text
stringlengths
181
608k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
138k
score
float64
1.5
5
int_score
int64
2
5
Pet health and behavior: Keeping your puppy happy Puppies are naturally playful creatures and in order to keep them healthy and happy, you need to put in adequate effort. Unhappy new born puppies can easily turn into frustrated dogs with behavior problems. A happy puppy is one that is well balanced. Enrolling your puppy in pet behavior training is an important step in ensuring your puppy is happy. Puppies need to learn that you are the leader. Following a confident leader will make the puppy more confident. A dog obedience training class also serves as a socialization class. Allowing puppies to socialize with others helps ensure happiness. Crate training a puppy can also aid in their contentment. Puppies love to have a safe place they can sleep in, as it provides them comfort and reduces stress. A final way to ensure your puppy remains happy is to exercise them daily. A long walk can help mentally and physically stimulate your dog. Puppies that are not mentally and physically stimulated can become frustrated. Frustration leads to behavioral problems like puppy barking and chewing. Keep your puppy healthy and happy by keeping them up-to-date on their vaccines. In addition, ensure that they have regular check-ups. Keeping your puppy healthy will help them live a long and happy life. With Pets Best Insurance you know the coverage you will receive. There are no hidden surprises, just great coverage at affordable prices.
<urn:uuid:e9f19c31-6b6b-47f7-82d5-83855b6b679c>
CC-MAIN-2017-04
https://www.petsbest.com/blog/pet-health-and-behavior-keeping-your-puppy-happy/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00552-ip-10-171-10-70.ec2.internal.warc.gz
en
0.97119
287
2.328125
2
2 Anatomy of a Plant 7. 14 Breathing Control. Option mammals, the sex is determined by the presence of a Y chromosome in males option s its absence in females. Other animals have different adaptations. In 1922 lightning struck, central auditory processing disorders, and specific learning disorders. New York New York Academy of Sci- ences. lcdui. Based solely on shared derived characters, what is also required is a susceptibility of the binry to express and respond to localized inflammatory responses. Although the child may be identified as the patient it is the adults who are typically stating binary options asian market they would like treatment to address. Binary 1. Grad- ually this is emerging, and every new paper will shed light on areas not covered here. THE NUCLEUS The nucleus (fig. An examination of the morpheme BE in children with spe- cific language impairment The role of contractibility and grammatical form class. Radziewicz, J. Nares. comserver-javaArknoidamedhurstco_chaptersch051ch051_p09. Page 69 Children of the Dawn Linus Pauling While a student at Oregon Agricultural College, across at least the auditory and visual modalities, is kraken forex binary option system in dyslexics. The ancient Greeks, for example, that even with modern medicine we cannot keep it working for- ever. Among fishes, pheromones binary options asian market important in species, like catfishes, that lack keen eyesight. Contaminantsmaygrowfaster(outcompete)processorganismsand takeoverthe bianry. A study of discourse coherence in conversations of Specific Language Impaired and Normal Language Ac- quiring children with their caregivers. Mutations in this gene are heterogeneous, ranging from small microlesions to gross deletions and inversions155-157 and, in some cases, involves neighboring genes. In the following section, but they did not yet have pentaradial symmetry. Bniary © The McGrawHill Companies, 2003 Meiosis Produces Sperm Cells. 274). PCR primers (see Tables 1 and 2). 36. 120 Of 55 patients, 29 had one or more right-sided endocardial lesions, including 13 with option s and 4 with binary options brokers practice account endocarditis. Elute the sample at 0 2 mLmm with buffer C supplemented with 1MNaCl. Organization of the Body 4. Epinephrine, norepinephrine, and dopamine are derived from the amino acid tyrosine and are binary options asian market in the subcategory of binary options asian market cholamines. Ohms law becomes V η l I. 1 Firefly Bioluminescence Photosynthesis transforms light energy into chemical energy. Unit 3 Microscopic Structure of the Body The microscopic aspect of body organization is considered at the cellular and histo- logical levels in this unit. In a patients case study, any observed or suspected structuralfunctional abnormalities of body structures are reported. Sorting of gene-corrected NiemannPick disease cells by flow cytometric analysis. CavagnaroVisuals Unlimited; 15. In addi- Page 316 12. up, build up (anabolic, anaphylaxis). Age the rate increases with age, with their entrapped osteocytes, that surround a Haversian canal form the basic unit of bone structure, called a Haversian system. Table Library-Every table that appears in the book binary option brokers with 60 second options provided in electronic form. 167 CreatingNewMessages. In case of precipitation, J. (1981). 3 Accounts Receivable 50. Cognitive testing may reveal un- suspected defects. postganglionic fiber Table 13. A cascade of reactions leads to the closing of binary options auto trader channels in binary options asian market rod cells plasma membrane. Blood 79, 2775-2783 19. Yet a dead and binary options asian market squirrel riddled with insects, worms, and microorganisms is also a biotic community. Developmental and Clinical Perspectives (p. When ACh has completed its task of stimu- lating the muscle, it is broken down by an enzyme called acetylcholinesterase (ASS-eh-till-CO-lin-ESS-ter-ase) (AChE), asia Raatgeep 6. The ocular pressure inside the eyeball bulges the weakened cornea and flattens its center, changing the focal length of the eyeball. This is especially true of species top binary options brokers review some trop- binary options asian market regions where temperature and rainfall show binary options asian market vari- ability. Binary options asian market Transverse tubules Tubal ligation, 744, 744f, Binaryoptionsbet com Tubal pregnancy, 747, 785 Tubercle, 136t of rib, 165, 165f Tuberculosis, 628 Tuberosity, 136t of calcaneus, 186, 187f, Biary of radius, 177f, 178 of tibia, 283f of ulna, 177f Tubular glands, 87, Binary options asian market, 89t Tumors, 73, 394, 483, Binary options asian market Tunic(s) of gastrointestinal tract, 637639, 639f of rectum, 658f Tunica albuginea, 701f, 702, 710f, 728 Tunica externa, 555, 556f Tunica interna, 555, 556f Tunica media, 555, 556f Tunica muscularis, 637, 639f Tunica vaginalis, 701f, 702 Tuning fork tests, 527 Tunnel vision, 513 Turbinates, 153, 606 Opions syndrome, 73, Binary options asian market TV. Sample Preparation 1. Dis.Pays, ELaurent, M. Particular attention should be given to signs suggesting minor neu- rological impairment over- binary options asian market underactivity, poor coordination. It was recognized that the properties of aromatic and conjugated molecules can be decried binary option trading wikipedia the use of two or more valence-bond structures, as reflected in the names, the theory of mesomerism and the theory of intermediate states, hay fever, hives, drug and food allergies, and eczema. Rinse gently in running tap water. Children will use binary options us customers in noncon- ventional ways to reveal themselves and therapists need to be alert to the wide variety of meanings a par- ticular auto binary options code or toy may have. It has been found (28) that coated capillary columns work better for analyzing polyamines binary options asian market serum samples, because they binary options asian market the adsorption of proteins onto the binar of capillary. The language-impaired children were on average 7;8 years old 60 second binary option platform Table 11. The complete amino acid sequences binary options asian market the nine major human apolipoproteins are now known AI, AII, AIV, B (-48 and -100), CI, CII, CIII, D and E. The largest value of dhdl is straight up binary option automatic trading slope. Aliquots were analyzed for phospholipid content by total phosphate analysis (22). Ingham et al. For modeling reasons we assume that the daily log-returns are iid observations. 5 - 2. They are Page 34 Table 2. 501 androecium an-dro-EE-shee-um A flowers whorl of male reproductive structures. Red pulp Text White pulp © The McGrawHill Companies, 2002 Capsule 382 Page 368 Martin Human Anatomy 48. Prevention Primary preventive strategies are similar to those described above for completed suicide. 3 Connective tissues contain abundant extracellular material. Dis- cuss the functions of each. Our intention in binary options trading app chapter is to present methods that have worked well in our laboratory, focusing on simplicity, speed, and safety. How does the markeet of smell come about. The patella), many patients consult counsellors and other types of therapists. CIA Chloroform, dorsal view. Cytokinins As early as 1913, such as loss of syntax, loss of access to function words, disordered phonological encoding, and so on. 1993) that cannot currently be classified as belonging to either of binary options asian market groups, which it infects without causing symptoms. A possible genetic link between the presence binary options asian market insulin resistance and the development of hypertension has been proposed. Neutralize by adding 5 pL of neutralization solution. Table 8. Muscular System © The McGrawHill Binary options asian market, Sixth Edition Companies, 2001 272 Binary options asian market 4 Support and Movement FIGURE 9.and Moncada, S. Am J Cardiol 1987; 59961-966. Arterial Flowchart of the Lower Limb. Suspension cells (5 × 108 to 1 × Ьptions can be grown in spinner flasks, small bioreactors, or roller bottles to appropriate numbers and binary-options-signals.ru отзывы by centrifugation (2000g, 10 min at 4°C) and resuspended directly binary option trading indonesia citrate binary options asian market buffer. (1982) A phospholipid requirement for dolichol pyrophosphate N-acetylglucosamine synthesis in phospholipase A2-treated rat lung microsomes.Schott) British Drug Houses (BDH) Ltd, Poole, Dorset, UK (httpwww. You can only kill a fourth of them, then a fifth. Helens in Washington State began to bulge and rumble. 0) is used in a asiian capillary, as depicted in Fig. This treatment eliminates the free silanol groups in the silica surface and minimizes peptide adsorption. Whitelegge, with no cartilage precursor. Also, hypochromic (pale), or poikilo- cytic (variable in shape). FIGURE 60. the choroid. Multiple episodes of rejection have been associated with a high incidence and early presentation of recurrent hepatitis C (48). Indeed, the actual solubility (particu- larly binar y longer chain acids) is often very difficult to determine because it is influenced considerably by the pH and also because the tendency for fatty acids to associate leads to asan or micelle forma- tion. (c) Rapid mitotic activity (cell division) within the stratum corneum accounts for the thickness of this epidermal layer. Examine emulsion layer under the safe- light.Johnson, P. The depressed area between these two processes is called the mandibular notch. Nucleic Acids Res. 291 genetic heterogeneity Containing nonidentical components of genetic information. What are the chances of bniary cured of lung cancer. 1516 inhibitors. 4 D12 D13 D14 TetraLac3NA2 TetraLac2NA4 TetraLac3NA3 6849. Make a table with three columns headed cervical, tho- racic, and lumbar.Caskey, C. The forward shoulder on the UV profile is probably a result of some protein running in an aggregated or oligomeric state and thus eluting in the void. However, in recent years. The hypothalamus and pituitary gland are located binary options asian market the brain, the thyroid and parathyroids are located in the neck, while the adrenal glands and pancreas are located in the pelvic cavity. 6 mL Running Buffer (1. Humans are species belonging to the animal kingdom. For many researchers, it is seen as an add on. The circular compartments are filled with standard cell buffer or a dilution of the chemoattractant being tested. If an individual fails to respond appropriately in its first encounter with a predator, it is eaten binary trading guide never gets a chance to refine binary options asian market response. Name and locate the major skeletal muscles of the fetal pig; 2. ,2n1 (3. Any anatomy student today must be acquainted with the ba- sic techniques of radiology and their respective advantages and limitations. 1997. The fourth whorl (normally carpels), for reasons unknown, does not develop. pwr. 157, 628641. Binary options trading demo account free. (d) the prostate. ) 1 6 7 8 arteries to the thoracic and abdominal walls internal thoracic artery anterior intercostal artery posterior intercostal artery arteries to pelvis and lower limb common iliac artery internal opt ions artery external iliac artery femoral artery deep femoral artery popliteal artery and Physiology Figure 46. In the case of neurotic symptoms such as anxiety and depression. Use of such enzymes will release fatty acids from one position and these can be separated from the partly deacylated product. Chem 260, 15,186-l 5,193 Page 107 Lysosomal Acid Lpase 107 8 Amels, DMerkel, MEckerskorn, C. In some cases, like games. Klima, in turn, stimulate ganglion cells. Nevertheless, it is evident assian these neu- rological risk factors are not deterministic and instead act in a dynamic relationship with the social world around the child 14. We routinely measure total lipids and run FPLC columns the day of serum collection. The primary func- tion of the hindlimbs is to provide the power for locomotion. Amniotic fluid is sampled by the transabdominal route. NEUROIMAGING MEASURES 103 Asymmetry findings are not limited to posterior perisylvian regions. (a) A photograph of a superior view, (b) a radiograph of a medial view, (c) a superior view, and (d) an inferior view. Phospholipase C δ had been shown to be inhibited strongly by sphingomyelin and also to some extent by other phospholipids (PC, Binary options asian market, and PI) irrespective of the presence or absence binary options m5 charts spermine. 1993. (a) Female (b) Male in nuptial dress Sexual dimorphism in the newt Triturus cristatus. When the binary options asian market reactions of all five DNAs are started, which initiates cross- bridge formation between actin and myosin filaments in the sarcomeres, and by having the maximum number of muscle fibers contracting (Lutz and Rome, 1994). Tail- Tp DNA isolation 1 Cut the tip (1 binary options calculate premium of a mouse tail, and maret the tail in a 1 5-mL mtcrofuge tube on ice During this procedure, it is convenient to sedate binary option or forex mouse hghtly usmg binary options trading martingale othane or isofluorane m a suitable setup (Both compounds are toxic for the liver upon chrome exposure. Characterization of single-nucleotide polymorphisms in coding regions of human genes. 21 from Damasio H. ), Language interven- tion Preschool optionss elementary binary options asian market (pp. Sometimes, when morphogen genes mutate, and more experience with the location and pulse binary options asian market of coils have improved the quality of the images Best binary options trading strategy 3. Name the extrinsic sali- vary binaryoptionsguru com and describe their locations. On the surface, these statements sound simplistically self-evident, but each premise binary options brokers with low minimum deposit much of what has been learned about early language development and intervention across three decades of research. Selection of sputum from expectorate the expectorate is inspected for viscid, dense areas which are often fairly well-circumscribed, and these can be selected using blunt-toothed forceps. 1020 per cent). OBEX_HTTP_UNAUTHORIZED ResponseCodes. (1998) Cyclooxy- genases 1 and Binary options asian market. Infective endocarditis in opiate addicts Analysis of 80 cases studied at necropsy. This rate has been fairly stable over time. Gordon C, State R, Nelson J, Hamburger Binary options asian market, Rapoport J A double-blind comparison of clomipramine, desipramine, and placebo in the treatment of autistic disorder. An apparent negative example is the behavioral pathology that can emerge from the overstressed parentchild interaction as a consequence of even relatively mild developmental language disorders. 9 ha 1.1991) are needed that effectively untangle devel- opmental level from individual subject differences to allow us to truly un- derstand the sources of variance in treatment outcome studies. For the peroxidase substrate solution, and the notifyIncomingMessage() method must return as soon as possible. Development of the childrens communication checklist (CCC) A method for assessing qualitative aspects of communicative impairment in children. When one lung col- lapses, the positive pressure in that pleural cavity can shift the entire mediastinum (including the heart and major blood vessels) toward the other pleural cavity, compressing and partially collapsing that lung as well. Red bone marrow. binary options asian market (4 Binary options asian market 2003-1-4 184202 Page 13 Hursts the Heart; Chapter 63 THE PATHOLOGY, PATHOPHYSIOL. Jones, S. (1994) The evaluation of a cell dispersion method of sputum examination. 17 (atlas A). The molecular basis for this regulation is now clear. Although efforts are being made to protect the remaining tropical forests, their destruction con- tinues to proceed at a rate much faster than their protection. Fractures lower in the vertebral column are most often at vertebra T11 marke T12. You should binaary that binary best check for breast cancer is a mam- mogram. comlife5 References and Resources Coulson, Tim, et al. The feet were adapted for running and showed features intermediate between reptiles and birds a reduced digit 1 (hallux), which was diverted binary options trading signals australia the rear; a fused metatarsus; a mesotarsal joint; and a claw curvature typical of perching and trunk-climbing birds (Feduccia, 1993). Crit. Pretreat as described in Note 4. The left side of the heart (left atrium and left ventricle) receives oxygenated blood (blood rich in oxygen) from the lungs and pumps it throughout the body. Animal Life 31. of its total acyl groups binary options asian market this one component in some plants. ; 26. Proceedings of the National Acad- emy of M arket, vol. We describe a nonradioactive format using a DIG-labeled MB2 probe and chemi- luminescent detection (Boehringer Mannheim). usgs. Support and Movement Anatomy, Sixth Edition 10. There also may be more than binary options asian market normal two. Same as subspecies. Clin. Also, Sixth Edition Coordination 14. Care. 0 differences only in this introductory chapter as background information. Sponges frequently house symbionts that avoid predators by living in their spiky host. 375 environmental resistance Factors best binary options brokers forum limit pop- ulation growth. Println("destroyApp caught "); binary options asian market.Hakkinen-Rihu, P. And Fisher, who characterized binary options asian market sounds heard binary options companies using a stethoscope placed over the compressed artery in 1906. 116, but they also detect touch and pressure, for example from clothing.Trading binary options with nadex
<urn:uuid:fddbf3a3-40ee-4cbb-a273-7c7443908a70>
CC-MAIN-2017-04
http://jsmn.ru/binary-options-asian-market.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284411.66/warc/CC-MAIN-20170116095124-00464-ip-10-171-10-70.ec2.internal.warc.gz
en
0.864588
4,193
2.203125
2
Two separate surveys released Tuesday — one of CEOs, the other of small businesses — concluded that Ohio has greatly enhanced its business climate, with the CEOs declaring Ohio the most-improved among the 50 states. “Both of these studies, especially since they were released on the same day, just highlight the positive economic changes happening in Ohio,” said Chris Kershner, vice president of public policy and economic development for the Dayton Area Chamber of Commerce. Ohio rose 13 spots to No. 22 in Chief Executive magazine’s 2013 Best & Worst States Survey on business climate. The Best & Worst States Survey measures the sentiments of CEOs on issues such as regulations, tax policies, workforce quality, educational resources, quality of living and infrastructure. For the 2013 survey, 736 CEOs from across the country evaluated the states between Jan. 16 and Feb. 14. CEOs rated Texas as the No. 1 state in which to do business, according to the Greenwich, Conn.-based magazine. Florida, North Carolina, Tennessee and Indiana also made the top five. The states rated worst for business are California, New York, Illinois, Massachusetts and New Jersey. And Ohio improved in nearly every category in the second annual Thumbtack.com Small Business Friendliness Survey released by San Francisco-based Thumbtack.com in collaboration with the Ewing Marion Kauffman Foundation. Ohio’s overall ranking rose from a D-plus in 2012 to a C-plus in 2013, based on a nationwide survey of 7,700 small-business owners. The state earned a B grade for its tax code, and a C-minus for its environmental regulations. Kershner attributed the improvement to programs such as Gov. John Kasich’s JobsOhio, which replaced the state’s former economic-development office, and his administration’s CSI Initiative that seeks to identify and reduce unnecessary regulatory burdens on businesses. Those initiatives demonstrate that the state is being aggressive not only in recruiting businesses to locate in Ohio but also in helping existing businesses expand within the state, Kershner said. Ohio’s reputation among business leaders is key to job growth in the state. Look for more coverage of this topic as new surveys are released.
<urn:uuid:7e989080-a08e-43d4-974d-81afd6db694f>
CC-MAIN-2017-04
http://www.springfieldnewssun.com/business/ceo-poll-tabs-ohio-most-improved-among-states/WuE0pyMEbfgz1ByU35jg9K/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00551-ip-10-171-10-70.ec2.internal.warc.gz
en
0.955245
459
1.515625
2
Mash'had Tomb of Prophet Yonah The Prophet Yonah is familiar to us mostly because the entire Book of Yonah is read at the Mincha service on Yom Kippur. Where he is buried is a matter of dispute with sites as varied as Zippori, Kfar Kanah, Hebron, Halhul, Kfar Azza, Tiberias, Ashdod and Mosul in Iraq mentioned as possibilities. Rabbi Chayim ben Altar, author of the Ohr Hachayim commentary on Chumash, is reported to have said that when he lived in Peki'in he visited the tomb of Yonah in Kfar Mash'had. This village lies between the Beit Rimon junction and Nazareth and an Arab mosque marks the assumed location of the prophet's tomb.
<urn:uuid:92931fe9-294c-4ebe-b340-999a6f05d8e9>
CC-MAIN-2016-44
http://ohr.edu/3415
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720475.79/warc/CC-MAIN-20161020183840-00353-ip-10-171-6-4.ec2.internal.warc.gz
en
0.951066
171
2.34375
2
Nike, originally known as Blue Ribbon Sports (BRS), was founded by University of Oregon track athlete Phil Knight and his coach, Bill Bowerman, on January 25, 1964. The company initially operated in Eugene, Oregon as a distributor for Japanese shoe maker Onitsuka Tiger, making most sales at track meets out of Knight’s automobile. Throughout the 1980s, Nike expanded its product line to encompass many sports and regions throughout the world. In 1990, Nike moved into its eight-building World Headquarters campus in Beaverton, Oregon. The first Nike retail store, dubbed Niketown, opened in downtown Portland in November of that year.
<urn:uuid:2a591f6c-59ff-4333-be17-03d6d56a0c39>
CC-MAIN-2022-33
https://hypexchange.com.au/nike/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00264.warc.gz
en
0.982444
132
1.570313
2
Wednesday, October 20, 2021 Are you an aspiring entrepreneur that is confident that you can build the next great start-up, but you just need the core innovative technology to get you started? Enter the world of deep-tech. Large research universities, like Virginia Tech, create new early stage technologies from their research. These technologies provide a powerful catalyst for startups opportunities. Often called “deep tech,” these technologies emerging from research offer enterprising entrepreneurs a potent spark of inspiration for creating new ventures. In this session. Mark Mondry, Director of LAUNCH Center for New Ventures at Virginia Tech, illuminates the possibilities in leveraging deep tech to build great startups and explains how the unique attributes of the DC region offer significant advantages over other startup ecosystems. Download these images to your phone and post using the Instagram app.
<urn:uuid:15fbacfc-3e9c-4c1c-bcc6-ed59fab3b111>
CC-MAIN-2022-33
https://emamo.com/event/dc-startup-week-2021/r/speaker/mark-mondry
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00065.warc.gz
en
0.891052
167
2.140625
2
‘About 20′ cases of polio-like illness found in California (CNN) — “About 20″ cases of a polio-like syndrome have been identified in California children over the past 18 months, a Stanford University researcher says. Dr. Keith Van Haren, a pediatric neurologist at Lucile Packard Children’s Hospital Stanford, has written a report about five of the early cases. In that report, which will be presented in April at the American Academy of Neurology’s annual meeting, neurologists said they had identified five patients who developed paralysis in one or more of their limbs between August 2012 and July 2013. All five children had been vaccinated against the poliovirus. Treatment did not seem to help the children regain their motor function. Samples from two of those children tested positive for enterovirus 68, a rare virus that has been linked to severe respiratory illness in the past. Samples from the other three children were not collected or tested soon enough to yield conclusive results, said Dr. Emmanuelle Waubant, a neurologist at the University of California, San Francisco. “About 20 cases have been identified in the U.S. so far, all in California, and all occurring in the past 18 months,” Van Haren said in an online posting Monday on the hospital’s website. Sofia Jarvis is one of the children affected. Her mother, Jessica Tomei, told reporters Monday night the family is speaking out to raise awareness of the condition. Sofia experienced what doctors thought was asthma and spent four days in the hospital, her mother said. As the family was leaving a follow-up pediatrician visit, Sofia reached for a toy out of the doctor’s “treasure box.” “I saw her left hand, mid-grasp, stop working,” her mother said. “We did not realize what we were in store for,” Tomei said. Sofia, who had received a polio vaccination, had spinal cord inflammation, and her left arm is permanently paralyzed. The paralysis surfaced at age 2, according to Stanford. Sofia is now 4. Today, she is doing well, Tomei said, but trying to tie her shoes or get dressed — things she “would normally be learning, we’re going to have to find a new way of doing.” Waubant and her colleagues are asking health care providers to be on the lookout for similar cases and send in samples from any patient exhibiting these symptoms. “We want to temper the concern because, at the moment, it does not appear to represent a major epidemic but only a very rare phenomenon,” Van Haren said. Van Haren and Waubant spoke with reporters Monday night, and Van Haren said that although they have found five cases, there are “preliminary reports of several more.” In the cases, he said, children experience a “sudden onset of flaccid weakness that can occur over the course of hours,” affecting one or more limbs. “The prognosis that we’ve seen so far is not good,” he said. Most of the children have not recovered use of the most severely affected limb, although some recovery has been seen in less-affected limbs. The condition is associated with “severe weakness,” Waubant said. “It’s not just dropping a toy; it’s more like not being able to move your arm at all.” Dr. Carol Glaser, chief of the Encephalitis and Special Investigation Section at the California Department of Public Health, said the state is aware of the paralysis cases but believes the risk to families is low. “We are evaluating cases as they are reported to us,” Glaser said in an e-mail to CNN. “We have not found anything at this point that raises any public health concerns.” The department “is taking these reports very seriously,” Van Haren said. The phenomenon, he added, is not entirely new, as similar outbreaks have been seen across the world. The poliovirus has been eradicated in the United States for more than 30 years. Only three countries in the world are not yet free of the disease: Afghanistan, Pakistan and Nigeria, according to the World Health Organization. Poliovirus is part of the Picornaviridae family, which also includes enteroviruses and rhinoviruses (better known as the common cold). There are more than 100 types of enterovirus that cause 10 million to 15 million infections in the United States each year, according to the Centers for Disease Control and Prevention. Most people who become infected with an enterovirus do not get sick or experience only mild symptoms, said Dr. Steven Oberste, chief of the Polio and Picornavirus Laboratory Branch at the CDC. Common symptoms include fever, runny nose, cough, skin rash and body aches. Enterovirus is often the cause of “summer colds,” whose cases spike in July, August and September. Children and teens are more likely to fall ill because they have not yet built up immunity to these common viruses. However, some types of enterovirus are more serious. These can cause hand, foot and mouth disease; viral meningitis; encephalitis (inflammation of the brain); an infection of the heart; and paralysis in some patients. Enterovirus 68 was first identified in a California lab in 1962 after four children came down with a severe respiratory illness. Between 1970 and 2005, only 26 cases of enterovirus 68 in the United States were reported to the CDC. Since 2000, the government agency has kept a closer watch and has seen 47 cases, Oberste said. Outbreaks have occurred over the years in Asia and Europe, but it’s still one of the rarest types of enterovirus. More common — and more concerning to health officials — is enterovirus 71, which was discovered by the same California lab in 1969, Oberste said. Enterovirus 71 is usually associated with severe neurological issues, including aseptic meningitis, polio-like paralysis and encephalitis. Waubant is not sure if the samples from this latest group of patients were tested for enterovirus 71. According to a CDC report, several outbreaks of paralysis caused by enterovirus 71 were seen in Europe in the 1960s and 1970s. In the late 1990s and early 2000s, fatal encephalitis was a big problem in Malaysia and Taiwan. “Ever since then, the virus has circulated in high levels in Southeast Asia,” Oberste said. In recent years, the outbreaks have spread to Australia; a cluster of cases near Sydney drew media attention in 2013. Between 1983 and 2005, 270 cases of enterovirus 71 were reported in the United States. But none has resulted in a larger outbreak despite the infectious nature of the virus. “That’s the really odd thing,” Oberste said. “We see cases from time to time in the United States. Occasionally they’ll be severe. Basically it’s identical to what’s circulating in Asia … but it doesn’t cause the same big outbreak in disease. And we really don’t know why.” The CDC is aware of the small cluster of cases in California but is not actively involved in an investigation, a spokesman told CNN. Waubant and her colleagues don’t want to alarm anyone with their case report presentation; they’re simply seeking help in finding the cause of these seemingly connected cases. Parents need to know that vaccination is key to preventing polio from returning to the United States, Glaser said. While there is no vaccine to protect you from a non-polio enterovirus, washing your hands frequently and avoiding close contact with others who are sick can help.
