] For depriving us, in many Cases, of the Benefits of Trial by Jury:
[xix] For transporting us beyond Seas to be tried for pretended Offenses:
[xx] For abolishing the free System of English Laws in a neighbouring Province, establishing therein an arbitrary Government, and enlarging its Boundaries, so as to render it at once an Example and fit Instrument for introducing the same absolute Rule into these Colonies:
[xxi] For taking away our Charters, abolishing our most valuable Laws, and altering fundamentally the Forms of our Governments:
[xxii] For suspending our own Legislatures, and declaring themselves invested with Power to legislate for us in all Cases whatsoever.
[xxiii] He has abdicted Government here, by declaring us out of his Protection and waging War against us.
[xxiv] He has plundered our Seas, ravaged our Coasts, burnt our Towns, and destroyed the Lives of our People.
[xxv] He is, at this Time, transporting large Armies of foreign Mercenaries to compleat the Works of Death, Desolation, and Tyranny, already begun with circumstances of Cruelty and Perfidy, scarcely paralleled in the most barbarous Ages, and totally unworthy the Head of a civilized Nation.
[xxvi] He has constrained our fellow Citizens taken Captive on the high Seas to bear Arms against their Country, to become the executioners of their Friends and Brethren, or to fall themselves by their Hands.
[xxvii] He has excited domestic Insurrections amongst us, and has endeavoured to bring on the Inhabitants of our Frontiers, the merciless Indian Savages, whose known Rule of Warfare, is an undistinguished Destruction, of all Ages, Sexes and Conditions.
In every stage of these Oppressions we have Petitioned for Redress in the most humble Terms: Our repeated Petitions have been answered only by repeated Injury. A Prince, whose Character is thus marked by every act which may define a Tyrant, is unfit to be the Ruler of a free people.
Nor have we been wanting in Attentions to our British Brethren. We have warned them from Time to Time of Attempts by their Legislature to extend an unwarrantable Jurisdiction over us. We have reminded them of the Circumstances of our Emigration and Settlement here. We have appealed to their native Justice and Magnanimity, and we have conjured them by the Ties of our common Kindred to disavow these Usurpations, which, would inevitably interrupt our Connections and Correspondence. They too have been deaf to the Voice of Justice and of Consanguinity. We must, therefore, acquiesce in the Necessity, which denounces our Separation, and hold them, as we hold the rest of Mankind, Enemies in War, in Peace, Friends.
We, therefore, the Representatives of the UNITED STATES OF AMERICA, in General Congress, Assembled, appealing to the Supreme Judge of the World for the Rectitude of our Intentions, do, in the Name, and by Authority of the good People of these Colonies, solemnly Publish and Declare, That these United Colonies are, and of Right ought to be, FREE AND INDEPENDENT STATES; that they are absolved from all Allegiance to the British Crown, and that all Political Connection between them and the State of Great-Britain, is and ought to be totally dissolved; and that as FREE AND INDE- PENDENT STATES, they have full Power to levy War, conclude Peace, contract Alliances, establish Commerce, and to do all other Acts and Things which Independent States may of right do. And for the support of this Declaration, with a firm Reliance on the Protection of divine Providence, we mutually pledge to each other our Lives, our Fortunes, and our sacred Honor.
Signed by ORDER and in BEHALF of the CONGRESS,
JOHN HANCOCK, PRESIDENT.
CHARLES THOMSON, SECRETARY.
Philadelphia: Printed by John Dunlap. | <urn:uuid:ab2dd23e-3410-46b7-9c53-403f950c429e> | CC-MAIN-2017-04 | http://www.theimaginativeconservative.org/2016/07/thomas-jefferson-declaration-independence-power-free-people-timeless.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280065.57/warc/CC-MAIN-20170116095120-00545-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.954005 | 17,469 | 3.46875 | 3 |
Government Price Setting Has Potentially Devastating Consequences for Patients
Government price-setting policies come in a variety of forms, but they all lead to the government inserting itself between patients and providers, threatening access to treatments and chilling research and development of new medicines. In fact, in other countries that have resorted to government price setting, patients have access to fewer new medicines and wait longer to get the medicines they need. Instead of pursuing proposals that could hurt patients and cripple innovation, we need policies that protect access to treatments and make medicines more affordable.
Members of Congress continue to push a misguided drug pricing proposal under the guise of negotiation and addressing inflation as part of the reconciliation package. This proposal is nothing short of government price setting and, if implemented, would require the government to dictate prices and choose winners and losers when it comes to which diseases are likely to see new treatments. Instead of addressing a broken insurance system, the most recent proposal doubles down on bad policies that will threaten patient access to medicines and future innovations.
Tell Washington to Hold Middlemen AccountableTake Action
HOLD MIDDLEMEN ACCOUNTABLE
Tell Congress to Hold Middlemen Like Insurers and PBMs Accountable
Too many Americans struggle to afford the medicines and health care they need. And the problem has gotten worse in recent years as insurers increasingly use practices that shift costs to patients. But the drug pricing debate in Washington continues to ignore the broader pharmaceutical supply chain, including middlemen like insurers and pharmacy benefit managers (PBMs).
Unfortunately, Congress just passed a law that doesn't stop abusive insurance and PBM practices that are the real drivers of health care costs. Take insulin, for example. Last year, manufacturers provided deep discounts to insurers and PBMs that lowered the cost of the most commonly used insulins by 84% on average. These middlemen – not patients – have been the primary beneficiaries of these deep discounts. Patients deserve better.
Prescription Drug Affordability Boards
Prescription drug affordability boards give bureaucrats the power to arbitrarily set medication prices in a given state. As a result, decisions about medicines would be a part of a political process that changes with elections and the whims of politicians.
Under this policy, the state would evaluate whether certain medicines and treatments are “worth” paying for, meaning the state’s bureaucracy could come between patients and the treatments their doctors prescribe. This spells disaster for patients as they could face barriers to obtaining life-saving medication.
Government price setting threatens families’ access to the medicine they need
Ensuring A Better Future For Her Child: Emily H
Caring for a child with a serious illness isn’t easy. "It took us a long time to get answers for him—9 years. And it took going across the country to a specialty clinic." Now Emily is raising her voice to ensure that her son and kids across the country have access to the medicines and new innovation they need.
Patients Like Olga Worry Congress Might Compromise Access to Medicines by Meddling with Medicare
Olga is a senior who feels blessed to have gotten the Covid-19 vaccine. But she is worried now that Congress might meddle with her Medicare and make changes that threaten her access to medicines.
Patients Like Sue Worry Congress is Compromising Access to Medicines by Meddling with Medicare
Sue is a patient with Type 1 diabetes who depends on Medicare to get her medicines. It’s not always easy. Now some in Congress want to make it harder for patients like Sue to access her medicines. There’s a better way to fix health care for patients.
Myth Vs. Fact: Government Price Setting in Medicare Part D
In Medicare Part D, negotiations between pharmaceutical manufacturers and insurance companies help lower what patients pay for prescription medicines. But some in Congress want to permit the government to intervene in these negotiations, risking patient access and choice as well as future innovation.
What politicians say about negotiating prices in Medicare vs. What they mean
Politicians say they’ll negotiate medicine prices in Medicare. But what they mean is that they’ll decide which medicines you can and can’t get. And it could lead to long waits in Medicare for new treatments and cures.
Building a Better Health Care System
Americans deserve better solutions than government price-setting that would help make medicines more affordable for patients without upending the health care system or jeopardizing American innovation. For Medicare Part D, these include capping annual out-of-pocket costs for medicines, lowering cost-sharing, making out-of-pocket costs more predictable throughout the year, and ensuring savings negotiated with health plans and PBMs are passed on to patients at the pharmacy counter.
In the commercial market, insurance should work like insurance, sharing negotiated savings with patients at the pharmacy counter, ensuring cost-sharing assistance applies to out-of-pocket maximums, covering more medicines from day one and making out-of-pocket costs more predictable.
Our goal should be lowering out-of-pocket costs and improving patient access through commonsense, patient-centered solutions that don’t upend the health care system or American innovation. Government price setting isn’t the answer. | <urn:uuid:6848d2a1-43da-4fc3-af47-5a8dea1e57c3> | CC-MAIN-2022-33 | https://phrma.org/protectpatients | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00674.warc.gz | en | 0.928639 | 1,079 | 2.28125 | 2 |
The report tabled by Justice Verma Committee yesterday, all 631 pages of it, underlines how important an issue rape and violence against women is. The committee was set up to suggest ways to make rape laws stronger in the country in the wake of the horrifying Delhi bus rape case.
The Verma Committee wrapped up proceedings in 29 days, demonstrating an alacrity and a commitment to purpose which is rarely seen in India. In addition to the three member committee, the task was supported by “an oral consultation” with “representatives of several stakeholders, particularly the women’s social action groups and experts in the field.” In addition, the committee was helped by “the dedicated industry of a group of young lawyers, law graduates and academics.” Finally, the committee received 80,000 recommendations from people from across the world.
In 2007, News of the World royal editor Clive Goodman and a private investigator were convicted of illegal interception of phone messages. The News of the World then claimed that this was an isolated incident, but The Guardian claimed that evidence existed that this practice extended beyond this incident. In July 2011, it was revealed that News of the World reporters had hacked the voicemail of murder victim Milly Dowler. Reacting to this, David Cameron announced that a public inquiry under the Inquiries Act 2005 would be chaired by Lord Justice Leveson on 13 July, 2011.
Part one of the inquiry was set up to look into “the culture, practices and ethics of the press, including contacts between the press and politicians and the press and the police; it is to consider the extent to which the current regulatory regime has failed and whether there has been a failure to act upon any previous warnings about media misconduct." Lord Justice Leveson published his report on Part 1 of the Inquiry on 29 November 2012.
To understand the gargantuan scale of the task (it had 97 evidence days), take a look at these figures (all from the BBC website):
Lord Leveson himself spoke over 330,000 words, which would translate into about 4 full- length novels
474 individuals were witnesses
These individuals were from 135 organisations
202 witnesses were from media and PR
48 witnesses were from the police
41 witnesses were from the legal field
38 politicians were spoken to
21 witnesses were from regulators or watchdogs
More details of the numbers can be found here.
All these numbers are relevant. The Leveson Inquiry (frequently asked questions are listed here) had the time and the resources to summon, question and speak to a wide range of stakeholders, including, for example, David Cameron, prime minister of England, Rupert Murdoch, chairman of News Corp, which owned the now defunct News of the World and even Tony Blair, former prime minister.
“The JS Verma Committee tasked to look into possible amendments to the criminal law for quicker trial and enhanced punishment for rapists, on Wednesday slammed Delhi’s police, public and the administration for not acting promptly to help the 16 December gang-rape victim,” Firstpost reported yesterday.
Where was the committee’s interaction with these stakeholders – the police, the public and the administration? It is this interaction which would have greatly enhanced the report – and, as a consequence, the recommendations made. The complexity is not helped by the fact that, in the final analysis, rape is a hyperlocal issue, the prevention of it, in large part, the onus of the smallest police station. The Justice Verma committee would have been well served if they attempted to understand why these police stations are so apathetic to victims of rape and violence against women; if they understood, from women, what could be done; if they interacted with administration at the centre and at the states to understand the challenges.
The report is a great first step — but there’s a lot more that needs to be done — by the political system.
This is something Lord Leveson had to face as well.
Take a look at the last FAQ on the Leveson Inquiry website and the answer:
“What will happen after the report? How will the findings be used?” “It will be for the Government to decide how to take forward the recommendations in the report.”
The challenge, in India, is to maintain the pressure so that the good work begun by Justice Verma and his colleagues is taken as seriously as it needs to be. Perhaps a beginning would be to convert the committee immediately into a permanent body which is given the resources and the time to talk to all the stakeholders and focus, on a continuous basis, on the area of rape and violence against women. | <urn:uuid:c02fc966-0001-4d73-b66a-5ee022d99329> | CC-MAIN-2016-44 | http://www.firstpost.com/india/justice-verma-should-have-demanded-more-time-and-resources-600501.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721595.48/warc/CC-MAIN-20161020183841-00477-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.975007 | 960 | 1.71875 | 2 |
MOJAVE, California — Virgin Galactic’s new spaceship has the enthusiastic endorsement of one of the world’s greatest scientists, who plans to fly on the vehicle one day.
Famed cosmologist and physicist Stephen Hawking revealed the name of the new SpaceShipTwo suborbital craft — VSS (for Virgin Spaceship) Unity — during its star-studded unveiling ceremony Friday (Feb. 19) at Virgin’s manufacturing facility here at the Mojave Air & Space Port.
Unlike actor Harrison Ford and English soprano Sarah Brightman, Hawking did not attend the event. But Virgin Galactic played a four-minute-long recorded message from the physicist when it was time to announce Unity’s name. [Gallery: Virgin Galactic’s VSS Unity Rolls Out]
“We are entering a new space age, and I hope this will help to create a new unity. Space exploration has already been a great unifier — we seem able to cooperate between nations in space in a way we can only envy on Earth,” Hawking said in the message.
“Taking more and more passengers out into space will enable them and us to look both outwards and back, but with a fresh perspective in both directions,” he added. “It will help bring new meaning to our place on Earth and to our responsibilities as its stewards, and it will help us to recognize our place and our future in the cosmos — which is where I believe our ultimate destiny lies.”
Hawking’s message concluded with the name annoucement: “Please welcome Virgin Spaceship Unity.”
Stephen Hawking has suffered from the neurodegenerative disease ALS (amyotrophic lateral sclerosis),which is also known as Lou Gehrig’s disease, for more than 50 years. He is confined to a wheelchair and speaks with the aid of a computer.
Hawking said in his recorded message that he has always dreamed of flying to space, but for most of his life he viewed that dream as unachievable. After hearing Hawking speak of his dream during a radio interview about eight years ago, however, Virgin Galactic founder Richard Branson called the scientist up and offered him a free seat on SpaceShipTwo.
“I said ‘yes’ immediately,” Hawking said in his recorded message. “Since that day, I have never changed my mind. If I am able to go — and if Richard will still take me — I would be very proud to fly on this spaceship.”
Branson has repeatedly expressed his admiration for Hawking, who was invited to Friday’s event but apparently couldn’t make it because of health issues. The scientist is the only person ever to be offered a free ride on SpaceShipTwo, Branson has said. And the entrepreneur revealed Friday that a piece of Hawking graces VSS Unity’s exterior.
“We felt strongly that we should somehow make sure that Stephen remained a permanent part of Unity’s story, because so much of what he stands for resonates with what we at Virgin Galactic aspire to be,” Branson said during the unveiling ceremony. “So the Galactic Girl on the side of our proud Spaceship Unity now carries a banner using an image of Stephen’s eye.”
The face of Unity’s Galactic Girl is based on an old photo of Branson’s mother, Eve, the entrepreneur added.
SpaceShipTwo is designed to carry six passengers on brief journeys to suborbital space, for $250,000 per seat. Customers will get to see the curvature of the Earth against the blackness of space and experience a few minutes of weightlessness during the trip, Virgin Galactic representatives say.
VSS Unity is the second SpaceShipTwo to be built. The first, VSS Enterprise, broke apart during its fourth rocket-powered test flight on Oct. 31, 2014, killing co-pilot Michael Alsbury and seriously injuring pilot Peter Siebold.
Unity will be subjected to a variety of ground-based tests before beginning its flight trials. It’s unclear exactly when the new spaceship will be ready to start carrying passengers to suborbital space and back. | <urn:uuid:639540f1-ad0b-4348-8712-90f9891879d5> | CC-MAIN-2016-44 | http://www.luckynewspaper.com/stephen-hawking-wants-to-ride-virgin-galactics-new-passenger-spaceship-space-com/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719547.73/warc/CC-MAIN-20161020183839-00394-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.960104 | 881 | 1.90625 | 2 |
Food For Thought: Warren Buffett formula = Continuous Personal Development
💡 Warren Buffet shares a secret to his personal success: If we go to bed smarter than when we wake up, we are bound to create a path of success for ourselves – and this can be in business or in life.
In simple terms, what we choose to do consciously on a daily basis towards our own personal development determines the quality of our outcomes.
A simple checklist to determine our self-development priorities is by thinking through the following:
✅ Like every business has clients that need serving, ask – “Who is my most valuable client” ❓
➡️ The ideal answer should be ME i.e. you should be the most important client to yourself. Because if we do not serve and nurture ourselves, how do we expect to serve and nurture our clients?
✅ In our daily activities, which activities and tasks are stimulating us towards achieving our ultimate goal(s)❓
➡️ Prioritising our peak energy levels to maximise our output levels is crucial to sustained success. This means knowing when we are at our most productive each day, and when it is we are required to take a break.
✅ After a day’s work, how much time do we spend at home, sitting on the couch, watching TV, and zoning out until bedtime❓
➡️ This valuable time could be sold back to your most important client, YOU by investing in personal development practices and habits | <urn:uuid:291512a4-12c7-4e49-bc0a-6cbcd45da462> | CC-MAIN-2022-33 | https://www.theunconventionalca.org/warren-buffett-formula-continuous-personal-development/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00675.warc.gz | en | 0.943761 | 314 | 1.78125 | 2 |
Rocky Hill September 20, 1783
Mrs Custis has never suggested in any of her Letters to Mrs Washington (unless ardent wishes for her return, that she might then disclose it to her, can be so construed) the most distant attachment to D.S.— but if this should be the case, and she wants advice upon it; a Father Mother, who are at hand, & competent to give it, are at the same time most proper to be consulted on so interesting an event. For my own part, I never did, nor do I believe, I ever shall give advice to a woman who is setting out on a matrimonial voyage; first, because I never could advise one to marry without her own consent; & secondly, because I know it is to no purpose to advise her to refrain, when she has obtained it. A woman very rarely asks an opinion, or requires advice on such an occasion, ’till her resolution is formed; & then it is with the hope & expectation of obtaining a sanction, not that she means to be governed by your disapprobation, that she applies. In a word, the plain english of the application may be summed up in these words— I wish you to think as I do; but if unhappily you differ from me in opinion, my heart, I must confess is fixed, & I have gone too far now to retract."
If Mrs Custis should ever suggest any thing of this kind to me, I will give her my opinion of the measure, not of the man, with candour, & to the following effect. I never expected you would spend the residue of your days in widowhood; but in a matter so important, & so interesting to yourself, Children & Connexions; I wish you would make a prudent choice; to do which, many considerations are necessary— such as the family & connexions of the man— his fortune (which is not the most essential in my eye)—the line of conduct he has observed— & disposition & frame of his mind. You should consider, what prospect there is of his proving kind & affectionate to you— just, generous & attentive to your children— and, how far his connexions will be agreeable to you; for when they are once formed, agreeable or not, the die being cast, your fate is fixed. Thus far, & no farther I shall go in my opinions. I am, Dr Lund, &c.
DLC: Papers of George Washington. | <urn:uuid:e1966d67-9111-4306-92b5-998bc4422c63> | CC-MAIN-2017-04 | https://founders.archives.gov/documents/Washington/99-01-02-11835 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00026-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.968918 | 512 | 1.546875 | 2 |
Why the Break up of Al-Qaeda and Taliban is So Messy
In 1996, Osama bin Laden, the leader of al-Qaeda fled Sudan after years of enjoying safe haven in North Africa and returned to Afghanistan. At the time that the Taliban was rising in power and bin Laden was welcomed.