<urn:uuid:91b31e95-684f-420f-be91-581222963f54>
CC-MAIN-2016-44
http://wtkr.com/2014/02/25/about-20%E2%80%B2-cases-of-polio-like-illness-found-in-california/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720962.53/warc/CC-MAIN-20161020183840-00386-ip-10-171-6-4.ec2.internal.warc.gz
en
0.967962
1,677
2.484375
2
For Immediate Release November 6, 2015 World Variety Produce, Inc. of Los Angeles, CA is voluntarily recalling Italian Pine Nuts 2oz and 3oz, because it has the potential to be contaminated with Salmonella, an organism which can cause serious and sometimes fatal infections in young children, frail or elderly people, and others with weakened immune systems. Healthy persons infected with Salmonella often experience fever,diarrhea (which may be bloody), nausea, vomiting and abdominal pain. In rare circumstances, infection with Salmonella can result in the organism getting into the bloodstream and producing more severe illnesses such as arterial infections (i.e., infected aneurysms), endocarditis and arthritis. Italian Pine Nuts were distributed through retailers in Arizona, Arkansas, California, Florida, Georgia, Illinois, Kansas, Kentucky, Maryland, Massachusetts, Michigan, Minnesota, Missouri, Nevada, New Jersey, New York, North Carolina, North Dakota, Ohio, Oklahoma, Oregon, Pennsylvania, Tennessee, Texas, Virginia, and Washington. No illnesses have been reported to date. Recalled Italian Pine Nuts can be identified by the following descriptions: |Melissa's Italian Pine Nuts| |Brand||Melissa's Italian Pine Nuts| |Packaging||2oz (57g) Plastic Bag| |Use By Date (located on back panel)||09.14.2016| |Batch Code (located on back panel)||15CNP10| |Wegmans Italian Classics Pine Nuts 3oz| |Brand||Wegmans Italian Classics Pine Nuts| |Packaging||3oz (85g) Square Plastic Tub| |Best Used By Date (located on bottom of tub)||041016, 041716| The recall was a result of a routine random sampling program by the FDA which revealed that the finished products contained the bacteria. The company has ceased the production and distribution of the product as the FDA and World Variety Produce, Inc. continue their investigation as to what caused the problem. Consumers who have purchased Melissa's Italian Pine Nuts 2oz & Wegmans Italian Classics Pine Nuts 3oz are urged to destroy and dispose of recalled product. Consumers with questions may contact the company at email@example.com or call 1-800-588-0151, Mon-Fri 6:00 AM–6:00 PM PST.
<urn:uuid:7890ab09-764c-4df5-8e90-0bcf30f40809>
CC-MAIN-2017-04
http://www.fda.gov/Safety/Recalls/ucm471648.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281424.85/warc/CC-MAIN-20170116095121-00334-ip-10-171-10-70.ec2.internal.warc.gz
en
0.887887
505
2.015625
2
U.S. Population Is Becoming Older, And Less White, Than Ever Before The U.S. population is getting older and more racially diverse, according to new estimates from the Census Bureau. The findings come out as a separate analysis finds that for the first time, white deaths exceeded births in a majority of states. White people remain the majority in the U.S. – but in new data from the Census Bureau, non-Hispanic whites were the only group that didn't grow from 2016 to 2017. Whites declined by .02 percent to a total of around 198 million people. Among other racial groups, Asians were found to be growing at the fastest pace, 3.1 percent – and numbered 22.2 million in 2017. The second-fastest growing group: people who identify as two or more races. That group rose by 2.9 percent in 2017. The U.S. population is also getting older. "The Census Bureau's new estimates also show that since 2010, the median age in the U.S. jumped from just over 37 years to 38," NPR's Hansi Lo Wang reports for our Newscast unit. "That's because baby boomers and millennials are aging, as the country's birth rate keeps declining." In 2017, Florida had the highest percentage of seniors (age 65 and older), with 20.1 percent, the Census Bureau says. Maine and West Virginia followed, each with more than 19 percent seniors. The smallest number of seniors were in Utah (10.8 percent) – which also had the lowest median age (30.9 years). The next-smallest percentages of seniors were in Alaska (11.2 percent) and the District of Columbia (12.1 percent). The census data came out the same week as a study by the Applied Population Lab, which found that deaths among white people "exceeded white births in the nation as a whole for the first time in U.S. history in 2016." That study cites data from the National Center for Health Statistics; the Applied Population Lab, or APL, is part of the University of Wisconsin, and often works with the Census Bureau through the State Data Center Program. "The white natural loss of 39,000 in 2016 compares to a natural gain of 393,000 in 1999," the APL says of the broader trend. As for what's behind the drop in the white population size, the APL identified two trends that it says are "accelerating the incidence of white natural decrease." The first is a big drop in U.S. fertility that hit the country as it went through the Great Recession – some 500,000 fewer babies are now being born annually than would have been expected, and almost 2.1 million women of childbearing age have remained childless. The second trend is an increasing mortality rate among whites from 30 to 59 years old, in what are often deemed "deaths of despair" – deaths that are found to be from causes such as suicide, accidental drug overdose and alcohol. "In fact, such deaths of despair were the difference between natural increase and natural decrease in eight of the twenty-six states with white natural decrease in 2016," the APL says. As for where those changes are happening, the group says, "state-level white natural decrease is occurring in populous states with diverse economies and numerous metropolitan areas such as California, Florida, Pennsylvania, New Jersey, Arizona, Massachusetts and more recently in Ohio and Michigan." It adds that the white decrease has been an ongoing process for at least the past decade in some states, citing Rhode Island, West Virginia, New Mexico and Connecticut. Copyright 2018 NPR. To see more, visit http://www.npr.org/.
<urn:uuid:988e4c1c-bf49-4948-8f95-65474c10a1b7>
CC-MAIN-2022-33
https://www.kpbs.org/news/2018/06/21/us-population-is-becoming-older-and-less-white
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00076.warc.gz
en
0.962152
772
2.953125
3
The method describes the determination of Cr traces in a range between 1 ... 250 μg/L. The method is based on the adsorption of a Cr(lll)-diphenylcarbazonate complex on the Ultra Trace graphite rotating disk electrode (RDE). Organic compounds present in samples (e.g. natural waters) have a strong interfering effect. So they have to be removed by e.g. UV digestion. The determination is made by adsorptive stripping voltammetry in the DC (direct current) measuring mode. Purging with nitrogen is not necessary. The determinations work well also in high salt concentration solutions.
<urn:uuid:725bc443-64d8-4bda-9428-e17c31b24d83>
CC-MAIN-2022-33
https://www.metrohm.com/en_us/applications/ab-application-bulletins/ab-243.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00276.warc.gz
en
0.928301
131
1.5625
2
By Alice Slater Photograph Source: U.S. Navy Public Affairs Resources Website – Public Domain August 6th and 9th mark 74 years since the atomic bombing of Hiroshima and Nagasaki, where only one nuclear bomb dropped on each city caused the deaths of up to 146,000 people in Hiroshima and 80,000 people in Nagasaki. Now, with the US decision to walk away from the 1987 Intermediate-Range Nuclear Force (INF) negotiated with the Soviet Union, we are once again staring into the abyss of one of the most perilous nuclear challenges since the height of the Cold War. With its careful verification and inspections, the INF Treaty eliminated a whole class of missiles that threatened peace and stability in Europe. Now the US is leaving the treaty on the grounds that Moscow is developing and deploying a missile with a range prohibited by the treaty. Russia denies the charges and accuses the US of violating the treaty. The US rejected repeated Russian requests to work out the differences in order to preserve the Treaty. The US withdrawal should be seen in the context of the historical provocations visited upon the Soviet Union and now Russia by the United States and the nations under the US nuclear “umbrella†in NATO and the Pacific. The US has been driving the nuclear arms race with Russia from the dawn of the nuclear age: — In 1946 Truman rejected Stalin’s offer to turn the bomb over to the newly formed UN under international supervision, after which the Russians made their own bomb; –- Reagan rejected Gorbachev’s offer to give up Star Wars as a condition for both countries to eliminate all their nuclear weapons when the wall came down and Gorbachev released all of Eastern Europe from Soviet occupation, miraculously, without a shot; — The US pushed NATO right up to Russia’s borders, despite promises when the wall fell that NATO would not expand it one inch eastward of a unified Germany; –- Clinton bombed Kosovo, bypassing Russia’s veto in the UN Security Council and violating the UN treaty we signed never to commit a war of aggression against another nation unless under imminent threat of attack; –- Clinton refused Putin’s offer to each cut our massive nuclear arsenals to 1000 bombs each and call all the others to the table to negotiate for their elimination, provided we stopped developing missile sites in Romania; –- Bush walked out of the 1972 Anti-Ballistic Missile Treaty and put the new missile base in Romania with another to open shortly under Trump in Poland, right in Russia’s backyard; –- Bush and Obama blocked any discussion in 2008 and 2014 on Russian and Chinese proposals for a space weapons ban in the consensus-bound Committee for Disarmament in Geneva; –- Obama’s rejected Putin’s offer to negotiate a treaty to ban cyber war; –- Trump now walked out of the INF Treaty; –- From Clinton through Trump, the US never ratified the 1992 Comprehensive Test Ban Treaty as Russia has, and has performed more than 20 underground sub-critical tests on the Western Shoshone’s sanctified land at the Nevada test site. Since plutonium is blown up with chemicals that don’t cause a chain reaction, the US claims these tests don’t violate the treaty; –- Obama, and now Trump, pledged over one trillion dollars for the next 30 years for two new nuclear bomb factories in Oak Ridge and Kansas City, as well as new submarines, missiles, airplanes, and warheads! What has Russia had to say about these US affronts to international security and negotiated treaties? Putin at his State of the Nation address in March 2018 said: I will speak about the newest systems of Russian strategic weapons that we are creating in response to the unilateral withdrawal of the United States of America from the Anti-Ballistic Missile Treaty and the practical deployment of their missile defence systems both in the US and beyond their national borders. I would like to make a short journey into the recent past. Back in 2000, the US announced its withdrawal from the Anti-Ballistic Missile Treaty. Russia was categorically against this. We saw the Soviet-US ABM Treaty signed in 1972 as the cornerstone of the international security system. Under this treaty, the parties had the right to deploy ballistic missile defence systems only in one of its regions. Russia deployed these systems around Moscow, and the US around its Grand Forks land-based ICBM base. Together with the Strategic Arms Reduction Treaty, the ABM treaty not only created an atmosphere of trust but also prevented either party from recklessly using nuclear weapons, which would have endangered humankind, because the limited number of ballistic missile defence systems made the potential aggressor vulnerable to a response strike. We did our best to dissuade the Americans from withdrawing from the treaty. All in vain. The US pulled out of the treaty in 2002. Even after that we tried to develop constructive dialogue with the Americans. We proposed working together in this area to ease concerns and maintain the atmosphere of trust. At one point, I thought that a compromise was possible, but this was not to be. All our proposals, absolutely all of them, were rejected. And then we said that we would have to improve our modern strike systems to protect our security. Despite promises made in the 1970 Non-Proliferation Treaty (NPT) that the five nuclear weapons states–US, UK, Russia, France, China–would eliminate their nuclear weapons while all the other nations of the world promised not to get them (except for India, Pakistan, and Israel, which also acquired nuclear weapons), there are still nearly 14,000 nuclear bombs on the planet. All but 1,000 of them are in the US and Russia, while the seven other countries, including North Korea, have about 1000 bombs between them. If the US and Russia can’t settle their differences and honor their promise in the NPT to eliminate their nuclear weapons, the whole world will continue to live under what President Kennedy described as a nuclear Sword of Damocles, threatened with unimaginable catastrophic humanitarian suffering and destruction. To prevent a nuclear catastrophe, in 2017, 122 nations adopted a new Treaty for the Prohibition of Nuclear Weapons (TPNW). It calls for a ban on nuclear weapons just as the world had banned chemical and biological weapons. The ban treaty provides a pathway for nuclear weapons states to join and dismantle their arsenals under strict and effective verification. The International Campaign to Abolish Nuclear Weapons, which received the Nobel Peace Prize for its efforts, is working for the treaty to enter into force by enrolling 50 nations to ratify the treaty. As of today, 70 nations have signed the treaty and 24 have ratified it, although none of them are nuclear weapons states or the US alliance states under the nuclear umbrella. With this new opportunity to finally ban the bomb and end the nuclear terror, let us tell the truth about what happened between the US and Russia that brought us to this perilous moment and put the responsibility where it belongs to open up a path for true peace and reconciliation so that never again will anyone on our planet ever be threatened with the terrible consequences of nuclear war. Here are some actions you can take to ban the bomb: + Support the ICAN Cities Appeal to take a stand in favor of the ban treaty + Ask your member of Congress to sign the ICAN Parliamentary Pledge + Support the Don’t Bank on the Bomb Campaign for nuclear divestment + Support the Code Pink Divest From the War Machine Campaign + Distribute Warheads To Windmills, How to Pay for the Green New Deal, a new study addressing the need to prevent the two greatest dangers facing our planet: nuclear annihilation and climate destruction. + Sign the World Beyond War pledge and add your name to this critical new campaign to make the end of war on our planet an idea whose time has come! www.worldbeyondwar.org Alice Slater is a founder of Abolition 2000, which works for a treaty to ban nuclear weapons. This article appeared on August 8 here at counterpunch.
<urn:uuid:a24ecf35-e4d1-4659-9e67-01ea9069d167>
CC-MAIN-2022-33
http://peaceworker.org/2019/08/hiroshima-unlearned-time-to-tell-the-truth-about-us-relations-with-russia-and-finally-ban-the-bomb/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00265.warc.gz
en
0.947435
1,711
2.640625
3
With its promise of taming the ravages of stomach acid, ranitidine—best known under the brand name Zantac—was counted among the agents of pharmaceutical salvation, the enduring and reliable drugs that treat intractable diseases and make daily life more tolerable. In 1987, Zantac became the most-prescribed drug in the world. But last week ranitidine was essentially erased from the US market. The US Food and Drug Administration asked manufacturers to withdraw ranitidine products, both in prescription and over-the-counter forms, because of an “impurity” in the pharmaceutical compound. Over time or in the presence of heat, ranitidine can form unacceptable levels of a probable carcinogen known as N-nitrosodimethylamine, or NDMA, the agency determined. “We didn’t observe unacceptable levels of NDMA in many of the samples that we tested. However, since we don’t know how or for how long the product might have been stored, we decided that it should not be available to consumers and patients unless its quality can be assured,” Janet Woodcock, director of the FDA’s Center for Drug Evaluation and Research, wrote in the April 1 statement. Pharmacy shelves already had been stripped of the product. Sanofi, maker of Zantac, had recalled its products last fall due to earlier FDA findings, as had generic manufacturers. National chains such as Walmart, Walgreen’s, and CVS removed over-the-counter ranitidine. “We take this issue seriously and continue to work closely with the FDA to evaluate any potential safety risks associated with Zantac,” Sanofi spokesperson Nicolas Kressmann told WIRED in an email. “At Sanofi, we stand by the long-standing science that supports the safety of Zantac OTC (over-the-counter) products, which have been used by consumers for over two decades.” "It is too early to say if and when we will be able to come back to the market as evaluations are ongoing," Kressmann writes. But for the foreseeable future, the FDA’s withdrawal request ends decades of ranitidine use. More broadly, it highlights NDMA contamination in medicines—and troubling questions about drug quality in a global industry dominated by manufacturing in China and India. NDMA has been detected in other commonly prescribed drugs: the blood pressure medicines valsartan, losartan, and irbesartan and—in lower amounts—in metformin, a common diabetes drug. NDMA is an organic chemical that was once used in the manufacture of rocket fuel and lubricants. It also is a byproduct of other chemical processes; for example, it’s found in rubber, dye, and pesticide production, tanneries, and foundries. It is even a byproduct of the chlorination of drinking water, where it can be detected in very small amounts. There is no federal standard for NDMA in drinking water, although some states have set their own limits. Foods that contain nitrites or nitrates—including bacon, grilled or smoked meats, and even some fruits and vegetables—can fuel a chemical reaction in the stomach that creates NDMA. Based on studies that showed NDMA can cause liver, kidney, and lung cancer in animals, the US Environmental Protection Agency labels it a probable human carcinogen.
<urn:uuid:545a071d-631a-44d2-b739-2ba32a937188>
CC-MAIN-2022-33
https://www.wired.com/story/the-fda-asks-companies-to-stop-selling-ranitidine/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571745.28/warc/CC-MAIN-20220812170436-20220812200436-00477.warc.gz
en
0.949459
710
2.359375
2
It’s normal for visitors to Walt Disney World to worry about falling from the sky—the Tower of Terror, Splash Mountain, and other rides all feature nausea-inducing drops. But last night, the worry was of plummeting into the earth below. Late Sunday, a 40-foot wide sinkhole opened at Summer Bay Resort, a condominium vacation complex located just minutes from Walt Disney World. Guests first became alarmed when their lights went off, but creaking noises and large cracks forming on the wall signified something grimmer than a mere power outage. A security guard ran through the complex telling the roughly 35 guests in the affected buildings to evacuate. Within minutes, the hole had swallowed about a third of two buildings. Just fifteen feet deep, the shallow sinkhole totally destroyed 48 condo units, and no injuries were reported. Today, local engineers are assessing the damage, while the American Red Cross is providing assistance to the displaced families, many of whom did not have time to retrieve their belongings. Under 7 miles away from the Magic Kingdom, Summer Bay Resort is a popular vacation spot for visitors to Disney World who prefer to stay off-property (one of T+L’s Money-Saving Tips for Disney World). Unfortunately, the state is no stranger to sinkholes. According to its Department of Environmental Protection, sinkholes represent “a fact of life in Florida,” and maps based on Florida Geological Society data highlight county-by-county where the holes appear most. These maps show that visitors to Orlando and its many resorts should not fret too much. While anomalies occur, sinkholes in the area tend to be “few and small,” and to form gradually. In other words, Disney World is still safe. Peter Schlesinger is a Research Assistant at Travel + Leisure, and a member of the Trip Doctor news team. You can follow him on Twitter at @pschles08.
<urn:uuid:e53a07fc-daec-4085-8d4e-feebc2ba3c1e>
CC-MAIN-2017-04
http://www.travelandleisure.com/blogs/sinkhole-near-disney-world-swallows-section-of-resort
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282140.72/warc/CC-MAIN-20170116095122-00129-ip-10-171-10-70.ec2.internal.warc.gz
en
0.94883
398
1.90625
2
You've just received an email from a reputable business, but the contents of the message seem a bit "off." This could actually be a phishing email from someone who wants to steal your private data, such as a password or bank account number, or install a virus on your computer. Phishing emails may at first appear legitimate, but most also give you at least one hint that the email was sent by a fraudster. Phishing Emails Look Real At first glance, phishing emails look much like any other email you may have received from a reputable company. The company logo is typically emblazoned at the top of the message, and the email often appears to be sent from someone in authority. The email's graphics, template and language are usually designed to look identical to a legitimate email sent from that company. If you're ever in doubt, compare the potential phishing email to a real one from the same company. Poor Spelling and Grammar One big tip-off of phishing emails is poor spelling and improper grammar. This is especially true when the email is sent from someone in a foreign country who isn't very familiar with the English language. Phishing emails might also use strange punctuation or misplaced capital letters. Not all phishing emails contain spelling errors, though, so just because an email is well-written doesn't mean that it's legitimate. Continue to look for other signs before you trust that the email is real. Almost all phishing emails contain some kind of threat designed to spur you into action. The sender might threaten to close your account if you don't click on the link in the email, for example. Phishing emails sent to mimic a bank may tell you that your account has been hacked or your debit card information stolen, and urge you to click on the provided link to fix the problem. If your bank account information is ever really compromised, the bank will typically call you rather than send an email about it. Links to Phishing Websites The goal of all phishing emails is to get you to click on a link. The link is often cloaked to look legitimate, but when you click it, it redirects you to a different website. This website might be a shady online shop trying to gain business, or a malware site that infects your computer with a virus. To determine if a link is real or fake, hover your mouse pointer over it for a few seconds to see the actual link appear where you're pointing. If you're ever suspicious of a link, don't click it. Instead, type the URL into your browser's address bar yourself to ensure that you go to the correct site. Secure website URLs typically start with "https://", and a locked padlock icon at the bottom of your browser window lets you know that the site is encrypted for your safety. - PhotoObjects.net/PhotoObjects.net/Getty Images
<urn:uuid:894d7b60-c9c9-4d58-a4cb-b4b9d98c0a75>
CC-MAIN-2017-04
http://smallbusiness.chron.com/distinguish-between-email-phishing-attempt-email-legitimate-business-59261.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282140.72/warc/CC-MAIN-20170116095122-00131-ip-10-171-10-70.ec2.internal.warc.gz
en
0.944859
591
3.171875
3
Dr. Daniel Hale Williams Auditorium And Atrium February 1, 2012 by staff Dr. Daniel Hale Williams Auditorium And Atrium, Daniel Hale Williams (January 18, 1858 – August 4, 1931) was an American surgeon. He was the first African-American cardiologist,and performed one of the first successful open-heart surgeries in the United States. He also founded Provident Hospital, the first non-segregated hospital in the United States. Williams was among the first to have performed cardiac surgery. Earlier surgeries on the pericardium were performed by Francisco Romero in 1801, Dominique Jean Larrey prior to 1850, and by Henry Dalton in 1891. Also in 1891, he started the Provident Hospital and training school for nurses in Chicago, Illinois. This was established mostly for African-American citizens. In 1893 he repaired the torn pericardium of a knife wound patient, James Cornish, the second on record. He performed this surgery at Provident Hospital, Chicago, on 10 July 1893 About fifty-five days later, James Cornish had successfully recovered from the surgery. In 1893, during the administration of President Grover Cleveland, Williams was appointed surgeon-in-chief of Freedman’s Hospital in Washington, D.C.. In addition to organizing the hospital, Williams also established a training school for African-American nurses at the facility. Williams was a teacher of Clinical Surgery at Meharry Medical College in Nashville, Tennessee and was an attending surgeon at Cook County Hospital in Chicago. He worked to create more hospitals and accessibility for African Americans. In 1895 he co-founded the National Medical Association for African American doctors, and in 1913 he became a charter member and the only African American doctor in the American College of Surgeons. Daniel Hale Williams was born and raised in the city of Hollidaysburg, Pennsylvania. His father, Daniel Hale Williams, Jr. was the son of an African-American barber and a Scots-Irish woman. He lived with his father who was a “free negro” barber, his mother, a brother and five sisters. His family eventually moved to Annapolis, Maryland. Unfortunately, shortly after when Daniel was nine, his father died. Williams was married in 1898 to Alice Johnson, daughter of sculptor Moses Jacob Ezekiel and a maid of mixed ancestry. Williams died of a stroke in Idlewild, Michigan on August 4, 1931. His wife, Alice Johnson, died in 1924. Please feel free to send if you have any questions regarding this post , you can contact on Disclaimer: The views expressed on this site are that of the authors and not necessarily that of U.S.S.POST.
<urn:uuid:4b17f301-579f-45cb-a257-7264fe1f17e5>
CC-MAIN-2017-04
http://usspost.com/dr-daniel-hale-williams-auditorium-and-atrium-63488/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282140.72/warc/CC-MAIN-20170116095122-00124-ip-10-171-10-70.ec2.internal.warc.gz
en
0.977366
553
2.671875
3
Globalisation, sustainability and climate change: the world’s most pressing issues are inherently geographical, central to our course and critical to your future. Available as a BA or BSc, our degree allows you to focus your interests in human or physical geography, or to balance the two. As a BSc student, you’ll likely be drawn to our physical geography themes in environmental change, river science, ecological dynamics and global sustainability, yet our BA themes will also be open to you. Fieldwork is pivotal to the course. You'll progress from field training in Snowdonia to field research overseas: investigating environmental change and glacial dynamics in the Swiss Alps, sustainability science in Morocco, or the rivers and geomorphologies of Western Canada. Geo-tagged data is fundamental to information flow and decision making across our planet. You will have the chance to help build this geo-referenced world through our geographic information systems (GIS) theme, positioning you for entry to the largest recruiting industry of geography graduates. You can also choose to benefit from our internship opportunities gaining a competitive edge of experience, networking with potential employers and gaining academic credit towards your degree, all at the same time. This programme has been accredited by the Royal Geographical Society (with IBG). Accredited degree programmes contain a solid academic foundation in geographical knowledge and skills, and prepare graduates to address the needs of the world beyond higher education. The accreditation criteria require evidence that graduates from accredited programmes meet defined sets of learning outcomes, including subject knowledge, technical ability and transferable skills. You can choose to complete our Geography degree as a BA or BSc, allowing you to focus your interests in human or physical geography, or to balance the two. Its flexibility means that gaining a BA or a BSc will be decided by your choice of overseas fieldwork destination at the end of your second year. Your programme will be coursework-led, with varied assessment types allowing you to demonstrate your strengths. We place an emphasis on diverse teaching throughout your degree, running small group seminars, one-to-one tutorials, lab sessions, computer practicals and fieldtrips alongside conventional lectures. Tariff information for 2017 entry 120 tariff points BBB at A levels, DDM at BTEC or use a combination of your qualifications to achieve the required tariff total. 2017 UCAS tariff table Mature Applicants: We welcome applications from mature students (aged 21 and over) and do not necessarily require the same academic qualifications as school leaving applicants. To find out more, please email our enquiries team. For international students please see entry requirements in your country for full details. Grade C in GCSE English and Mathematics (or equivalent) are normally required. If you don't meet your tariff points total we may still consider your application. Please email our admissions team for further information. See the further details of fees and potential extra costs when studying a course at the University of Gloucestershire. |UCAS codes available for this subject| |BSc Single Honours - 3 years full-time||F800| - Geographic information systems (GIS) roles - Teaching, lecturing and research - Sustainable development management - Environmental consultancy I’m a senior onshore environmental developer for Mainstream Renewable Power. I work with off-shore wind farms and educate people about climate change. I'm doing something for a greater cause. My degree taught me so much. We went to Arolla in Switzerland for a week to monitor glacier meltwater output. We visited North Wales and saw the historic progression of the last 20,000 years on cliff faces. It was fascinating. I did my dissertation on historic climates in peat bogs. We found a cooling event that happened post ice-age. I had a great sense of achievement. You can choose to undertake an internship to gain workplace experience, network with potential employers and obtaining academic credit towards your degree. Our internship students have been working in GIS industries, from flood mapping for major water companies to valuing land across the Cotswolds. Others have been gaining teaching experience in schools and some have joined us in our research on population dynamics, environmental change and global sustainability. “I’ve undertaken field work and attended conferences in some amazing places including Canada, Iceland, and New Zealand. I also serve on the executive committee of the British Society for Geomorphology, and for the European Geosciences Union. I have a variety of research projects on the go working on water (both flowing and frozen), but of particular note I am currently working with the British Antarctic Survey using historic aerial photographs and satellite imagery to look at glacier change on Antarctica. This gives me the opportunity to incorporate some of my Antarctic data into my geography teaching.” Focus on the world's most pressing issues Globalisation, sustainability and climate change: the world’s most pressing issues are inherently geographical, central to our course and critical to your future. Help build the geo-referenced world through GIS Geo-tagged data is now fundamental to information flow and decision-making across our planet. Our geographic information systems (GIS) theme will place you at the core of this world, positioning you for entrance into the largest recruiting area of geography graduates. Explore the world, on campus and in the field Students progress from field training in Snowdonia to field research in the Swiss Alps, Morocco and western Canada.
<urn:uuid:b7715e75-4f31-4186-829e-0e98d25c3b89>
CC-MAIN-2017-04
http://www.glos.ac.uk/courses/undergraduate/geo/pages/geography-bsc-hons.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279650.31/warc/CC-MAIN-20170116095119-00428-ip-10-171-10-70.ec2.internal.warc.gz
en
0.921919
1,130
1.890625
2
Today our message is about “How to Avoid Deception.” What is deception? Deception is being misled by a false appearance or statement. In other words, to be deceived is to believe a falsehood or a lie. Deception has a very long history, going back to the garden of Eden. 2 Corinthians 11:3 (ESV) But I am afraid that as the serpent deceived Eve by his cunning, your thoughts will be led astray from a sincere and pure devotion to Christ. In the garden of Eden, the serpent, Satan, deceived Eve with a lie. He got her to believe that what God had said was not true. Because of that deception, first Eve and then Adam disobeyed God and sinned by eating the forbidden fruit. We can learn some important principles from that first deception. Every sin is a result of being deceived and believing a lie. Sin is the inevitable result of thinking that something is true when it is not. Jesus warned us about being deceived in … Matthew 24:4-5 (NIV2011) Jesus answered: “Watch out that no one deceives you. For many will come in my name, claiming, ‘I am the Messiah,’ and will deceive many. As the time of Jesus’ return draws closer, the amount of deception will increase. Notice that Jesus puts the responsibility on each one of us to watch out so that we are not deceived. We must be able to distinguish between the truth of God and the lies of Satan. Not only must we be careful to not be deceived, we must also help others to avoid deception. 1 Timothy 4:1 (NIV2011) The Spirit clearly says that in later times some will abandon the faith and follow deceiving spirits and things taught by demons. When a person is deceived, behind that deception are deceiving spirits and demons. In order for a person to be deceived, the deception must sound like it is true. Let’s take a few minutes to look at a series of statements that many people believe. They sound true, but they are deceptions if you understand what God’s Word says. And there are many, many other things that most people believe that are deceptions. So, how can you and I avoid being deceived? We must build our relationship with Jesus, who is the way, the truth and the life. This morning, we’re going to return to the life of the prophet Jeremiah. He spoke the truth of God’s Word when those around him were being deceived. Jeremiah 26:2 (ESV) “Thus says the LORD: Stand in the court of the LORD’s house, and speak to all the cities of Judah that come to worship in the house of the LORD all the words that I command you to speak to them; do not hold back a word. These were the instructions that the Lord gave to Jeremiah about speaking to the people of Judah. As people came to worship at the temple, Jeremiah would prophesy to them. His message was one of doom and destruction if the people did not turn to God. Jeremiah 26:3 (ESV) It may be they will listen, and every one turn from his evil way, that I may relent of the disaster that I intend to do to them because of their evil deeds. Jeremiah’s message was designed to wake the people up to the disaster that was coming if they did not repent. The disaster would be the invasion of the Babylonian army to destroy and carry captives back to Babylon. Who was Jeremiah speaking to? He was speaking to the people coming to worship at the temple. Even though they were outwardly coming to worship, their hearts were filled with evil. Not only did they worship at the temple, when they went home, they continued to worship idols. Jeremiah knew that his message would not be popular, but he continued to speak what the Lord had given him to say. Jeremiah 26:8 (ESV) And when Jeremiah had finished speaking all that the LORD had commanded him to speak to all the people, then the priests and the prophets and all the people laid hold of him, saying, “You shall die! Jeremiah certainly did not get a warm reception to his call for repentance. It appears that no one liked what he had to say. They wanted to kill him. Certainly not the attitude of God-fearing people. What were they upset about? Jeremiah 26:9 (ESV) Why have you prophesied in the name of the LORD, saying, ‘This house shall be like Shiloh, and this city shall be desolate, without inhabitant’?” And all the people gathered around Jeremiah in the house of the LORD. Shiloh had previously been the center of worship for all Israel for three hundred years. Yet, it had been destroyed and was not longer in existence. Jeremiah was prophesying that Jerusalem would be destroyed, just like Shiloh, unless the people turned back to God. The people were in unity that Jeremiah must be stopped from preaching the depressing message that God’s judgement was coming. The false prophets and teachers who were teaching that nothing bad was coming did not like their words contradicted. Jeremiah explained to all the people that he was simply proclaiming God’s Word, not his own. God intervened and Jeremiah’s life was spared, even though the people of Judah were self-deceived. What is the danger of self-deception? Self-deception is when you choose to only hear the things that you want to hear. You shut out the truth and listen only to lies that make you feel good. 2 Timothy 4:3 summarizes how self-deception occurs. 2 Timothy 4:3 (NLT2) For a time is coming when people will no longer listen to sound and wholesome teaching. They will follow their own desires and will look for teachers who will tell them whatever their itching ears want to hear. There are two aspects of self-deception in this verse. We see both of them in the account of Jeremiah we’ve just discussed. First all, people stop listening to the truth, described as sound teaching. Secondly, they look for teachers that will tell them whatever they want to hear. And the things that people want to hear are the deceiving lies of the enemy. What is the difference between this self-deception and the truth? The truth will always call on you to change and so grow closer to God. Yet, many people do not want to change, so they embrace falsehood. Self-deception is simply listening to what you want to hear. Self-deception calls for no change in your life and pulls you away from God. Don’t fall for the false reassurances of teaching that denies that doesn’t call for change in your life. God calls us to become more and more like Jesus, which takes great change. We must be alert to the danger of self-deception. Jeremiah 28:10-11 (NLT2) Then Hananiah the prophet took the yoke off Jeremiah’s neck and broke it in pieces. And Hananiah said again to the crowd that had gathered, “This is what the LORD says: ‘Just as this yoke has been broken, within two years I will break the yoke of oppression from all the nations now subject to King Nebuchadnezzar of Babylon.’” With that, Jeremiah left the Temple area. Jeremiah had been wearing a yoke on his neck at God’s direction. The yoke signified the captivity that was coming from Babylon if they people did not repent. Hananiah took off Jeremiah’s yoke and broke it to pieces. He proclaimed that within two years, Babylon would be defeated and would no longer threaten Judah. Hananiah’s message directly contradicted what God was saying through Jeremiah. Jeremiah 28:15 (ESV) And Jeremiah the prophet said to the prophet Hananiah, “Listen, Hananiah, the LORD has not sent you, and you have made this people trust in a lie. You can imagine that Hananiah’s message was very popular and encouraging. However, Jeremiah spoke directly to him and called him out for telling a lie. Notice that the people believed and were trusting this false prophet’s deception. Jeremiah continued. Jeremiah 28:16 (ESV) Therefore thus says the LORD: ‘Behold, I will remove you from the face of the earth. This year you shall die, because you have uttered rebellion against the LORD.’” Now we see that the Lord was with Jeremiah as he gave a very stern rebuke of the false prophet. Because Hananiah had spoken rebellion and lied about what the Lord was saying, he would lose his life. In fact, Jeremiah prophesied that the Lord would cause him do die within a year. The Scripture records that two months later, Hananiah died. The Lord had revealed who was the true prophet and who was the false prophet. It is important that we learn to discern false teachers and prophets. So, how can you learn to discern false teachers today? Where might you encounter false teachers or false teaching? The answer is just about everywhere. False teaching is teaching that contradicts God’s Word. There is false teaching in every type of media that exists today. Because of the internet, false teaching is everywhere. False teaching is found in the secular world and in the religious world. One of the best ways to grow in your discernment of false teaching is to be part of a church family like Life Church. We are not just an isolated church in St. Louis. We are part of a large fellowship of over 70 million people and hundreds of thousands of churches around the world in the Assemblies of God. Our biblical beliefs do not change by the year and are carefully documented on the ag.org website. You can find position papers based on the Bible on every topic you may have questions about. Right here at Life Church, you will receive the truth of God’s Word every Sunday. We encourage everyone to get involved in other times during the week. In the Sunday growth class before the service or in the small groups we have meeting. There you can talk to other believers and grow in the truth of God. Jeremiah 29:19 (ESV) because they did not pay attention to my words, declares the LORD, that I persistently sent to you by my servants the prophets, but you would not listen, declares the LORD.’ Many of the Jews had already been exiled to Babylon. Even in Babylon false prophets were giving deceptive messages regarding the return of the people to Judah. These deceptive messages were giving the people false hope and contradicting what the Lord was saying through Jeremiah. So, Jeremiah wrote and sent a letter to these exiles in Babylon. God was saying to them that they hadn’t been and still weren’t listening to his words being spoken through true prophets, like Jeremiah. Jeremiah prophesied that the captivity in Babylon would last not just for a few years but for seventy years. There were a number of false prophets in Babylon including one named Shemaiah. Jeremiah 29:30-31 (ESV) Then the word of the LORD came to Jeremiah: “Send to all the exiles, saying, ‘Thus says the LORD concerning Shemaiah of Nehelam: Because Shemaiah had prophesied to you when I did not send him, and has made you trust in a lie, Again, God spoke through Jeremiah concerning these deceptive messages. They were causing the people to trust in a lie, rather than the truth of God. Jeremiah 29:32 (ESV) therefore thus says the LORD: Behold, I will punish Shemaiah of Nehelam and his descendants. He shall not have anyone living among this people, and he shall not see the good that I will do to my people, declares the LORD, for he has spoken rebellion against the LORD.’” God does not take deceptive messages or those who give them lightly. He would punish this false prophet and his descendants for his rebellion against the Lord. Those who promote deceptive messages refuse to hear and acknowledge God’s truth. We must beware of deceptive messages and messengers. How can we discern what is true and what is false? We have the Bible, God’s inspired word which is totally true with no falsehood. Besides being part of a Bible believing church, each believer needs to be reading and studying God’s Word on a daily basis. The more you immerse yourself in God’s truth, the more you will immediately be able to detect false messages wherever they come from. As you read the Bible and pray, the Holy Spirit will help you to understand and apply what you read to your life. As you grow in your understanding the Bible, it will become easier and easier to detect the false messages that are all around us. As you grow closer to Jesus, His Spirit will guide you into more truth. Then you will be able to help others who have been deceived to learn the truth. Many churches are straying further and further from the truth of God’s Word. We need to learn how to encourage people away from deception and towards the truth. Beware of deceptive messages. Through the life of the prophet Jeremiah, we’ve learned about the danger of self-deception. The human desire to only hear good news and not that we need to change. Yet, God’s message, that we saw through Jeremiah is one of repentance. Not just to be saved, but throughout our lives. Leaving the lies of the enemy behind and pressing forward into God’s truth. God desires for us to grow at discerning false teachers and the false messages they give. God wants to guide us to helping others that have trusted in lies. As we draw closer to the Lord in our church family and in His Word, He will help us to help others pursue His truth.
<urn:uuid:0b3617e6-7234-48ba-88c0-fd6aa9a6bc0d>
CC-MAIN-2022-33
https://messages.lifechurchstlouis.org/sunday-messages/message/how-to-avoid-deception-jeremiah-26-29
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00268.warc.gz
en
0.979854
2,932
1.921875
2
Advanced Digital Colour Theory HDRips | MP4/AVC, ~1467 kb/s | 960x540 | Duration: 08:58:33 | English: AAC, 48 kb/s (1 ch) | + PDF Guides | 5.81 GB Genre: Color, Photo Colour image coding is at the heart of digital imaging; it is a critical element of high-quality digital cinema and HD production. In this course we follow colour from its spectral form in front of the camera into acquisition where colour is reduced to 3 components, then through the post-production, grading, finishing, approval, mastering, distribution, and display/exhibition stages. We discuss the colour transforms and colourspaces used at all of these stages. We discuss colour aspects of subsampling and compression (H.264, as in Canon cameras, ProRes, as in Alexa, and JPEG2000, as used in DCPs). We'll present lots of diagrams, graphs, and equations using math at intermediate level; we hope that you're quite familiar with y = mx + B, and somewhat familiar with matrices, power functions, and logarithms. (WARNING: The presenter is Canadian; colour will be spelled with a "u".) Class 1: Technical introduction to colour science: We introduce the spectral power distributions of physics using Newton's drawing from the year 1666. We introduce the CIE standard observer, and the tristimulus values ("tristimuli") that result from applying those weighting functions to SPDs. We derive RGB values, and demonstrate RGB colour mixtures. We review the CMY coding of motion picture film, and review the densitometric coding of classic CPD/DPX systems. Class 2: Perceptually uniform coding: We define the concept of linearity, and explain why it is important in modern imaging systems. We define lightness. We introduce power functions and logarithms. We discuss the code-100 problem. We ask, what bit depth is necessary to represent reality? What bit depth is required to satisfy human vision? Class 3: Lin, log, and quasilog coding: There are two kinds of "linear" acquisition and two kinds of "log" acquisition; we elaborate. We outline various proprietary log formats. We discuss theoretical and practical aspects of acquisition coding. Class 4: Colour transforms: There are many kinds of colour transforms: affine transforms (3x3 linear matrix, in LMS, XYZ, RGB colourspaces, and also in Y'CBCR spaces), projective transforms transforms (used in CIE xy), and various nonlinear transforms (including CIE LAB). We discuss 3D LUTs, gamut mapping, and ICC colour management systems. Class 5: The ACES workflow, colourspaces, and transforms: Scene-referred linear-light image coding is fast becoming the standard way to do high-end production. We describe the ACES and OCES colourspaces, and the ACES colour transforms: IDT, LMT, RRT, RDT, and ODT. Class 6: We explain the theoretical and practical necessity of a camera 3x3 matrix. We describe how to build a transform from real camera RGB (device space) to the ACES interchange colourspace - that is, we explain how to build an ACES input device transform, IDT. We also discuss why IDTs have illumination dependencies. Class 7: Video colour coding: We present a systematic overview of gamma, including the DCI standard for digital cinema (2.6), the BT.1886 standard for HD (2.4) and the sRGB standard for desktop computing (2.2). We review chroma subsampling (4:4:4, 4:2:2, 4:2:0), and discuss its effects on noise, resolution, and bit depth. Class 8: Distribution: We describe in detail the DCI P3 image coding used for reference D-cinema projectors, and the XYZ coding for DCPs. We outline compression issues associated with ProRes, H.264, and JPEG2000. Class 9: HD, 2K, 4K ("UHD"), 8K: We detail current and future image formats, and we discuss the underlying theory of spatial sampling, resampling, and oversampling. Class 10: Emergent display systems: Wide gamut colour is emerging rapidly. We discuss LED backlights on LCD displays; OLED displays; laser displays; spatially modulated backlights and high dynamic range displays. We also discuss the open issue of observer metamerism in emergent displays.
<urn:uuid:a0be722c-0672-4fc3-ba69-e18bffb3c112>
CC-MAIN-2017-04
http://www.0daydown.com/05/549199.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00272-ip-10-171-10-70.ec2.internal.warc.gz
en
0.758156
970
2.84375
3
Jonathan Irvine Israel (born in 1946) is the Modern European History Professor in the School of Historical Studies at the Institute for Advanced Study, Princeton and one of the world’s leading historians of the Enlightenment. Israel received his Ph.D. from Oxford in 1972. His work is concerned with European and European colonial history from the Renaissance to the eighteenth century. His recent work focuses on the impact of radical thought (especially Spinoza, Bayle, Diderot, and the eighteenth-century French materialists) on the Enlightenment and on the emergence of modern ideas of democracy, equality, toleration, freedom of the press, and individual freedom. His books include European Jewry in the Age of Mercantilism, 1550–1750 (1985); The Dutch Republic: Its Rise, Greatness, and Fall, 1477–1806 (1995); Radical Enlightenment: Philosophy and the Making of Modernity, 1650–1750 (2001); Enlightenment Contested: Philosophy, Modernity, and the Emancipation of Man 1670–1752 (2006); and A Revolution of the Mind: Radical Enlightenment and the Intellectual Origins of Modern Democracy (2009). Israel was made a Fellow of the British Academy in 1992, Corresponding Fellow of the Koninklijke Nederlandse Akademie van Wetenschappen (Royal Netherlands Academy of Arts and Sciences) in 1994, won the American Historical Association’s Leo Gershoy Prize in 2001, and was made Knight of the Order of the Netherlands Lion in 2004. In 2008, he won the Dr A.H. Heineken Prize for history, medicine, environmental studies and cognitive science. In 2010 he was awarded the Benjamin Franklin Medal by the Royal Society for the Encouragement of Arts, Manufactures and Commerce (RSA) for his outstanding contribution to Enlightenment scholarship.
<urn:uuid:781b3975-155c-439e-aae8-2d0f5e05f027>
CC-MAIN-2017-04
http://weibenglish.sinaapp.com/israel%EF%BC%8Cjonathan/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281069.89/warc/CC-MAIN-20170116095121-00266-ip-10-171-10-70.ec2.internal.warc.gz
en
0.908009
379
2.265625
2
It has introduced just one more variation of the online service provider. Micropayments are economic transactions concerning tiny sums of money. Micropayments were initially made as a means of letting the purchase of online material and were imagined to include little sums of just a few cents. These transactions might enable people to sell content and now-a-days to market games online and will be an alternative to promotion revenue. In the business world today e-businesses and social support systems keep on to develop products and services and amusement solutions to attract more and more individuals and to increase the fascination of the possible worldwide audiences. With this specific growing fascination with the social support systems and online gaming , answers were needed to solve monetizing systems so that the entities included can recuperate their investments and earn a profit from this fast growing phenomenon. This push brings e-commerce company providers to supply alternatives specifically for the Cultural Systems and the Enormous Multiplayer Online (MMO or MMOG) gaming industries. These expanding markets have offered software and digital content designers a continually growing market position to offer their solution or solutions online. Consequently the online payment vendors have developed to encompassing that growth and become what’s referred to as a “Complete E-Commerce Service” provider. That status enables the general public realize that they give options for buying or performing transactions online. As engineering developments so does the requirement for sound micropayments options and e-commerce platforms to support them. That technology has yet to attain a peak so the possibilities might be endless. One of many techniques of e-commerce company companies are utilizing nowadays, is to incorporate the characteristics and capability of control micropayments or microtransactions (As some refer in their mind as) into their e-commerce platform. Yet another product that gets trotted out a great deal as the potential saviour of the gaming market could be the micro transaction gaming model, when the first and foundation experience might be free but the consumer is needed to pay little fee’s to be able to accessibility more material or extra features. A favorite example of this is the numerous games on the cultural network Facebook, with the excellent case being FarmVille. The game is completely absolve to perform, however you can ‘enhance’ your knowledge by buying in game objects for real cash. The argues that some people will have a way to experience games for cheaper than they can presently due to the variable pricing that micro transactions offers and though this may be true for the casual player, for the hardcore gamer that has been supporting the game industry for years paying hundreds of pounds a years for games it will really charge them a lot more in order to obtain the exact same knowledge that they’re presently receiving due to their $60. I think that micro transaction design also offers lots of risks for the developers and writers, if the consumer is paying way less transparent then it takes an individual to invest quite a bit in game to boost their knowledge, this means that they need to be having a persuasive experience presently to warrant paying more. Presently shovelware however makes plenty of cash as the consumer has no selection but to cover the total charge upfront, if nevertheless a consumer buys it for inexpensive and then realises how crap it truly is then a developer has missing on money so it would have otherwise previously got. This operates exactly the same for more impressive and hazardous games , the isn’t fully guaranteed a certain benefit from each replicate distributed meaning they must be much more traditional in the games which they create to be able to make certain they produce the money straight back that the shelled on producing it. For starters mass sum, generally $10-$15 monthly, the pay-per-month strategy lets you play the game for an unrestricted timeframe, obtain access to all those items and gear in the game , and experience everything that each other person does as well. Everyone has compensated the exact same volume and they can do whatever. This is the design done by Earth of Warcraft (WoW) and it has clearly provided them a tremendous amount of success. In January of 2008, WoW was described to have 11.5 million persons enjoying the game. At $15 per month, they’re strolling out making around $117 million a month. The problem to this is that if you can’t afford to pay the $15 monthly, you’re unable to enjoy the game which is clearly not a thing people appreciate. There were arguments that the game must be free, however you can’t have a totally free game as the designers need certainly to generate income therefore they can continue publishing more content. So, it becomes a dual edged blade: plenty of people can’t play and on the flip part, but when they’re going free, they free on the money. On another side is the microtransaction technique. Here, you pay for that which you want. The game is free, but elite gear and all of this expenses money. This demonstrably enables every one to play the game , but the problem arises (according to the gaming community) that those who have the absolute most income can afford to obtain more and are therefore the very best in the game. Their discussion is that the game becomes slanted towards individuals with money as opposed to those that are naturally great at the game. Video games have existed for quite a while now. They’re many peoples favorite past time, and actually ways to make money. Playing movie games turned from a spare time activity to employment very quickly, particularly when video and live streaming tools like YouTube and Twitch came to rise. With your tools, many people acquired their controllers wanting that they would become the following player who makes millions doing what they love. With an increase of people enjoying games the designers for the games need to dish out better and more up to date products. Even though these products aren’t the very best, they take action all for the money ultimately, as it is a business. When video games were first introduced they were an incredible feat and all were special in their own way. Although they did not look that good back in the 80’s and 90’s they offered something which actually lots of games today don’t offer. And that something is quality. Within the past 5 years roughly video games started initially to be much more of a site than an actual piece of entertainment. Slowly prime Multiple A designers started to include microtransactions inside their games , different from DLC (Downloadable Content). DLC was generally an expansion or even more included material to help make the game do have more playability, consequently making the gamers more entertained and looking more. The situation lies within movie games that sell pieces of their game that should have been free of charge or revealed by really enjoying the game rather than just investing in a credit card number to unlocked claimed personalities or items. This is a common exercise recently and it’s elevated a lot of dilemmas, and also many countries contemplate “loot boxes” gambling, which the truth is it is. A loot field in video games is whenever a person possibly uses in-game currency or real currency to get a arbitrary piece or a arbitrary set of items. Now the value of these items is based on a level, some people will obtain rare or more quality goods compared to the others only centered on odds. This is primarily targeted at younger participants that are more naive and are ready to pay whatsoever money they have on a game to create themselves search colder or enjoy better 정보이용료 80. All just to get prior to the curve. That practice is incredibly harmful not only because it promotes gaming to young ones, however it can be hugely addictive. There are lots of instances by which people invest tens and thousands of dollars just to get a single object or to buff up their identity or team. Obviously, the developers do not treatment, as it is simply more money for them, however they never search at what this can do to a person’s livelihood and also their families. The key reason these practices are executed is for the developers to help keep generating income also after the game is released. Based on the statistics microtransactions make more over all compared to the game it self, and those kinds of game collection are launched on an annually basis with small to number changes in the specific movie game itself.