Now after 20 years, a new Sudan government that even did not exist in the 1990s is paying the price for harboring the al-Qaeda leader. The Sudanese government currently pays compensation to the families of 17 U.S. sailors who were killed in an al-Qaeda bombing of the USS Cole at a port in Yemen in 2000.
In response to harboring the al-Qaeda leader in Afghanistan where al-Qaeda plotted 9/11 attack, the U.S. toppled the Taliban in December 2001 and then signed a deal in February, 2020. After nearly 20 years of fighting that cost billions of dollars and hundred thousand lives, the US is aiming for a withdrawal from Afghanistan. This hinges on a deal with a Taliban, a group which refused to hand over Bin Laden in 2001 and refused to name al-Qaeda as a terrorist organization in 2020.
Under the deal, the Taliban will not allow groups like al-Qaeda to use Afghan soil. The deal is only several months old and there does not seem to be a significant chance of cutting ties between al-Qaeda and Taliban considering they have been companions for 40 years. The U.S. Department of Defense said in a report that the al-Qaeda “maintains close ties to the Taliban in Afghanistan,
likely for protection and training.” Earlier, a UN report read that al-Qaeda and Taliban enjoy a close relationship and that the Taliban “offered guarantees that it would honor their historical ties.”
Al-Qaeda and the Taliban share a long history of partnership that took shape in the 1980s during the fight against the Soviet invasion of Afghanistan. The relationship deepened over the years of the rising of the Taliban as a conqueror in the Afghan civil war in the 1990s. When the international community was against the Taliban in the 2000s and the 2010s, al-Qaeda was in the blackline of the Taliban’s insurgency.
The extremist ideology of the Taliban and al-Qaeda makes cutting ties between the two Islamist groups more difficult. For 20 years of the insurgency, the Taliban’s hardline Islamist ideology drove young fighters to die in the front line and conduct suicide bombing in a bid to take over Afghanistan, while al-Qaeda’s ideology of hurting the West and driving them out from the Islamic world continues to inspire global jihad.
“The al Qaeda and Taliban relationship runs too deep and is too interwoven in Afghanistan for the Taliban to excise al Qaeda from its network,” said Katherine Zimmerman, a resident fellow at the American Enterprise Institute. “Both groups believe in transforming the Muslim world into… restoration of the Caliphate. The Taliban seeks this [Emirate] governance in Afghanistan and al Qaeda seeks to support it in Afghanistan and bring it about throughout the Muslim world.”
Trump’s Desire to Cut al-Qaeda and Taliban Ties
In contrast to the expectation of President Trump administration that hoped-for cutting ties between al-Qaeda and Taliban and withdraw troops from Afghanistan, General Kenneth McKenzie, commander of US Central Command, told a virtual meeting hosted by Middle East Institute that “those conditions have not been fully met.” McKenzie said that leader of al-Qaeda is still in eastern Afghanistan, though the Taliban rejected it.
The Analytical Support and Sanctions Monitoring Team of the United Nations said in an earlier report that the senior leadership of al-Qaeda, armed operatives around 400 to 600, and other foreign terrorist fighters aligned with the Taliban remain in the country. During negotiating with the United States, the Taliban “regularly consulted” with al-Qaeda, according to the UN report. The Taliban dismissed the UN report in a statement.
“We cannot expect that the relations including structural, organic and emotional [the Taliban and al-Qaeda] cut within 24 hours or more,” said Jafar Mahdawi, secretary-general of Afghanistan Milat Party, a political party in Kabul. “Are these communications really for plotting attacks against the Afghan government? Or Just emotional and intermarriage relations that cannot threats the interests of the Afghan government and the U.S.?”
Roots in the Soviet Conflict
According to the UN report, the Haqqani Network — a notorious military branch of the Taliban — and al-Qaeda maintain close ties based on “friendship, a history of shared struggle, ideological sympathy, and intermarriage.” The relation between the Haqqani Network and al-Qaeda formed in 1988 during the fight against the Soviets in eastern Afghanistan, home to the Haqqani Network and al-Qaeda.
Jalaluddin Haqqani, founder of Haqqani Network who was once praised by US President Ronald Reagan as “freedom fighter,” gave al-Qaeda training space in eastern Afghanistan. Osama bin Laden used the space to train fighters who led their Jihad against the U.S. elsewhere when the Soviets withdrew from Afghanistan. Bin Laden stayed five years in Sudan before returning back to Afghanistan in 1996.
Rise of the Taliban
The Taliban were rising and capturing Afghan cities one by one. As the Taliban were facing resistance from Afghan Mujahidin groups, in particular, the northern alliance in the north, al-Qaeda came in to help. In return for harboring bin Laden, al-Qaeda provided the Taliban with enormous financial and military assistance to take over the country.
Hafiz Mansoor, a member of Northern Alliance who fought the Taliban and al-Qaeda in the 1990s, said the novice Taliban madrassa could never win over the Northern Alliance, if al-Qaeda did not step in. Mr. Mansoor said that the al-Qaeda organization included supporters, fighters, financial resources and propaganda machine supported the Taliban, and that orchestrated complex military operations to take over Mazar Sharif and Herat provinces, where the Taliban faced catastrophic failures.
“The Taliban was under pressure for harboring al-Qaeda, but Osama promised financial and military support,” Mr. Mansoor said. “At the very top level, al-Qaeda had plotted to assassinate Ahmad Shah Massod [Anti-Taliban icon]. In the last stance, I was there, and we had detected 30 radio channels that Arabs were using.”
The Price of Harboring al-Qaeda: Invasion
For the Taliban, the result of harboring al-Qaeda was a full crisis: the US toppled their regime in 2001 and supported a new Western-backed government. But the Taliban and al-Qaeda deepened their new struggle against the US during the two long decades of insurgency. When the world was against the Taliban, al-Qaeda was supporting the Taliban in the backline.
Despite al-Qaeda losing its senior leader bin Laden in 2011, the global terror group continued supporting the Taliban and enjoyed safe haven in the mountains of Afghanistan. Al-Zawahiri, the new leader of al-Qaeda, pledged alliance to the Taliban and argued that Taliban’s leaders “have been the only Muslims worthy of holding the title of ‘leader of the Faithful.’”
With such a long history of companionship with al-Qaeda, the Taliban refused to call al-Qaeda as a terrorist group in the agreement signed with the United States on February 29. In the four-page and three-part agreement, the Taliban just commit to keeping groups including al-Qaeda out of the Afghan soil and prevent such groups from launching attacks against the US.
Mahdawi, who wrote a book on society of the Taliban, said that the Taliban paid a huge price for harboring al-Qaeda once, and that this agreement with the US was a historical opportunity for the Taliban to take part in power-sharing of Afghanistan. “As the Taliban seeks political power, they have must put on their agenda to cut structural and organic ties with al-Qaeda. They cannot hide their relations from the world.”
As once alliance with al-Qaeda cost Taliban their regime, cutting ties with al-Qaeda can pave the way for the Taliban to return to the power. Unlike in the 1990s when ties with al-Qaeda carried political and military weight for the Taliban, experts said that ties with al-Qaeda may no longer carry military weight for the Taliban.
“Some suggest al-Qaeda fighters have embedded with Taliban units, while other reports suggest al-Qaeda fighters train new Talib recruits or provide specialized skills (though little evidence exists),” said Andrew Watkins, senior analyst at Crisis Group. “In an insurgent group the size of the Taliban, which may count anywhere from 50,000 to 100,000 fighters, even if all al-Qaeda suspects in Afghanistan provide military benefits, they are less than 1%.”
The Taliban’s Attempted Shift
Through negotiations with the United States, the Taliban sought to portray itself as a legitimate group that have political ambitions that weigh heavier than ideological issues. On the paper, the Taliban accepted that they will break up with their friends, fight them back and is no longer an Islamic movement that helps other Islamist foreign fighters, said Mansoor who was a junior reporter in Kabul when the Taliban emerged in the early 1990s. Mansoor added that the real challenge is implementing the paperwork.
“Taliban ideological support to foreign resistance or insurgent movements, including groups that carry out terror attacks, is a concern, especially when it comes to the potential to host such groups,” said Andrew Watkins of the International Crisis Group. “But it is also not clear that Taliban leaders currently (or plan to) devote great resources to supporting such groups.”
Has the Taliban Really Changed?
The ideology of the Taliban fueled 20 years of insurgency. A record number of Taliban fighters were killed in the frontline for their ideology. Many Taliban suicide bombers died in the name of their ideology. Extremism experts said that the Taliban have given up little of their extremist ideology which was reflected by their action of harboring and helping other extremist groups like al-Qaeda.
Mullah Omar, the first leader of the Taliban, defended the Taliban’s ideology by refusing to hand over Osama bin Laden in 2001. “So you won’t give Osama bin Laden up”? Mullah Omar was asked by a reporter of Voice of America in September 2001. “No. We cannot do that. If we did, it means we are not Muslims … that Islam is finished.”
In public, the Taliban continues defending the decision. As recent as in April 2020, the Taliban praised Mullah Omar’s “historical statement.” In a statement, the Taliban said that “It is because of his historical stand in front the global coalition of invaders under the leadership of the Americans that Afghans resisted and brought down another idol of this age.”
Hussain Ehsani, an extremism expert in Kabul said that ideology of the Taliban did not remain confined to Afghanistan, but rather than the community of believers in Islam. “Being confides to Afghanistan contrast the core ideology of the Taliban,” said Mr. Ehsani. “Religious ideas are not limited by borders. The idea of Jihad is against the infidel” and lasts until doomsday.
Afghanistan as a Launchpad for Global Jihad
Ehsani said that the Taliban use the agreement with the United States to establish their emirate in Afghanistan, from where many other Islamists can be inspired to pursue their armed Jihad elsewhere in the world, from Kashmir to Palestine. “Islamic movements are like the pandemic,” said Mr. Ehsani. “Like the corona” that spread everywhere in the world.
The Taliban have not shown evidence that they have given up on their extremist beliefs. In Voice of Jihad, the official website of the Taliban, the group continues denouncing liberalism and democracy. “The Deviants are those who are trained in the poisonous deviant beliefs of atheism, communism, secularism, democracy, and other satanic western and disbelieving ideologies in order to mislead the Muslims with their deviant ideologies,” said one episode of a Taliban propaganda video series.
Human Rights Watch said in a report that the Taliban imposes severe restrictions on rights such as education, equality, and freedom of speech in their areas of Afghanistan. “The Taliban’s widespread rights abuses in areas it controls raise concerns about their willingness and ability to keep commitments on rights in any future peace agreement,” read the report by Human Rights Watch.
Internal Taliban Tensions
Even if the Taliban want to make compromises over their ideology in peace talks with the Afghan government, many fear a split of the Taliban. The UN report concludes that the political office of the Taliban in Doha, “understood the need for the Taliban to interact with the international community and show moderation, while rank-and-file fighters were reported not to share that view.”
As much as the United States fear al-Qaeda in Afghanistan, the Taliban also faces trouble in handling their old friends from bad times. According to the UN report, the Taliban leadership did not tell their fighters of commitment to cut ties with al-Qaeda and other foreign fighters due to fear of a backlash and possible split of “pro and anti-al-Qaeda camps.”
For al-Qaeda, the US-Taliban deal was a cause for celebration. Soon following the US Special Peace Envoy to Afghanistan Zalmay Khalilzad signed and hand over the text agreement to his counterpart, Mullah Ghani Bardar of Taliban in Doha, al-Qaeda praised the Taliban for their victory and called it a “Great Victory” against the United States that aim to pull back all troops within 14 months.
“Al Qaeda is already rising again ahead of the US withdrawal — and the absence of American troops will accelerate al Qaeda’s re-ascendance,” said Katherine Zimmerman of American Enterprise Institute. “The threat al Qaeda poses is the same that it posed on 9/11, though now the US has better defenses primed. But al Qaeda also has two decades more of experience, access to new technologies, more fighters, and more fronts on which to attack.”
Al Qaeda is Still the Enemy
The latest al-Qaeda attack happened in December 2019, inside the US soil. Second Lieutenant Mohammed Saeed Alshamrani, 21, was radicalized in 2015 and opened fire on his host US naval base, killing three people in Florida. Alshamrani was a member of the Royal Saudi Air Force. Although the al-Qaeda branch of Yemen claimed responsibility for the attack, it is believed that the senior leadership of al-Qaeda who remains in Afghanistan leads the global network of al-Qaeda.
McKenzie has warned that al-Qaeda “want to inspire—they want to direct if they can. Today, they’re limited to inspiring action. That is radicalization, typically via cyber or other means of people in Western countries that are then motivated to go out and conduct lone-wolf attacks of something like that.”
In one episode of radicalization efforts, al-Qaeda attempted to exploit civil unrest in the United States over racism. Following the death of George Floyd and widespread street protests in the states, al-Qaeda issued an English-Language version of their magazine, saying that “not even the Democrats can help you but we can.”
Assessing the Situation Realistically
At the time of President Trump whose “America First” campaign has become “Trump First”, bringing back home troops from Afghanistan is an election promise that Trump wished to fulfill before the November election. Many fear such a withdrawal within such a short period of time will lead to a full crisis for the United States and the rest of the world.
The US withdrawal “will make the Taliban and al-Qaeda arrogant,” said Mansoor, who witnessed the results of the Soviet withdrawal in 1989. “Within a short time, al-Qaeda will recruit and threatens Arabic and western countries. The US and NATO will be forced to fight back terrorists in their own cities.” | <urn:uuid:e2c67930-9fae-4778-a516-f6f1099f7387> | CC-MAIN-2022-33 | https://www.insideover.com/terrorism/why-the-break-up-of-al-qaeda-and-taliban-is-so-messy.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00073.warc.gz | en | 0.95576 | 3,387 | 2.0625 | 2 |
This increased capital expenditures by $4,500,000. It gave larger and better facilities in all areas – kitchen, eating area, clothing store, food shelf, medical, dental, office, and elbowroom. The new Day Shelter opened in 1997. In 1998, the remodeling of the original day shelter was started. The ground floor was converted into a Teen Center with numerous wholesome activities, and the second floor was devoted to a children’s activity center for young children. The remodeling for this building cost $500,000 and was named Mary My Hope Children’s Center. In 2015 Mary My Hope Children Center was taken down to accommodate another Mary's Place expansion adding on the new teen/children center and eight more apartments. Our three building campus became a two building campus.
Mary Jo was and is the main fundraiser, the recruiter of volunteers and director of the shelter. Mary Jo has recruited church groups to buy, prepare, bring in and serve the noon meal each day. She has a different group for each day of the month. This system has been in place since the first days of Sharing and Caring Hands. Some of the original groups are still serving today.
So what does the future hold? Mary Jo subscribes to the philosophy expressed by Pope John XXIII, who considered himself the servant of the servants of God. Mary’s faith is wondrous to behold. Sometimes when she articulates her plans and desires, the Board of Directors caution her to go slowly. She responds with “God will provide,” and He does. | <urn:uuid:fb98c59f-0a08-4d39-bdaa-e1b0510ca13e> | CC-MAIN-2017-04 | http://www.sharingandcaringhands.org/pages/our-story | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281574.78/warc/CC-MAIN-20170116095121-00021-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.977224 | 321 | 1.609375 | 2 |
Hoping for Economic Recovery, Preparing for Health Reform: A Look at Medicaid Spending, Coverage and Policy Trends — Results from a 50-State Medicaid Budget Survey for State Fiscal Years 2010 and 2011
This annual 50-state survey finds that number of states experienced rapid growth in their Medicaid enrollment and spending last year and expect additional growth, though at a slower pace, in fiscal year 2011.
In the survey of Medicaid officials, states reported an average increase in Medicaid spending of 8.8 percent across all states in fiscal year 2010, the highest rate of growth in eight years and well above their original projections of 6.3 percent growth. Medicaid directors attributed the unexpected jump to higher-than-expected increases in eligible families due to the recession, which pushed the national unemployment rate above 10 percent and even higher rates in some states.
For fiscal year 2011 (which runs through June 2011), states budgeted for an average 7.4 percent increased in spending above fiscal year 2010 – a slightly slower rate of growth consistent with their expectations that enrollment growth will slow to 6.1 percent, according to the 10th annual survey and of state Medicaid directors.
The American Recovery and Reinvestment Act of 2009 (ARRA) provided a temporary boost in the federal government’s share of Medicaid costs, providing an estimated $87 billion to states starting in October 2008. ARRA’s increased federal Medicaid support was originally scheduled to end in December 2010, but in August, Congress enacted additional relief for states through June 2011 at a reduced level, providing $16 billion over six months.
The report was released at a Sept. 30, 2010 briefing on state Medicaid programs, the recession and health reform. It was authored by researchers at the Kaiser Family Foundation and Health Management Associates. | <urn:uuid:92a69906-9b72-4b58-9ec4-62e092c030da> | CC-MAIN-2017-04 | http://kff.org/medicaid/report/hoping-for-economic-recovery-preparing-for-health-reform-a-look-at-medicaid-spending-coverage-and-policy-trends-results-from-a-50-state-medicaid-budget-survey-for-state-fiscal-years-2010-and-201/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281419.3/warc/CC-MAIN-20170116095121-00482-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.945046 | 357 | 1.757813 | 2 |
Day 3 Theme: Sin and Its Effects
Thou sayest, I am rich, and increased with goods, and have need of nothing; and knowest not that thou art wretched, and miserable, and poor, and blind, and naked -- Revelation 3:17
Dr. Paul Brand dedicated much of his life to investigating the disease of leprosy in India. Anyone could see that lepers lost parts of their extremities, like fingers, or a foot, but no one knew exactly how leprosy caused this decay in the body.
Dr. Brand discovered that leprosy does not actually directly cause this damage. Leprosy prevents the affected part of the body from feeling pain, and so a broken ankle, or injured hand, goes untreated. It is in this indirect way that leprosy causes many other difficulties.
Similarly, sin deadens us to the danger we are in. It keeps us from feeling the soul-injuries that every human has. It makes us think everything is fine, when it is not.
This is why Jesus speaks to us here and warns us not to trust our feelings. We may convince ourselves that we are in need of nothing, when in reality we are hanging by a thread over an eternity for which we are unprepared.
To those who are deceived in this way, Jesus says, "You are wretched, your condition is miserable, you are exposed and naked before a Holy God."
How do you see yourself today? In need of nothing? Or poor and blind and in need of a Savior?