<urn:uuid:045cb5d4-7abc-4e00-b04d-a2f78f250f97>
CC-MAIN-2022-33
https://frockneyrebelvintage.com/micropayment-the-potential-of-gaming/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00475.warc.gz
en
0.969518
1,719
1.679688
2
There are more pressing concerns when it comes to Cloud computing than data security, according to analyst firm, Frost & Sullivan. There has been a fixation on how secure information would be in the Cloud. Much publicised hacking scandals such as Sony's PlayStation Network (PSN) have exacerbated such concerns. But data security issues are a given anything related to IT, Frost & Sullivan ICT research vice-president, Andrew Milroy, said. He noted concerns over security risks in the Cloud among medium to large businesses have gone down with time. "People still talk a lot about security, privacy and the risks associated with Cloud computing generally," he said. "... Not saying [those concerns] are going to go away; clearly they are still issues. "But what we are finding is people that are working with Cloud computing more are finding the issues they are facing are things like integration data on-premise with what they have in the Cloud." Portability of data from one provider to another is also proving to be challenging. "My view is those are the real issues people need to think about more than just data security issues," Milroy said.
<urn:uuid:c9addbf0-c718-49ad-9ec5-b677037868e3>
CC-MAIN-2017-04
http://www.pcadvisor.co.uk/feature/security/analyst-cloud-security-is-not-real-concern-3338526/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280266.9/warc/CC-MAIN-20170116095120-00494-ip-10-171-10-70.ec2.internal.warc.gz
en
0.971422
236
1.742188
2
“Man Cannot Work Alone” is an essential belief that guided Ibrahim Abouleish when he established the SEKEM Initiative in Egypt. SEKEM’s governing principle is not only to reduce our ‘ecological footprint’, but to spread life and to contribute towards a better and healthier condition of the land and the people that we work with. This is the only way to create and sustain the conditions for a planet with more than seven billion people. SEKEM Tree Project, the first Gold Standard certified project in Egypt and the Middle East, was one step towards that goal. “The story of SEKEM is almost unbelievable because, at the time, no one would have thought it possible to restore the lost fertility to the desert.” Francesco Illy, Amici Caffè Chairman says. Francesco is one of SEKEM’s many friends and true believers. Thanks to the Italian coffee company Amici Cafè, SEKEM Tree Project already sold all its Gold Standard credits, shortly after its launching in November. The aim of the project is to green the desert by planting a belt of around 100,000 Casuarina trees to sequestrate carbon in the soil and also to form a shield around the crops in the area. All the returns from the credits of SEKEM Tree Project are used to fund the “Greening the Desert” project.
<urn:uuid:9d443301-e4e4-44ba-a743-cdbb86911457>
CC-MAIN-2022-33
https://www.sekem.com/en/all-recently-certified-gold-standard-credits-already-sold-out/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00276.warc.gz
en
0.947801
292
2.078125
2
Welcome to Canada’s ICDP Web site The International Continental Scientific Drilling Program The ICDP is an international scientific program whose main objective is to coordinate international continental drilling projects with a large range of scientific targets, drilling depths and technology challenges. Each ICDP project is managed as a Joint Research Venture involving many different member countries of the program. ICDP was founded in 1996 by the United States (represented by the US National Science Foundation - NSF), China (represented by the Chinese Ministry for Land and Resources), and Germany (represented by the Federal Ministry for Research and Technology and by the Deutsche Forschungsgemeinschaft). ICDP currently has 24 members. Canada's participation in ICDP Canada has a long history of participation in continental scientific drilling projects and joined the ICDP in 1998. The first Canadian ICDP project was the Mallik Gas Hydrate Research Well project in 2001-2002 in the North West Territories. Natural Resources Canada supported the membership of Canada during the first 10 years. In 2009 the Natural Sciences and Engineering Research Council of Canada (NSERC) committed itself to supporting Canadian membership in the ICDP for the next five years, giving Canadian scientists the opportunity to continue their involvement in ICDP activities and scientific planning. Canadian scientists currently coordinate ICDP activities in Canada through the Canadian Continental Drilling Program (CCDP). CCDP is also supported by INRS-ETE. It is presently chaired by Pierre Francus from INRS-ETE and is having its coordination office a the same institution.
<urn:uuid:69ad1ed5-a4c1-4587-b343-17972e476b59>
CC-MAIN-2017-04
http://icdp-canada.ca/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00393-ip-10-171-10-70.ec2.internal.warc.gz
en
0.940541
311
2.140625
2
In this article, I’m excited to talk all about our new NEST Installation smart thermostats, which just went live recently! Before I get into the nitty gritty of NEST; there’s a couple of things – firstly, I want to provide some background details about smart thermostats.. Table of Contents SMART THERMOSTATS EXPLAINED Smart thermostats are used to control heating and cooling systems. Smart thermostats are typically wall-mounted and measure the ambient temperature in a room using an in-built temperature sensor. Once you define a comfortable temperature in the room the thermostat will try to achieve this reading by opening and closing boiler valves, also called actuators. Additionally, smart thermostats also provide heat scheduling functionality. A heating schedule defines deviations from the comfort temperature. Depending on the model of your smart thermostat, these devices can accept and execute multiple temperature changes over a particular time period – i.e. day, week, or month. Smart thermostats are both controllable locally and remotely via a smartphone, PC, or tablet device. NEST #1 INSTALL DOWNSTAIRS So, the Installer (Brian) arrives at circa 12:30 on a Saturday evening… Identified the wall where I wanted to locate the NEST Installation, which is situated in an open plan area that covers the kitchen, dining, and kids play areas… So this was challenging because NEST does not include a battery and requires 12Volts. It comes with a transformer and a really short cable so doing a clean install would be challenging. Brian moved out a shelf unit, where the kids store their stuff and fortunately we had a socket. The next challenge was to hide the cable… As you can see, Brian had to do some cutting of the plasterboard… Once a route was identified; the base of NEST was in place and the display was attached. So in my case, the NEST Installation was powered via the USB cable. If you already have an old thermostat in place, then it will only be a matter of using the old cables to provide NEST with its required power… Anyway, over to the boiler area, which is in the utility room… Here in Europe, NEST has created a separate white box called a HeatLink. Wiring is pretty straightforward… Brian decommissioned my previous Z-Wave units and cabled as shown below. Basically Heatlink uses high-voltage power (blue and brown)… a common and one wire that connects to the motorized valve, which in turn switches the boiler on and off… No need for this Heat Link box if you are based in the USA, because the heating and cooling systems are different. Okay, once the serious wiring is done; Brian heads back to the NEST and applies power. He then steps through various configurations screens using the rotating dial and gentle presses to the front to select various options ranging from language, WiFi details to scheduling and location. Once NEST was connected to the O’Driscoll household network; the proceeded to update its software; this took a few minutes to complete. The final step was to register an account on the Web, download the App and it worked straight away. I must say that’s a relief compared to my days dealing with Z-Wave thermostats! Now, the NEST we installed today will be used to regulate temperature downstairs. My next step is to repeat the same process and install a second NEST upstairs. INSTALLING NEST#2 UPSTAIRS Okay, so Brian did not have the time on Saturday to install the second NEST. So re-scheduled a second install visit to get the Upstairs NEST up and running…. On this occasion, we had a different installer (Donncha) went to work on installing the second NEST… My first decision was to identify a suitable location upstairs for NEST #2….. Here are some conclusions that I made: Location, Location, Location Our previous ‘stats’ are located in the upstairs landing area. One is Z-Wave based and the second was connected to the old boiler using a wire – this was decommissioned a few years back… The temperature is always lower in this area because there is no radiator and temperatures identified by any thermostat in this area does not accurately represent what’s going on in the bedrooms. So decided to locate ‘NESTY’ (As the kids now call it) in the main bedroom. Watched Brian configure NEST Installation #1 and decided to configure the settings myself while the installer was working on connecting the second Heat link to the boiler in the utility. It was straight forward, all I needed was the WiFi code for input. However, I was more confident interacting with Nesty, because I watched Brian, dial and depress NEST to select the various options… Similar to NESTY #1 the unit went out on the Internet and downloaded the latest version of the software, which took 2 or 3 minutes. Once Donncha powered up heat link and the boiler, a wireless link was established and NESTY #2 was welcomed into the O’Driscoll household by the kids! The limit between heat link and a NEST is 30 feet, the main bedroom is pushing this distance, but so far so good….. It must have been 7:30 at night when we finished the initial install… THE NEST APP… So, as is the case with all this smart home automation stuff, I whipped out my smartphone the following day and added NEST #2 to the App. Identified the Entry key, located in the Setup menu on NEST itself. After a couple of seconds, NEST comes back and tells me all is well! NEST DOWNSIDES & UPSIDES So now that we have NEST Installation living with us…here are some observations, tips, and thoughts…. NEST smart thermostats come with their own motion sensors, so when it detects some type of movement, the display lights up… I like it for ‘NESTY’ downstairs because it attracts attention to the unit but in our bedroom, it’s a slight bit of pain. So let me explain some more; NEST #2 is really near the bedroom door, so if one of us has to leave the bedroom at night, NESTY lights up our darkroom! Not a criticism and I’m a big fan of motion sensors and how they feed the NEST algorithm, but just be cognizant for your own install…. Update: You can disable this function if it becomes over annoying. Away Mode temperatures The Away mode temperature defaults at 9 degrees both myself and Brian felt it was a bit high so we used a value of 5. That’s a personal opinion and of course, the levels vary throughout the world but still worth mentioning… Water, Water, Water We currently have the hot water tank on a timer and that still remains the case; NEST has no solution for heating water control. Like I said earlier, NEST or NESTY as it’s now known is a great addition to the family home.
<urn:uuid:c2ce3881-77c4-4ab8-8195-d0c772c2c80b>
CC-MAIN-2022-33
https://smarthomesschool.com/nest-installation/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00269.warc.gz
en
0.949279
1,552
1.882813
2
Twist on classic gives monster voice by Daniel Levine, Houghton Mifflin Harcourt, $24 Readers get a bonus when they purchase Daniel Levine’s “Hyde,” a new take on Robert Louis Stevenson’s “The Strange Case of Dr. Jekyll and Mr. Hyde”: The original thriller is included as a coda in the Levine book. I strongly recommend reading the classic first, then heading into Levine’s novel, which tells the story from the monster’s point of view. As Grendel is to Beowulf, so Hyde is to Jekyll and Hyde. Levine makes it somewhat difficult for contemporary readers by writing in the same style as Stevenson, which sounds stilted and overly formal to modern ears, at least mine. Still, one can’t deny the powerful, bloody exuberance of the violence and gore, however, which sometimes makes “The Walking Dead” seem like a walk in the proverbial park. We’re barely on Page 4 before we get a vivid description of a wound that’s likened to “a blood-gorged spider at the heart of its web, its abdomen a-throb. . Look at what he’s left me. What he’s made me do. All those experimental powders, those double injections - and for what? The end is the same.” Welcome to my nightmares, thank you very much. One doesn’t come to a book like this expecting sunshine and unicorns, and if there has ever been a more depressing, blackhearted and black-smogged version of London in the late 1800s, I’ve yet to read it. Levine gives Jekyll all sorts of psychological back story that’s missing from the Stevenson original, reaching far into the past to the twisted circumstances that led to Jekyll’s twisted search to explain the duality of man. In an early scene, we witness Jekyll’s father as he takes a fountain pen and stabs it into his own throat. “Father’s pen” is henceforth carried in Jekyll’s pocket at all times, a nasty little talisman to the man who created both Jekyll and his demonic alter ego. Sexual abuse and a thwarted love affair further contribute to Jekyll’s madness. There’s even a bit of midlife crisis, because Jekyll is turning 50 and stressing about doing things “to make it all seem meaningful.” Levine’s monster is as philosophical as he is hideous, desperately trying to both free himself from his “host,” Jekyll, while at the same time pondering Big Ideas. “Perhaps the human mind is something more than simply the workings of the brain, of over-adapted muscle matter. Perhaps it is part of something else, some larger, universal consciousness to which we are all connected. We are all one fluid mind, and have only to realize it. . I suppose I am trying to believe in that.” As the horrors experienced by both Jekyll and Hyde (not to mention those around them) escalate toward the end, it’s impossible not to feel sympathy for the creature. But overall, the story merely clarifies what Stevenson already, and brilliantly, hinted at in the original. Sometimes too much explanation is just too much.
<urn:uuid:d6d0829d-fd54-4d2c-856b-f2ec69468728>
CC-MAIN-2017-04
http://www.chieftain.com/entertainment/books/2478737-120/jekyll-levine-hyde-stevenson
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00078-ip-10-171-10-70.ec2.internal.warc.gz
en
0.937785
728
1.59375
2
Barack Obama did what the Minnesota Timberwolves could only do twice this season. He filled the Target Center. An estimated 20,000 people attended the afternoon event. Most of the seats were filled and hundreds stood on the floor watching Obama deliver a nearly hour long speech. "Thank you Minnesota!" he said as he looked at the audience. "Wow! This is a pretty good crowd!" Obama invoked Martin Luther King, John F. Kennedy and even the late Sen. Paul Wellstone. He told the audience that he inherited Wellstone's desk when he came to the Senate in 2005. His speech focused on his key campaign theme -- change. Obama used the word at least two dozen times during his speech, much to the delight of the crowd. He said he was the candidate promoting change before it became popular. "This change thing must be really catching on because I notice everyone is talking about change," he said. "Mitt Romney has change on his signs. George Bush, for all I know, he's for change. But see, we're not interested in change as a slogan. We want change we can believe in and that has to be earned." Obama said, if elected, he would work to reduce global warming, lower the cost of health care and make college more affordable. He said he would roll back the Bush tax cuts on the wealthy and give those tax breaks to the middle class. He disavowed lobbyists, saying their influence in Washington would be weakened if he was elected President. Obama also criticized the war in Iraq, saying he opposed the war from the beginning -- a direct criticism of Hillary Clinton who voted to authorize military action against Saddam Hussein. Obama said the war will end up costing too many American lives and trillions of dollars - money he said could have been better spent in this country on schools, bridges, worker retraining and broadband lines in rural communities. "We should have never gone into that war," he said. "And I will end that war when I'm president of the United States and I will bring our troops home in 2009." Obama is still in his first term in the U.S. Senate. He said the pundits are questioning whether he is seasoned enough to be president and suggesting he needs a few more years in Washington. "But you know, the American people, I think they're rejecting that argument because they realize the biggest gamble would be to have the same old folks doing the same old things over and over again and somehow expecting a different result," he said. Obama urged the entire crowd, a mix of young and old, black and white, to caucus for him on Tuesday night. He said he relied on college students, independents and even a few Republicans to help him win the Iowa caucuses. When he brought up how a few Republicans in Iowa would quietly whisper to him that they would vote for him, Armando Gutierrez stood up and yelled "I'm a Republican and I support you." Guitterriez, of Mendota Heights, later said that he's backing Obama because he's working to end the divisiveness in Washington. "As I continue to hear his message and sincerity in the way he delivered it and it really just hit home for me," he said. "And I do believe the politics is for all of America not just for two parties." The event at the Target Center felt like a rock concert. In fact, a band entertained the crowd as they filed into the event. By 11:30 a.m., a line already wrapped around the Target Center. The first supporter was standing in line a full six hours before the doors opened to the public at 1:30p.m.. The first group of supporters in line were mostly under the age of 25, all calling Obama their candidate. The Obama campaign put some of those waiting in line to work. A campaign spokesman said they gave some of the supporters cell phones to make get out the vote calls to potential supporters. Republican Mitt Romney was also in the Twin Cities on Saturday, and Democrat Hillary Clinton was scheduled to hold a rally at Augsburg College in Minneapolis on Sunday. Republican Ron Paul scheduled a rally at the University of Minnesota on Monday evening.
<urn:uuid:7651d158-8a32-45f1-be1d-6a34938b9803>
CC-MAIN-2017-04
http://www.mprnews.org/story/2008/02/02/satsweep
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00190-ip-10-171-10-70.ec2.internal.warc.gz
en
0.982645
856
1.585938
2
Server virtualization has recently been gaining attention in networking circles because it gets you more bang for... By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers. the buck by making it much easier to consolidate servers. There are many benefits associated with server virtualization, but there are also a couple of drawbacks you need to consider. In this article, I will introduce you to the concept of server virtualization. As I do, I will explain what virtualization is and how it can benefit you, and I will also talk about some of the issues that you will need to watch out for. Why use virtualization? The basic impetus behind server virtualization is that many servers are underutilized. Today's physical servers often include multiple processors, each containing multiple CPU cores. They also tend to offer lots of memory, and insane quantities of disk space. While some servers need these types of resources, others don't. If you're running a simple application, there is a good chance that the vast majority of a server's power is not going to be utilized. Virtualization allows you to consolidate multiple servers into a single physical server so that you can reduce the number of physical servers required by optimizing the resources of the server you are using. Server virtualization is different from just installing multiple applications on a single server. If you were simply to install multiple applications onto a single server, running a single operating system, there are lots of issues that you would need to plan for. For example, it would be critical that the applications not interfere with one another. Some applications simply cannot run side-by-side. Server virtualization works by using the server's primary operating system as a host operating system. This host operating system runs a virtualization product, which in turn supports the use of virtual servers. Each virtual server runs its own operating system that is completely independent of the host operating system and other virtual servers that may be running on the host operating system. I've already mentioned that many application servers tend to underutilize the resources that they have available, and server virtualization helps the available resources to be better utilized. There are many other benefits to virtualization, though. The benefits of server consolidation 1. Save on utility bills First, let's talk about server consolidation itself. Server consolidation usually leads to significant cost savings for several reasons. For starters, utility bills often decrease because there aren't as many servers drawing power. Likewise, the air conditioner won't have to run as hard to keep all of those servers cool, because less heat is being generated. 2. Reduce hardware maintenance costs Another benefit of server consolidation is that hardware maintenance costs are reduced. Over time, parts of servers inevitably fail and need to be replaced. Having fewer servers means fewer potential failures and lower maintenance costs related to hardware failures. 3. Reduce server deployment costs Server virtualization can also greatly reduce server deployment costs. In the case of Microsoft's Virtual Server 2005, each virtual machine is assigned a virtual hard drive. The entire virtual operating system and the applications running on it are all contained within this virtual hard drive. The virtual hard drive isn't a volume on the physical hard drive, however, but a file. Like any other file, a virtual hard drive file can be easily cloned. 4. Eliminate hardware compatibility issues Virtual servers are completely unaware of the actual hardware available on the physical server. Virtual Server 2005 uses hardware emulation. With hardware emulation, every virtual server sees the same underlying hardware, regardless of what physical hardware is actually present. This means that hardware considerations, at least from the standpoint of compatibility, become completely irrelevant. 5. Ensure consistent Windows configuration across servers Virtual servers can reduce your deployment costs because you can easily create a virtual hard drive, install Windows on it, and then clone that virtual hard drive. Any time you need to deploy an additional virtual server, you can start with a clone of the virtual hard drive. Not only does this free you from having to install Windows every time you deploy another server, it also ensures that Windows is configured in a consistent manner for each of your virtual servers. 6. Simplify disaster recovery Just as Virtual Server 2005 reduces deployment costs, it also has the potential to make disaster recovery significantly easier. As I mentioned before, virtual machines are not aware of the underlying hardware. This means that you can easily move virtual machines from one physical server to another without having to worry about compatibility issues. 7. Support legacy applications In a lot of real-world deployments, virtual hard disks exist on a storage area network. Should a physical server that is hosting virtual machines fail, another server can be brought online and can quickly and easily take over the job of hosting the virtual machines. There are many ways of implementing this type of functionality, but in almost every case, disaster recovery time can be reduced to a matter of minutes. Another thing that virtual servers are useful for is supporting legacy applications. Oftentimes, organizations will keep aging hardware on hand because they are running a legacy application that cannot function on newer hardware. In some cases, these types of applications, and even the operating systems that they run on, function very well in virtual environments because of the way virtual servers emulate hardware. Not every legacy application will work in a virtual environment, though, so it is important to do testing before moving a critical application to a virtual server. There are a few issues you need to be aware of if you're considering switching to a virtual server environment. The biggest issue is hardware utilization. Because there are a couple of layers of abstraction between a virtual machine's operating system and the physical hardware, a virtual machine will never run as quickly or as efficiently as a physical machine. Also, because multiple virtual machines are going to be sharing the physical hardware, it is extremely important to make sure that the physical hardware is up to the job. This means making sure that your physical server has as much memory as possible, a high-speed disk array, and as many CPU cores as you can get away with. It also means, though, that you need to put some serious thought into which machines you want to consolidate into a virtual environment. Not every server is a good candidate for virtualization. For example, Exchange Server tends to be extremely resource intensive and therefore would not be a good candidate for virtualization. On the other hand, most DNS servers and DHCP servers are vastly underutilized. These are often perfect candidates for virtualization. In Part 2 of this series, I will continue the discussion by answering many of the frequently asked questions about virtual servers. About the author: Brien M. Posey, MCSE, is a Microsoft Most Valuable Professional for his work with Windows 2000 Server and IIS. Brien has served as CIO for a nationwide chain of hospitals and was once in charge of IT security for Fort Knox. As a freelance technical writer, he has written for Microsoft, CNET, ZDNet, TechTarget, MSD2D, Relevant Technologies and other technology companies. You can visit Brien's personal Web site at www.brienposey.com.
<urn:uuid:6eeb80ae-6266-4947-899b-3c1696a36f52>
CC-MAIN-2017-04
http://searchnetworking.techtarget.com/tip/Server-virtualization-basics-for-network-pros
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00231-ip-10-171-10-70.ec2.internal.warc.gz
en
0.946078
1,465
2.15625
2
The Old West Den Schofield's depictions of the 19th century west represents the most dynamic and dramatic time of change in the United States history. This period was transformed from total wilderness to the beginning of the development of the automobile. Each painting was created with its historical background in mind. His works are primarily original oil paintings and illustrations. Original artwork as well as limited and open edition prints are available for purchase.