Listen to the Baptist Bible Hour (BBH) broadcast on OnePlace.com. | <urn:uuid:8b62d32b-74dd-40ad-9e29-37b333112205> | CC-MAIN-2016-44 | http://www.crosswalk.com/devotionals/baptist-bible-hour/a-good-thing-aug-3-2010-11635765.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988717963.49/warc/CC-MAIN-20161020183837-00375-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.96028 | 335 | 2.171875 | 2 |
The house dust mite allergen Der p 1 is the most immunodominant allergen involved in the expression of dust miteCspecific immunoglobulin (Ig)ECmediated hypersensitivity. expression of dust miteCspecific IgECmediated hypersensitivity 2. The reason for this potent IgE-eliciting property of Der p 1 remains unknown, but there is mounting evidence linking the allergenicity of Der p 1 to its cysteine protease activity 3. Recent in vitro work has established that Der p 1 selectively cleaves human CD25, the 55-kD subunit of the T cell IL-2 receptor (the high-affinity form of which consists of , , and subunits) 4. As a result of cleavage of surface CD25, peripheral blood T cells show markedly diminished proliferation and IFN- secretion in response to stimulation by anti-CD3 antibody. SU6668 It is known that CD4 Th cells undergo a cytokine-driven process of polarization and that IL-2, along with IFN-, and IL-4 are considered to be autocrine growth factors for the Th1 and Th2 subsets, respectively 5. The Th1 and Th2 cell populations promote the development of cells of the same subset while suppressing the propagation of those of the other subset. Therefore, Der p 1Cinduced cleavage of CD25 is likely to lead to impaired growth of cells of the Th1 subset and consequent augmentation of those of the Th2 subset. These observations raise the question of whether the cysteine protease activity of Der p 1 would bias the immune response in favor of IgE. In this paper, we demonstrate that immunization of mice with proteolytically active Der p 1 results in a significant enhancement in total IgE and Der p 1Cspecific IgE synthesis compared with animals immunized with Der p 1 that was irreversibly blocked with the cysteine protease inhibitor E-64. Materials and Methods Der p 1 Preparation. Der p 1 was isolated from house dust mite fecal pellets (Allergon) by a multistep procedure 6 involving immunoaffinity chromatography on immobilized antiCDer p 1 mAb (clone 4C1; Indoor Biotechnologies), removal of contaminating serine proteases on immobilized soybean trypsin inhibitor (Sigma Chemical Co.), and finally fast protein liquid chromatography (FPLC) to remove low-molecular-mass contaminants. The purity of the preparation was confirmed by NH2-terminal sequencing on an automatic amino acid sequencer (Applied Biosystems, Inc.), SDS-PAGE analysis (15% gel), and demonstration that enzymatic activity was completely dependent on preactivation with cysteine and totally inhibited by E-64 (l-trans-epoxysuccinyl-leucylamido [4-guanidino]butane). SU6668 Protein concentration was decided using a bicinchoninic acid (BCA) microtiter plate assay and confirmed spectrophotometrically using the empirical absorption coefficient value for Der p 1 of E1% (280 nm) = 16.4. Before use, Der p 1 was preactivated with 5 mM cysteine (Sigma Chemical Co.) to regenerate its thiol group, which becomes oxidized during purification. The catalytic activity of Der p 1 was ascertained in a continuous rate (kinetic) assay using the fluorogenic peptide substrate test was used to compare levels of antibody responses between the different immunization groups; < 0.05 was considered significant. Results and Discussion Der p 1 is usually a SU6668 25-kD cysteine protease whose structure has been modeled 7 around the crystal structure of papain, with which it shows considerable sequence similarities, most notably for residues involved in the enzyme active site 8. The proteolytic activity of Der p 1 can be inhibited by E-64, the class-specific inhibitor of microbial origin 9. This inhibition is usually brought about when cysteine within the Der p 1 active site forms a thioether covalent bond with the epoxy group of E-64. This is an irreversible process that does not lead to significant structural changes, as evidenced by crystallographic studies of a papainCE-64 complex 10. We have purified Der p 1 from fecal pellets using a multistep procedure and confirmed its purity by NH2-terminal sequencing, SDS-PAGE analysis, and demonstration that enzymatic activity was completely reliant on preactivation with cysteine and inhibited by E-64 and iodoacetamide (Fig. 1). We've recently proven that Der p 1 selectively cleaves individual Compact disc25 through the areas of peripheral bloodstream T cells 4. Right here we demonstrate that Der p 1 also selectively cleaves Compact disc25 from cultured mouse spleen T cells (Fig. 2), which isn't surprising provided the high amount of series homology that is RAC3 available between individual 11 and mouse 12 Compact disc25. This observation provides therefore supplied the justification for applying this pet species for tests our hypothesis, specifically the fact that proteolytic activity of Der p 1 is certainly a significant contributor to its allergenicity. Body 1 Assessment from the purity from the Der p 1 planning. NH2-terminal sequencing demonstrated that the series obtained (TNACSINGNA) fits the published series of Der p 1 8. (a) Silver-stained SDS-PAGE evaluation showing crude remove of fecal pellets (street … Body 2 Proteolytically energetic Der p 1 (10 g/ml) cleaves mouse Compact disc25,. | <urn:uuid:560dc2c3-ed57-4c13-90d1-92ec863b7413> | CC-MAIN-2022-33 | http://complextraitgenomics.com/tag/rac3/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz | en | 0.909441 | 1,173 | 1.554688 | 2 |
TRADITIONAL JAPANESE BREAKFAST DISHES
Breakfast is the most important meal of the day. However, breakfast dishes tend to vary between countries. Polish breakfast usually consists of scrambled eggs, sandwiches, milk with cornflakes or other products, depending on individual preferences. Breakfast in Japan looks slightly different.
Breakfast in Japan
Breakfast is one of the basic Japanese meals. Japanese cuisine is known to be one of the healthiest in the world as the Japanese put great emphasis on the quality of their food and the products they use to prepare it. Japanese breakfast, just like other meals, is a combination of balanced tastes. It is also filling, giving you the strength for the rest of the day.
Traditional Japanese breakfast
Japanese breakfasts consist of several dishes. They are usually based on rice, accompanied by several distinct additions (e.g. pickled plums, i.e. umeboshi). There is always one hot dish (e.g. miso). Every dish is served in a separate bowl, which is placed on a special breakfast tray. Meals are always eaten with traditional Japanese chopsticks (in restaurants and hotels cutlery can be served as well). Additions to hot dishes include: umeboshi, natto (fermented soybeans) and marinated vegetables, which are often served in sour seasoning. Fruit, noodles and salads are also present on Japanese tables. The food is accompanied by cold green tea.
Natto – an ingredient of Japanese breakfasts
Natto, that is fermented soybeans, is a popular component of Japanese breakfasts. Its taste is very distinctive, rarely appreciated by tourists. The characteristic, intensive smell and the chewy and viscous consistency are not particularly aesthetic. Still, the dish is tremendously popular with the Japanese. In the past, the opinions in this respect used to be divided: the Kanto community enjoyed natto, while the Kansai did not like it. Due to its nutritional values, fermented soybean is served increasingly often.
Popular and original snacks
Another Japanese breakfast dish is Tamagoyaki – a rolled egg omelette with soy sauce, an alternative to the Western and European scrambled eggs. Ikanago, that is small sweet dried fish, is another addition to a Japanese breakfast. The Japanese eat it together with head, eyes and the crunchy skeleton.
The Japanese value quantity. In addition to the dishes listed above, there are also small bowls that contain smoked eel or udon served cold. A Japanese breakfast often resembles a European dinner – it is very filling and incredibly nutritious. Japanese cuisine is considered to be among the healthiest in the world so perhaps we should use it as an example and a source of breakfast inspirations. | <urn:uuid:188eab4a-eb67-46ee-b9ee-dbfb32d2edd6> | CC-MAIN-2022-33 | https://www.oyakata.com.pl/en/oyakata-masters-book/japanese-cuisine/traditional-japanese-breakfast-dishes | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00677.warc.gz | en | 0.969175 | 573 | 2.3125 | 2 |
The musical score plays an even greater role in “The Godfather: Part II” than it did in the original film. Nostalgic, mournful, evoking lost eras, it stirs emotions we shouldn’t really feel for this story, and wouldn’t, if the score were more conventional for a crime movie. Why should we regret the passing of a regime built on murder, extortion, bribery, theft and the ruthless will of frightened men? Observe how powerfully Nino Rota’s music sways our feelings for the brutal events onscreen.
At the end of Francis Ford Coppola’s masterwork “The Godfather” (1972), we have seen Michael Corleone (Al Pacino) change from a young man who wanted to stand apart from his family to one who did not hesitate to take up the reigns of control. In “Part II” (1974), we see him lose his remaining shreds of morality and become an empty shell, insecure and merciless. If the score evokes pity, it is Michael’s self-pity. In attempting to fill the shoes of his father, Michael has lost sight of those values that made Don Corleone better than he had to be and has become a new godfather every bit as evil as he has to be. If Rota’s score had been energetic and pounding, we might see him as more closely paralleling Tony Montana in a better film, Brian DePalma’s “Scarface” (1983). But the score is sad, and music can often evoke emotion more surely and subtly than story. Consider how deeply we are moved by certain operatic arias that are utter nonsense.
The devolution of Michael Corleone is counterpointed by flashbacks to the youth and young manhood of his father, Vito (Robert De Niro). These scenes, taking place in Sicily and old New York, follow the conventional pattern of a young man on the rise and show the Mafia code being burned into the Corleone blood. No false romanticism conceals the necessity of using murder to do business. Such events as Vito’s murder of the minor-league New York godfather have their barbarism somewhat softened as Coppola adopts Vito’s point of view and follows him as he climbs rooftops to ambush the man and successfully escapes. It is a built-in reality that we tend to identify with a film’s POV. Here the murder becomes another rung on Vito’s ladder to success.
To be sure, the life of young Vito helps to explain the forming of the adult Don Corleone, and to establish in the film the Sicilian code of omerta. As Michael changes, we see why he feels that he must. He must play the game by its rules. But I am not sure the flashbacks strengthen the film. I would have appreciated separate films about young Vito and the evolution of Michael. Never mind. What we have are two compelling narratives, two superb lead performances and lasting images. There is even a parallel between the deaths of two elderly dons. Revenge must be obtained.
Coppola is at the top of his form in both films, and if I disapprove of the morality of the central characters, well, so do we all. We agree people should not kill one another, but that doesn’t explain why these films are seen again and again, entering a small worldwide canon of films just about everyone seems to have seen. They are grippingly written, directed with confidence and artistry, photographed by Gordon Willis (“The Master of Darkness”) in rich, warm, tones. The acting in both films is definitive. We can name the characters in a lot of films (Harry Lime, Scarlett O’Hara, Travis Bickle, Charles Foster Kane) but from how many films do we remember the names of six or more characters? Brando, Pacino, De Niro, Duvall, Cazale, Caan, Diane Keaton, Lee Strasberg, Talia Shire, Michael V. Gazzo and others are well-cast, well-used, gifted and correct for their roles.
Simply as a story, the Michael scenes in “The Godfather: Part II” engage our emotions. I admire the way Coppola and his co-writer Mario Puzo require us to think along with Michael as he handles delicate decisions involving Hyman Roth (Strasberg), the boss of Miami; Fredo (Cazale), his older brother, and the shooting of Sonny (James Caan). Who has done what? Why? Michael floats various narratives past various principals, misleading them all, or nearly. It’s like a game of blindfolded chess; he has to envision the moves without seeing them.
But finally it is all about Michael. Even the attack on the night of his son’s first communion party is on his bedroom, not our bedroom. His wife, Kay (Keaton), leaves him, and his focus does not waver: He will keep his son. Tom Hagen (Duvall), the most trusted confidant of father and son, considered a brother, is finally even suspected. In Michael’s life, paranoia is a useful defense mechanism.
Coppola shows Michael breaking down under the pressure. We remember that he was once a proud war hero, a successful college student, building a legitimate lifestyle. But on their wedding day, Kay first began to fully realize what an all-controlling cocoon the Corleone clan was. There would always be things she could not be told about, could not be trusted with. Finally Michael has no one to tell or trust except his elderly mother (Morgana King). Michael’s desperation in that intense conversation explains everything about the film’s final shot.
So “Part II” is finally a sad film, a lament for loss, certainly. It is a contrast with the earlier film, in which Don Corleone is seen defending old values against modern hungers. Young Vito was a murderer, too, as we more fully see in the Sicily and New York scenes of Part II. But he had grown wise and diplomatic, and when he dies beside the tomato patch, yes, we feel regret. An age has closed. We feel no regret at Michael’s decline. The crucial difference between the two films is that Vito is sympathetic, and Michael becomes a villain. That is not a criticism but an observation.
The “best films” balloting on IMDb.com lacks credibility because popularity is the primary criteria. But hundreds of thousands do indeed vote, and as I write the top four films, in order, are “The Shawshank Redemption,” “The Godfather,” “The Dark Knight” and “The Godfather: Part II.” Of all of the reviews I have ever written, my three-star review of “Part II” has stirred the most disagreement. Sometimes it is simply cited as proof of my worthlessness. I’ve been told by many that “Part II” is a rare sequel that is better than the original. Have I changed my mind? No. I have read my review of “Part II” and would not change a word.
Then why is it a “great movie”? Because it must be seen as a piece with the unqualified greatness of “The Godfather.” The two can hardly be considered apart (“Part III” is another matter). When the characters in a film take on a virtual reality for us, when a character in another film made 30 years later can say “The Godfather” contains all the lessons in life you need to know, when an audience understands why that statement could be made, a film has become a cultural bedrock. No doubt not all of the gospels are equally “good,” but we would not do without any of them.
“The Godfather: Part II” then becomes a film that everyone who values movies at all should see. And as I write this, it can be seen in astonishingly good prints. The “Godfather” trilogy has been painstakingly digitally restored by Robert Harris, a master in his field. I have seen the restored “Godfather” in the new 35mm print and “Part II” in the new Blu-ray DVD. Having first seen both at their world premieres, I would argue that they have never looked better. For films of such visual richness, that is a reason to rejoice.
And now I come back to the music. More than ever, I am convinced it is instrumental to the power and emotional effect of the films. I cannot imagine them without their Nino Rota scores. Against all our objective reason, they instruct us how to feel about the films. Now listen very carefully to the first notes as the big car drives into Miami. You will hear an evocative echo of Bernard Hermann’s score for “Citizen Kane,” another film about a man who got everything he wanted and then lost it.
Note: The newly restored 35mm prints of the first and second parts will be screened at the Music Box, 3733 N. Southport. “Part I” plays today through Oct. 9 (except Monday), and “Part II” plays Oct. 10-16. A Blu-ray set of the trilogy is now available. | <urn:uuid:1ed01d91-4e69-4cfb-89cf-323400dc188b> | CC-MAIN-2017-04 | http://www.rogerebert.com/reviews/great-movie-the-godfather-part-ii-1974 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00045-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.962401 | 2,003 | 1.679688 | 2 |
Eight passengers and a train operator were killed last summer when a Washington Metro train ran into a stopped train that was ahead of it on the tracks. The National Transportation Safety Board released its findings this week, saying that the crash was caused by “a failure of the track circuit modules that caused the automatic train control (ATC) system to lose detection of one train, allowing a second train to strike it from the rear.” Here’s the press release.
The NTSB’s synopsis of safety recommendations specifically stated this:
To Massachusetts Bay Transportation Authority, Southeastern Pennsylvania Transportation Authority, Greater Cleveland Regional Transit Authority, Metropolitan Atlanta Regional Transportation Authority, Los Angeles County Metropolitan Transportation Authority, and Chicago Transit Authority:
Work with Alstom Signaling Inc. to establish periodic inspection and maintenance procedures to examine all GRS audio frequency track circuit modules to identify and remove from service any modules that exhibit pulse-type parasitic oscillation.
Here is Metro CEO Art Leahy’s response to the findings from his daily email to Metro staff:
Following up on yesterday’s release of the National Transportation Safety Board (NTSB) report on last summer’s fatal train collision in Washington, D.C. that was caused when the automatic signal system failed to detect a stopped train, the Associated Press (AP) has published an article. It summarizes the 40 conclusions and 34 recommendations in the NTSB report; MTA staff is analyzing those items in depth.
Today, our staff produced a comparison of MTA’s approach to the approach taken by Washington, D.C. before the accident. The NTSB is urging other properties that use similar train detection systems, including Los Angeles, to replace them, and in the meantime “to establish periodic inspection and maintenance procedures to examine all (similar) audio frequency track circuit modules to identify and remove from service any modules that exhibit pulse-type parasitic oscillation.” The reporter was told that only segment 1 for the subway (downtown LA) has a similar system and Metro already is in the process of replacing it at a cost of $1.3 million. This should be accomplished within the next 12 months. We’ve been in touch with NTSB and they approve our efforts.
Even before the Washington accident, Metro was in the process of replacing the equipment on segment 1 because the manufacturer, Alstom, said it was obsolete (technology had advanced and the manufacturer wouldn’t support the older system much longer). After the Washington accident, Alstom tested our system and it worked fine. We also did our own tests. And we also installed new software in rail control to detect any anomalies in track detection circuitry.
The NTSB also wrote this:
Contributing to the accident was the lack of a safety culture within WMATA; ineffective safety oversight by the WMATA Board of Directors and the Tri-State Oversight Committee (TOC); and the Federal Transit Administration’s (FTA) lack of statutory authority to provide federal safety oversight. Additionally, WMATA’s failure to replace or retrofit the 1000-series rail cars, after these cars were shown in previous accidents to exhibit poor crashworthiness, contributed to the severity of passenger injuries and the number of fatalities. | <urn:uuid:14efd42e-b109-45be-bdb7-e360a47cb7ea> | CC-MAIN-2017-04 | http://thesource.metro.net/2010/07/29/metro-replacing-subway-equipment-cited-by-ntsb-as-cause-of-washington-metro-crash/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279410.32/warc/CC-MAIN-20170116095119-00169-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.944733 | 665 | 1.867188 | 2 |
Jane Goodall, one of the world's greatest conservationists, has made an impassioned plea for a worldwide ban on the sale of ivory to prevent the extinction of the African elephant.
Her call follows the seizure in Malaysia last week of 24 tonnes of illegal ivory and a report by conservationists warning that the illegal ivory trade now threatens governments as rebel groups use the sale of tusks to fund their wars.
"A massive tragedy is unfolding in some parts of Africa. This is desperately serious, unprecedented," she said. "We believe that Tanzania has lost half its elephants in the last three years. Ugandan military planes have been seen over the Democratic Republic of the Congo shooting elephants from the air. Armed militia are now shooting the elephants."
She accused China of being ultimately responsible, because most of the ivory is sent there to be made into ornaments. "The main market is China and the east. The ivory appears to be smuggled out in the Chinese diplomatic pouches or in unmarked planes, or it is smuggled over the border to DR Congo. Armed gangs and rangers are joining in the smuggling or are getting killed. I fear we are losing the battle in some countries. It's shocking," she said.
China's growing presence in Africa has been blamed for an unprecedented surge in poaching. The discovery last week by Malaysian customs of 1,500 tusks hidden in secret chambers in 10 containers supposedly carrying wooden floor tiles was the largest illegal ivory haul ever, roughly equivalent to all the illegal ivory seized last year.
The containers were reportedly on their way to China via Spain from Togo, a popular destination for armed gangs to smuggle ivory. It follows the discovery in Hong Kong in October of nearly 1,000 pieces of ivory tusks from Tanzania and the discovery of more than 200 tusks in Tanzania itself.
Goodall, who became famous for her work as a primatologist working with chimpanzees in Africa, compared the deteriorating situation with elephants to the drastic decline of primate populations in the past 40 years. "We are seeing the devastation of populations of elephants in many countries. It's a similar situation to the great apes. Everyone should be concerned. We are fighting for a total worldwide ban on the sale of all ivory."
She said that she would be campaigning with David Attenborough to persuade the UN to ban ivory sales. "The world must wake up. Governments need to tighten up. No one anywhere should buy any ivory. Countries must be helped to reinforce controls on poaching," said Goodall.
A report submitted to the UN last week by WWF International warned that the illegal ivory trade threatened Africa's governments as rebel groups used the sale of tusks to fund their wars. "This is about much more than wildlife. This crisis is threatening the very stability of governments. It has become a profound threat to national security," said Jim Leape, director-general of WWF International.
Poaching in some countries is said to be out of control. In southern Sudan the elephant population, estimated at 130,000 in 1986, has crashed to 5,000, said World Conservation Society director Paul Elkan. "Within the next five years, they could completely be gone with the current rates of poaching. Even security forces are involved in trafficking," he said.
Conservationists blamed the Tanzanian authorities for not controlling ivory poaching and trafficking. "There's an enormous slaughter of elephants going on in Tanzania right now. Things are out of hand," said the veteran conservationist Iain Douglas-Hamilton. "There's no protection in numbers for elephants, any more than there was for bison in the last century when they were all wiped out in America. So people shouldn't kid themselves."
Tanzania, with 70,000-80,000 elephants in 2009, is thought to have nearly a quarter of all African elephants. But Peter Msigwa, a Tanzanian MP, said last week that poaching was "out of control" with an average of 30 elephants being slaughtered for their ivory every day.
"At the end of the year, you're talking about 10,000 elephants killed," said James Lembeli, chairman of Tanzania's natural resources committee. "Move around this country where you have populations of elephants and [you see] carcasses everywhere," he said.
Last year Tanzanian police seized more than 1,000 elephant tusks hidden in sacks of dried fish at Zanzibar port.
In June the Convention on International Trade in Endangered Species described the plight of Africa's elephants as "critical" and said that elephant poaching had reached its highest level for a decade, with tens of thousands killed for their tusks each year. | <urn:uuid:2acaa71c-c6bb-43e2-81c9-e6b3ed5c70c9> | CC-MAIN-2017-04 | https://www.theguardian.com/science/2012/dec/16/jane-goodall-ivory-poaching-elephant | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284352.26/warc/CC-MAIN-20170116095124-00190-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.969219 | 959 | 2.828125 | 3 |
قرآن شریف کے اندر ہر چیز کا علم موجود ہے
Hazrat Pir Mehr Ali Shah (R.A.)
Once an American Priest questioned Pir Mehr Ali Shah RA, 'Why there is no reference of Hazrat Imam Hussain (R.A.) in Quran which is against the Muslim claim that everything is found in Quran. Here the reply of Pir Mehr Ali Shah RA is presented with English translation.
Admin's Note: Allama Iqbal also used Huroof Abjad in one of his couplets of Manaqbat (A devotional poem) on Hadsa-e-Karbala and in same poem Allama Iqbal mentioned a Verse of Quran for Hazrat Imam Hussain (RA), that couplet can also be seen in below extract, Its explanation is given below with exact poem name and its translation.
Extract from Book Mehr-e-Munir (Page 425, 426)
Explanation of the Above-mentioned Couplet of Allama Iqbal
37-Surah Al-Safaat Verse 107
وَفَدَيْنٰهُ بِذِبْحٍ عَظِيْمٍ
اور ہم نے ایک بڑی قربانی کو ان کا فدیہ دیا
And We ransomed him with a great sacrifice.
Read English Translation Here
Reply to the objection of an American clergyman
An American priest/clergyman on a visit to Golra Sharif once raised this objection in Hazrat Pir Mehr Ali Shah’s presence: “The Muslims claim that the Quran contains a reference to everything in the universe. Yet it makes no reference to Imam Hussain (R.A), even though it kept being continuously revealed during the first six years of the Imam’s life. This is a surprising omission, considering the supreme sacrifice that the Imam offered in the cause of Islam. Hazrat asked the clergyman to quote any part of the Quran so that his objection could be responded to. When the latter recited Quran’s opening Ayah before reading a substantive portion of the Quran, Hazrat asked him to stop there. He then drew the cleric’s attention to the fact that from the point of view of “Abjad”, the number of the various letters of the words totals to 786. Thereafter, he asked the cleric to note down the number of Syedna Imam Hussain’s name and related episodes of his life as follows:
The name, Imam Hussain = 210
Year of Birth = 4 (A.H)
Year of Martyrdom = 61 (A.H)
The words Karb-o-Bala = 261
The name Imam Hassan = 200
Years of his Martyrdom = 50 (A.H)
Total = 786
Hazrat thus demonstrated that a reference to Syedna Imam Hussain (R.A), his brother Syedna Imam Hassan (R.A), the years of their martyrdom etc. appeared in the very first verse of the Quran.
This discourse of Hazrat left the American clergyman amazed at the depth and breadth of the research that Muslim scholars and divine had carried out over the centuries into various aspects of their Holy book which they staunchly believed to be the Word of God Himself.
Same Extract from http://www.thelightofgolrasharif.com | <urn:uuid:537d9a3b-dd9e-4038-91b1-0c116f5a0944> | CC-MAIN-2017-04 | http://spiritual-pakistan-future.blogspot.com/2011/12/quran-contains-everything-hazrat-mehr.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00537-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.900367 | 799 | 1.859375 | 2 |
New satellite data reveal an alarming reality for coastal cities around the globe. Many are sinking up to several centimeters (inches) on average per year. Falling land levels is one contributor. But at the same time, sea levels have been rising due to climate change. That one-two punch puts coastal regions at greater risk for flooding than had been expected.
Researchers shared their new finding in the April 16 Geophysical Research Letters.
Matt Wei is an earth scientist at the University of Rhode Island. That’s in Narragansett. He was part of a team that studied 99 coastal cities spread across six continents. “We tried to balance population and geographic location,” he says. Subsidence, or land sinking, has been measured in cities before. But past research has tended to focus on just one city or region. This study is different. “It’s one of the first to really use data with global coverage,” says Wei.
His team used observations made by a pair of European satellites. Most of the data were collected from 2015 to 2020. The satellites beamed microwave signals toward Earth. Then, the satellites recorded the echoes as those waves bounced back. Wei’s team measured the timing and intensity of the reflected waves. This allowed the researchers to determine the height of the ground in different places. Those height measurements were accurate to about one millimeter (0.04 inch). And because each satellite flew over the same part of the planet every 12 days, the researchers could trace how the ground deformed over time.
Some places — mostly in Asia — were sinking up to five centimeters (two inches) per year. These regions included Tianjin in China, Karachi in Pakistan and Manila in the Philippines. Spots in 34 of the cities were sinking by more than a centimeter (0.4 inch) each year.
That’s a worrying trend, says Darío Solano-Rojas. He’s an earth scientist who was not involved in the research. He works at the National Autonomous University of Mexico in Mexico City. Coastal cities are being hit with a double whammy. First, sea levels are rising due to climate change. Those waters are swallowing coastal cities up. Meanwhile, land beneath those cities is sinking. “Understanding that [secondf] part of the problem is a big deal,” Solano-Rojas says.
Educators and Parents, Sign Up for The Cheat Sheet
Weekly updates to help you use Science News for Students in the learning environment
The land-sinking is largely caused by people, Wei and his colleagues suspect. They viewed Google Earth images of fast-sinking regions within cities. There, the team saw mostly housing or business areas. That hints the ground is sinking due to people pumping groundwater out for drinking and other uses.
But there’s reason to be hopeful. Consider the city of Jakarta in the East Pacific island nation of Indonesia. In the past, Jakarta was annually sinking by nearly 30 centimeters, on average. That’s nearly a foot per year! Now, sinking has slowed there and in other places. This may be thanks to recent government regulations that limit how much groundwater can be extracted. | <urn:uuid:b37cb016-781e-40ba-9667-a170d35e159d> | CC-MAIN-2022-33 | https://www.thetopmag.com/coastal-cities-around-the-world-are-sinking-satellite-data-show/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00267.warc.gz | en | 0.961821 | 664 | 3.4375 | 3 |
Brian Steiner, The Atlantic: In some cases, the holistic practice could replace narcotics. Integrating meditation into regular treatment could significantly cut healthcare costs.
Sarah Kehoe tried Aleve for her back pain. She tried stretching. She tried yoga. She tried forgetting about it. She tried pain patches. She tried acupuncture. A shot of painkillers into her back. Prescription anti-inflammatory pain patches. Opiates. Surgery. Physical therapy. Heat and compresses. Ignoring it again. Steroids. More opiates. Acupuncture again. She couldn’t sit, stand up straight, lie down on her back. She was weak, had lost muscle tone. She fainted on the subway. Sarah Kehoe, an otherwise healthy …
The four reminders are:
These reminders can make a difference in how we live our lives, if we keep them in mind and reflect on them each day.
1. The preciousness of life – our lives are precious and our physical and mental health, energy, freedom, food, and money give us opportunities to make the most of each and every day. So each day, we might ask ourselves, “Am I making the most … Read more » | <urn:uuid:6ec4315f-4674-49b2-9b34-63bd2df592aa> | CC-MAIN-2017-04 | http://www.wildmind.org/tag/transcend-pain | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00145-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.955826 | 246 | 1.609375 | 2 |
What means API?
An application-programming interface it is also called API. An API is a set of programming instructions and standards made to access a Web-based software application.
What happens usually is that a software company releases its API to customers so that other software developers can design products that are powered by this service.
For instance, the internet retailer Amazon released its API so that other developers could access Amazon’s product information in a much easier manner.
How API works?
Through APIs, applications talk to each other without any user knowledge or intervention. When we buy tickets online and enter our credit card information, the website uses an API to send our credit card data to a remote application that verifies whether the information is correct or not. After the payment is confirmed, the remote application sends a response back to the ticket website saying the purchase it’s ok.
As users, we only see one interface – the tickets website – but behind the scenes, many applications work together using APIs. This process is called seamless, because the user will never see the software or the process to notice what really happens. The user sees the final result of the process. To better visualize this concept, we can imagine an API as the middleman between a programmer and an application. This middleman accepts requests and, if that request is allowed, returns the data.
The middleman also informs programmers about everything they can request, exactly how to ask for it and how to receive it. The API itself consists of software code written as a series of XML messages. Every XML message corresponds to a different function of the remote service. Companies who release their API often do so as part of a larger software development kit (SDK) that includes the API, programming tools and other instructions documents to make the developer’s job easier.
APIs and web services are completely invisible to website surfers and software users. Their job is to run silently in the background, providing a way for applications to work with each other to get the user the information or functionality he needs.
A good API makes it easier to develop a program by providing all the building blocks. A programmer then puts the blocks together. There are many different types of APIs for operating systems, applications or for websites. Windows has many API sets that are used by applications — when we copy and paste text from one application to another, it is the API that allows that to work.
Nowadays, APIs are primarily important because they guide in how developers can create new apps that tap into big web services—social networks like Facebook or Pinterest, for example, or utilities like Google Maps or Dropbox.
A game application developer, for instance, can use the Dropbox API to let users store their saved games in Dropbox cloud instead of working out some other cloud-storage option from the starting point.
In this respect, APIs are great time savers. They also provide user convenience in many cases. Facebook users undoubtedly appreciate the ability to sign into many apps and websites using their Facebook ID — a feature that relies upon Facebook APIs to work.
The main advantages of using APIs are:
- Faster development – since the functionality is already implemented, you just need to call the API;
- Error handling – the implementation of the API is well tested and has minimal bugs. This can eliminate any bugs from creeping in if the functionality had been coded specifically instead of using the API.
BoostIT Hub help their clients to understand better how these interfaces run. Their team has understood how important API is for an online business and for this reason there is a specialized department working on it and now the company is ready to provide API integration systems. | <urn:uuid:1e109f94-9c46-46dd-912e-411d835bc179> | CC-MAIN-2017-04 | http://www.boostit.net/blog/api-functionality-internet-services/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280900.71/warc/CC-MAIN-20170116095120-00003-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.937784 | 745 | 4.03125 | 4 |
A more clearly positive note was that all 12 of the country's banking districts reported housing
starts were up. However, on a down note, Federal Reserve Chairman Ben Bernanke told the U.S. Congress earlier this week that hiring had dropped since the beginning of 2012, but he added that the Reserve would take steps to improve employment. He did not reveal what those steps might be.
World economy continues to slump
This comes at a time when the global economy is continuing to slump and, according to poll results conducted by Reuters
news service, will continue to slump for the rest of this year before improving in 2013. In his July 19 story Andy Bruce writes: "The global economy will labor against a dismal tide from recession-hit Europe for the rest of this year. But 2013 should bring better growth, according to Reuters polls of hundreds of economists worldwide."
In his story, Bruce came to similar conclusions as the Federal Reserve, chiefly that job increases are not being managed but that the U.S. economy is slowly expanding. The story quoted the chief economist at Standard Chartered in London, Gerard Lyons, as saying vis a vis the American economy that "there is growth." | <urn:uuid:a0f36798-699e-4fa2-af8b-d59ea46aca7f> | CC-MAIN-2017-04 | http://www.digitaljournal.com/article/328958 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280718.7/warc/CC-MAIN-20170116095120-00407-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.980558 | 240 | 1.84375 | 2 |
OpenBSD 3.7: The Wizard of OSby Federico Biancuzzi
Today the OpenBSD project announced the new 3.7 release. This is the
first release to support newer wireless chipsets, especially for 802.11g,
thanks to a big activism campaign lead by project leader Theo de Raadt. It's
now possible to create a portable access point with a tiny PDA using the Zaurus
port, too. As usual, there are a lot of other big and small changes, such as the
import of Xorg, the jump towards
gcc3, and a feature to update your installed
packages automagically. Discover the details behind the scenes in this
interview that Federico Biancuzzi had with several OpenBSD developers.
Many people will probably enjoy this release especially for the rich set of new Wi-Fi chipsets supported. It took years, but now you support them with total compliance with your goals and license. Which vendors would you define as open-source-friendly and which as unsupportive?
Damien Bergamini: Ralink Tech. and Realtek have been very
friendly by providing us documentation for their wireless chipsets. Ralink
Tech. gave us the spec for their RT2500USB 802.11 b/g chipset and about one
week later, we had a working driver (
ural) for it, just in time before 3.7 code
freeze. The work on this driver now continues in OpenBSD-current and I'm adding
advanced functionalities like HostAP mode support (the capability for a host to
act as an access point). OpenBSD was the very first operating system to provide
an open source driver for the RT2500USB chipset, and AFAIK it is still the only
one to support this chipset today. I know some Linux users that feel jealous
about this ;)
It is important to show vendors what they can benefit at no cost when cooperating with us. We are very respectful toward these vendors and if they ask us not to spread the documentation around, we respect this. But we do not sign NDAs.
OTOH, Intel has been quite uncooperative by refusing to give us the right to
redistribute the binary firmware images for their PRO/Wireless
2100/2200BG/2915ABG adapters (Centrino). As a consequence, although drivers
for these adapters (
iwi) are included into OpenBSD 3.7, they do not
work out of the box. Users must download the firmware images by hand on the
Intel web site and they are invited to complain to Intel about this before
Is there anything that our readers could do to help you succeed?
Damien Bergamini: Buy hardware made by open-source-friendly vendors (there is almost always a choice) and continue to contact the closed vendors. It has proven to be effective in the past.
And to the Linux "vendors" that regardlessly ship non-free firmware images with their OSes, I'd say that they are playing against their camp. Why would vendors ever change their policies if such things are accepted by the open source community?
I read that you have a plan to create a global
tool to manage all of the different RAID controllers, but you are missing the
necessary documentation from some vendors. Which vendors would you define as
open-source-friendly and which as unsupportive?
Marco Peereboom: Yes, work has started on a tool that will
do universal RAID management; it is actually called
because it uses the
ioctl tunnel device. The tool you
raidctl(4), is used for software RAID instead.
The idea behind
bioctl(8) is to do as much RAID management as
possible inside of the driver whereas the userland portion remains as simple as
Unfortunately, there are still vendors out there that believe that there is IP inside of a hardware API. In my experience this is mostly nonsense, and whenever there is IP hidden inside an API it only means that the device was architected poorly. We are talking about filling in some sort of structure, sending it to the device and awaiting an answer either directly or through a callback. There is no secret sauce hidden in these numbers that enables competitors to magically understand what goes on in the firmware.
Reverse-engineering hardware is all about motivation and resources. If a vendor is motivated enough, it will have to spend considerable resources on people with specialized knowledge and equipment to X-ray a board in order to obtain the schematics. It is even harder to reverse engineer programmable chips like FPGAs and CPLDs. Compared to this, reverse-engineering a software API is trivial. Hiding an API does not help a vendor in any way, shape, or form, and it really is silly to keep it hidden as if the farm depends on it.
This release fixes the mirroring mode in
types of choices does an OpenBSD user have to set up a RAID array
Michael Shalayeff: As usual, two choices: software or
hardware. All of the drivers we have currently do not support any management, but
we are working on a few that we have enough info to make some management
raid(4) however allows full management. For
simple mirroring or striping,
ccd(4) provides even better
performance, although it lacks some basic management knobs that I hope to fix
A lot of companies have been using OpenSSH in their products (Sun Microsystems, Cisco, Apple, GNU/Linux vendors, etc.). Did they give anything back, like donations or hardware?
Henning Brauer: Nobody ever gave us anything back. A plethora of vendors ship OpenSSH--commercial Unix vendors (basically all of them), all of the Linux distributors, and lots of hardware vendors (like HP in their switches)--but none of them seem to care; none of them ever gave us anything back. All of them should very well know that quality software doesn't "just happen," but needs some funding. Yet, they don't help at all.
This release includes the new OpenSSH 4.1. What's new?
Damien Miller: 4.1 is just a bugfix release; it didn't include any new features over 4.0. The new features in 4.0 included:
- Extending port forwarding to allow it to bind to a user-selected address rather than just localhost or the wildcard address. This turned out to be a fair bit of work and discussion to ensure that we didn't break backwards compatibility.
Added the ability to store hostnames added to ~/.ssh/known_hosts in a hashed format. This is a privacy feature that prevents a local attacker from learning other hosts that a user has accounts on from their known_hosts file.
So instead of hostnames being stored in plain text like:
> yourhost.example.com ssh-rsa AAAB3NzaC1yc2EAAAABIwAAAIEAp832eeMwYH...
They are hashed first, so they don't reveal the hostname. E.g.:
> |1|bRGYyrC+bfKZGGd5GZH4wo1AnsI=|xcQ+54QNVwQ+fBCldn0= ssh-rsa AAA...
We added at the request of some MIT researchers who found that a substantial number of user private keys on shared systems are not encrypted (a really dumb thing to do, BTW). This lack of user care, coupled with the information in the known_hosts files, allowed attackers to spread their attacks to multiple systems.
Right now this is disabled by default, but administrators of sites with lazy users can turn it on with the
If you do this, you should probably also hash your existing known_hosts file (
- Because the hostname hashing makes it more difficult to manually manage
known_hosts files, we added some tools to
ssh-keygento perform common operations, like finding listings for hosts and deleting hosts. These work on hashed as well as plain known_hosts files.
- More improvements to the
sftpclient. In particular, it now has basic command-line editing and history (no tab-completion yet, though).
- As usual, lots of other improvements and bugfixes :)
ntpd include any new features?
ntpd is not about features.
ntpd is about solving a relatively simple task the right way.
ntpd is about keeping the local machine's clock synchronized with
ntp servers, no more and no less than that. A plethora of little buttons
and statistics and query tools doesn't gain the majority anything, but imposes
a cost--more complex configuration, and more (potentially buggy) code. Our
ntpd is different. It is supposed to stay small and solve the
The only bigger new feature is the
-s option, which allows
ntpd to set the machine's clock hard on boot, so it is no longer
required (or even desirable) to run
I read some complaints about its limited precision. Is this a real problem for most users?
Henning Brauer: No, not at all. It reaches offsets of way below 100ms, typically below 50ms. That is about the clock resolution typical PC hardware reaches. None of the people crying for "better" resolution could ever give any valid reason why they'd need it--in fact, almost all couldn't give any at all.