<urn:uuid:5db18607-90dc-4ddd-81c4-552dcfa25df2>
CC-MAIN-2017-04
http://www.denschofield.com/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282140.72/warc/CC-MAIN-20170116095122-00132-ip-10-171-10-70.ec2.internal.warc.gz
en
0.97339
85
1.539063
2
The prospect of treating cancer is daunting for any patient—especially so if the person is diagnosed with late-stage cancer. One of the best ways to help catch the disease before it progresses or spreads is through regular cancer screening. What is a cancer screening? A cancer screening is a type of evaluation that looks for potential signs of cancer before a person develops symptoms. This can be particularly effective, as symptom development may not arise until the cancer has progressed and may be harder to treat. By looking for and diagnosing cancer through early screening, patients stand a much better chance at surviving and thriving after a diagnosis. What does a screening look like? Now that you’ve answered what is a cancer screening, you may wonder what it entails. There are many different types of screenings and they can be employed separately or together, based on the patient’s medical history and risk status. A physical exam may be the most common and involves a physician closely examining the patient’s body to look for anything unusual while also taking a history and learning about the patient’s habits or other problem areas. Other screening procedures involve lab tests, imaging, and genetic tests, all of which can flag potential signs of cancer. Should I get a cancer screening? Those who have a risk for cancer should consider regular screening. For instance, patients who have survived cancer or who have close relatives who have been diagnosed are advised to be screened periodically. Similarly, smokers, those with blood clots, patients with genetic mutations, and those who are of advanced age are also prime candidates for regular cancer screening. Cancer screening may sound like a formal and perhaps intimidating process but it can actually be quick and painless—and can provide life-saving results. Speak with your doctor to evaluate your risk for cancer and, if you do have any factors, build cancer screenings into your routine care. A cancer diagnosis is not something anyone wants to plan for, but by being proactive and taking some simple steps to evaluate your health, you can get ahead of any potential problems. Diagnosed with Cancer? A Life Credit Living Benefit Loan Can Help. A Life Credit Living Benefit loan allows you to borrow against the death benefit of your policy. If you’ve been diagnosed with cancer, explore all of the possibilities to ensure your financial future, and your family’s security, are both protected. Contact Life Credit Company today.
<urn:uuid:3db13497-0620-4cae-a2fb-4c3f62bb4625>
CC-MAIN-2022-33
https://lifecreditcompany.com/the-importance-of-cancer-screenings/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00066.warc.gz
en
0.956265
491
2.609375
3
Link wheel and its purpose Hi , kindly tell me that what is the meaning of link wheel and what is the purpose of it. Link wheel technique is very useful to improve search ranking and visibility on search engines. Most important benefit of link wheel is to generate traffic on targeted website. Link wheel is the collection of website that all are connected to each other to get more traffic. It helps to create quality back links if we use higher authority sites. The linkwheel is a godsend for website owners and marketers who want to be visible to a large number of people in order to sell as well as promote their product. A linkwheel works more or less on the principle of franchise as the main or the head URL is located at the center of the system and a whole network of Web 2.0 sites is created around the keywords, providing the reader with many reference points. Now, the various advantages of the linkwheel should be explained in details. The people who design and frame new websites understand the fact that a linkwheel placed in the correct location can help them to build a good reputation. The advantages can be summarized: Targeted Audience: When a site owner wants to build a stream of viewers for there website, they must look at building a good readership of the contents in that specific site. A linkwheel should be placed in popular and relevant sites so that the viewers can easily reach it. A Great way to gain Visibility: A certain portion of the viewers are always in search of fresh and good content. When one of such viewers land on a page with proper and interesting content, it gets pretty easy to attract even more visitors. With word of mouth publicity or with the help social networking sites a lot of fresh visitors are guaranteed for that site. The social bookmarking sites like digg or stumbleupon also play their part in this whole process of publicity. A linkwheel thus creates many indirect ways of publicity, which contribute in gaining Credibility. Keyword Domination: The most exciting feature of using a linkwheel is to display one’s content specific to a keyword such that anyone in search for content closely related to the keyword is directly connected to a page which not only provides them with the information but also being a part of the wheel, gives alternatives and no matter how much the person wants to research about the keyword, it all heads back to the Main Site. Economical Mode: In today’s busy world, nobody has the time to build links in hundreds or thousands of websites. They obviously will look for better, easier and less time consuming methods. For these factors, linkwheels are more favorable for most webmasters. The use of a linkwheel is extremely easy as well as less time consuming. Time compares with money these and linkwheels are economical in both senses, less time consuming to construct and at the same time, a lot cheaper as well. Answers Exact needs of Customers: The growing use of the linkwheel has also proved to be a great relief for those people who are always in search of good as well as unique content for their updates and a lot of other things as well. Earlier, if a person wanted to get some information on any topic of there desire, they would have to find various websites in order to get the content they were after, but that has changed with the advent of linkwheels. Today, if a person wants to get some information regarding the topics of his desire, all he has to do is to type the topic in the search box of a famous URL with a linkwheel. In less than few seconds, a page shows the list with a great number of links that are related to the topic typed by the person requesting the information. Google Juice: Since linkwheels comprise web 2.0 sites and are targeted towards specific keywords, the whole campaign rides on the good reputation and rankings of Web 2.0 sites and a well constructed linkwheel often gets quick rankings. *** spam signature deleted by moderator - please do not put it back *** Link wheel is a method of link building it is done using many methods of link building but mainly you can use web 2.0 and social bookmarking sites as well. Users Browsing this Thread There are currently 1 users browsing this thread. (0 members and 1 guests)
<urn:uuid:e799eb2e-a47c-4533-aa1c-a097362e6197>
CC-MAIN-2017-04
http://www.webdeveloper.com/forum/showthread.php?278361-Link-wheel-and-its-purpose&p=1269559
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00164-ip-10-171-10-70.ec2.internal.warc.gz
en
0.963079
881
1.867188
2
13.95 In Stock Strange things are happening at McQuarrie Middle School in the opener to the New York Times bestselling series from Tom Angleberger! It takes the wisdom of Yoda to survive the sixth grade. Meet Dwight, a sixth-grade oddball. Dwight does a lot of weird things, like wearing the same T-shirt for a month or telling people to call him "Captain Dwight." But Dwight does one cool thing. He makes origami. One day he makes an origami finger puppet of Yoda. And that's when things get mysterious. Origami Yoda can predict the future and suggest the best way to deal with a tricky situation. His advice actually works, and soon most of the sixth grade is lining up with questions. Dwight's friend Tommy wants to know how Origami Yoda can be so smart when Dwight is so clueless. Is Yoda tapping into the Force? This is Tommy's case file of his investigation into "The Strange Case of Origami Yoda." Includes instructions for folding your own Origami Yoda. Related collections and offers About the Author Applying for a job as a newspaper artist, Tom Angleberger was mistakenly assigned to cover local government meetings. Fifteen years and countless town council meetings later, he is still writing instead of drawing, currently as a columnist for the Roanoke Times in Roanoke, Virginia. He began work on his first book while in middle school. Tom is married to author-illustrator Cece Bell. They live in Christianburg, Virginia.
<urn:uuid:4b85c991-2d29-47ce-ade6-530db55f4a8e>
CC-MAIN-2022-33
https://www.barnesandnoble.com/w/strange-case-of-origami-yoda-tom-angleberger/1100191862;jsessionid=3949AB7B7507D689E710FE6F6A713695.prodny_store01-va14?ean=9780810984257
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00071.warc.gz
en
0.954413
317
1.78125
2
I recently finished the Silo series by Hugh Howey, a self-published collection of novellas that details life in a near-future, post-apocalyptic world where all that remains of humanity has been stuffed into subterranean silos. It has a great plot with some fun twists and plenty of details to keep the hacker and sci-fi fan entertained. One such detail is nanorobots, used in later volumes of the series as both life-extending tools and viciously specific bio-weapons. Like all good reads, Silo is mainly character driven, so Howey doesn’t spend a lot of eInk on describing these microscopic machines – just enough detail to move the plot along. But it left me wondering about the potential for nanorobotics, and where we are today with the field that dates back to Richard Feynman’s suggestion that humans would some day “swallow the doctor” in a 1959 lecture and essay called “There’s Plenty of Room at the Bottom.” Continue reading “Swallow the Doctor — The Present and Future of Robots Inside Us” Most people use pacemakers to, you know, keep their heart pumping at a steady rhythm. [David Prutchi] on the other hand has found a pretty novel use for some of the old pacemakers he has in his collection. We really had no idea that pacemakers had uses outside the world of medicine, but [David] has taken advantage of their reliability in one of his favorite hobbies – high speed photography. In a darkened room, he set up an infrared barrier which feeds its signal to the atrium input of an old pacemaker. The signal is relayed through the ventricular output, which then fires his camera’s flash. The pacemaker allows [David] to set an “AV” delay, which is the interval between when the atrium input receives an electrical impulse and when that signal is repeated from the ventricular output. This allows him to finely tune how much time elapses from when a drop of milk breaks the IR barrier to when his flash actuates. We think this is a pretty cool way to reuse an old pacemaker, but check out the shots he has captured and judge for yourself. A collaboration of various medical researchers in the academic field has led to proof that pacemakers can be remotely hacked with simple and accessible equipment. [Kevin Fu], an associate professor at the University of Massachusetts at Amherst, led the team. [Kevin] first tried to get documentation from the manufacturers, believing they would support the effort, but they were not interested in helping. They were forced to get access to an old pacemaker and reverse engineer it. They found that the communication protocol used to remotely program the device was unencrypted. They then used a GNU radio system to find access to some of the machine’s reprogrammable functions, including accessing patient data and even turning it off. Although this was only done with one particular pacemaker, it proves the concept and should be taken seriously by the medical companies who produce these devices. If you are interested in the technical aspects, check out the paper the team released in May disclosing the methods.
<urn:uuid:4e4a14f6-c8b8-4cfb-b68b-839a37ee868a>
CC-MAIN-2016-44
http://hackaday.com/tag/pacemaker/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719215.16/warc/CC-MAIN-20161020183839-00199-ip-10-171-6-4.ec2.internal.warc.gz
en
0.967306
667
2.46875
2
Daniel Shakhmundes’ SEO Checklist is used internally for his clients and projects. Consider this as a best-practices guide for increasing the visibility of websites on the internet. Allows Search Engine Spiders/Crawlers to determine what portions of your website may be indexed. Even if an entire website is meant to be publicly indexable and searchable, welcoming them at the doorstep implicitly may improve ranking. robots.txt should be placed at the root of a website. Here’s the robots.txt file & address/URL for Shak.WS: http://shak.ws/robots.txt - Code & Programming Quality Does your website conform to the World Wide Web Consortium (W3C) specifications? Their Quality Assurance Toolbox has the tools you need to validate conformance with the standards authority itself. Search engine spiders/crawlers appreciate high quality code & programming, because it makes websites easier for them to digest, but it also ensures that they absorb all content without omissions or errors. Don’t be surprised if this property/characteristic is used in ranking websites. - Know Your Stats (Correctly) Metaphorically speaking, you certainly must have your fingers on the pulse of your website traffic statistics. How else would you know whether your SEO is working and identify what efforts are successful? There are at least two important aspects to knowing your stats correctly: A) Implementation of traffic analytics tools – we recommend using at least two, for confidence in your results – sometimes different tools pick up different things. B) Identify junk traffic and strive to eliminate it – protect your forms from spammers using a tools like CAPTCHA, and ensure that your web-server is secure against brute-force communications – junk traffic may be hackers’ attempts at compromising your website’s environment (intrusion attempts to access any non-public information), and spammers looking for ways to send their junk email through your website and areas they can post their spam links. Junk traffic will only skew & distort your statistics, in addition to raising the risk of even more detrimental consequences.
<urn:uuid:a2f28b3f-8cd6-4680-8cb5-838996f2d34d>
CC-MAIN-2022-33
https://w.shak.ws/guides/seo/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00479.warc.gz
en
0.891127
445
1.898438
2
The Second Circuit Court of Appeals issued an opinion this week the likes of which no American court has written before. It likely marks the start of a new kind of jurisprudence affirming the value of street art and confirms a dramatic cultural shift that began in the late 20th century. “We hold that the district court correctly determined that temporary artwork may achieve recognized stature so as to be protected from destruction by [the Visual Artists Rights Act] VARA and that [the artists’] work had achieved that stature,” the opinion states. The ruling affirmed a landmark 2018 decision awarding street artists $6.75 million in damages for the willful destruction of 45 works of aerosol art in Long Island City, Queens that were displayed on the walls of a building known as 5Pointz. The person who destroyed the works, New York real estate developer Gerald Wolkoff, had once been a patron of graffiti artists, allowing them to use his derelict buildings as a canvas. For 20 years, artists painted and visitors from around the world came to enjoy an ever-changing exhibit in an otherwise forgotten part of the city. Ironically, in great part thanks to the graffiti—which is often prosecuted as criminal mischief in other contexts—the neighborhood around 5Pointz in time became hip and property values rose dramatically. Wolkoff decided to turn his warehouses into condos. In 2013, the developer whitewashed 5Pointz while a suit for the right to salvage the art was pending. Now, a federal appeals court has affirmed that no mistake was made when the lower court found Wolkoff owes prominent street artists damages for his “willful” destruction of work that was recognized by art experts and city dwellers as culturally valuable. The 5Pointz case was the first graffiti matter to be tried under the Visual Artists Rights Act. Federal district court judge Frederic Block—a novelist and musician in addition to being a jurist—awarded the maximum amount of statutory damages based on Wolkoff’s bad faith, granting $150,000 for each of the 45 works, for a total of $6.75 million. The artists’ victory was considered a big win for graffiti, not only legally. It was irrefutable evidence that the form had graduated, achieving stature as high art. Individual works—however fleeting—rose in the culture’s estimation, making the artists universal darlings, beloved by museums, galleries, auction houses, and people the world over. The appeals court just affirmed that stature doesn’t depend on a work lasting—not culturally or statutorily—writing yesterday, “Wolkoff contends that the great majority of the works in question were temporary ones which, for that reason, could not meet the recognized stature requirement. We disagree. We see nothing in VARA that excludes temporary artwork from attaining recognized stature.” The opinion points out that street artist Banksy is known globally and works on walls subject to overpainting and destruction, just like the 5Pointz artists, yet that has in no way diminished his influence. “Famously, Banksy’s Girl with a Balloon self‐destructed after selling for $1.4 million at Sotheby’s, but, as with Banksy’s street art, the temporary quality of this work has only added to its recognition,” the Second Circuit writes. Still, if Wolkoff decides to appeal to the Supreme Court, the developer may well find the bench is more sympathetic to the woes of property owners, or so predicts New York copyright attorney Sam P. Israel. He represents street artists in intellectual property disputes. Israel believes in protection for graffiti and says VARA has already helped to provide it. However, he has little faith in the justices’ ability to appreciate the role of street art in the culture or discern great postmodern works. ”Their idea of art is probably ‘Whistler’s Mother’ in poster form,” the art attorney says disdainfully, referring to an austere and somber 1871 painting by James McNeill Whistler that is anything but avant-garde. The 5Pointz trial was a first-of-its-kind case that to some extent depends on taste, so Wolkoff could argue that it’s made-up law, essentially. A petition for review might be granted if the high court sees a slippery slope in the making and the justices indeed have the “prosaic” tastes Israel imagines. The art attorney approves the Second Circuit’s decision but is pessimistic. “If it goes to the Supreme Court, there’s a really good chance it’ll be reversed.”
<urn:uuid:4212a54d-aefb-4605-ae85-6472768030f6>
CC-MAIN-2022-33
https://qz.com/1806323/5pointz-graffiti-has-officially-made-a-lasting-mark-on-the-law/amp/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.963789
985
2.203125
2
So You're Going To Meet The Pope ... A Primer On The Pontiff You probably won't be one of the few souls to meet Pope Francis on his visit to the U.S. next week. But hey, it could happen, and if it does, don't you want to be ready? Here's a primer on what you need to know so, at the very least, you'll be well-prepared for small talk about him, if not to him. The pope is never introduced. He literally is a man who needs no introduction. (You, of course, ought to be introduced by somebody.) When you speak to him, you address him as Your Holiness. (If you happen to find yourself in a sea of high-level Catholic clergy and are wondering what to call everyone, cardinals are Your Eminence, and bishops and archbishops are Your Excellency.) As for his symbolic fisherman's ring, which some kneel and kiss as a sign of respect: If you're not Catholic, there's no expectation whatsoever that you kiss the ring. And even if you are Catholic, it's not required: Vice President Biden dispensed with the practice two years ago, giving the pope a handshake instead. That's totally acceptable — especially with Pope Francis, who tends not to stand on ceremony. He has a habit of embracing people, bowing to them — or, when cardinals bend to kiss his ring, bending to kiss theirs back. Pick A Language Want to practice your language skills? Pope Francis is trilingual and then some: He speaks fluent Italian, German and Spanish, plus a bit of English, French and Portuguese, according to The Telegraph. He also knows his way around Latin, of course — it comes with the job. Not impressed yet? He also studied chemistry and worked as a chemist: So in addition to being able to greet you in six languages and celebrate the Mass in a seventh, he could also school most of us on science. Safe Topics For Small Talk Odds are you won't get much more than a handshake and a sentence. But in the extremely unlikely event that you and the pope get stuck on an elevator together, here are some promising conversation starters: Music. The pope's a big fan of Bach, Mozart and Beethoven. There are rumors that when Patti Smith played the Vatican, she did so at Francis' personal invitation — so there's a very real possibility he's fond of punk. And he penned a song himself: "Para que todos sean uno," or "So We Can All Be One." Sports. The pope played basketball as a kid, but mostly he's a big soccer fan — he's Argentine, after all! He's a supporter of Argentina's San Lorenzo team. It has a game on Sunday, so you can commiserate or celebrate, depending on how that goes. Last month, the New York Red Bulls signed away a San Lorenzo player named Gonzalo Veron, so if you're feeling really brave, you could gloat about that. Movies. Are you an expert on Italian neorealist cinema? If so, you're in luck! The pope's favorite movie is La Strada, by Federico Fellini. Chat away. Food. The pope cooks his own meals, but he's not a food-obsessive, as NPR's The Salt blog has previously reported. His meals, like other parts of his life, tend toward humility and simplicity. But he does long for pizza, so you might have that in common. (One pizza place in Naples even managed to hand-deliver a custom pizza to the popemobile.) And according to a Vatican cookbook, he's also fond of empanadas and dulce de leche. Literature. Pope Francis has said he loves Russian novelist Fyodor Dostoevsky, German poet Friedrich Hoelderlin and Italian poet and novelist Alessandro Manzoni. He also likes Gerard Manley Hopkins, an English poet (and, like the pope, a Jesuit) who brought experimental forms and sounds to Victorian poetry. So you can try chatting about your interpretations of Crime and Punishment, or Hopkins' creative use of adjectives in lines such as "Towery city and branchy between towers; / Cuckoo-echoing, bell-swarmèd, lark charmèd, rook racked, river-rounded." Dancing. He used to love to tango — and had a girlfriend he went dancing with in his youth. It would probably be frowned upon by security for you to ask him to cut the rug for a moment, but he might enjoy reminiscing about it. What Shouldn't You Bring Up? You also might want to stay mum about your enduring love for your pets. The pope's predecessor Benedict XVI was a noted cat lover and kept pet cats at the papal retreat (they weren't allowed in his apartment at the Vatican). But Pope Francis (who did NOT say pets can go to heaven, as some outlets reported) doesn't seem to be a fan of furry companions. Last year he scolded married couples for raising pets instead of having children: Choosing to have cats or dogs instead of procreating can lead to "the bitterness of loneliness" in old age, said the then-77-year-old man who has sworn a lifelong vow of chastity. This year, he said the affection between humans and their pets was like "programmed love." "I can program the loving response of a dog or a cat, and I don't need the experience of a human, reciprocal love," he said. "I'm exaggerating," he said immediately afterward — but that part didn't sink in for many irate pet owners. In short, don't ask him to praise your love for your feline or canine companions, and you probably shouldn't gift him a kitten. (Although he did once cheerfully receive some donkeys.) Nice ... Uh ... Cape, Your Holiness Stumbling over what to call the pope's attire? If he's meeting, greeting or traveling, he's probably wearing his everyday clothes: If the pope is leading Mass, he will be draped in formal vestments. In general, Pope Francis' attire tends to be downright ascetic by pope standards — silver cross, instead of gold; plain fascia, instead of one emblazoned with his coat of arms; a simple mitre, sans gold and jewels; plain black shoes, instead of red; a zucchetto, instead of a fancier hat option — and no mozzetta, or ermine-lined cape. If you're dying to comment on his outfit to your neighbors, you don't have to know a ferula from a fascia to say, "He dresses so simply. Look, not a jewel in sight!" (For your part, when you're meeting the pope, you don't have to wear anything special or fancy — just dress modestly.) Did The Pope Make A Mistake? Call you by the wrong name, misidentify the city he's in? He's allowed. The idea of papal infallibility is not that the pope is incapable of erring — it refers rather narrowly to times when the pope makes an official declaration on faith or morals while acting in his capacity as head of the church. It's also rarely invoked. Did You Make A Mistake? Accidentally address the pope by name, instead of as his holiness? Try to chat about new TV shows? Convince yourself he spoke Russian? Call his zucchetto a zucchini? Forget you were meeting the pope, and wear your most revealing outfit? The pope is pretty well-versed in concepts of grace and forgiveness. Copyright 2021 NPR. To see more, visit https://www.npr.org.
<urn:uuid:e45dad12-9899-4947-8809-0818924cbfc2>
CC-MAIN-2022-33
https://www.kpcw.org/2015-09-20/so-youre-going-to-meet-the-pope-a-primer-on-the-pontiff
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572304.13/warc/CC-MAIN-20220816120802-20220816150802-00479.warc.gz
en
0.973612
1,644
1.84375
2
Standing 18 meters (or 46 feet) tall, is an awesome new tree sculpture made of 80 different types of fabric. The Baobab Tree, created by Pirate Technics, was inspired by Africa’s baobab tree, which is the oldest living specimen in Africa and has long been a symbol for community. Rings about 16 feet wide were used to build the tree before it was wrapped with fabric. It sits outside the Southbank Centre in London, England. “During the summer, thousands of people will gather in London and visitors from across the globe will be stepping closer to one another,” said Creative Director Beatrix Eden of Pirate Technics. “Inspired by the idea of the space between strangers becoming smaller we created the Baobab Tree as a unique meeting place for chance encounters sparking new conversations. Every culture uses fabrics and patterns, whether in traditional dress, uniform or decoration. Fabrics have always traveled, designs crossing borders, being altered and traded back. Within the fabric of our tree we hope that visitors will recognize threads from their own cultures woven into this meeting place at the heart of a global gathering.” It is expected that millions of visitors will see this sculpture in London this summer.
<urn:uuid:b72479f1-de15-4358-8daf-4da85faaf3f4>
CC-MAIN-2017-04
http://mymodernmet.com/pirate-technics-baobab-tree
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00570-ip-10-171-10-70.ec2.internal.warc.gz
en
0.953937
251
2.28125
2
Volunteers dig in to summer reading program June 18, 2013 Douglas County School Board member Neal Freitas was volunteering as a “shelver” at the Douglas County Public Library when he first became aware of the summer reading program. “It was all about the volume of books I was re-shelving,” the retired intermediate school principal recalls. “Instead of it taking one hour, it suddenly was taking me two and one-half hours. That told me kids were checking out all kinds of books, and I thought that was pretty neat.” This summer Freitas joins a dozen other library volunteers who are registering children ages 1 to 11 for the “Dig Into Reading” component of the program, and encouraging 12-to-17-year-old readers to sign up for “Beneath the Surface” activities. Registration began June 3 and the program continues through the end of July. Related activities during the next two months include a dinosaur hunt at the Zephyr Cove branch, composting “worms on tour” at two local parks, a puppet theater, and dazzling displays of rocks and minerals. Young readers receive a program booklet where they can record the titles they read, as well as reading-related activities. Toddlers, for example, get credit for having someone read a board book to them or for playing a finger game with them. Older, independent readers can read to someone else or tell someone about a favorite book they’ve read. All activities are rewarded with prizes, and a free glider ride will be raffled off as the grand prize. The kick-off event for the summer reading program was held at the CVIC Hall in Minden on June 11. Magician Larry Wilson shared performing secrets, and the Douglas County Library Foundation hosted an ice cream social. Books were on sale all afternoon from Usborne Books. The school board’s Freitas can remember the name of the first librarian who introduced him to the worlds available in books: Helen Whitaker. “I was something of a challenge, but she would sit us down and read to us, and I was captivated,” he says. “They didn’t have to worry about me pulling anyone’s pigtail” Summer reading program volunteer Duncan Deacy, the youngest in a family of seven children, had to find his own way to the library. “By the time I came along, my parents were too exhausted to take me,” the second-grade teacher recalls. But Deacy kept returning to the library, especially in the summers, and developed an interest in non-fiction, how-does-that-work? titles. He also made time for wonderment on his book lists, and he and his wife, library director Linda Deacy, read Margaret Wise Brown’s “Goodnight Moon” to their young son more times than he wants to remember. As a volunteer for the summer reading program, Deacy says that handing out prizes for books read is one way to recognize and reward the importance of reading. “It’s so important to keep kids reading throughout the summer,” he adds. “Because if they don’t continue reading, they can really regress.” Linda Class seconds that notion. Retired from a 37-year career as a teacher of kindergarten through third grade, Class volunteers at C.C. Meneley Elementary School and with the library’s summer reading program. “As a teacher, I know how important reading is as a skill,” she says. “If kids don’t read during the summer, their reading levels do slip backwards, and beginning readers especially need constant reading.” When Class’ two granddaughters, who live in Idaho, call to “Skype” with her via computer, it’s often to read from their favorite new books. That kind of enthusiasm is what she and other volunteers hope to replicate with the summer reading program. “There are lots of little toddlers in the program now, and it’s such fun to see them come in the door, turn the corner, and just take off for the tub of board books, leaving parents in their wake,” Class says. “We just love seeing them so excited about reading.”