I read that OpenBSD added the support for PIM (Protocol Independent Multicast). What is it? When is it useful?
Damien Miller: These changes came from FreeBSD and NetBSD via Pavlin Radoslavov and Ryan McBride. It is the kernel support required to implement the PIM multicast routing protocols (PIM sparse-mode and PIM dense-mode). These are the most popular ways to route multicast traffic between networks.
Note that OpenBSD doesn't have PIM-SM or PIM-DM daemons that can use this support in the base OS, but you can use Xorp from ports.
Claudio Jeker: PIM replaces the traditional multicast
mrouted or MOSPF to do multicast routing for a
certain area/network. In most cases, group members are sparsely distributed over
this area and protocols like MOSPF are very inefficient in these cases. PIM
introduces two new routing protocols, PIM-SM (Protocol Independent Multicast--Sparse Mode) and PIM-DM (Protocol Independent Multicast--Dense Mode).
Both protocols share the same packet format but the underlying concepts are
xorp (from the ports tree) has support for PIM-SM
on OpenBSD, but I don't know how usable it is.
PIM makes only sense in larger networks that need to do a lot of multicasting. A possible example are some IP TV solutions that stream every channel as its own multicast group. This reduces the network load on the backbone, but the end user is still capable of switching quickly between channels.
OpenBSD 3.7 includes in-kernel PPPoE support. Previous versions already have a PPPoE implementation in userland; why is there a kernel-based one now, too?
Can Erkin Acar: PPP is a protocol for establishing
point-to-point links. It is a quite complicated protocol with many options for
authentication, encryption, and compression. The existing userland
ppp(8) program supports a wide variety of these options and has
been in the tree for a long time. PPPoE (PPP over Ethernet) is a method for
establishing point-to-point links over Ethernet via PPP. Many ISPs provide
broadband services through PPPoE. The userland
pppoe(8) program is
used for establishing PPPoE links through
The main problem with userland PPP/PPPoE processing is the overhead. A single packet has to travel quite a number of times between the kernel and the userland before finally reaching the TCP/IP stack in the kernel. While not really noticeable with slow links, high-speed PPPoE links may increase the CPU utilization and the throughput may be affected.
When the PPPoE processing is moved to the kernel, much of the overhead is
removed. However, the PPP layer inside of the kernel (the
sppp layer) supports only a
minimal subset of the PPP protocol. While it is usually enough for connecting
to your ADSL link to your ISP, most of the other bells and whistles are not
OpenBSD's PPPoE (PPP over Ethernet) code is initially ported from NetBSD by
David Berghoff. It was developed and tested outside of the tree until one of the
developers (me) had enough time and motivation (Theo) to put it into the tree.
I modified the initial port to work with our
sppp layer, and moved the
functionality of the
pppoectl tool into
I continue to work on and improve the
sppp layer, which is also shared by the
Claudio Jeker: The userland PPPoE is a bit tricky insofar
as it uses
bpf to capture the PPPoE packets from the interface. This was a bit
ugly, as it needs root privileges to use
bpf, but since 3.6 PPPoE drops
privileges to user
chroots after setting the write
filters and locking its
bpf descriptor. The in-kernel version of PPPoE accesses
the device in a more natural way and has less overhead--the userland PPPoE
runs two processes and has to pass all data between the two processes and the
kernel. In some cases, it is still better to use the userland PPPoE because
its PPP back end is far more complete than
sppp(4) of the
The 3.7 release page shows some new PF features. How does each one work?
carpdevmode for IP-less interfaces.
Henning Brauer: Previously, CARP relied on the physical interface having an IP address in the same subnet as the
carpinterface. Now you can leave the physical interface IP-less, by specifying it when configuring the
# ifconfig carp0 10.0.0.1 netmask 255.255.255.0 vhid 1 pass XXX carpdev sk0
Support limiting TCP connections by establishment rate, automatically adding flooding IP addresses to tables and flushing states (
Henning Brauer: This was made to fight (D)DoS attacks. Basically, IPs with unusual high connection rates are detected, and added to a table. You can then block them based on that table, or assign them to a very slow queue or similar. It is also possible to flush all existing states from that IP when it gets added to the table.
Improved functionality of tags (tag and tagged for translation rules, tagging of all packets matching state entries).
Henning Brauer: Previously, we only tagged the first packet of a stateful connection, so that you had to filter statefully. We now tag all packets.
Improved diagnostics (error messages and additional counters from
Henning Brauer: Some error messages have been made more clear, and some counters were a bit overloaded, so we spread some off. This allows for a finer view on what
pfis doing now.
New keyword set skip on to skip filtering on arbitrary interfaces, like loopback.
Henning Brauer: It does exactly that--"disable"
pfon the given interface(s).
Henning Brauer: It is now possible to assign labels to routes--basically, 32 bytes of arbitrary information that can be used for almost anything. For example,
bgpdcould record information about the source AS number for that route, or about the peer it learned the route from.
pfcan then filter based on this information--or apply queuing :)
bgpdcannot set these labels yet, but that's the plan.
What is new in the IPsec/
Hans-Joerg Hoexer: For 3.7, we mainly focused on stability
and interoperability: the implementations of the NAT-traversal (NAT-T) and
dead-peer-detection (DPD) features that we shipped with 3.6 were not mature
enough. These issues have been resolved for 3.7. Among many minor bugfixes, we
also made sure that it is possible to run multiple instances of
isakmpd on different ports again.
Ryan McBride added a nice feature for typical roadwarrior setups:
in addition to IP addresses, isakmpd.conf now also understands
interface names and the special keyword
default, which selects the address
based on the default route. Thus one does not have to change isakmpd.conf
when the interface address is assigned dynamically.
Did you develop any new feature to fight spam?
Bob Beck: Yes, I've added a "greytrapping" feature to
spamd. This allows a site runner, when greylisting, to make use of
old unused email addresses (or any other ones that spammers like) as spamtraps
for the greylist. This is done by adding the spamtrap address to
spamd's database with the
spamdb(8) utility. After
spamdb -T -a "<email@example.com>"
if a server is running doing greylisting, any greylisted host who attempts
to mail to the destination address of
would be blacklisted for 24 hours. These machines then show up in the
spamd database as
TRAPPED entries for the next 24
spamdb -a | grep TRAPPED ... TRAPPED|184.108.40.206|1113143172 TRAPPED|220.127.116.11|1113148919 TRAPPED|18.104.22.168|1113159698 TRAPPED|22.214.171.124|1113158993 ...
The spamtrap address has no effect on established
servers; i.e., mail servers I regularly correspond with could mail to
firstname.lastname@example.org without being trapped. This only affects hosts
that are a candidate for greylisting; i.e., I haven't exchanged any mail with
them at all (or recently).
Good candidates are any unused address or formerly used address that has
been harvested or appears in a public forum. (in fact, you can pretty much
count on my putting
email@example.com into my spamtrap list
before I even see this article, since spammers like to harvest anything that
looks like an email address to a resolvable domain :)
I have small servers consistently running several hundred
TRAPPED entries, and large ones running
fluctuating between 7000 and 10000 entries. These seem to pick up more hosts to
blacklist than the typical spews and spamhaus lists, without any side
This is the first of several new features to take advantage of the 30-minute
initial delay given by greylisting, as spammers seem to be noticing. Noticing
is good. This means both that it works, and that spammers are easier to identify if they
don't like talking to
running readers try the following in their
define('confSMTP_LOGIN_MSG', '$j spamd IP-based SPAM blocker; $d')dnl
Reading the changelog I found a funny point: "The Great Apache Cleanup of 2004 to remove code we don't use." What is the status of the forked Apache included in OpenBSD?
Henning Brauer: Well, we're cleaning up the mess, starting by removing code we don't use. In the end, we hopefully have readable code, and we're pretty sure we will fix security bugs in the process.
Since the Apache people decided to change their license to an un-free one, we cannot import newer versions anyway--which is not really a loss, given that they don't really put any work into the 1.3 tree any more. Our Apache has hundreds of fixes they didn't take back even before the licensing issue. Now it has even more, and they still don't have them. We're fixing more stuff on the way, most often without noticing--we are just fixing bugs.
So, technically, this could be called a fork.
This is the first release that includes X.Org. Why did you choose to import it instead of XFree86 4.5.0?
Matthieu Herrb: The primary reason is that the new revision 1.1 of the XFree86 license is less free than the old MIT license that had been used for years by XFree86. OpenBSD already avoided shipping the final XFree86 4.4 release that also uses the new license in 3.6. Then, as many other projects moved away from XFree86 because of the license, it became obvious that most new developments in the X window system now take place in X.Org. Having said that, projects like OpenBSD have to stay vigilant that X.Org doesn't turn into a Linux-only project (that would slowly slip to a GNU General Public License).
What new features do package tools support?
Marc Espie: A lot!
The most visible new feature is probably the progress meter. If you add/remove packages, you will now get instant feedback that something is going on. A related features is that the message system has been completely redesigned to be more useful: it's much harder to miss things now.
In general, the system is more robust, handles more fringe cases better, and is a wee little bit faster. Package tools in 3.7 consume half the memory they did in 3.6.
Shared library handling has been totally rethought. Packages will now check that libraries in the base system are present, with the correct version. And also register and handle inter-package library dependencies fully. From the ports people point of view, it's now much easier to write correct package dependencies than it ever was.
The object-oriented packing-list framework has been cleaned up, and is now used extensively through the whole package system. This is a huge improvement, because some very nice tricks are now feasible with a few lines of Perl. For instance:
- Packing-lists updates are now 99 percent automatic and correct.
- There's a new
pkg_mklocatedbtool that you can use to build a small
locate(1)database of files all packages can install. It took about half an hour to write with the new tools.
Alongside shared libraries, the package system now includes smart ways to handle:
- Man pages
- Texinfo files
- Configuration files
And I've probably forgotten a few things along the way. This means that
most special cases (
INSTALL) are gone. In most cases, you just say "OK, this file is
man page" and the system will do the right thing. (Heck,
make update-plist will often do the guessing correctly for you.)
For instance, one minor thing you'll notice is the instant update of the
This is way more robust than the old tools. A lots of simple manual mistakes in making ports with the old tools will just not happen with the new ones.
OK, I've kept the big one for last.
You can use
pkg_add -r foo-1.1 to replace your old
foo-1.0 package with the new
That's right, we've got a real update system.
pkg_add -r will
(more or less):
- Unpack the new package near its final install place.
- Check that dependencies still match (both forward and backward).
- Check that the deinstall of the old package will work.
- Check that the install of the new package will work.
- Proceed with the deinstall.
- Finish the install.
- Adjust dependencies for the new package.
Yes, Virginia, you no longer have to uninstall the old packages before
installing the new ones.
pkg_add -r will deal with dependencies
correctly. For instance, assume you want to update
xv. You know
it depends on
So you just have to:
pkg_add -r <newjpeg-pkg> <newpng-pkg> <newtiff-pkg> <newxv-pkg>
and it will just work, by first updating
tiff, and finally
It handles shared libraries correctly, keeping old libraries around until all packages that need them are updated, and is generally pretty safe.
What is the roadmap for their development?
Marc Espie: Next on my list is handling really complicated update cases, where you can't update packages individually (for instance, when files move from package to package, you have to update both packages at once).
There's also some redesign for dependencies (again) to take updates into account.
And there's a smarter tool to do updates too. If you read
-r's description, you'll notice that you have to specify all of the
packages you want to add. The counterpart would be a
where you just say "OK, I want to update those packages, so locate the
replacements, and just do it." We're getting there.
As usual, there's some quality-assurance work to do. Even though
pkg_add -r has seen a lot of testing internally, I'm certain there
will be a minor quirk or two to take care of after the release.
The next very significant change will probably be in the ports tree itself.
A lot of the
pkg_tools replacement effort was geared at ensuring
better quality of the ports tree. Well, this is now mostly done. Porting
software has gotten simpler. A lot of mistakes no longer happen. So the
remaining mistakes are, of course, more visible, and need to be taken care
One important policy you'll already see is that we're much more careful in bumping package names each time we change anything--having update capabilities mean people will want updates to work. And they will mix and match packages from various points in time, even though this is not guaranteed to work. Between very precise package names, and the registration of shared libraries versions, the package system is doing its best to "get out of the way" and ensure things will just work, or say in a very obvious way, "Hu, hu, no, sorry, you really shouldn't do that" if the user does a stupid mistake.
I saw various updates for
mac68k. This is not a modern
platform, so what happened?
Martin Reindl: As you noted, pretty much.
mac68k was rotting away for quite some years. The hardware is
quite slow and there is no fancy stuff like USB or wireless. Nevertheless, the
exotic hardware nature is a valuable proving ground for the kernel APIs and
OpenBSD in general. A nice example how
mac68k helped showing bugs was a fix to
CFLAGS could be set with
system wide for all architectures.
It all started in fall 2004 when I dusted off a stray NuBus network card. It
was not recognized back then, but the fix was easy. Miod Vallat then contacted
me, gently pushed me in the right directions, and gave me some good information
on where and how to start working if
mac68k support should not be dropped. So I
started merging code from NetBSD and after two weeks I had quite a big
covering a new interrupt system, much more like the one in the
hp300 port, and
a much more flexible serial driver. This in turn allowed Miod to add
Things took off and Claudio Jeker fixed the
mc(4) driver as
found on the fastest
mac68k, the 840AV. Another long-standing bug was fixed by
Miod, which made it possible switching to bsd.rd as the preferred install
method. (Cutting down the install time from like one day to one hour!) With
this came the ability to finally use more than one disk. Various other
subsystems were also improved, including the driver for the Quadra's onboard
SCSI controller, resulting in much better disk performance (which is
weak point). During all of this time Nick Holland, Otto Moerbeek and many other
developers provided rich testing reports and help.
So what we have now is a
mac68k port that runs better than ever on Quadra
machines, including new support for the AV machines. Projects for the future
include improved NuBus support,
pdisk, as well as many small
bugfixes and code merging.
I think people will get excited by the Zaurus port, bringing a secure SSH-capable machine to their pocket. What is the development status?
David Gwynne: It is trivial to find an OpenSSH package and install it on the Zaurus's default Linux distribution. I believe the availability of these packages is a good demonstration of the effectiveness of the work that the portable OpenSSH guys are doing.
Personally, I am more interested in having OpenBSD itself and some of its
other features on a wireless device in my pocket. Being able to build a
temporary access point out of a Zaurus with a USB Ethernet device and a
wireless CF card and using four commands to set it up is extremely cool. Apart
from my own needs, I know that people want OpenBSD on the Zaurus for the same
reason they want it on
macppc; they want to use something
they trust and are comfortable with.
The 3.7 release on the Zaurus C3000 is surprisingly usable considering the short amount of time it has actually been in-tree. It is a functional system with exactly the same software and ports tree as found on any other architecture OpenBSD runs on. As for Zaurus hardware, 3.7 ships with support for its display, keyboard, touchscreen, Compact Flash slot, and the USB controller. This means that if your USB device works on your desktop or laptop, you can expect it to work on the Zaurus. The same goes for Compact Flash devices.
Development is already progressing post-3.7. Power management is constantly being improved, mostly thanks to Uwe Stuehler. Drivers for the rest of the onboard Zaurus hardware are being written. For example, Chris Pascoe has already provided a basic driver for the sound hardware. The Zaurus has become a popular toy among the developers, so there is a lot of interest in producing good device support.
Are there any particular limitations?
David Gwynne: In my opinion the biggest limitation is the need to keep Linux on the device; it is only used as a glorified boot loader for OpenBSD itself. I would love to see OpenBSD boot up when I press the power button instead of Linux.
Uwe Stuehler: A minimal fraction of Linux must remain on internal flash memory in order to run OpenBSD's boot loader. Those who want to use the whole disk for OpenBSD can do that, assuming they can do well without the applications that ship with the Zaurus.
The boot loader is mostly the same as on other OpenBSD platforms. It is conveniently installable via the same package installer that you would use to install OpenSSH on Linux. Once it is installed, OpenBSD can indeed start immediately every time you press the power button or reboot the Zaurus.
There are intrinsic limitations of the ARM processor being used in the
Zaurus, such as the lack of a hardware floating-point unit. Our ports tree already
contains alternative software that is better optimized for integer arithmetic
mpg321 as an alternative to
gaps currently remain can hopefully be closed as more developers port their
software to various ARM platforms.
Is there any plan to support other devices beyond the Sharp Zaurus SL-C3000?
David Gwynne: The Zaurus port originally started out on the SL-C860, but was quickly moved to the C3000 due to the better onboard hardware. The intention has always been to go back and make OpenBSD work on the C860 once we're happy with our work on the C3000. In the short term, it might be easy to support the new C1000, since it is basically a C3000 without a hard disk. Support for other Zaurus handhelds should be fairly trivial once the C860 and C3000 are both working, since the same devices and CPUs on these handhelds are used on other models, too.
Uwe Stuehler: Despite there being certainly at least a little bit of interest, I think realistically nothing much apart from recent Zaurus models has a chance to be supported anytime soon.
This release introduce
gcc 3.3.5 for common platforms
macppc. What pros/cons does this version of
gcc bring over the old and patched
Marc Espie: Obvious con:
gcc 3.3 is about 30 percent slower than
Pros: a lot of modern C++ code now compiles. There's no way to avoid recent
gcc for some architectures, like AMD64. The various language parsers now give
much better diagnostics. In particular, the new C preprocessor is very
Do you plan to update to
gcc 3.4 or 4.0 in the near
Marc Espie: Nope.
gcc 3.4 adds a whole set of C++ problems
we don't want to deal with right now (more stringent syntax, catastrophic
memory increases in some cases), and
gcc 4.0 is definitely not mature
technology yet, and it's even slower than
In a previous interview I did with Richard
Stallman, he stated that
gcc will include ProPolice. I hope
this is this good news for you. Is there any other technology that you would
like to see imported into
Marc Espie: OK, this might be the scoop you're looking for.
This is not news to me. This is definitely not good news. In this instance, Richard was all talk, and no action. There is absolutely nothing going on that indicates that ProPolice will be a part of future GCC releases.
Let me publicize that more. The GCC people are going to say they haven't had any luck collaborating with Etoh Hiroaki.
I've inquired into the problem, I've offered to help by acting as liaison between the GCC developers and Etoh Hiroaki. I got a lukewarm response at best.
Right now, the ProPolice technology is not considered stable enough for inclusion in GCC. Technically, the stuff Etoh does is a nice hack that plays interesting games with GCC internals. Those games are actually not really supported inside of GCC. (ProPolice assumes the frames have a given internal representation, which is 99 percent the case in practice, but is not part of the GCC internals' contract.)
And this is it--this is as far as ProPolice integration so far has gone. Richard asked for ProPolice to be integrated, which does not cost him anything. It's just a PR move, as far as I'm concerned. No resources have been devoted in actually pushing for ProPolice to be integrated.
The GCC people are handling other stuff, which is more important for them, which is something I quite understand.
There is absolutely nothing going on where ProPolice integration is concerned.
Yes, there's a lot of work. Ask the OpenBSD developers how many issues we
had to solve in
gcc in taking ProPolice from the "proof of concept" stage to
"integrated compiler technology in the
gcc we ship." Hundreds of hours. Sweat
Well, right now, ProPolice stops at GCC 3.4. No one has a working ProPolice for GCC 4.0. No one is devoting enough resources to ensure this will happen. And you think we will switch to GCC 4.0? Think again.