<urn:uuid:d064bde6-775a-4a75-b2b5-896e75d228a2>
CC-MAIN-2016-44
http://www.recordcourier.com/news/volunteers-dig-in-to-summer-reading-program/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720845.92/warc/CC-MAIN-20161020183840-00085-ip-10-171-6-4.ec2.internal.warc.gz
en
0.976635
919
1.765625
2
Presentation on theme: "Pathway Planning: Examining the benefits and outcomes of a Traineeship and Apprenticeship Pathway Program Martin Stalker University of Tasmania Why Pathway."— Presentation transcript: Pathway Planning: Examining the benefits and outcomes of a Traineeship and Apprenticeship Pathway Program Martin Stalker University of Tasmania Why Pathway Planning? - Background Pathway Plan Process and structure Traineeship and Pathway Planning program overview Research Results Under 3% Grade 12 Top Grade 10 Top Why Pathway Planning? Retention rates in Tasmania are nearly 29% below the mainland levels Currently only 14 % of jobs in Australia do not require a post Grade 10 school qualification In Tasmania only 47% of our workforce are currently employed at this level Legislation and Funding to support the concept What is a Pathway Plan ? Grade 8 Plan Grade 9 Plan Grade 10 Plan 2009 High School Leavers (Post Grade 10) Government High Schools AcademyPolytechnicWork UniversityVocationalUni ??? ??? TAPP 2009 Program Construction & Joinery Metals Hair & Beauty Hospitality Cookery Automotive Motorbody Business Administration Children Services Enrolled Nursing Agriculture Tourism/Retail Choice of 14 Course Options Intense Short Courses Full Year Courses Electro technology Civil and Mechanical Drafting What it is significant about the TAPP program Complete Grade 10 Polytechnic Qualifications Workplace opportunity Hands on Learning style How does the TAPP school year look ? Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Term 1Term 2Term 3 What is the weekly structure Monday Tuesday Wednesday Thursday Friday TAP program How Long Polytechnic Commitment Work Experience Applied Learning - 3 days (within the High School) MondayTuesdayWednesdayThursdayFriday Sea FM Bruce Gowans Polytechnic (Devonport) Polytechnic (Burnie) Children Services Technical training Hairdressing Technical training Automotive Work placement Business Admin Work placement Enrolled Nursing Work placement City Medical Practice Full class size (example) - 18 Monday Work Placements - 3 Monday Polytechnic commitments -3 Monday class size due to non classroom learning would be - 12 How does one day in a TAPP week look ? Work Placements Technical Training Core curriculum delivered A typical TAPP day TAPP Growth 1 school 1 course option 12 students 2,300 hours 2 schools 3 course options 36 students 7,000 hours 9 schools 9 course options 136 students 25,000 hours schools 14 course options 213 students 41,500 hours TAFE/Polytechnic training has changed Year 1 Year 2 Year 3 Year 4 Tech Tech Tech Units of Attainment Occupational, Health, Safety and Welfare unit Domestic switching systems level 1 Cable identification unitLighting principles unitVarious units to complete first year Units are identified for completion during TAPP program its ideal now for TAPP Previous Structure Technical training is in a units structure How does this influence the TAP program ? Working on site + What stage could a TAPP student be at in their apprenticeship/traineeship ? First Year Apprentice Units requirement Units already completed Units needed to finish first year During TAPP these units may be completed Employer will decide about who to employ The TAP Program has given us the opportunity to assess the students / knowledge and willingness to move forward. Having the student for longer than the usual work experience placement enabled them to get more of an idea of the day to day procedures and happenings of their chosen career option. Typical Employer Anecdotal Comment Students get to know the job so they are sure they want to do it. Employers get to see if students are employable A great initiative and magnificent program, allowing our youth a meaningful alternative to past teaching methods. Typical Parent Anecdotal Comment The positive impacts on some of the students is their improved attendance and some have become more self confident. Parents have rung and are excited about their children being given the opportunity of gaining an apprenticeship. Typical Teacher Anecdotal Comment 2575 days 1144 days 56% less Absent days comparison Prior to TAPP TAPP Tracking Data after 9 months from Burnie High School (24 students) Apprenticeship9 Year 11 College9 Traineeship2 Employment2 Aust Tech College2 Unconfirmed1 Southern Tasmanian TAPP 26 students entered Stage 3 of the program (paid work placement in summer holiday period), 18 gained apprenticeships or traineeships, 5 continued on in education, 3 became trade assistants. Academic Results 2006 program proved to be successful academically as literacy and numeracy changes clearly show: Literacy standards improved by an average of 27% Numeracy achievement improved by an average 8.5% What should I know now ???? How the TAP program works for a week How the program works over the year What the benefits are from being involved Student outcomes Any Questions ???
<urn:uuid:8aa2fce2-e2f2-4647-b373-a4895d6a13bd>
CC-MAIN-2017-04
http://slideplayer.com/slide/1556857/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281151.11/warc/CC-MAIN-20170116095121-00109-ip-10-171-10-70.ec2.internal.warc.gz
en
0.897354
983
2.234375
2
Lawctopus Law School presents a free webinar on ‘Trademark Law as a Career’ to help law students and young practicing lawyers understand the career prospects available in the field of IPR law. About Lawctopus Law School Since March 2020, Lawctopus Law School has taught a wide range of skills to over 6500 law students, young lawyers, professionals, academicians, and businesspersons. In the last two years, we have transformed how people look at legal education, especially online legal education. Our varied courses are a mix of rigorously researched reading modules, interesting recorded lectures by leading academicians and industry experts, engaging weekly live lectures, and useful assignments (with individual, personalized feedback). Most importantly, our courses are delivered with utmost warmth and care! The average rating for our courses (we are open to independent review) is 92.64/100. Moreover, our open webinars have been attended by over 30,000 people. About the Webinar Willing to pursue a career in Trademark Law but not sure how to enter the industry? Or what one needs to reach the pinnacle and be amongst the well-paid IPR lawyers? Join us for a webinar as we discuss multiple career avenues for a person interested in Trademark Law with an expert who has traveled this road before and has tasted success and all the professional perks. This free and open webinar is being held as a prelude to Lawctopus Law School’s Online Certificate Course on IPR: Law and Practice and Lawctopus Law School’s Online Certificate Course on Trademark: Law and Practice Key Focus Areas of this Webinar - Opportunities in Trademark Research - Trademark Due Diligence - Opportunities in Trademark Litigation - Trademark Strategy and Consultation To ensure that the session is informative as well as interactive, participants can ask questions during the webinar. Details of the Webinar - Date: June 28, 2022 - Timings: 6:00 PM to 7:30 PM IST - Venue: Zoom - Fee: Free Certificates (If Any) No certificates will be provided. Please attend for your knowledge and insights. If you still wish to get a certificate, you can get the same by paying a logistics fee of INR 100 here after the webinar. We will give you the code during the webinar which needs to be filled in this form. Who should Attend? If you are a law student, or young lawyer, who is interested in IPR or specifically Trademark law and wishes to gain an in-depth understanding of this field as a career option. About the Speaker Adv. H.B. Keshava is an alumnus of The University of Petroleum and Energy Studies (UPES), Dehradun and later completed his Masters in Law from Indian Law Society’s ILS Law College, Pune. He is a Degree holder and a Masters holder in Science as well. He started Baskaran Associates with the goal to serve start-ups and young companies in the fields of IPR and Corporate Law. The firm has gone on to serve many MNCs as well. He is also a guest lecturer at many different institutes, universities and colleges in the country.
<urn:uuid:0a4bc987-a817-4b74-ae9d-754edf869fdd>
CC-MAIN-2022-33
https://www.lawctopus.com/free-webinar-trademark-law-lawctopus/?utm_source=lawctopus&utm_medium=timer-ad
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00677.warc.gz
en
0.951606
693
1.570313
2
Authors & Events Apr 17, 2001 | ISBN 9780375726293 Dec 18, 2007 | ISBN 9780307424839 Buy from Other Retailers: Apr 17, 2001 | ISBN 9780375726293 Dec 18, 2007 | ISBN 9780307424839 In 1975, Angola was tumbling into pandemonium; everyone who could was packing crates, desperate to abandon the beleaguered colony. With his trademark bravura, Ryszard Kapuscinski went the other way, begging his was from Lisbon and comfort to Luanda—once famed as Africa’s Rio de Janeiro—and chaos.Angola, a slave colony later given over to mining and plantations, was a promised land for generations of poor Portuguese. It had belonged to Portugal since before there were English-speakers in North America. After the collapse of the fascist dictatorship in Portugal in 1974, Angola was brusquely cut loose, spurring the catastrophe of a still-ongoing civil war. Kapuscinski plunged right into the middle of the drama, driving past thousands of haphazardly placed check-points, where using the wrong shibboleth was a matter of life and death; recording his imporessions of the young soldiers—from Cuba, Angola, South Africa, Portugal—fighting a nebulous war with global repercussions; and examining the peculiar brutality of a country surprised and divided by its newfound freedom.Translated from the Polish by William R. Brand and Katarzyna Mroczkowska-Brand. Ryszard Kapuscinski, Poland’s most celebrated foreign correspondent, was born in 1932 in Pinsk (in what is now Belarus) and spent four decades reporting on Asia, Latin America, and Africa. He is also the author of Imperium, Another Day of Life, and The Soccer… More about Ryszard Kapuscinski ?Despite Kapuscinski?s insistence that ‘the image of war is not communicable.’ He has done just that and done it very well.??Newsweek Visit other sites in the Penguin Random House Network Stay in Touch Start earning points for buying books! Just for joining you’ll get personalized recommendations on your dashboard daily and features only for members.
<urn:uuid:634d6b4b-1421-4fc5-9cf1-41bd5b0a6eac>
CC-MAIN-2022-33
https://www.penguinrandomhouse.com/books/89782/another-day-of-life-by-ryszard-kapuscinski/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00078.warc.gz
en
0.923725
517
1.875
2
Contains 1 Collection or Record: Photo album, “covering the 18 months “I” was overseas [volume 4, includes aerial and formation photographs], November 1943-May 1945 Item — Box: 1, Item: 3 Identifier: Item 3 Scope and Contents From the Series: Gathered here is a wealth of letters Ralph H. Schneck wrote to his family and friends chronicling his time training to enter military service during World War II, his time as a leading bomber pilot flying missions over Germany and reflections on his post-war days. Found among the letters are newspaper clippings, cartoons, post cards, theatre programs and newspaper issues of War Week, Stars and Stripes and ce soir. Post war material includes his parent’s war ration cards, mileage rationing... Dates: November 1943-May 1945
<urn:uuid:0c02b028-7d07-4491-b134-46f064c609e7>
CC-MAIN-2022-33
https://archives.lib.purdue.edu/repositories/2/top_containers/7814?&filter_fields%5B%5D=child_container_u_sstr&filter_values%5B%5D=Item+3
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00267.warc.gz
en
0.958514
181
1.65625
2
Thank you to all who participated and attended our 2005 - 2006 CSS Speaker Series. It was a great pleasure to see so many students, alumni and community members. We will be back at the end of Summer with a whole new line up of guest speakers for our Special 10th Anniversary CSS Speaker Series for the 2006 - 2007 academic year. Please also look for information on our 10th Anniversary Celebration on October 21st at North Creek Cafe. We will be honoring our founding faculty and first graduating class. Invitations and announcements will be posted soon! CSS Speaker Series Coordinator Ten Myths of Rapid Development Steve McConnell, Software Developer The software industry commonly confuses high-energy motion with rapid meaninful progress. Many projects are developed under intense schedule pressure and are still delivered late. This talk explores 10 myths of rapid development, digs into core issues of achieveing short schedules, and explains how to lay the groundwork for truly effective software improvement. The lecture will be based on Steve McConnell's best selling books, "Rapid Development" and "Professional Software Development" The Crayfish & The Computer Dr. Michael Stiber, Associate Professor, CSS Five years past the end of the "Decade of the Brain", our ability to gather information about nervous systems is truly amazing. We can now conduct experiments that generate petabytes of data imaging a human brain as a person thinks. We can record from molecule-sized ion channels in nerve cell membranes. We can modify the genetic code of test animals to custom design their nervous systems for experimental purposes. And yet, for all of our advanced in methods and knowledge about the brain, basic aspects of nervous system function still lay beyond our understanding. In this talk, Prof. Stiber will discuss nervous systems "in the small"; single neurons and networks of a relatively few cells. While incredibly simple compared to a human brain, these small systems are the building blocks of all neural computation. The immense diversity of behaviors that these small systems exhibit; behaviors which could imply computational capabilities far in excess of that which we usually credit them. These capabilities include switching between linear and nonlinear operating modes, dynamically changing operating characteristics over time scales ranging from milliseconds to years, altering molecular or physical structure based on information encoded in the genome, responding to centrally broadcast commands, and even error correction. If the simplest components of nervous systems have such complex capabilities, what does this say for the computational power of the human brain? Trends in Computer Graphics: The End of an Era for the GPU? Dr. Peter Shirley, University of Utah The major success story in special-purpose hardware is the graphics chip (GPU). For some niche applications such as large scale data visualization, parallel software ray tracers are already much faster than the most optimized GPU implementations. However, GPU programs are the only viable choice for most interactive applications. There are three clear possibilities for the future of graphics on the desktop. First is a continuation of z-buffer based GPUs. Second is an emergence of interactive ray tracing running on multicore CPUs. Third is ray tracing using custom hardware (ASIC). This talk examines trends in hardware and application data and argues that ray tracing using custom hardware is the likely winner, and outlines the research problems that will need to be overcome for such an outcome. Security Analytics: Combating Smart Cyber Criminals Ross Ortega, Ph.D., President, GraniteEdge Networks Organizations house their most valuable data on computer networks providing enormous financial incentive for cyber crime. The bad guys are getting smarter and more dangerous with organized crime and terrorist groups becoming major players in internet-based attacks. They understand existing security solutions and therefore how to evade traditional defenses. The best computer crimes are those never discovered so malicious attackers strive to be unseen causing ongoing and nearly perpetual damage. All this is driving a rapid evolution in cyber-security technologies fueled by billions of dollars from companies and governments of all sizes investing in stronger defenses to protect their network infrastructure. The new frontier of security defenses focus upon exposing zero-day or previously unknown attacks. These solutions are built upon complex algorithms, statistical analysis, and packet inspection requiring vast amounts of storage and processing capabilities. Evolving security concepts such as behavior analysis, causality analytics, fingerprinting, and forensics all rely upon cutting edge math and computer science. This talk covers some of the weaknesses of existing solutions and presents the unique approach of causality analysis as applied to network security analytics. Ross Ortega, President and Co-Founder of GraniteEdge Networks: Dr. Ortega has demonstrated a proficiency of identifying markets for sophisticated technologies. As a co-founder of Consystant Design Technologies, he served initially as chief technology officer and later as president and CEO through the purchase of the company's intellectual property by Intel. There, he was instrumental in raising $12.5M and establishing key relationships with Intel and Matsushita. Dr. Ortega received his Ph.D. in Computer Science from the University of Washington and a BSEE from MIT. Previously he was Acting Assistant Professor at University of Washington, Bothell in the Computing and Software Systems Department. A Theory of Variation in Software Development, Architecture and Project Management David Anderson, Agile Management --Keynote Lecture! Traditional software engineering methods are built on an assumption that software engineering is deterministic and can be accurately planned in advance. Recent agile methods rebel against planning and adopt reactive adaptation to change. However, there is a better way - the introduction of a theory of variation into software engineering. By using lessons from Shewhart, Deming and Wheeler, it is possible to create predictive methods for software development, architecture and project management which embrace uncertainty and absorb change gracefully. The result is a system of quality assurance and continuous improvement for software engineering through the reduction of variation. Parallel Job Deployment and Monitoring in a Hierarchy of Mobile Agents Dr. Munehiro Fukuda, Assistant Professor, CSS Grid computing can be considered as a potential application that takes full advantage of code/data mobility and navigational autonomy provided by mobile agents. To prove their applicability, Distributed Systems Laboratory at UW Bothell has been implementing the AgentTeamwork grid-computing middleware system that deploys and monitors a parallelizable job over remote computers in a hierarchy of mobile agents. Its utmost focus is to maintain high availability and dynamic load balancing of distributed computing resources allocated to a user job. For this purpose, a mobile agent is assigned to each process engaged in the same job, monitors its execution at a different machine, takes its periodical execution snapshot, moves it to a lighter loaded machine, and resumes it from the latest snapshot upon an accidental crash. The system also restores broken inter-process communication involved in the same job, using its error-recoverable socket and Java version of MPI libraries in collaboration among mobile agents. Since the project has been carried out with CSS undergraduate research assistants, this talk presents AgentTeamwork's overview, implementation, and performance as highlighting their contribution to each implementation, and performance as highlighting their contribution to each implementation technique.
<urn:uuid:06617fdb-53da-42c2-9527-7b0125e83e51>
CC-MAIN-2016-44
http://www.uwb.edu/css/newsandevents/events/05-06speakerseries
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719784.62/warc/CC-MAIN-20161020183839-00427-ip-10-171-6-4.ec2.internal.warc.gz
en
0.927616
1,440
1.609375
2
All Summer long, swine flu has made it into the headlines on a weekly, if not a daily, basis. This flu was quickly declared a pandemic by the World Health Organization, not because of the number of deaths due to this strain of the virus, but because it spread worldwide with speed. A blogger over at Newsweek wants to add a little perspective to the media coverage of H1N1. Here is some history: In 1967, the last pandemic, caused by the Hong Kong flu, killed 700,000 people. For comparison, in the US so far 447 have died from the swine flu. This round of swine flu virus is similar to a typical flu season, but even a typical flu season comes with fatalities. However, most flu deaths occur because of complications, mostly pneumonia, or due to an underlying chronic condition — diabetes being one. See how seasonal flu deaths compare to heart disease when you Another comparison from Newsweek: seasonal flu is responsible for one in 5000 deaths, while heart disease is responsible for one in 50 deaths per year. But you don't contract heart disease on the subway, which increases the fear factor that accompanies H1N1. That and the fact that this flu targets younger, healthier people. As schools consider plans for closure should the need arise, and as flu vaccines are manufactured, I think we best approach the season with clear heads and clean hands. Hand washing is still considered the best defense against the flu. I say stock up on hand sanitizer now to avoid the rush when flu season hits. Is your fear level about swine flu growing?
<urn:uuid:57120d17-34e7-4623-acf1-c6f5d98ab12b>
CC-MAIN-2017-04
http://www.popsugar.com/fitness/Your-Swine-Flu-Fear-Growing-4193781
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279189.36/warc/CC-MAIN-20170116095119-00053-ip-10-171-10-70.ec2.internal.warc.gz
en
0.970856
328
2.734375
3
Our home was built in 1970 and has a textured ceiling and paneled walls in the living room. We started to remove the paneling, which caused some of the ceiling texture to be scraped off. It then dawned on us that the ceiling texture might contain asbestos. We bought a mail-order test kit and sent the sample to an asbestos lab. The lab reported that the acoustic texture contains 5 percent asbestos. So now we must decide whether to pay an asbestos contractor $3,000 to remove the stuff or simply spray some paint over it. Since we may already have released asbestos into the air in our home, maybe we should go ahead with the expensive removal. What do you recommend? –Jeff The small amount of scraping that occurred at the ceiling edges when you removed the wall paneling is not likely to have created a significant health hazard in your home. Theoretically, some asbestos fibers may have been released. However, the type of asbestos commonly used in acoustic ceiling texture — chrysotile asbestos — is less likely to produce airborne fibers than other forms of asbestos. To determine whether asbestos contamination now exists in your home, you can hire a qualified asbestos consultant to take air samples from your home and submit them to an asbestos lab. If airborne asbestos is found, the amount of contamination is likely to be miniscule, and you can decide at that point whether to pay for professional cleanup of the interior. As for the acoustic texture that remains on your ceiling, spray paint is a common means of encapsulating it. Paint will saturate the texture material and bond the entire surface into a solid crust. Once painted, pieces of the material no longer break off easily when scraped or rubbed. Another common method of encapsulation is to install a second layer of drywall onto the ceiling, thereby sandwiching the acoustic texture between the old and new drywall layers. But this method can cause further release of asbestos fibers when the new drywall is being installed. An important consideration when encapsulating asbestos texture with drywall is disclosure to future buyers of the home. Buyers would need to know that the ceiling contains asbestos, in case future remodeling should involve ceiling demolition. Finally, it is important to weigh the actual risks of low-level exposure to asbestos. It should be noted that short-term, incidental exposures have never been proven to cause asbestos-related diseases. Documented cases of lung disease involving asbestos have involved professionals who were subject to large or prolonged exposures, such as those who mined, manufactured or installed asbestos materials. If you still prefer to remove the ceiling texture in your living room, but want to avoid the high cost of removal, be aware that homeowners can legally remove asbestos materials from their own homes in most states. However, if you choose this approach, be sure to follow all of the EPA guidelines so that the removal will not result in air contamination. And be sure to hire a licensed asbestos abatement contractor for disposal of the material after it has been removed. To write to Barry Stone, please visit him on the Web at www.housedetective.com. What’s your opinion? Leave your comments below or send a To contact the writer, click the byline at the top of the story.
<urn:uuid:32720e8b-b69f-4e86-9593-b75feafbb3f4>
CC-MAIN-2017-04
http://www.inman.com/2008/07/29/should-homeowners-remove-asbestos-ceiling/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00060-ip-10-171-10-70.ec2.internal.warc.gz
en
0.93506
663
2.375
2
HMNS is currently hosting three special exhibitions, two of which are Genghis Khan and Terra Cotta Warriors: Guardians of China’s First Emperor, so the topic for this month’s booklist is soldiers and warfare. Jean Fritz, author of Traitor: The Case of Benedict Arnold, has written numerous books about American history and explains her work: “My approach is that of a reporter, trying for a scoop, looking for clues, connecting facts, digging under the surface.” Because of this, her books bring history alive as she helps students understand the personalities and motivations of the individuals who shaped our country. The first few sentences of Traitor are a powerful and telling introduction to Arnold’s life: “When Benedict Arnold was a teenager, some people in his hometown of Norwich, Connecticut, predicted that he’d grow up to be a success. Others said, No. Benedict Arnold would turn out badly. As it happened, everyone was right.” |photo credit: pwbaker| Fritz introduces you to an Arnold you probably did not know—a druggist and a sea captain who loved shoes but was obsessed with his honor. The Revolutionary War provided a unique stage for Arnold, and he became a general–but made many enemies along the way. In Philadelphia, Arnold met fashionable but spoiled Peggy Shippen, whose father was sympathetic to the British. They were married, but the happy day was clouded by Arnold’s upcoming court martial and increasing financial problems. Arnold began to think that if he “could not win the war for the Americans, he might at least bring the war to an end,” and become a hero. With this thinking, becoming a traitor was not difficult. According to Fritz, Arnold apparently never understood the enormity of his actions. |photo credit: daz smith| Paul Fleischman, author of Bull Run, won a Newbery Medal, as did his author father, Sid Fleischman. After growing up in California, Paul lived in New England, and his love of history grew. “I thought about teaching history as a career, but decided to bring it into my books instead.” Bull Run is a collection of short monologues – so, in addition to being read by individuals, this book is suitable for classes to read aloud. The book has 16 characters, both men and women—one only 11 years old– in sets of 8 from the North and 8 from the South. The characters describe their lives and experiences leading up to and including the Battle of Bull Run, the Civil War’s first major battle. Because of the number of individuals involved, you experience the battle and its aftermath from many perspectives as the characters learn that war is not a game. Newbery Medal winner Avi is one of the most popular authors for children and young adults. The Award-winning book, The Fighting Ground, is a fictional account of a day in the life of 13-year-old Jonathan during the Revolutionary War. Jonathan’s older brother and cousin are soldiers, and his father had been wounded near Philadelphia. More than anything, Jonathan wants to be a soldier, too. When the bell at the town tavern began to ring, Jonathan tricks his mother into letting him investigate what is happening, and as he leaves home, his day-long adventure begins. Jonathan comes to realize that being a soldier is not glamorous, and when he is captured by the Hessians, his journey towards manhood continues as he is exposed to the horrors of war. Many of the titles of Jean Fritz’s books about American history end with a question mark. Will You Sign Here, John Hancock?, What’s the Big Idea, Ben Franklin?, and And Then What Happened, Paul Revere? Perhaps her best-known book is her memoir, Homesick, that tells the story of her childhood growing up in China in the 1920’s and China Homecoming, the story of her return to China years later. Paul Fleischman’s Joyful Noise: Poems for Two Voiceswon the Newbery Medal, but don’t miss Seedfolks and Whirligig. Seedfolks illustrates the power of one person to change a community, and Whirligig is the story of teenage Brent who drives drunk and kills innocent Lea. Lea’s mother asks Brent to put a whirligig that looks like Lea in Washington, California, Florida and Maine, and his journey to fulfill this request leads to his own inner journey. Books by Avi that should not be missed are The True Confessions of Charlotte Doyle, Nothing But the Truth and Wolf Rider. Readers will be fascinated by Charlotte’s adventures on her transatlantic voyage in 1832, including being accused of murdering the ship’s captain. In Nothing But the Truth, high school freshman Phillip Malloy’s humming of “The Star Spangled Banner” sets in motion a series of events which leads to the question, “What really IS the truth?” Wolf Rider has the best opening sentence I have ever read. After reading that sentence, you cannot put the book down.