Instead, GCC 4.0 will ship with a framework called
mudflap, which does about
as much as "flap, flap, flap" flying through code. It catches one valid bound
violation every April the 1st, and complains about valid code every other day
of the year.
No ProPolice in sight.
Federico Biancuzzi is a freelance interviewer. His interviews appeared on publications such as ONLamp.com, LinuxDevCenter.com, SecurityFocus.com, NewsForge.com, Linux.com, TheRegister.co.uk, ArsTechnica.com, the Polish print magazine BSD Magazine, and the Italian print magazine Linux&C.
Return to the BSD DevCenter.
- Trackback from http://mt.rollingegg.net/archives/2005/06/09/on_usb_wifi_clients.html
On USB Wifi Clients
2005-06-08 15:59:13 [View]
New spam feature will ruin the email system
2005-05-22 06:27:31 xstatica [View]
New spam feature will ruin the email system
2005-05-25 08:50:19 rdump [View]
2005-05-20 16:47:01 arekm [View]
OpenBSD 3.7 Released
2005-05-20 16:12:38 [View]
OpenBSD 3.7 Released
2005-05-20 09:57:32 [View] | <urn:uuid:a0b63d62-6a43-490c-b4b7-4d96950513fe> | CC-MAIN-2016-44 | http://www.macdevcenter.com/pub/a/bsd/2005/05/19/openbsd_3_7.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718278.43/warc/CC-MAIN-20161020183838-00239-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.929955 | 7,982 | 1.671875 | 2 |
Home remodeling refers to the process of redesigning your home to create something new. When remodeling your home, you change the look and the layout of its space to create a more functional space. A home remodeling project is a daunting project that requires a lot of planning and preparation for the best results. Remodeling a house may be costly since it involves incorporating complex designs and numerous constructions that alter major systems in the home. If you do not have enough money for the project, you need to look for a reputable company to finance my home renovations.
Develop a plan for the project and outline all the renovations needed. Make sure you have the expertise you need for the project before starting. You need to organize a home loan with your financial provider before the project begins. If your home improvement costs are above your budget, you can take credit for home repairs needed in the project. Consider consulting an experienced remodeling contractor before you start the project. Various options are available for financing house renovations for people redesigning custom homes.
Home remodeling has reached a whole new level at your place. After 30 years in the same house, you were certain that you had made all of the updates you would ever need. That was only true, however, until the fall when your younger daughter left for college. Attending a campus that was 12 hours from home, you were uncertain how the absence of your daughter would change you lifestyle. For the last 22 years you and your husband have focused your time, budget, and energy on your tow daughters. With the oldest daughter working as a nurse and earning a full time paycheck for the first time in her life and your youngest daughter following in the footsteps of her older sister and earning a full ride scholarship, you and your husband were ready to try this empty nest thing.
Only a few weeks of being the only two in the house, your husband announced that he had one more home remodeling project in mind. He wants to remake the basement one more time. He wants to add some extra desk seating and cabinet storage to the large bedroom in the basement in an effort to give you a better space for your quilting and scrapbooking. At the same time, he wants to get rid of the older pool table and transform that space into an area that can include a home golf simulator.
And so the home remodeling begins again!
Not Only Home Remodeling Projects Are Bathrooms and Kitchens
As more and more property owners transition into empty nesters it should come as no surprise that there are a number of ways that extra spaces are uniquely being transformed. From areas where empty nesters can pursue their interests in golf and crafting to spaces that provide an extra income from the home sharing industry, there are a number of ways that you can make sure that your house is exactly the way that you want it.
If you have unique building goals it is important to make sure that you take the time to still work with the best building contractors. Being certain that everything is up to code when it comes to electricity and plumbing, for instance, helps you know that the changes you are making will allow you still get a great return on investment (ROI). Interestingly enough, remodeling companies often have some traditional suggestions that they can add to even the most non traditional changes you would like to make. A custom design builder, for instance, still understand the codes and regulations that you need to incorporate to meet the local inspections.
Custom remodeling contractors can work side by side with you to create any kind of space that you desire. Did you know, for instance, that projected total sales of home improvement retailers in the U.S. in 2019 reached $409.2 billion? The most successful of these projects involved the guidance of experienced contractors. Another study, a 2017 U.S. Houzz and Home report indicated that Millennials invested 7% more in their homes in 2016 as compared to 2015. Not all of these projects were kitchens and bathrooms. Some where as unique as home golf simulators and personal quilting and scrapbooking spaces. | <urn:uuid:3bda2085-abd8-4369-89cf-69e1d207732d> | CC-MAIN-2022-33 | https://cyprushomestager.com/2019/01/are-you-beginning-a-very-unique-home-remodeling-project/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00473.warc.gz | en | 0.969832 | 825 | 1.648438 | 2 |
Description: The Conical mill is a size reduction machine widely used in pharmaceutical, food, and fine chemical industries. Our currently available GMP-certified model impresses with its high efficiency and easy handling. Operation procedure: raw material first enters the feed inlet of grinding/granulating machine, then the conical sieve chamber. In the chamber, the rotating impeller forces the granules to the sieve mesh surface, where they are sized and passed through the openings. Once finished, the final product is collected through the milling chamber to a receptacle underneath.The size of ground particles can be customized by adjusting the sieve mesh type, the gap between rotary knife and sieve mesh, and the rotary speed. Features
- No contamination of material is by the debris of worn sieve mesh as in a pendulum-type granulating machine.
- The unique patented shaft sealing technology ensures no leakage of lubrication oil.
- Size of granularity is easily controlled.
- No retention of raw material in dead corners, no material overheating.
- Less dust, no vibration, low noise.
- High efficiency, energy saving, large production capacity.
- Attractive appearance, easy to clean.
- A-type machine meets requirement of 100-grade workshop.
- All indirectly product-wetted surfaces are made of stainless steel
|Capacity of cone mill (kg/h)||10-100||15-150||30-300||45-450||70-700||100-1000|
|Drive seat temperature rise(℃)||<30|
|Range of speed regulation(rpm)||100-1450||FZB series frequency control 300-3600|
|The height from ground to discharge mouth(mm)||600||650||650||690||690||700|
|Hot storage and distribution|
|Room temperature storage and distribution|
|Single-tank parallel circuits|
|Minor circulation for cooling treatment of use points|
|Ozone treatment for storage and distribution|
|Maintain water quality within the maximum limitation.|
|Delivery water to use points according to required flow rate and temperature.|
|Reduce capital investment, achieve low operation cost.|
|Chemical disinfectant methods|
|Hot water, superheated water disinfection|
|Ozone dosing continuously|
|Hot water circulation|
|Microfiltration, ultrafiltration device|
- Professional calculation software for water consumption balance and pipe resistance.
- Professional design software for equipment piping can automatically generate pipe isometric drawings and bill of materials.
- Modular production structure is reasonable and compact, covering small area.
- Perfect construction management guarantees the construction quality.
- PTC electrical heating insulation is our patented technology, which is used for WFI insulation at night or holiday, and perfectly replaced heat exchanger insulation. Industrial steam supply is not needed, so as to save energy and reduce consumption.
- Pure steam generator adopts unique tertiary separation technology(flash, gravity separation by 180 degrees exhumation and health type spiral separation technology), producing pure steam with best quality, as well as safe and reliable.
- Device for continuous separating non-condensable gas from feed purified water is embedded into system, and impurities are excluded continuously.
- Pre-heaters and evaporating columns adopt double tube plate design, preventing cross contamination to the greatest degree.
- Evaporating column is equipped with special feedwater distribution plate, which can guarantee that supply water can form falling film in the column tube, to ensure the highest evaporation heat exchange efficiency.
- Equipment design pressure can guarantee stable production with 8 bar industrial steam pressure. During pure steam consumption, discharge automatically adjusts to about 2% to 8% of capacity of equipment.
Introduction The machine is mainly used for the operations of mixing, granulating, drying and coating of granule “Top Spraying”, etc of powder material in pharmaceutical industry, foodstuff industry, chemical industry, etc. Such as granule of tablet, granule for quick resolving drinking, condiment. Mixing-granulating-drying in one-step. Adopting double chamber filtering bags system, removing dust completely. Adopting multi-fluid nozzle, it guarantees that the formed granule is uniform and the content of powder is very low. Can choose 2 bar explosion-proof design. Designed, manufactured and laid out by GMP. Technical data
|Capacity (Kg /batch)||5||15||30||60||120||200||300||500||By client|
|Scope of application for liquid(g/cm3)||<1.3|
|Material yield rate (%)||≥99|
|Qualified rate of end products (%)||≥85|
|Container volume (L)||22||45||100||220||420||670||1000||1500|
|Power of fan (Kw)||3||5.5||7.5||11||18.5||22||30||45|
|Power of supply liquid motor (Kw)||0.37|
|Pressure of steam (Mpa)||0.4-0.6|
|Consumption of steam (Kg/h)||18||35||60||120||140||180||310||400|
|Pressure of compressed air (Mpa)||0.4-0.6|
|Consumption of compressed air (m3/min)||0.3||0.6||0.9||0.9||0.9||1.1||1.1||1.5|
|Working temperature (℃)||Normal temperature -120℃ could adjust|
|Noise (DB)||Installed separated with fan ≤75|
|Overall dimension of machine (L×W×H)||refer to installation drawing or customer’s room|
- Cylinder & conical material container structure, Z shaped mixing impeller, together forms the perfect mixing and granulation performance with qualified wet granules.
- Modular designed platform and on-line wet cone mill option satisfies with various process and facility conditions. 3. Pressured spray, manual or other requested binder loading sys option satisfies with various product & granulation requests.
- Designed with granulation end-point detection function, satisfies with the process reproducibility request.
- Designed with self-vent vacuum loading sys for raw material, reduce the labor and avoids dust and cross contamination, satisfies with the current GMP clean production request.
- Compound mechanical & air sealing structure avoid any material leakage and cross contamination, satisfies with the current GMP clean production request.
- Variable impeller & chopper speed controlled by VFD and setup from HMI, satisfies with various product mixing & granulation requests.
|Model||Container Volume||Working Volume||Mixing Power||Mixing rpm||Chopper Power||Chopper rpm||Wet Mill Power||Mill rpm||Compress Air Cons| | <urn:uuid:5a2cf3e0-2ed3-4e32-aba4-1e99dbed3194> | CC-MAIN-2022-33 | http://pharmectech.com/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00277.warc.gz | en | 0.768234 | 2,241 | 1.960938 | 2 |
As You Were 1946 – DATA CD – $19.50
This is “the first of a new series of post-war Service volumes which will provide a contemporary record of developments in the Australian Navy, Army, and Air Force”. The As You Were series completed the series of books produced during the Second World War by the Australian War Memorial. The contents of the book are again the work of service and ex-service men and women and the views expressed are those of the writers – unlike the volumes published during the war, the authors of these contributions are named.
As You Were 1947 – DATA CD – $19.50
As You Were: A cavalcade of events with the Australian Services from 1788 to 1947, “adds another volume to the story of the Australian Navy, Army and Air Force which was continued in As You Were 1946 from the volumes published during the First and Second World Wars”. The sixty-seven stories in the volume are again the work of service and ex-service personnel.
Queensland State Electoral Roll 1906 – DATA CD – $54.50
The roll for Queensland in 1906 totals over 6,400 pages. Entries are arranged alphabetically by district and by division within the district. You will find the details of over 200,000 voters who resided in Queensland at this time, and who were qualified (and registered) to vote. Apart from the annual roll (published in January 1906), the CD includes the additional rolls published in February, April, June, August, and October 1906.
Greater Brisbane Area Atlas and Street Directory c1948 – DATA CD – $19.50
The ‘Greater Brisbane Area Atlas and Street Directory’ contains almost 100 detailed street maps of Brisbane and its suburbs. Those covered include; Ipswich, Tingalpa, Cleveland, Redcliffe, Scarborough, Southport and Moreton Bay.
Tasmania Post Office Directory 1939 (Wise) – DATA CD – $27.50
This directory is divided into four main sections: Streets (covering Hobart and Launceston), Country Towns, Alphabetical, and Trades and Professions. These four classifications enable the reader to see at a glance, the names of residents or traders in any one town; the address and occupation of any resident in the state; and, the number of persons throughout Tasmania, engaged in any one trade or calling.
Victorian Government Gazette 1882 – DATA CD – $47.50
There is wide variety of interesting material including an Order in Council on Deserters from Danish Merchant Vessels, Weekly Abstracts of Births and Deaths, information on the 1871 and 1881 census of Victoria, Register of Medical Practitioners for 1882, Grazing Permits, a patent application for “An improved composition for unhairing and preserving hides and skins (a communication from Charles Jules Pierre Desnos, of Paris, France) and numerous references to miners, mining leases and mining companies.
Port Arthur 1830-1877: A Compelling History of Australia’s Most Infamous Convict Settlement – I. Brand – $16.45
This booklet has been prepared to present a balanced view of Port Arthur and its allied stations on Tasman Peninsula. It is based on original documents of 1830-1877, wherever possible, rather than than the faulty memories of visitors recorded many years later.
Carlton: A History – P. Yule – $39.95 REPRINT
The contributors reveal how, since its initial subdivision in the early 1850s, Carlton has been home to Melbourne’s most diverse ethnic and social heritage: from the early bourgeoisie, who built the grand terrace houses of south Carlton, to successive waves of immigrants who have enlivened the community. They capture the excitement of the nationally important social movements that sprang to life in Carlton–from the eight-hour day campaign of the 1850s to the experimental theatre of the1960s and 1970s–and show how the Carlton Association’s fight with the Housing Commission in the 1960s did much to determine the character of Melbourne’s inner suburbs in to the twenty-first century. Throughout, the major institutions and architecturally significant buildings that characterise the suburb, are illuminated.
Tracing Your Liverpool Ancestors: A Guide for Family Historians – M. Royden – $54.95
In a series of short, information-packed chapters he describes, in vivid detail, the rise of Liverpool through shipping, manufacturing and trade from the original fishing village to the cosmopolitan metropolis of the present day. Throughout he concentrates on the lives of the local people – on their experience as Liverpool developed around them.
The Victorian Public School – T. May – $14.95
It has been suggested that, by the end of the nineteenth century, a gentleman might be defined as one who had been to public school or who successfully concealed the fact that he had not.
Yorkshire North Riding Quarter Sessions Records 17th and 18th Centuries – DATA CD – $50.00
Full of fascinating detail about crimes, Papists, oaths of allegiance, indentures, and the proceedings of the local government of the time. With over 2500 pages of information, these 7 books are contained on a single CD-ROM. Many hundreds of names of people are included, and a complete index is included with each volume. Very useful for family history and local history
Calendar to the Pleadings (Ducatus Lancastrle Pars Quarta) c.1572-1603 – DATA CD – $35.00
This book, covering the period c.1572-1603, forms a listing of court cases involving land, rent, tithes etc. in many counties, including – Lancashire, Derbyshire, Yorkshire, Staffordshire, Sussex, Gloucestershire, Hertfordshire, Carmarthernshire, Essex, Nottinghamshire, Berkshire, Norfolk etc. Complete with extensive name and place indexes. 644 pages of fascinating historical detail. An outstanding Tudor resource for local and family historians.
Tracing Your Dublin Ancestors – J. Ryan & B. Smith – $32.50 NEW EDITION
This third edition of “Tracing Your Dublin Ancestors”, provides the researcher with a huge selection of genealogical sources to draw on for family and local history. Each chapter is devoted to a source type providing an introduction, a description of the source, its location and reference.
Round About the County of Limerick – DATA CD – $33.00
First published in Limerick in 1896 by McKern & Sons and republished here on fully-searchable CD-ROM is Rev. James Dowd’s ‘Round About the County of Limerick: Illustrated’, which contains 377 printed pages arranged into seventeen chapters, with 11 appendices and illustrated with maps and photographs.
Topographical and Historical Hibernian Gazetteer 1835 – DATA CD – $40.00
First printed and published in Dublin in 1835 and republished here on fully-searchable CD-ROM is the Rev. George Hansbrow’s ‘Topographical and Historical Hibernian Gazetteer’. Containing some 426 printed pages, the full title of this publication reads as follows: An Improved Topographical and Historical Hibernian Gazetteer; Describing the Various Boroughs, Baronies, Buildings, Cities, Counties, Collieries, Castles,, Churches, Curiosities, Fisheries, Glens, Harbours, Lakes, Mines, Mountains, Provinces, Parishes, Rivers, Spas, Seats, Towers, Towns, Villages, Waterfalls, etc., Scientifically Arranged, with an Appendix of Ancient Names. To which is Added, An Introduction to the Ancient and Modern History of Ireland by The Rev. G. Hansbrow.
A Sinclair Family Sourcebook – DATA CD – $29.50
This CD contains a collection of material relating to the Sinclair and St Clair families.
The Battle of Largs: The Norse Invasion of Scotland in 1263 – DATA CD – $29.50
Battles often are cited as turning points in the history of a region, and thus the Battle of Stamford Bridge, the Battle of Hastings and the Battle of Largs become fixed points in the mind of students of Britain. In 1263, the great Scandinavian king Hakon collected an enormous fleet of ships, with troops to match, and sailed for Scotland, only to be defeated by a combination of weather and the Scots army. While all agree that this was not the battle to end Norse authority in Scotland, it was a battle which captured the popular imagination in the 18th and 19th centuries.
The Tartan Spotter’s Guide – DATA CD – $29.50
When this book first appeared, it broke entirely new ground. Here, for the first time, was an orderly, logical, method of studying and identifying Scotland’s most famous symbol — the tartan. James Scarlett, the greatest tartan authority of the late 20th century, has given us a concise guide to the history of tartan. He describes in detail over 180 different tartans, and explains the principles of the designs and simplifies their identification. Whether you are a beginner or have been studying tartans for years, this is an invaluable work, one you will consult again and again.
Sutherland and the Reay Country – DATA CD – $29.50
Edited by Adam Gunn and John Mackay, this is a history of the county of Sutherland, with introductory chapters which trace the history of the region down to 1800, and with a subsequent chapter on the home life and customs of the region.
Reminisce 12×12 Double Sided Germany – Scrapbooking – $1.80
Reminisce have released their ‘Passports’ range of scrapbooking products, this includes papers and stickers relating to many countries worldwide. We have chosen to list just a few that are most relevant to our customers areas of interest. This double-sided Germany paper comes with the outline of a map of Germany, German flag and the word Germany on the front – the back has the German flag and the word ‘Germany’ over the whole page.
Reminisce 12×12 Double Sided Ireland – Scrapbooking – $1.80
This double-sided Ireland paper comes with the outline of a Ireland map, Irish flag and the word Ireland on the front – the back has the Irish flag and the word ‘Ireland’ over the whole page.
Reminisce 12×12 Double Sided Scotland – Scrapbooking – $1.80
This double-sided Ireland paper comes with the outline of a Scotland map, Scottish flag and the word Scotland on the front – the back has the Scottish flag and the word ‘Scotland’ over the whole page. | <urn:uuid:f76748c6-4f15-49b9-9372-c417be42b1b8> | CC-MAIN-2017-04 | http://www.gouldgenealogy.com/2010/03/new-genealogy-and-history-product-additions-%E2%80%93-19-march-2010/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00068-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.926076 | 2,254 | 1.757813 | 2 |
Is Transition from Secondary to Tertiary Education Less Likely among Black South Africans than their Non-Black Counterparts in the Democratic Dispensation?