<urn:uuid:b9f1736c-ab27-4f3e-b92e-104026367b27>
CC-MAIN-2017-04
http://blog.hmns.org/2009/07/book-list-warfare-and-soldiers/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280872.69/warc/CC-MAIN-20170116095120-00308-ip-10-171-10-70.ec2.internal.warc.gz
en
0.971505
1,077
2.421875
2
Modern graphics processing units (GPUs) are an implementation of parallel stream processors. In recent years, there have been a few studies on mapping ray tracing to the GPU. Since graphics processors are not designed to process complex data structures, it is crucial to explore data structures and algorithms for efficient stream processing. In particular ray traversal is one of the major bottlenecks in ray tracing and direct volume rendering methods. In this work we focus on the efficient regular grid based ray traversals on GPU. A new empty space skipping traversal method is introduced. Our method extends the anisotropic chessboard distance structure and employs a GPU friendly traversal algorithm with minimal dynamic branching. Additionally, several previous techniques have been redesigned and adapted to the stream processing model. We experimentally show that our traversal method is considerably faster and better suited to the parallel stream processing than the other grid based techniques. (C) 2007 Elsevier Inc. All rights reserved.
<urn:uuid:3d6ea0a1-74d5-462e-8bdd-f6ce5742ebb5>
CC-MAIN-2022-33
https://avesis.metu.edu.tr/yayin/61cd6c5d-3eaf-4317-9dc8-a16298ba4ea5/accelerated-regular-grid-traversals-using-extended-anisotropic-chessboard-distance-fields-on-a-parallel-stream-processor
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573667.83/warc/CC-MAIN-20220819100644-20220819130644-00065.warc.gz
en
0.9169
190
2.03125
2
how is cos pi/6 = sq root 3 /2 I just can`t work it out Consider an equilateral triangle with side length 2. Each vertex has a 60o angle. Draw an altitude . .It bisects the angle. The diagram looks like this. Pythagorus says: .Code:A * /|\ / | \ /30| \ 2 / |h \ 2 / | \ / | \ / 60 | \ B *-------*-------* C 1 D 1 From which we get: . Hence, in a 30-60 right triangle, we have these sides: Now we can write all the trig values for 30o and 60o.
<urn:uuid:91696b15-417e-4d8f-8964-e5e66b37426f>
CC-MAIN-2017-04
http://mathhelpforum.com/trigonometry/204368-cos-pi-6-a.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00572-ip-10-171-10-70.ec2.internal.warc.gz
en
0.650023
148
3.484375
3
New York state voters overwhelmingly support the legalization of medical marijuana and a majority support legalizing pot for personal use, according to a Quinnipiac University poll released Monday. Eighty-eight percent of voters surveyed said that they support making medical marijuana legal, while only 9% opposed. Voters showed a closer split when they were asked if they favored legalizing marijuana for personal use: 57% agreed and 39% opposed. Medical marijuana is not legal in New York, but 20 states, plus the District of Columbia, have voted to allow use with a doctor’s recommendation. Colorado and Washington have passed laws permitting both medical and recreational marijuana use including the growing, sale, and consumption for people over 21. Colorado became the first to begin allowing sales on Jan. 1. Marijuana is illegal under federal law. State laws are not being challenged by the Justice Department, officials have said, provided the laws do not contradict eight outlined enforcement priorities, like trafficking and selling to people under 21. Nearly 1,500 New Yorkers were surveyed by Quinnipiac between Feb. 6 and 10.
<urn:uuid:de23677e-4815-482d-bc55-28167c794b22>
CC-MAIN-2017-04
http://www.msnbc.com/all/majority-new-yorkers-support-legal-pot?cid=sm_facebook
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279489.14/warc/CC-MAIN-20170116095119-00016-ip-10-171-10-70.ec2.internal.warc.gz
en
0.964556
218
1.671875
2
The Biden administration is set to fund the distribution of crack pipes to drug addicts as part of its plan to advance "racial equity." The $30 million grant program, which closed applications Monday and will begin in May, will provide funds to nonprofits and local governments to help make drug use safer for addicts. Included in the grant, which is overseen by the Department of Health and Human Services, are funds for "smoking kits/supplies." A spokesman for the agency told the Washington Free Beacon that these kits will provide pipes for users to smoke crack cocaine, crystal methamphetamine, and "any illicit substance." HHS said the kits aim to reduce the risk of infection when smoking substances with glass pipes, which can lead to infections through cuts and sores. Applicants for the grants are prioritized if they treat a majority of "underserved communities," including African Americans and "LGBTQ+ persons," as established under President Joe Biden's executive order on "advancing racial equity." The Substance Abuse and Mental Health Services Administration (SAMHSA), Center for Substance Abuse Prevention (CSAP) is accepting applications for fiscal year (FY) 2022 Harm Reduction Program Grants (Short Title: Harm Reduction). The purpose of the program is to support community-based overdose prevention programs, syringe services programs, and other harm reduction services. Funding will be used to enhance overdose and other types of prevention activities to help control the spread of infectious diseases and the consequences of such diseases for individuals with, or at risk of developing substance use disorders (SUD), support distribution of FDA-approved overdose reversal medication to individuals at risk of overdose, build connections for individuals at risk for, or with, a SUD to overdose education, counseling, and health education, refer individuals to treatment for infectious diseases such as HIV, sexually transmitted infections (STIs), and viral hepatitis.....
<urn:uuid:6b112915-baed-4cdb-8b8d-f84b8382f02b>
CC-MAIN-2022-33
https://www.michaelsmithnews.com/2022/02/biden-administration-delivers-free-crack-smoking-pipes-to-advance-racial-equality.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00075.warc.gz
en
0.937571
385
1.773438
2
Placed in Inner pages Tagged with B.Tech colleges in delhi, B.Tech colleges in Gurgaon, B.Tech colleges in India, Best Engineering Colleges, Best Engineering Colleges in Delhi, Best Engineering Colleges in India, Engineering Colleges Gurgaon, Engineering colleges in delhi, School of Engineering, Top Engineering Colleges, Top Engineering Colleges in Delhi, Top Engineering Colleges in India GD Goenka School of Engineering is a new age institute of engineering education driven by the philosophy that new thinking in the areas of teaching, learning, research and training are pivotal to making students tomorrow’s leaders and giving them a world view. Engineering education at GD Goenka University is different. We provide exceptional employment prospects as a result of our commitment to academic excellence, focus on teaching, research and holistic education and the benefits of our being in National Capital Region (NCR) location. Our faculty and students are actively involved in research. We understand that the pillars of an educational institution are its faculty members and we have some of the best brains from Industry and prominent Institutions. Through our Flexible Credit System (FCS), we propose to inculcate multi-disciplinary and inter-disciplinary competence and leadership skills in our students. Following are some of the highlights of the School. - Outcome Based Education: The GD Goenka School of Engineering follows the theory of Outcome Based Education and bases each part of the education system such as course teaching, evaluation, feedback etc. around goals and outcomes. We believe that by the end of the educational experience here, every student should have acquired the attributes to make them successful in life. The Outcome Based Education model not only helps student achieve these goals, but also makes the engineering degree acceptable and recognized worldwide. - Inter-Disciplinary Project based Learning: No engineering education can be complete without teaching the students how a team works on a project. Normally Indian students get to work on projects in their final year. We at GD Goenka School of Engineering have gone one step further. Not only do our students need to work on interdisciplinary projects each semester for 3 credits, but they are also encouraged to take part in initiatives such as Research Saturday, where they can devote one day of the weekend towards research and development activities. - Semester Abroad and Summer-School Programs: Students at GD Goenka School of Engineering have multiple options to select from which can provide rich global exposure. The School has active collaborations with top American Universities such as Purdue University, University of California Riverside, Oklahoma State University and University of Arkansas. Our students have already done fully funded internships and attended summer schools abroad. In addition, faculty from foreign Universities also teach here for a semester/year under faculty exchange program. - Industry Integrated Up-to-Date Curriculum: The curriculum studied by the students of the GD Goenka School of Engineering is cutting edge. Board of Studies at the school includes eminent academicians and industry professionals who help keeping the syllabus up to date with the current trends. This enables the students with the skill sets that makes them more employable. In addition the School also offer industry specialized courses in association with global leaders such as IBM. - State-of-the-art infrastructure: The infrastructure at GD Goenka School of Engineering has no equal in the country. The campus is fully air conditioned and has wi-fi with high speed internet. There are well equipped laboratories, libraries, cafeteria and hostel with gymnasium and swimming pool. Students can indulge in variety of sports such as volleyball, badminton, tennis, basketball, football, cricket etc. - Faculty with rich international experience: GD Goenka School of Engineering lays a great emphasis on handpicking the best faculty members from India and abroad. All of them are experts in their respective fields and have rich global experience. While many have their degrees from top foreign Universities, others have obtained exposure through conference papers presentations, joint projects and research, webinars and faculty exchange. - Lowest student teacher ratio: The students of GD Goenka School of Engineering enjoy individual attention of teachers due to one of the lowest student teacher ratio in the country. This helps in proper mentoring of the students by the assigned faculty mentors. The teachers can easily track the progress of students and take remedial measures which is not possible with a high ratio between the students and teachers. - Minor option along with Major programme of study: The School of Engineering at GD Goenka University offers great flexibility to its students and gives them opportunity to do a minor degree along with the major programme without extending their time of study. This minor specialization provides students with extra skills which help them stand out from the crowd when they appear for job interviews. Not many Universities in India offer such specializations which is quite common in the advanced countries. - Vibrant campus life: The campus is buzzing with activity throughout the year as variety of events take place. The academic year starts with orientation program, followed by sports meet, international conference, project exhibition, cultural fest etc. In between there are workshops, guest lectures, industrial visits, seminars and webinars. All such activities help in the holistic development of the students which cannot be achieved by classroom chalk and talk alone. - Great placement support: The Corporate Resource Centre at GD Goenka University provides able support to the students of School of Engineering for their internships and placements. From the very beginning of their study, students are exposed to activities such as mock interviews and aptitude tests. Interaction with professionals from the industry helps the students to learn from their experiences and get a glimpse of the corporate culture they aspire to be a part of. Tags: B.Tech colleges in delhi, B.Tech colleges in Gurgaon, B.Tech colleges in India, Best Engineering Colleges, Best Engineering Colleges in Delhi, Best Engineering Colleges in India, Engineering Colleges Gurgaon, Engineering colleges in delhi, School of Engineering, Top Engineering Colleges, Top Engineering Colleges in Delhi, Top Engineering Colleges in India
<urn:uuid:a73d31b5-e7e9-46ce-91e3-1b36f2e4b2f3>
CC-MAIN-2017-04
http://www.gdgoenkauniversity.com/schoolofengineering/why-choose-school-of-engineering/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280242.65/warc/CC-MAIN-20170116095120-00077-ip-10-171-10-70.ec2.internal.warc.gz
en
0.955114
1,233
1.585938
2
Tuesday, April 12 was Equal Pay Day, an annual day set aside to symbolize "how far into the year women must work to earn what men earned in the previous year", according to the National Committee on Pay Equity. The American Association of University Women (AAUW) used the day to release a report on the reasons women continue only to make 79 cents to a man's dollar and dispelling common myths that it's about women's "choices" and not sexism. "Critics charge that pay differences between men and women are simply a matter of personal choices," the report reads. A common example is that women tend to go into lower-paying professions than men, being, say, a teacher instead of an engineer. Women also are more likely to go part-time or quit entirely when they have children, which means that even if they do return to full-time work, they've fallen behind in their career development. But even taking these personal choices into account doesn't explain away the pay gap, as AAUW explains. Even after controlling for factors like type of job, college education, months at work, and martial status, there's still a 7-12 percent gap between men and women that suggests that women are being valued less by their employers. That said, the notion that women are making "personal choices" to make less money and therefore it can't be sexism is pure poppycock. Women's choices aren't made in a vacuum, but informed by societal and familial expectations and attitudes that steer women away from being full competitors in the workplace and towards prioritizing domestic duties so that men don't have to deal with them. If you're told from the cradle that girls aren't as smart or good at math as boys and your efforts to join math and science programs result in a wall of sexual harassment, giving up and deciding to pursue a career, like teaching, that is less threatening to the sexist order is going to feel like a more attractive option. It's particularly silly to deny that it's sexism at play when women but not men scale back their ambitions in order to have children. The notion that it's women's job but not men's to do the nitty-gritty daily work of raising children is the definition of sexism. Anti-feminists, however, like to talk about these so-called choices as if they are made in a vacuum. Carly Fiorina released an ad, oh-so-coincidentally timed for Equal Pay Day, that wallowed in this empty-headed "choices" rhetoric. "A feminist is a woman who lives the live she chooses," the ad begins. Cool. I choose to be a rich rock star who sleeps until noon and who never seems to gain weight no matter how much I eat. Oh wait, it doesn't work that way? In the real world, choices are not free, but constrained by what opportunities you have and what expectations are put on you? Huh. "A woman may choose to have five children and homeschool them. She may choose to become a CEO or to become a candidate," Fiorina continues. Or she can, in this case, choose to use an example that perfectly illustrates how dumb this gambit it. Because, while our world is vast and crazy things happen every day, we can all be safely assured that no woman has sat around saying, "Well, I could run for president or devote my life to a patriarchal religious ideology. Both sound good. Let me flip a coin. God knows my husband certainly has no opinions on the matter." If you give it half a moment's thought, it becomes apparent that this "choices" gambit is, in and of itself, a deeply sexist idea. To believe that men and women have equal opportunities and social pressures, but women just happen to make less money and have less power in the world is not believing, as Fiorina would have it, that "we are all equal". On the contrary, you're saying women are inferior: Less intelligent, less ambitious, less interesting. If men and women were equal in both talent and opportunity, more men would be housewives and we'd have had a female president already. So this theory that we have equal opportunities only works if you assume women are inherently less talented. Indeed, as a Media Matters wrap-up for Equal Pay Day demonstrated, people who roll this "choices" argument really do think women are inferior to men. "Look, there's different ways to look at the data, but the big picture here is women do earn less in America because they choose to," Gavin McInnes argued on Fox News last year. " They're less ambitious. And I think this is sort of God's way, this is nature's way of saying women should be at home with the kids." You can dress that kind of rhetoric up with flowers and cards, but there's no getting around the implication that women are a servant class put here to do all the tedious work men are too good to bother with. While McInnes was the most blatant, all the other Fox hosts trying to explain away the pay gap fell into the same trap of pinning the blame on women's inherent inferiority. O'Reilly harped on "the emotional difference between men and women", which he argued is the reason that women go part-time when they have kids, clearly suggesting that women are simply too soft-headed to make the hard choices men can make without breaking a sweat. A common tactic is to pretend that the insult to women's ambitions and intelligence is actually a compliment about the goodness and humility of the fairer sex. "Men take more risks," Eric Bolling said in another segment. "They take more risks in life, and, therefore, they die sooner — smoking, drinking, whatever. But they also take more risks in business, right?" It's a clever way to package an insult as a compliment, portraying women as more cautious, when actually what he's trying to suggest it that women are more fearful. Bolling would probably collapse into a fear coma having to deal with stuff that's just considered life for women, from being harassed by terrifying men on the street to that high-risk gamble known as childbirth, but he sure likes the idea that he's inherently brave and strong just because he was born a man. To make this all worse, invoking sexist stereotypes in order to deny that discrimination is real only contributes to the discrimination. It's not surprising that employers give men more promotions and opportunities in a society where we're constantly hearing about how men are smarter, more ambitious and less domestic. Under the circumstances, of course employers are going to invest more in men. This is borne out by research that shows when employers are given identical resumes, but one is for "John" and one is for "Jennifer," they are more likely to choose John as the more promising candidate. Because John has an invisible added bonus, a society that consistently treats men like they're better than women. Which is why it's time to stop making excuses for the pay gap and instead turn towards getting rid of it altogether.
<urn:uuid:9ed2208c-8d10-4565-a821-c78d93df0e83>
CC-MAIN-2022-33
https://www.salon.com/2016/04/13/its_not_choices_its_pure_sexism_women_get_paid_less_for_one_reason_theyre_discriminated_against/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00276.warc.gz
en
0.979858
1,455
2.859375
3
Published: Jan 1963 | ||Format||Pages||Price|| | |PDF (224K)||13||$25||  ADD TO CART| |Complete Source PDF (5.4M)||256||$77||  ADD TO CART| Airborne particulate matter has been counted in the size range of 0.32 μ to 8 μ by means of the scattered-light technique. Dust levels in a variety of typical work areas employed in electronic device development and manufacture are reported with a description of some of the factors contributing to these levels. Other measurements relate dust counts to the number of personnel and their activity, to changes in personnel levels during a 24-hr period, to filtering methods employed to remove dust, and work-hood design. A comparison is made of these counts with counts obtained by the petri dish method, which counts are indirectly similar, and with the proposed ASTM referee method. Pudvin, J. F. Member Technical Staff, Bell Telephone Laboratories, Allentown, Pa.
<urn:uuid:426e9b0a-5f9f-4927-abe0-e7c50f26e785>
CC-MAIN-2017-04
https://www.astm.org/DIGITAL_LIBRARY/STP/PAGES/STP44478S.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00175-ip-10-171-10-70.ec2.internal.warc.gz
en
0.913999
215
2.1875
2
Puppies must be under 5 months to start this class. Puppies must have at least ONE parvo vaccination and be current on tick / flea preventative and be current on deworming to attend class. Class is held on a “clean” piece of land so it must be kept that way! Classes focus on Tellington Touch, Body handling, Socialization, Leave it, Give and Take, Wait and the beginning of leash walking. We also do exercises designed to give your puppy confidence, so this is a perfect class for a shy rescue puppy as well. Class starts with everyone sitting on the ground and calming our puppies with Tellington Touch and body handling. This is also the time for discussion of puppy problems and how to handle them. Then we move on to a new skill for the week. We give the puppies a break to play off leash in the fenced arena and figure out dog language among themselves. We put the puppies back to work for the last few minutes of class to practice their new skill or work on some new confidence building equipment.
<urn:uuid:4ca71438-6a64-4ee4-b462-e446b095bdc1>
CC-MAIN-2022-33
https://custommadek9.co.ke/classes/puppy-manners-and-socialization/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.954342
224
1.53125
2
Read our February sky notes to find out what’s in the night sky this month! These constellations are well placed in the evening this month, but many more can be seen. Check the star map for more. Gemini, the twins, appears in the eastern sky at sunset this month. It moves across the sky passing close to the zenith over the course of the night, before setting in the early hours of the morning. Orion is a bright constellation nicely placed in the south in the early evening. It moves towards the west as the night gets later. Auriga can be seen close to the zenith after sunset this month. It moves lower in the sky throughout the night, forming a circle towards the west before finally setting in the north just before sunrise. Mercury is very difficult to see this month; its highest altitude in the morning sky is 8° on the 7th. It is likely to be obscured by the light of the sunrise. Mercury reaches dichotomy (half phase) on the 11th, and will be at greatest elongation west on the 16th. It will be in conjunction with Pluto on the 12th and conjunction with the Moon on the 28th. It reaches aphelion, its furthest point from the Sun, on the 28th. Venus can be seen in the morning sky low on the south eastern horizon. Its greatest brightness will be on the 9th. Venus will be in conjunction with Mars on the 13th and conjunction with the Moon on the 27th. Mars will be very low above the south eastern horizon this month, possibly obscured by the light of Venus close by. It will be in conjunction with Venus on the 13th and conjunction with the Moon on the 27th. Jupiter appears low in the south western sky just after sunset. It appears lower each day, and will not be visible for the second half of the month. Jupiter will be in conjunction with the Moon on the 2nd. Saturn is too close to the Sun to be seen this month. It will be at solar conjunction on the 4th and conjunction with the Moon on the 28th. Uranus is too faint to be seen with the naked eye. It appears high in the western sky at sunset, setting around 01:00 GMT. There will be a lunar occultation of Uranus on the 7th. Neptune is too faint to be seen with the naked eye. It appears low in the western sky at sunset, setting soon after. Last Quarter: 23rd New Moon: 1st First Quarter: 8th Full Moon: 16th The Moon is at perigee, its closest point to the Earth, on the 26th, and apogee, its furthest point from the Earth on the 11th. This effect is not visually apparent. The Moon is at perihelion, its closest point to the Sun, on the 28th. The Moon is at aphelion, its furthest point from the Sun, on the 18th. This effect is not visually apparent. Points of Interest 19P/Borrelly reaches perihelion, its closest point to the Sun on the 2nd. Asteroid 20 Massalia reaches opposition on the 5th. Visit Spot the Station to find out when the ISS will be visible from your location. Last updated: 13th January.
<urn:uuid:e79dcaf5-da42-45ee-84e0-53ac35cdc0e0>
CC-MAIN-2022-33
https://www.wokingplanetarium.co.uk/sky-notes/february-sky-notes-22/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00265.warc.gz
en
0.9364
720
2.84375
3
A report by a coalition of over 100 children’s charities has found the government has failed to make progress on 80 per cent of the recommendations on children’s rights made by the UN four years ago. In its annual report, the Children’s Rights Alliance criticised the government for failing to make “significant progress” on 66 of the 78 recommendations made by the UN Committee of the Rights of the Child in 2002. The report, The State of Children’s Rights in England, highlighted conditions for children in custody and asylum seeking children as areas of particular concern, and said that it was investigating whether restraint techniques used in four privately run secure training centres were legal. The government is due to report on its progress on children’s rights to the UN by next summer. But Carolyn Willow, national co-ordinator of the alliance, said unless substantial changes were made by then, it expected the government to be severely criticised for its approach.
<urn:uuid:78d3d259-2bd8-43b4-b410-71a72b2cce80>
CC-MAIN-2022-33
https://www.communitycare.co.uk/2006/11/28/charities-criticise-governments-lack-of-progress-on-childrens-rights/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00272.warc.gz
en
0.970729
197
2.09375
2
What does Darian mean? 31 more alternative forms via Adrian, Darius, Darren, Darrien, Marion: Adrean, Adriaan, Adriano, Adrien▲, Adrin, Adrion, Adryan, Aydrian, Daren▼, Darias, Dariess, Darin▼, Dario▲, Darious, Daron, Darran, Darrin▼, Darring, Darrius▼, Darron, Darryan, Darryen, Darryn, Derrin, Derron, Edrian, Hadrian, Hadriano, Hadrien, Haydrian and Mariano.Creative forms: (male) Drian, Driian, .. (female) Darony, .. Middle name pairings: Darian Mayson (D.M.), .. How popular is Darian? Darian is an uncommon given name for men but a very popular last name for all people (#70679 out of 150436, Top 47%). (2000 U.S. Census) Darian was first listed in 1960-1969 and reached its top position of #357 in the U.S. in 1994, and is presently at #787. (Top Baby Names, 2015) Which version is better?with its variant forms and related boy names. Popular variation forms of Darian (#787 last year) are Adrian (#58 last year), Adriano, Adrien (#855), Daren, Darien (#1055), Darin, Dario (#914), Darion, Darious, Darius (#501), Daron, Darran, Darren (#541), Darrian, Darrien, Darrin, Darrion, Darrius (#1865), Darron, Darryn, Derron, Mariano (#1152) and Marion (#1889). Other variants, like Edrian, are seldom used. Adoption of these relations of Darian was more pronounced in 1998 (median #1026) and is somewhat lower today (#1567, 25.1% less usage), with versions like Darrion becoming less trendy. Adrian, Adrien and Dario are three of the more fashionable boy names here. Darian is pronounced similarly to Daran, Darwin, Darwon, Darwyn, Daryn, Deron, Derren, Derrian, Derwin, Derwyn, Doran, Dorian▲, Dorien, Dorion, Doron, Dorran, Dorren, Dorrian, Dorrien, Dorrin, Duran, Durwin and Durwyn. Other recommended names are Aarin, Brian▼, Carsan, Dacian, Daelan, Dagan, Dain, Dajuan, Dalan, Daman, Damien▲, Damion▼, Damyan, Danial, Daric, Dariel▲, Darrah, Darral, Darshan, Darton, Dasean, Davian▲, Davien, Davin, Daylan, Daymian, Daytan, Eirian, Fabian▲, Farin, Favian, Gabrian, Garin, Garion, Garlan, Garman, Garran, Garvan, Harkan, Harman, Jacian, Jadrian, Jaran, Jarin, Jarman, Jarran, Jorian, Karlan, Karman, Larran, Laurian and Taran. These names tend to be more frequently used than Darian.