Education provides the building blocks for skills development for a
country’s labour market. Investment in education is hence an important
determinant of economic growth and has been associated with various economic
benefits. However, non-transition to tertiary education is a common phenomenon.
This study examined the probability of a specified age cohort transiting to tertiary
education in South Africa and compared Black South Africans with other
population groups considering environmental and individual factors. Using
cross-sectional data from the 2016 South African Community Survey, the study
revealed that the difference in the probability of transition to tertiary education
between Whites and Blacks was not statistically significant. The findings will be
useful to policymakers in formulating strategies to improve the quality of the
labour market, and thus South Africa’s economic competitiveness.
Key words: Transition to tertiary education, South African education system,
apartheid education, post-apartheid education, economic development
Copyright (c) 2021 International Journal of African Higher Education
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. | <urn:uuid:e6a87216-88d0-461f-95b0-84e3713be9c9> | CC-MAIN-2022-33 | https://ejournals.bc.edu/index.php/ijahe/article/view/14169 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00270.warc.gz | en | 0.900322 | 267 | 2.140625 | 2 |
Books & Music
Food & Wine
Health & Fitness
Hobbies & Crafts
Home & Garden
News & Politics
Religion & Spirituality
Travel & Culture
TV & Movies
Some Gift Books for Gardeners
Throughout the year there are numerous occasions that call for gifts. Gift books are a perfect choice for gardeners. Here are some very special titles that will be of interest to gardeners.
“Carlton Watkins in Yosemite” by Weston Naef was released by Getty Publications. Those interested in nature will revel in the beauty this exquisite book has to offer. This presents around 50 of Watkins’ large format 18 by 22 inch black and white photos taken between 1861 and 1880 on glass negatives. These photos were selected from the Getty Museum’s collections. They reveal the rare beauty of Yosemite.
The introduction presents the story of Watkins’ life and career as a celebrated landscape photographer. His work was used widely in travel and guide books of the area. Taking these photos was quite a feat. The oversized camera and the other photographic equipment weighed nearly a ton. This gives complete details on each photo, including the date.
“Lucas Reiner: Los Angeles Trees 2001-2008” by Petra Giloy-Hirtz with an essay by Fred Dewey was released by Prestel. This edition features German translations of Giloy-Hirtz’s essay. Only Reiner can find beauty in ill-treated, abused trees that have been injured by vehicles, topped, and chopped into unnatural shapes by highway crews and those clearing right-of-ways.
While most of these trees are too misshapen to be called beautiful, they become so in Reiner’s hands. H conveys their will to live. Reiner takes videos of the trees, which he uses for his paintings. The enlightening essay by Giloy-Hirtz follows Reiner’s career, and provides perspective on trees in western art. Dewey’s essay explores the many roles of trees in our lives and culture, and addresses the stories behind Reiner’s tree art.
“The Prayer Book of Charles the Bold-A Study of a Flemish Masterpiece from the Burgundian Court” by Antoine de Schryver with English translation by Jessica Berenbeim was released by the J. Paul Getty Museum.
This definitive title presents the entire history of this remarkable illuminated manuscript dating from the 1460’s when it was commissioned by Charles the Bold. This volume has a biography of Charles the Bold as well as biographies of the artists and analyses on their work. It also explores all the different miniatures used in the manuscript.
This explains how the pages were carefully designed and decorated with the various elements, such as borders and script. The borders are beautifully decorated with all sorts of plants, foliage, and flowers as well as birds and
This volume is lushly illustrated with 46 color photos along with 124 black and whites.
“Edwin Deakin-California Painter of the Picturesque” by Scott A. Shields has an introduction by Alfred C. Harrison Jr. Published by Pomegranate, this definitive guide presents the life and career of this remarkable landscape artist (1838-1923). After migrating from England to the U.S., he fell in love with California, and spent most of his remaining years capturing the unique beauty of the area.
The sense of place is quite evident in this art. In addition to the natural beauty of the state, he was widely known for his wonderful still lifes of grapes. His mission series, which was particularly memorable, documents an important part of California history.
This large format volume does justice to the panoramic color plates. In addition to a biography of Deakins, this volume also has a chronology of his life and works.
| Related Articles | Editor's Picks Articles | Top Ten Articles | Previous Features | Site Map
Content copyright © 2015 by Connie Krochmal. All rights reserved.
This content was written by Connie Krochmal. If you wish to use this content in any manner, you need written permission. Contact Connie Krochmal for details.
Website copyright © 2016 Minerva WebWorks LLC. All rights reserved. | <urn:uuid:666fbdd9-6e8e-4593-9410-290d02c126e3> | CC-MAIN-2017-04 | http://www.bellaonline.com/articles/art62126.asp | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281069.89/warc/CC-MAIN-20170116095121-00271-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.943272 | 878 | 1.523438 | 2 |
This is the first of three posts highlighting the charities that we will vote on next week as part of Cupcake Project 4.0. For all of the details of the project, see the original project post.
I wrote to each of the three selected charities and asked them what they would do with $4000. Here is the response from Planet Water Foundation:
Planet Water Foundation is a US based non-profit organization that focuses its work on bringing clean water to disadvantaged communities in the developing world through the installation of water purification systems and the deployment of education programs on water-health and hygiene practices. Our projects are directed toward schools and rural villages who do not have access to clean, safe water. Should we be selected by the Cupcake Project, we would direct the $4,000 contribution toward installing a clean water system in an elementary school in Siem Reap, Cambodia bringing clean water to over 1,000 children. Not only will these funds directly impact the health and well being of many people, but it will also have an immediate impact on the lives of women and girls who typically walk hours a day fetching water. By having access to clean water, women will be able to focus their time on activities to enrich their lives, and girls will be able to replace their water buckets with school books!
In a follow up email, I was told that one system costs $8,500 – installed with an education program deployed in the school. That means that with our $4000, the water filtration system would be almost halfway funded!
Watch this video to see a time-lapse of of one of Planet Water’s projects. As you watch, keep in mind that when you see the kids drinking and washing their hands, they are experiencing clean, purified drinking water for the first time in their lives.
While PlanetWater sounds like an incredible charity, don’t forget that we have two more to choose from. Posts about the other charities are coming soon. | <urn:uuid:5567d8af-bd8f-47f0-a38b-a8ef2020a5f4> | CC-MAIN-2017-04 | http://www.cupcakeproject.com/2010/10/planet-water-foundation.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00244-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.973894 | 402 | 2.09375 | 2 |
NORTH TEXAS (CBS 11 NEWS) – On a basketball court in Frisco, Nancy Lieberman doesn’t see boys and girls. She sees only players.
After the San Antonio Spurs made the announcement that Becky Hammon will be the first paid female assistant coach in NBA history, Lieberman said she’s starting to feel the same about coaching staffs. She says the announcement is a breakthrough.
“It is a glorious day in the history of the NBA,” Lieberman said, adding, “I want to be one of those coaches that hopefully gets an opportunity to coach in the NBA. There are 29 teams and they might look at this [announcement] and go, ‘Wow! Why didn’t we think of hiring some qualified women that could help us?’”
Lieberman is a trailblazer herself. She’s the general manager of the Texas Legends, the Mavericks Development League Team.
Lieberman actually started as a coach with the Texas Legends, making her the first female coach for a professional men’s team. She was also the only woman to ever play in a men’s professional sports league — the United States Basketball League in the 80’s.
Nona Yarbough is a little girl learning a valuable lesson at the sports camp.
“Now girls get the same respect as the boys. And more girls can coach in the NBA now, because they’ll probably be hiring more girls,” the 9-year-old said plainly.
MaKenna Long is another player at the basketball camp and she knows there are no limits to her dreams.
“That maybe one day I can become the coach of an NBA team too, [that is] when I retire from basketball,” she said smiling.
Hammon, who is wrapping up a 16-season playing career in the WNBA, will join the Spurs coaching staff next season.
(©2014 CBS Local Media, a division of CBS Radio Inc. All Rights Reserved. This material may not be published, broadcast, rewritten, or redistributed.)
- Keidel: Brady And Ryan, A Contrast In QBs
- Dez Bryant Added To Pro Bowl Roster
- CONCACAF Trims Champions League To 16 Teams
- Dez Bryant Buys Table Full Of Food For Homeless Pets
- Former Patriots Teammate Calls Out Julian Edelman | <urn:uuid:4b7af876-7e54-42ab-a799-65673b008045> | CC-MAIN-2017-04 | http://dfw.cbslocal.com/2014/08/05/female-mavs-legend-talks-hiring-of-spurs-female-coach/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00083-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.943493 | 501 | 1.648438 | 2 |
In 1914 Patrick MacGill’s first novel, Children of the Dead End, sold ten thousand copies in a fortnight. In the same year, Joyce’s Dubliners sold 499 copies, 120 of them bought by the author. In 1915, MacGill published a companion novel, The Rat-Pit, which was also highly successful and contained a Preface in which the author avowed himself to be ‘highly gratified’ by the success attained by Children of the Dead End ‘in Britain and abroad. Only in Ireland, my native country, has the book given offence.’ You could write a tune to that comment, one of the favourite choruses to the plaintive anthems of Irish novelists. However, MacGill prospered as a popular novelist until 1930, when he emigrated to the United States and, caught in the Depression, dwindled into obscurity. He died in 1963. Now there is a resurgence of interest in his work. Five of his novels, two memoirs of the First World War and his collected verse have been reprinted, and his native townland, Glenties in County Donegal, has an annual Patrick MacGill Festival. Writers are now commemorated as often as saints used to be and, like saints, they fall into the categories of the local or the international. The particular flavour of MacGill’s reputation is nicely distilled in a sentence from the 1982 Festival brochure: ‘We have compiled a programme which we hope will be culturally acceptable while catering also for those who prefer outdoor activities.’ These included sheep-dog trials, a lamb-shearing competition, a treasure hunt and a Gaelic football match.
This is not an example of charming naivety. It is the result of writing for ‘my own people’, as MacGill put it in the dedication to Glenmornan (1919). The people he refers to were the subject of – not the audience for – his work. The 10,000 copies of Children of the Dead End were not sold in Donegal in 1914. They were sold in Britain and the USA. Their popularity derived from the sense they gave of a hidden world exposed, one of the many ‘organic communities’ which evoked nostalgia in an urban reading public. But it was also a society dominated by taboos, oppressed by injustice and reduced to the point of disappearance by poverty and emigration. MacGill’s stereotyped lyricism and outright, if not outraged, realism was a potent blend in the era of the Irish Revival. As in the deservedly more celebrated cases of Synge and Joyce, or, perhaps more appropriately, of Liam O’Flaherty, the reaction of the community exposed by this kind of writing was hostile. It felt that its privacy had been betrayed from the inside. It sought from those who wrote for it an account of its inherent worth, not a critique of its failures. Thus it was one thing for MacGill to stress the systematic exploitation of the community by landlords and their agents, by the local gombeen men and by the police who served the political, economic and sectarian forces which made Donegal one of the most beautiful of all wastelands. But it was another matter when he included, and even gave central prominence to the Irish Catholic clergy and its various and ruthless manoeuvres to retain power over its flock. What the landlord did not take in rent, or the gombeen man on interest payments, the priest took on tithes which were very often of his own invention.
Most of all, though, the priest and the people conspired in an attitude of such repressive severity towards sexual matters that, for all its traditional generosity and sympathy in other respects, the community managed to reproduce internally its own version of the oppressions which beset it externally. A woman who had a child out of wedlock was completely disowned. A man who objected to the power of the clergy was expelled. Everything was reduced to an economic ground, for subsistence living could not afford the luxury of passion. It was inevitable that emigration would take its toll of such a community, but it was equally the case that emigration came to be regarded both as an injustice forced upon the people and as an escape which they gladly welcomed. They were a people who lived between extremes: the glens where they grew up and the slum cities in which they had to work; the awareness of knowing and being known to families and neighbours for generations and the feeling of utter anonymity and contempt which they experienced in England and the United States; the ethic of physical strength characteristic of the unskilled male labourer and its counterpart of the unsullied purity of the almost untouchable female, who was herself very often a labourer too; the endless repressions of guilt and consciousness of sin, the wild or sullen concentration on drink and the escape from the sin of consciousness. This was a bitter fate and MacGill made it visible.
In doing so, he did not analyse, he melodramatised the plight of his community, thereby making it available, in conventionally packaged form, to the great reading public. His Donegal, or the slums of Glasgow, the ‘models’ in which the itinerant navvy lived, the sites on which he worked, became little more than the local colour which added a tint of the exotic to his pulp magazine stories. Even so, the melodrama is not exploited for its own sake merely: it is the vehicle for MacGill’s socialism, tempering his anger at injustice with a sympathy for the victims of it. The sugar and the salt are coarsely mixed. When you look for a comparison, most of those already offered in the few comments made on MacGill seem inept. He may be a ‘naturalistic’ writer in some respects, but neither Zola nor Gorky are useful exemplars. George Orwell, also cited here and there as a point of reference, is a little closer, since he, too, wrote about the people at the bottom of the heap. But Orwell is remote from MacGill in almost every possible way, save that he, too, had to find a way of writing fiction which would be ideologically ‘correct’, so to speak, and still be fiction. MacGill’s closest and most illuminating counterpart is his fellow writer from Donegal, Peadair O’Donnell, whose Adrigoole (1929) looks less lonely when it is set beside MacGill’s Black Bonar of the previous year. Both are socialists, O’Donnell much the more radical and committed. Both write about the people who have to go to Scotland and England for seasonal work, potato-picking or labouring on building sites. Both are embittered by the sufferings of those people at home and abroad. Yet neither is considered to be a novelist in the sense that, say, Elizabeth Bowen is. Her novel of 1929, The Last September, is also a lament for a vanishing class, that of the highly privileged Anglo-Irish ascendancy. In describing the three novels of those two years in this way – as chronicles of disaster – we blur one of the essential distinctions: that between the local and the international writer, between literature which survives only within the social matrix of its origin and literature which is finally independent of it. Most Irish novels are one or the other and are so to an extravagant degree. Perhaps this is because they are so consistently involved in the experience of entrapment within a society too intimately enclosed to allow for individual freedom. The byzantine struggles to gain that freedom create those intensities and strange forms which 20th-century Irish novels display from Joyce to Beckett to Flann O’Brien and John Banville. When the lack of freedom is viewed, on the other hand, as a structural defect, based on economic forces, then the novel tends to be much more dependent for its appeal upon the verisimilitude with which the social formation is registered. Even if the verdict passed by the novel on that society is negative, the novel is still, as a work of fiction, parasitic upon that society. This is the fate of the works of O’Connor, O’Faolain, O’Donnell, MacGill and others, up to a recent instance like Bernard Mac Laverty’s Cal. There is always a predictable ratio of the lyrical writing that comes from intimacy and regret, to the ‘realist’ writing that comes from repudiation and the ethic of candour. Everything is ‘right’; that’s the way it was. But, still, there is something petrified in the gaze of these Gorgon Zolas.
Here is a characteristic lyrical moment, an epiphany out of the exercise-book of Fine Writing, from Children of the Dead End:
Nature was restless and throbbing with movement; streams were gliding forward filled with a longing for unknown waters; winds were moving to and fro with the indecision of homeless wayfarers; leaves were dropping from the brown branches, falling down the curves of the wind silently and slowly to the great earth that whispered out the secret of everlasting change. The hazel-clump twined its trellises of branches overhead, leaving spaces at random for the eternal glory of the stars to filter through and rest on our faces.
From the same novel, any number of counterbalancing ‘realistic’ passages can be taken:
The first day was very wet, and the rain fell in torrents, but as the demand for potatoes was urgent we had to work through it all. The job, bad enough for men, was killing for women. All day long, on their hands and knees, they dragged through the slush and rubble of the field. The baskets which they hauled after them were cased in clay to the depth of several inches, and sometimes when emptied of potatoes a basket weighed over two stone ...
Descriptive passages like these are hung out on the story line with great regularity, accompanied by others in which the habits, customs, dialect and beliefs of the Donegal community are described in detail. Otherwise, the novels are inclined to sermonise on various topics: the heroism of the buck-navvy, the un-Christian behaviour of priests, the merciless exploitation by the employer class of those below them, the racketeering of the hard-faced men who did well out of World War One.
The plots of these novels turn on one simple principle of narration. The central figure is driven through the various strata of society in a doomed search for happiness and, in the more tragic cases, for the materials of survival, while keeping before him the ideal of a perfect and unshakable love. The picaresque frenzy is released by romantic idealism. The travels on the road and in the city allow for a panoramic survey of the corrupt and cruel social system. The dream of the ultimate home, where wandering can stop and labour become productive in a human sense, is the source of the longing for privacy which impels so many of MacGill’s people on their long journeys. Clearly, this is the imaginative world of an emigrant who can neither belong in the new place nor return to the old. One of the sorely felt humiliations of the itinerant labourers’ lives was that they were treated as a herd, housed like animals, given no privacy of bedroom or toilet and finally degraded into practising the only group activities that were permitted or encouraged – drinking and gambling. Everything was makeshift, temporary, squalid, with the threat of starvation never far away, especially for those whose bodily strength was beginning to fade. To be ill or disabled in such a world was to be disposable. An interior world of stability, affection and enclosure is the natural and desired antithesis. So all MacGill’s stories tell us of desperate wanderings that are borne because the wanderer has a fixed star to guide him or her towards the heart’s desire.
The plots have popular appeal because they shift so easily and readily from one arena to another. There is Nature, unspoiled by Man. There is Nature violated by Man’s industrial activities. There is Nature indifferent to Man, especially when he is an unemployed hobo looking for food and shelter. Then there is Society in which the physically and morally admirable people are ground down by ill-favoured and stony-hearted monsters. The monsters are, of course, very ordinary people. They can be the housewife who will not give a starving beggar a crust of bread or the clergyman who sets his dog on the man who seeks help for a dying friend. They can be warmongers or patriots, journalists or ‘gentlemen’. What makes them monstrous is the System. Society is unlike Nature because the System, which governs Society, is anti-Nature – in its refusal of normal warmth and feeling, in its replacement of love by greed, in its deformity of the body and impoverishment of the spirit. These are the basic properties of Romantic myth. MacGill chooses the left-wing version patented by Marx and Henry George. The sense that there is a demonic principle which battles with the forces of good in the guise of a contest between Nature and Society helps to give spice to his melodrama.
Children of the Dead End and The Rat-Pit are overlapping novels. One tells the story of Dermod Flynn, the navvy who has a gift for writing, becomes a journalist but returns finally to the road again with its ramshackle violence and its heroic characters like Moleskin Joe. His abiding passion is to find Norah Ryan, the love of his life, who disappeared into the Glasgow slums after becoming pregnant by an employer’s son. The Rat-Pit tells the story from Norah’s point of view. The ending, common to both, has the lovers finally meet at the moment of Norah’s death, a meeting brought about by the good-hearted behaviour of the prostitute Gourock Ellen and the tough, swaggering Moleskin Joe. The opening chapters of both novels are MacGill at his best. He is simultaneously re-creating his own childhood and recovering the almost lost folklore of a community in these pages. Thereafter, he lapses into his popular-novelist vein, hammering home his moral as a navvy would drive home a spike. They are, indeed, novels of indictment, but the indictment needed the melodrama in order to survive imaginatively. Glenmornan is MacGill’s version of the return of the native. Doalty Gallagher gives up the life of journalism in London to return to his native patch. There he meets Sheila Dermod, the incarnation of all émigré longing, and is fair set to marry her when the priest intervenes and denounces poor old Doalty from the altar for his anti-clerical outbursts. Back to the glooms of London, therefore, with the next most eligible male in the district his companion. Moleskin Joe is another travelogue, from the trenches of the First War, throughout the island of Britain, with the object of the quest another woman who was Cruelly Betrayed. This has the most absurd unravelling of plots but is, perhaps, the best portrait of the navvy who ‘works and dies in combat with Nature, the rude uncultured labourer under whose feet railways, bridges, cities and castles spring into being’. The builder of civilisation is himself excluded from it.
The most curious novel of all is Lanty Hanlon. Published in 1922 (and not in 1912, as stated in the introduction), the same year as one of Joyce’s more memorable efforts, it reads like something out of the 19th century when Irish novelists were inventing the Ireland where motley will always be worn. Lanty is stage-Irish. He drinks fortunes with remarkable equanimity; he discourses on all subjects with a swindler’s ease; he is violent, charming, whimsical, paradoxical ... the ultimate stereotype. He invents the paper company called the Ballykeeran Development Society, buys one power loom which remains unused at the station, and wastes the substance of the subscriptions he receives in one night’s orgy. Is this an emblem, a parable? It hardly matters. It is popular writing with a vengeance. MacGill is here exploiting the very people about whom he was otherwise so frequently and genuinely concerned. It seems a pity that he might be remembered as the inventor of a funny-grotesque capitalist-swindler like Lanty. But the siren call of the stereotype is so strong, especially for those whose view of Irish society is disobliging, that the attempt to create images of heroism will often give way to the acceptance of that deep self-mockery which is at the root of the stage-Irish figure. Both local and international literary practitioners in Ireland know this well. It would be possible to list them in sets in relation to their repudiation or acceptance of that mockery and the roles it enforces. Patrick Kavanagh was the most successful of all the local writers, in this respect. His Monaghan and MacGill’s Donegal are comparable places. MacGill, however, aimed for an audience that knew nothing of the peculiar plight of the exiled writer. He did not make his work out of what Kavanagh called ‘a local row’. In the last analysis, he reached for the available conventions and wrote awkwardly and diffidently within them. In that respect, he is exemplary. Much that is strained and stretched in Irish writing can be understood from MacGill’s novels, their popularity and the contrast between them and the work of the sophisticated international writers of the Irish Revival. Light-years apart, they are nevertheless haunted by similar demons and by the trouble of finding new ways or of using old ways to exorcise them.
As Rifleman No 3008 of the London Irish, MacGill fought in the First World War and wrote of his experiences in the trenches, particularly of the offensive which climaxed in the Battle of Loos, during which he was wounded and invalided out of the war. The Red Horizon deals with the preparation for the assault; The Great Push gives an account of the battle itself. The war is a reproduction of the conditions of the labourer’s life in peacetime conditions, more brutal and remorseless, but not essentially different. There is a System which is impersonal and kills; there is a Sentiment which persuades the victims to accept what is happening to them. In war, it is called patriotism. There is Humanity itself, epitomised in the common soldier, revealing how unquenchable the Human Spirit is in the most atrocious conditions. Within this do-it-yourself narrative framework, there is a varied sequence of descriptions and observations which emphasise the Horror of War, the Futility of It All and the physical miseries and camaraderie of the trenches. Passages of Fine Writing abound, particularly in the closing pages of The Great Push:
For miles and miles the barbed wire entanglements wound circuitously through the levels, brilliant with star-clusters of dew-drops hung from spike, barb and intricate rareries of gossamer. Out in front of my bay gleamed the Pleiades which had dropped from heaven during the night and clustered round a dark grey bulk of clothing by one of the entanglement props. I knew the dark grey bulk, it was He; for days and nights it had hung there, a huddled heap; the Futility of War.
MacGill’s ideas about war and society are as inert as his embarrassingly symbolic soldier. Viscount Esher, who was president of the County of London Territorial Association, wrote a Preface to The Red Horizon in which he cited MacGill as ‘an example and symbol’ for Britain and Ireland of the sacrifice already made by the writers, painters and sculptors of France. Yet why should MacGill, of all people, be willing to give his blood, to be made into an emblem of that idiocy which he attacked so vigorously in his writings? The answer must be, in part, that he did not know what he believed. The Human Spirit school of writing and its attendant mass audience is, in fact, a highly deferential phenomenon. It believes in quietism, but it speaks the pseudo-language of human solidarity. MacGill’s war writings make this clear and, in doing so, allow us to see why there is so little difference between the rattling good yarns of the itinerant navvy and those of the British Tommy.
It is a peculiar feature of writers of a socialist persuasion that they should oscillate between the extremes of trenchant realism and nebulous idealism. Where the form of the work has no mediating power, as in MacGill’s case, the result is callow indeed. His poetry is a perfect example of this failure. Some of his verses, particularly the Soldier Songs, would be better sung; all of them are better unread. There is feeling here for everything – Man, Nature, Injustice, Heroism, Home, Love – except language. That flatulent, popular appeal still survives, proudly asserting its distance from the high aestheticism of the ‘serious’ fiction of the early or of the late century. At least, MacGill’s work, because of its naivety, forces the reader to recognise what a complicated business it is to describe the differences between ‘high’ and ‘low’ literature and to explain why the division should have become so pronounced and so important. | <urn:uuid:74d381c8-e1b4-439c-a54a-470fdca6b128> | CC-MAIN-2022-33 | https://www.lrb.co.uk/the-paper/v07/n02/seamus-deane/extremes | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00272.warc.gz | en | 0.9709 | 4,537 | 2.3125 | 2 |
Copyright and the Web
JHU complies with the Digital Millennium Copyright Act (DMCA).
School Policies for Listserv Email Messages
The School has established policies about which listserv emails can be sent to faculty, staff and students.
Use of Images of People
To protect the School from liability, you must obtain written permission for any people you photograph and use in print or on the Web.
School Logo Policy
The official School logo must appear on all official Web pages, publications and material representing the School. See this page for some general guidelines.
Creating a School Website
Policies for getting a site created in Site Executive, the School's content management system.
Web Policies for Funded Organizations
Policies for centers, institutes, programs and other organizations which receive funding for outreach.
Guidelines for the Wall of Wonder
Policies for the School's Monument Street Atrium video screen.
Privacy of Student Information
The School complies with the Family Educational Rights and Privacy Act of 1974 (FERPA) to protect the privacy of students.
Privacy of Health Information
The School complies with the Health Insurance Portability and Accountability Act (HIPAA), which provides national standards for protecting the privacy of health information.
Privacy of Website Users
All websites that elicit personal information from visitors must have a privacy statement about what information you collect from your customers and how that information will be used.
Legislation enacted by Congress (Section 508) requires all websites funded by federal dollars be accessible to those with physical handicaps.
Social Media Policies
The Office of External Affairs manages the official social media channels for the Bloomberg School and offers consultation and guidance for faculty, students and staff venturing into Facebook, Twitter, YouTube and other forms of social media. | <urn:uuid:cb996f45-e5f1-40a6-930d-21dba1e78989> | CC-MAIN-2016-44 | http://www.jhsph.edu/offices-and-services/marketing-and-communications/policies/index.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720000.45/warc/CC-MAIN-20161020183840-00023-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.891851 | 365 | 1.5 | 2 |
This sentence contains at least two falacies. Firstly, the enrgy of the sun is not infinite, although within the span of human life on this planet it may as well be. More importantly, the idea that utilising that energy could somehow "eliminate all aspects of profit and capitalism" is total tosh. How are you going to utilise that energy without designing and manufacturing some device or devices? Those devices requre materials and labour, the principle "aspects of capitlaism and profit". Humans will still need to produce food, shelter and clothing which similarly require materials and labour. What the illusury 'bitcoin' scam has anything to do with this is beyond my comprehension. | <urn:uuid:d39beb20-a085-4224-a665-85bc9948053f> | CC-MAIN-2022-33 | https://frankparker.medium.com/this-sentence-contains-at-least-two-falacies-40d26cc6508e?source=post_page-----d84b7599f76d-------------------------------- | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.95/warc/CC-MAIN-20220817032054-20220817062054-00478.warc.gz | en | 0.948058 | 142 | 1.78125 | 2 |
How and where a sheep receives an injection affects the quality of meat and pelt that they produce. It is not unusual for meat processors to find abscesses and scar tissue from injections in expensive cuts of meat. The location where a vaccine is to be injected is a critical part of a successful vaccine program. The vaccine must be placed in a site compatible for its action as well as one that reduces the chance of contamination and potential trim loss or pelt damage if a reaction occurs.
In sheep the best and only "route" that we recommend is giving all injections under the skin (subcutaneously) rather than in the muscle tissue (intramuscularly). Subcutaneous injections cause much less damage to the meat tissue. This is even more important in baby lambs because of the small amount of muscle tissue and the damage that can be caused by the intramuscular injections can cause lameness and stiffness which often leads to unthrifty lambs.
There are two preferable "locations" to use in sheep. Never give an injection into the rear leg or loin area. The best locations are the sides of the neck or the low area on the rib cage just behind the bare spot behind the front leg. The meat in this area is less valuable and if pelt damage occurs it can easily be trimmed to help reduce losses.
Related Article: Sheep Facts >>
Use the correct needle size. Use the smallest gauge of needle that can properly handle the job. Most injections done to any size of sheep can be accomplished with an 18 gauge needle that is 5/8 inches in length. Longer needles tend to bend or break which cannot only injure the sheep but also pose great problems if a needle is left in the muscle tissue. The same is true of using smaller gauge needles. Large gauge needles tend to cause more local tissue damage and drag more skin contamination into the injection site.
Never vaccinate wet or muddy sheep -- the location of the injection needs to be clean and dry. Do not vaccinate in manure stained areas. Freshly shaved sheep are good to vaccinate as well as dry newborn lambs. Long wool makes it very difficult to see if the vaccine and needle are properly placed or if any vaccine leaks back from the injection site.
Improper syringe and needle handling can alter the effect of a vaccine or induce a local reaction at the injection site. Disposable syringes are just that - disposable. Normal cleaning disinfecting or even boiling will affect the integrity of any syringe. Small microscopic cracks in the rubber plungers can contain bacteria. All rubber will crack with age and needs to be maintained and replaced as needed. The use of alcohol or disinfectants will often alter and greatly reduce the effectiveness of vaccines. Always use a clean needle when drawing vaccine or medicine from a bottle. A needle that has been used to give injections should not re-enter the bottle as it will carry bacteria from the skin into the bottle. Never store a bottle with a needle in the stopper as this will promote bacterial growth. Lastly, always make sure to keep the vaccine or medicine at the correct temperature and replace into the refrigerator as soon as you finish the injections. | <urn:uuid:e50c871e-144f-4795-a9ca-885b06723a4b> | CC-MAIN-2022-33 | https://www.lambertvetsupply.com/wellpetpost-sheep-vaccination-principles.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00078.warc.gz | en | 0.942068 | 646 | 2.84375 | 3 |
This article discusses the social significance of the silver spoon throughout history and the different types of silver spoons made from the 12th through the 19th centuries. It originally appeared in the July 1941 issue of American Collector magazine, a publication which ran from 1933-1948 and served antique collectors and dealers.
From the Middle Ages down, the silver spoon has been a symbol of a certain standard of living. “Born with a silver spoon in his mouth” indicated a person who began life well shielded against the harsh winds of poverty. Silver spoons were the first investments made by the English yeoman or by the early American colonist as they struggled up from meager beginnings. Gifts of silver spoons also marked such important events as births, weddings, and deaths.
“Come, come, my lord, you’d spare your spoons,” Shakespeare makes Henry VIII say to Archbishop Cranmer when the latter would fain be excused from acting as godfather to Elizabeth. And in the mid-17th Century we have Samuel Pepys remarking in characteristic manner on a christening which did not go to his entire satisfaction:
“Bose early and put six spoons and a porringer of silver in my pocket to give away today — went to Mrs. Browne’s where Sir W. Pen and I were godfathers to her boy. But for as much as I expected to give the name to the childe, but did not, (it being called John) I forbore then to give my plate.”
In the American Colonies, silver spoons of varying sizes also were considered suitable gifts for important occasions. From the fourth decade of the 17th Century when the first examples were hammered out, to the middle of the 19th Century when mechanized production caused the last silversmiths to lay down their tools, silver spoons were part of a young woman’s dowry. The quantity, of course, depended on the length of the parental purse, but it was a poverty-stricken household that could not find funds for at least six teaspoons and a tablespoon or two.
And while not of antiquarian interest, we can many of us remember the keen zest with which sweet young things of the 1890’s and early 20th Century collected souvenir tea and coffee spoons.
With this background it is not surprising that the beginner in collecting should be attracted to silver spoons. Although their making goes back several centuries, most of those practical for collecting and real use will be apt to date between 1780 and 1840. This does not mean that earlier examples are nonexistent. The National Museum of Antiquities in Edinburgh, Scotland, has at least one spoon that dates from the 12th Century.
Of American-made spoons, there are a very few bearing the mark of such early 17th-Century silversmiths as John Hull, Robert Sanderson, and John Coney. These are in museums and important private collections, however. Even spoons of the first half of the 18th Century are none too plentiful and, therefore, expensive.
The reason is obvious. Although spoons were made in fair quantity, even in the far from luxurious 17th Century, by the various silversmiths working in the American Colonies, constant use took its toll. Also, there was the practice of melting down old silver to appear again in newer designs which continued until well into the 19th Century.
The examples illustrated are representative of what the collector can find at not too much trouble and expense. Before discussing them, however, a few words on the types that preceded them are in order.
The spoon of the 12th Century, already referred to as well as those in use during Tudor days, had a fig-shaped bowl with a hexagonal handle ending in a decorative knop. The well-known Apostle spoons were of this type, the knop being the head of one of the twelve or sometimes of St. Paul.
Coming down to the Commonwealth and the Restoration, the type of spoon that Samuel Pepys put in his pocket and then “forebore to give” was undoubtedly of the “Puritan” type, a rounded bowl with a hexagonal handle having no decorative terminal. Later in the century came the “rat-tail,” so-called because of a projection on the back of its bowl, which was now elliptical in shape.
The 18th Century brought in a narrower bowl and a less flattened stem. By the middle 1700’s, handle tips and bowls both became more pointed.
Thus, in the spoon on the extreme left, whose maker worked in Philadelphia about 1793, we have the slender handle with pointed end. Bright cutting, also a popular form of ornamentation, appears on the next spoon, made in New York in the early 19th Century.
The third spoon has the “coffin-lid” handle, thought to have been given to relatives and friends of the deceased instead of the usual mourning ring, but probably so named because of the shape. The fourth spoon, made in the last decade of the 18th Century is by Thomas Revere, brother of Paul. The fifth, with shell-shaped bowl, is one of the novelty spoons designed for sugar and from the shape of its handle might date anywhere between 1840 and 1850. The doll’s spoon at the top was also made about 1850.
Spoons with handles like the shell sugar spoon are late but artistic in outline.
This article originally appeared in American Collector magazine, a publication which ran from 1933-1948 and served antique collectors and dealers. | <urn:uuid:c304b5b9-0870-4a58-b7b5-abacb045fe08> | CC-MAIN-2022-33 | https://www.collectorsweekly.com/articles/silver-spoons/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570977.50/warc/CC-MAIN-20220809124724-20220809154724-00465.warc.gz | en | 0.977749 | 1,166 | 3.296875 | 3 |
Before your first trip or just to refine your technique, you might want to try indoor skiing if you do not live near a ski slope! You might be wondering what conditions are like in and indoor ski slope, how these differ from a dry ski slope, and what to wear if you are planning to go to one!
If you find yourself asking any of these questions, then keep reading for everything you need to know about what to wear to an indoor ski slope!
Remember to check with the specific ski slope you want to go to about what to wear before you go too, especially regarding hiring ski equipment!
Indoor Ski Slope Clothing
Indoor ski slopes are kept cold in order to maintain the indoor snow conditions but will not have wind or bright sunlight within them. Suggestions of what to wear:
- Warm clothes and thermal layers
- Ski or waterproof trousers
- Ski socks
- Gloves (non-woolly)
Conditions at an Indoor Ski Slope
While not a completely natural ski slope like you might experience on your first real skiing holiday, indoor ski slopes simulate some of the conditions you can expect on the slopes.
This often includes snow created by snow machines which forms the slope itself! This differs from a dry ski slope, where plastic bristles are instead used as the ground of the slope to simulate how your skis will feel on real snow.
Indoor ski slopes however offer a closer feel to how an outdoor ski slope will feel by using snow, mimicking how your skis will really behave on the slopes!
Because indoor ski slopes use snow created by snow machines, the area is also kept in relatively cold conditions! Different slopes may have slightly different ground and air temperatures, but speaking generally, some indoor ski slopes can have air temperatures of around -4 degrees Celsius!
This is why it is really important to wrap up warm when you are getting ready to head to an indoor ski slope!
However, in an indoor ski slope you don’t have to worry about all the conditions you might experience on the slopes outdoors! For example, there are no cold winds if the slope if completely enclosed, and no glare from the sun on the snow if the slope is artificially lit.
If you are going to an indoor ski slope as a complete beginner to see if you like skiing or snowboarding, you might not have your own gear like ski boots and skis! But don’t worry if this is the case, at many indoor ski slopes there is the option to hire a lot of the equipment you are going to need!
For skiing, needless to say you will need ski boots, skis, possibly ski poles and a helmet in order to head out onto the slope. Often, indoor ski slopes require you to wear a ski helmet before going onto the slopes at all as it is essential for your safety.
Luckily, there is often an option to hire or book ski gear like this in advance at indoor ski slopes, where you will find equipment perfect for your feet and head size as well as height and ability if you don’t have your own.
Make sure to call ahead and check with the specific indoor ski slope you are planning to go to to check when and if you can book all the gear you need and how much this will cost to make sure you have all the information before you go.
While the ski slope will be indoors, meaning that you won’t be exposed to cold wind, indoor ski slopes can still be kept pretty cold to make sure that the snow within them doesn’t melt!
As a result, you want to make sure that you are keeping as warm as possible during your ski or ski lessons to make sure you get the best out of it and enjoy yourself without shivering!
It is therefore recommended to layer warm clothes, as this is likely to keep you warmer than just wearing one thick jumper! For example, you might want a thermal base layer and then an jumper and coat on top
Accessories and Extras
Gloves are an absolute essential when indoor skiing. Not only will these keep your hands warm when exposed to the cooler air, but if you touch the snow or fall over, it will also keep them warm and dry as well as protecting them!
As the snow will be cold and wet, it is advisable not to wear woolly gloves. Wool tends to allow snow to stick and melt onto them. All this will accomplish is to make your hands even more cold and wet!
Therefore, waterproof leather or specialist ski and snowboard gloves are definitely advisable. This will make sure your hands are kept warm and dry at all times, as well as protected from the snow!
Dry ski slopes can be a great place to learn or improve your technique, or just to have some fun! But to get the best out of the whole experience, make sure you are wearing the right think that will keep you warm, dry and safe on the slopes! | <urn:uuid:11f71490-0995-46de-b32a-3b81446bd612> | CC-MAIN-2022-33 | https://ontotheslopes.com/what-to-wear-to-an-indoor-ski-slope/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00276.warc.gz | en | 0.958275 | 1,024 | 1.742188 | 2 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.