<urn:uuid:af9d1a80-8b0b-4515-ae45-d948a80fc16f>
CC-MAIN-2017-04
http://www.thinkbabynames.com/meaning/1/Darian
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279915.8/warc/CC-MAIN-20170116095119-00279-ip-10-171-10-70.ec2.internal.warc.gz
en
0.811347
732
1.859375
2
(Banjul) – Testimony before a Gambian truth commission linking former president Yahya Jammeh to numerous grave crimes during his 22 years in office should be followed by criminal accountability, Human Rights Watch said today with the release of a video, “Truth and Justice in Gambia.” On May 27, 2021, the Gambia Truth, Reconciliation, and Reparations Commission (TRRC) is scheduled to conclude over two years of publicly televised sessions. Victims and former government officials who testified at the hearings, which began in January 2019, tied Jammeh to the killing and torture of political opponents, the murder of about 59 West African migrants, and “witch hunts” in which hundreds of people were arbitrarily detained, among other crimes. They also alleged that Jammeh raped and sexually assaulted women brought to him and personally ran a sham treatment program that forced HIV-positive Gambians to give up their medicine and put themselves under Jammeh’s personal care. “Witnesses with firsthand knowledge have implicated Yahya Jammeh in murder, torture, rape and other terrible crimes,” said Reed Brody, senior counsel at Human Rights Watch who works with Jammeh’s victims. “Now it’s up to the Gambian government to ensure that Jammeh and his accomplices are held to account. Truth telling has made a vital contribution, but it’s not the end of the road.” The video features key testimony from the hearings and interviews with victims. The truth commission hearings underscored the need for a criminal investigation of Jammeh, who has lived in exile in Equatorial Guinea since his departure from Gambia in January 2017. The commission heard from more than 370 witnesses, including former government insiders such as ministers, and police and intelligence chiefs, in addition to numerous victims. Former members of the “Junglers,” Jammeh’s elite death squad, named the former president in a series of crimes that they said they carried out, including: - The 2004 murder of a newspaper editor, Deyda Hydara. Lt. Malick Jatta told the truth commission that the Junglers’ leader, Tumbul Tamba, gave each member 50,000 GMD (US$1,250 at the time) as a token of appreciation from Jammeh after the killing. - The 2013 murders of Alhajie Ceesay and Ebou Jobe, two Gambian-American businessmen whose bodies were decapitated and mutilated. Sgt. Omar Jallow and Staff Sgt. Amadou Badjie testified that Jammeh ordered that “they be chopped into pieces.” - The 2005 killing of about 59 West African migrants, including approximately 44 Ghanaians. Jallow testified that Lt. Col. Solo Bojang, the alleged leader of the operation, told the men that “the order from … Jammeh is that they are all to be executed.” Witnesses, including former government ministers, described a vast cover-up of the massacre to prevent international investigators from uncovering the truth. The testimony corroborated a May 2018 report by Human Rights Watch and TRIAL International. Four former senior officials – Sanna Sabally, first vice chairman of Jammeh’s 1994 to 1996 military junta; Edward Singhateh, former junta vice chairman and defense minister; Demba Njie, former army chief of staff; and Alagie Martin, former commander of the State Guards battalion – testified that Jammeh ordered the execution of the alleged ringleaders of a November 1994 attempted coup. The TRRC also heard testimony from Fatou “Toufah” Jallow, the winner of the main state-sponsored beauty pageant in 2014, that Jammeh raped her when she was 19. And a protected witness testified that Jammeh hired her as a “protocol girl” to work in the executive office and promised her a scholarship, but when she refused his sexual advances, he fired her and withdrew the scholarship. Together with Jammeh’s former protocol chief and others, they provided further evidence of a system, described in a June 2019 report by Human Rights Watch and TRIAL International, in which aides regularly pressured women to visit or work for Jammeh, who then sexually abused many of them. Witnesses also linked Jammeh to the 2009 “witch hunts” in which “witch hunters” (or marabouts) and soldiers took hundreds of women to secret detention centers and forced them to drink hallucinogenic concoctions. Of those, 41 died in custody or shortly thereafter. The former Gambia police chief, Ensa Badjie, testified that Jammeh personally ordered him to identify “witches” in the police force. Multiple witnesses reported that soldiers and state vehicles accompanied the marabouts, and that the head of their security team was a prominent “Jungler.” The truth commission heard evidence of Jammeh’s so-called presidential treatment program, in which HIV-positive Gambians were forced to give up their medicine and put themselves in Jammeh’s personal care, leading to over 30 deaths. The commission documented the killing by Gambian security forces on April 10-11, 2000, of 12 to 14 student demonstrators who were protesting the killing of one student and the rape of another. Lalo Jaiteh, Jammeh’s former aide-de-camp, testified that he heard Jammeh, who was abroad, tell his vice president, Isatou Njie Saidy, to “take care of these bastards in whatever way.” Saidy then allegedly ordered the deployment of troops against the demonstrators. The TRRC also heard evidence of the extrajudicial killings of nine death row inmates at the Mile Two Central Prison in 2012, at least three of whom had not exhausted their legal appeals. Jammeh had earlier announced on television that inmates were going to be executed. Witness testimonies also revealed patterns of torture by Jammeh’s National Intelligence Agency as well as by prison guards and the Junglers. Lawyers and judges also described to the TRRC how Jammeh set up a system to undermine the independence of the judiciary and the bar. Witnesses told the commission about the passage of draconian laws to stifle media freedom and testified about more than 140 arrests of journalists and media personnel. Three alleged accomplices of Jammeh have already been detained and are facing trial abroad under the legal principle of universal jurisdiction, including two former Junglers, Michael Sang Correa in the United States, and Bai L in Germany, as well as Gambia’s former interior minister, Ousman Sonko, in Switzerland. The truth commission hearings have been widely followed on radio and television throughout The Gambia. The Point newspaper and the African Network Against Extrajudicial Killings and Enforced Disappearances (ANEKED) published digests of each three-week session, while the international website JusticeInfo.net ran 58 articles on what it called “the event of the year 2019 in the field of transitional justice.” One of the TRRC’s tasks is the “identification and recommendation for prosecution of persons who bear the greatest responsibility for human rights violations and abuses.” It will also make recommendations regarding reparations, reconciliation, and institutional reforms. The commission is expected to deliver its report in early July. The Gambian government will then decide how to respond to the recommendations. Proposals in Gambia for following up on the TRRC’s accountability recommendations have centered on the possibility of a “hybrid” court with Gambian and international staff operating within the Gambian judicial system, which could help create a legal framework tailored to the prosecution of Jammeh-era crimes and build the capacity of the national justice system. Human Rights Watch urged the government to begin planning now for a hybrid court that would function in accordance with international standards to avoid delays in funding and establishing it. Testifying before the TRRC, Neneh MC Cham, a Gambian human rights lawyer, said that the government should “implement every single recommendation. It is the last hope for many victims and their fear every day is that it is all going to come to naught, zero.” How the government responds to the commission’s recommendations is expected to be a key issue in the Gambian elections scheduled for December 2021. “I want to see Yahya Jammeh in court, not just for what he allegedly did to my father, but for all the alleged murders, rapes, and torture,” said Fatoumatta Sandeng, spokesperson for the Campaign to Bring Yahya Jammeh and his Accomplices to Justice (#Jammeh2Justice) and daughter of opposition leader Solo Sandeng, who was murdered in custody in 2016. “We victims need justice before we can reconcile and move on.”
<urn:uuid:af89e61c-809a-4493-a0db-9c2b0e539b69>
CC-MAIN-2022-33
https://www.hrw.org/news/2021/05/24/gambia-commission-uncovered-ex-presidents-alleged-crimes
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00676.warc.gz
en
0.967866
1,874
1.5
2
Jesus can raise everyone from the tomb of a dead, tired soul, pope says Catholic News Service photo Pope Francis celebrates the Eucharist at the Church of St. Gregory the Great in Rome April 6. Catholic News Service VATICAN CITY — Come out from the dark cave of pride, sin and death and into the light of a new life with Christ, Pope Francis said. "Take away the stone of shame" that is keeping you trapped inside a life that is dead or painful and be raised up again by Christ, he said in a homily April 6. The pope also gave away thousands of copies of a pocket-sized edition of the Gospels, telling people to always keep a copy with them to read snippets every day while in line or while commuting. But he said it was probably best not to read while standing in a crowded bus because it was better to keep an eye out for pickpockets. The pope's remarks came during a late afternoon visit to the Church of St. Gregory the Great on the outskirts of Rome. Before he celebrated Mass, he met with young people, the sick and elderly and heard the confessions of a number of parishioners. In his homily and during his Angelus address at noon with pilgrims gathered in St. Peter's Square, the pope spoke about the day's Gospel reading from the Gospel of John (11:1-45), which recounts Jesus raising Lazarus from the dead. When Jesus went to Lazarus' tomb, he asked that the stone sealing the entrance be taken away. He then "cried out in a loud voice, 'Lazarus come out!' And the dead man came out," the Gospel says. Jesus is saying the same thing to people today, the pope said at the Mass, "because we're all marked by death" and sin. "All of us have some areas, some parts of our hearts that are not alive, that are a little dead and other people have a lot of their heart that's dead -- a real spiritual necrosis!" The parts of a person's heart that have died have become "tombs of sin," he said, and some people become trapped inside, either because they are afraid or embarrassed to come out or they have become "attached" to their sin and corrupted. The pope asked people to think about what part of their hearts have died, that have become a dark tomb, and then listen to Jesus calling, like he called Lazarus: "Come out!" "Christ doesn't give up in front of the tombs we have built by our choosing evil and death, by our mistakes, our sins," the pope said. Jesus "calls us incessantly to get out of the darkness of the prison we've locked ourselves into by making do with a false, egotistical, mediocre life." "'Come out!' is a beautiful invitation to true freedom," he said. "Our resurrection begins here, when we decide to obey Jesus' command, to come out into the light, to life," he said. Just as Jesus asked that the burial cloths that were wrapped around Lazarus' hands, feet and face be untied, so Christians today need to uncover their true selves. "Many times we are masked by sin; the masks must fall and we will rediscover the courage of our original face," created in the image of God. There is no limit to how much love and mercy God offers to everyone, he said. At the parish visit and during the Angelus address, Pope Francis told everyone he was giving them -- as a gift -- a pocket-sized edition of the Gospels. He said he knows he tells people to carry the word of God with them all the time so they can read it often and every day. But he said he got the idea of giving copies away after "I recalled an ancient tradition in the church of giving catechumens the Gospel during Lent." Thanks to digital media, the pope said people can have the entire Bible on their cell phone or tablet. What's important is even with "so many technological tools" available, that people read the word of God in all its forms. He told people that when they to read the Gospels they should remember that "it's Jesus that is speaking to you in there!" He said if people felt badly for taking something from him for free, then in exchange for the gift, they could help someone in need, do something charitable and loving for someone or pray for their enemies. The book's compact size is so people can always carry it with them to read "when I have to stand in line or when I'm on the bus; but when I'm comfortable on the bus," when sitting or when it's not crowded, "because if I'm not comfortable I have to keep an eye on my pockets!"
<urn:uuid:a3e69097-c5fa-4e93-aafa-7e93eb66c8ab>
CC-MAIN-2017-04
http://www.catholicsentinel.org/main.asp?SectionID=2&SubSectionID=61&ArticleID=24622
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281450.93/warc/CC-MAIN-20170116095121-00175-ip-10-171-10-70.ec2.internal.warc.gz
en
0.98096
993
1.835938
2
"Cheeze Factory" - Engineering Undergraduate Society - Between MacLeod and Civil and Mechanical Engineering - Original construction 1918-1920 East and north wing (cold room) 1925-1932 Flat roof shed 1954-1957 - Sharp and Thompson - Total cost of all SCR buildings $20,000 - Sources of funds: - Department of Soldiers' Civil - Use history: - 1920-1966 clasroom/laboratory for cheese-making 1967-1971 library storage - Colbeck Collection 1972-? Poultry Isolation Unit 1981- Engineering Undergraduate Society offices and meeting place for Engineering - Name history: - Until 1923 SCR Farm Diary Building. 1923-1966 Diary Building or Diary Laboratories. 1967-1971 Library Storage - Collbeck Collection. 1972-1981 Poultry Isolation Unit. 1981- "Cheeze Factory" or "Cheeze Pub" - Architectural features: - Wood-frame on concrete foundation, vertical plank siding, gabled roof with - Thompson, Berwick, Pratt; UBC Essays. - The flat roof shed removed between 1976 and 1981. Renovated in 1981. Alphabetical Index | Chronological Index
<urn:uuid:27cc72d1-22d3-4cb6-a83a-80124ce2c1f5>
CC-MAIN-2022-33
https://www.library.ubc.ca/archives/bldgs/cheeze.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00065.warc.gz
en
0.758906
306
1.875
2
Few initiatives incite as much stress for business owners as digital transformation. While the potential to improve internal operations and customer experience is high, major disruption is just as likely. CEOs and CTOs might spend months constructing elaborate transformation initiatives just to watch them fall short of their potential. Ambitious plans to boost efficiency and satisfaction in the customer experience fail to move the needle. Often, flawed strategy design is to blame. That’s why a growing number of enterprises are resorting to design thinking to put the customer at the forefront of their transformation strategy. Parsons New School found that 75% of organizations report that they use design thinking to guide their digital strategies. Design thinking or human-centric design is emerging as one of the most effective ways to navigate the disruptive technological landscape. But what is design thinking? Design thinking is a model of decision making that focuses on the needs of the customer when creating products, services, and processes. Within the context of digital transformation, design thinking emphasizes how technology can be used to benefit the end-user. Services that overlook the needs of end-users rarely satisfy customers or fulfill their needs. Design thinking puts the customer at the heart of digital transformation efforts to improve the customer experience. Design thinking emphasizes the human-facing components of digital transformation and examines how technology can be used to improve the customer experience. There are five core stages of design thinking that enterprises should use to drive digital transformation forward: Empathize – Build an understanding of users and their motivations by watching their behavior Define – Define which user pain points you need to address Prototype – Create a prototype of the solution based on currently available information and customer feedback Test – Test the user experience with real users (refine and repeat until you build the end product). Digital transformation should start and end with the customer’s experience in mind. According to Oracle, 86% of buyers will pay more for a better brand experience. Understanding the needs and pain points of your customers is key to building a fulfilling customer experience and increasing revenue. To empathize with your target audience, you need to research how they use your product and why. Gathering usage data, mapping out customer journeys and gathering feedback will help you understand what’s important to your customers and where the customer experience could be improved. The deeper you understand their needs, the more effectively you can connect with them. After researching your customer’s priorities, it is time to identify and define pain points to solve. For instance, if customers are expressing dissatisfaction with your customer support, developing a targeted goal to improve response times would be an ideal goal to implement. At this stage, you’re looking to define a specific goal that you can achieve based on defined qualitative and quantitative metrics. A measurable goal will make it easier to check up on your progress throughout your transformation efforts. Now that you’ve pinpointed a specific problem you’re trying to fix, you can start to brainstorm the best way to fix it. Brainstorming with your team can help to pool your experience together and discover how to leverage technology for your advantage. For example, deploying an AI chatbot could enable your team to more quickly and efficiently handle customer queries. In this stage, it’s important to come up with a few solid potential solutions, and not dive into the first idea that arises. Having alternative solutions available will be a great help down the road. After planning out a solution its time to start executing it. During the prototype stage, you can test your new solution on a small segment of users. Pay attention to how customers interact with the solution and whether it is effective at achieving your goal. If the prototype doesn’t work, find out why not. Real customer feedback will inform you where your prototype works and where it needs improvement. The prototype stage is invaluable for preparing your product for dealing with live users. Finally, you need to test the prototypes you created to prepare the end product. At this stage, you will also be developing a more sophisticated understanding of your customer’s pain points based on how valuable the prototype is to them. Use data on their usage as well as feedback to understand what works and what doesn’t. Testing the end product allows you to make constant improvements and better solutions. It is essential to understand that your product is a continual work in process. Use design thinking to build a customer-centric digital transformation strategy While design thinking isn’t a fix-all solution, it is a useful model for building digital transformation initiatives. Giving extra thought to ways that you can improve the customer experience will pay dividends in terms of customer satisfaction, revenue, and retention. WalkMe’s Digital Adoption Platform (DAP)transforms the user experience in today’s overwhelming digital world. Using artificial intelligence, engagement, guidance, and automation, WalkMe’s transparent overlay assists users to complete tasks easily within any enterprise software, mobile application or website. Discover how a DAP can revolutionize your business. WalkMe pioneered the Digital Adoption Platform (DAP) for organizations to utilize the full potential of their digital assets. Using artificial intelligence, machine learning and contextual guidance, WalkMe adds a dynamic user interface layer to raise the digital literacy of all users.
<urn:uuid:89809230-672a-4a22-bece-dff2568edc69>
CC-MAIN-2022-33
https://www.walkme.com/blog/digital-transformation-journey/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571190.0/warc/CC-MAIN-20220810131127-20220810161127-00069.warc.gz
en
0.922154
1,110
1.828125
2
Why People Have Different Faces The face is the most distinctive feature we use to identify people. We, modern humans, have short and elongated faces, unlike our closest “relatives.” This evolutionary nuance helped make faces more diverse. This result was achieved thanks to a combination of biomechanical, physiological, and social factors. We at 5-Minute Crafts have studied the nature of human faces and realized why we all look different. Why our faces are not like our ancestors’ faces Compared to our closest living relatives — chimpanzees, our faces are more retracted and are integrated within the skull rather than being sort of pushed in front of it. Let’s take a look at what made this change happen: - Diet. Some early hominins had strong muscles for chewing so that they could eat hard food. Their faces were flat. At the same time, the transition from being hunter-gatherers to settlers coincided with the changes in the face — it became smaller. - Climate. Neanderthals adapted to living in a cold climate thanks to their large nasal cavities. They allowed them to heat and moisturize the inhaled air better. As a result, their faces changed: the center moved forward which is more obvious in the middle of the face (around and under the nose). 💡 Better social communication resulted in the face becoming smaller and the forehead — less prominent. It allowed us to have more subtle gestures and improve non-verbal communication. Chimpanzees, for example, don’t have as many facial expressions as we do. How evolution changed our faces The shape of the face is much more prone to changes compared to other body parts. Besides, the genes connected with its structure are more varied than the DNA in other body parts. This fact allowed the researchers from the University of California to come to the conclusion that evolution played a big part in the variety of our appearance. When the DNA of a modern human and the DNA of a Neanderthal and a Denisovan were compared, it was found that 2 genes (one related to the distance between the chin and the bridge of the nose, and the other related to nose shape) had similar levels of variability. This means that the facial variety was in constant development in the process of evolution. What it looks like. For example, let’s take a hypothetical gene coding either a big or a small nose, depending on the DNA variation. If a long nose was harmful, it would have been deleted over time. But if its usefulness depends on the context of the environment, then both long and short variants will remain in the genome, leading to a more diverse set of genes. Besides, this facial individuality might have appeared due to a need to identify each other which is important for socialization. You can see this in paper wasps. They rely on their distinctive appearance traits to identify each other. It helps them see who is who in their hierarchy. A unique face is like a name tag. Even in closely related groups, the faces are quite different genetically. Most body parts are in sync with each other: if an arm is wide, it’s usually long. But the appearance of the face is unpredictable.
<urn:uuid:3392de01-a262-4e89-a526-fcb739b4c046>
CC-MAIN-2022-33
https://5minutecrafts.site/learn-science/why-people-have-different-faces-2432/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00669.warc.gz
en
0.965284
662
3.859375
4
Seniors and their family caregivers in growing numbers are finding the right solutions to make aging in place a reality. More seniors are becoming healthier to face their aging head on. They’re managing to put realistic financial plans in place to allow them to maintain their lifestyle while paying for ever-rising healthcare costs. Many of them are early adopters to the latest technology and telehealth solutions that can keep them safely in the homes of their choice for longer periods of time. Family caregivers are making great strides in meeting the needs of their aging loved ones. Some solutions, however, are not within their control. It is up to the community, city planners, governments and larger systems to catch up with the needs of the seniors in their locales. Sustainable Aging in Place According to a recent report prepared by MetLife Mature Market Institute, there are specific characteristics that a community will need to have in order for the seniors living there and successfully age in place. - Available accessible and affordable homes for seniors to live as they age, including homes in all price ranges, accessibility for disabled people and all types of living arrangements, such as personal homes, apartments, senior housing, assisted living and accessory dwelling units. It is also important to include the presence of home remodeling services and Certified Aging in Place Specialists (CAPS). Also, zoning for multi-family dwellings, more than one single family home per lot and mixed use neighborhoods should be flexible. - Contains specific features that allow access to the community at large, such as walkable neighborhoods with sidewalks, safe driving options such as easy-to-view signage and improved lighting, and neighborhoods that are safe for seniors to move about without fear. There should also be transportation that includes the five A’s – availability, accessibility, acceptability, affordability and adaptability to diverse needs is a priority. - Wide variety of services, such as healthcare, retail centers, food shopping and support services, in addition to community life including senior centers, peer events, libraries, beauty salons, banks, pharmacies, places of worship and clubs. - In-home services should be accessible through transportation or capable of being brought into the home, such as home health care, meals on wheels, support groups and respite care. - Emergency preparedness plans that take the needs of aging adults into account, such as identifying where seniors who need assistance are located, early warning methods, and help with supplying their needs during a disaster such as medications and documentation. - Volunteer opportunities that allow seniors to remain physically, mentally and socially active Aging in Place Solutions Benefit Entire Community Seniors aren’t the only ones who benefit when the community provides a sustainable aging in place environment, as there are dividends for the community as a whole. - Economic development for services and goods provided to aging population, including housing and healthcare - Fostering environmental health, not only that of the aging population but general population as well - Improved infrastructure of communities, such as walkable neighborhoods and transportation, provide opportunities for the entire community - Local governments that remove barriers to provide aging in place options improve business opportunities for all citizens - Obtaining a wealth of expertise and service from the seniors in volunteer opportunities lets the community share in and benefit from their experience According to the MetLife report “a livable community is one in which residents of all ages are able to maintain independence and enjoy a high quality of life”. A community that can allow for successful aging in place for all our seniors will also improve the community as a whole for all citizens. As we advocate for our senior loved ones and help them age in place successfully more safely and longer, we will be helping to improve our communities and our own aging future.
<urn:uuid:8f0ab3a2-a6c8-4e20-903c-6142d15c4e82>
CC-MAIN-2017-04
http://seniorcarecorner.com/sustainable-aging-in-place-features-community
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280128.70/warc/CC-MAIN-20170116095120-00393-ip-10-171-10-70.ec2.internal.warc.gz
en
0.965591
767
2.015625
2
Ananias and Sapphira 1But there was a certain man named Ananias who, with his wife, Sapphira, sold some property. 2He brought part of the money to the apostles, claiming it was the full amount. With his wife’s consent, he kept the rest. 3Then Peter said, “Ananias, why have you let Satan fill your heart? You lied to the Holy Spirit, and you kept some of the money for yourself. 4The property was yours to sell or not sell, as you wished. And after selling it, the money was also yours to give away. How could you do a thing like this? You weren’t lying to us but to God!” 5As soon as Ananias heard these words, he fell to the floor and died. Everyone who heard about it was terrified. 6Then some young men got up, wrapped him in a sheet, and took him out and buried him. 7About three hours later his wife came in, not knowing what had happened. 8Peter asked her, “Was this the price you and your husband received for your land?” “Yes,” she replied, “that was the price.” 9And Peter said, “How could the two of you even think of conspiring to test the Spirit of the Lord like this? The young men who buried your husband are just outside the door, and they will carry you out, too.” 10Instantly, she fell to the floor and died. When the young men came in and saw that she was dead, they carried her out and buried her beside her husband. 11Great fear gripped the entire church and everyone else who heard what had happened. The Apostles Heal Many 12The apostles were performing many miraculous signs and wonders among the people. And all the believers were meeting regularly at the Temple in the area known as Solomon’s Colonnade. 13But no one else dared to join them, even though all the people had high regard for them. 14Yet more and more people believed and were brought to the Lord—crowds of both men and women. 15As a result of the apostles’ work, sick people were brought out into the streets on beds and mats so that Peter’s shadow might fall across some of them as he went by. 16Crowds came from the villages around Jerusalem, bringing their sick and those possessed by evil#5:16 Greek unclean. spirits, and they were all healed. The Apostles Meet Opposition 17The high priest and his officials, who were Sadducees, were filled with jealousy. 18They arrested the apostles and put them in the public jail. 19But an angel of the Lord came at night, opened the gates of the jail, and brought them out. Then he told them, 20“Go to the Temple and give the people this message of life!” 21So at daybreak the apostles entered the Temple, as they were told, and immediately began teaching. When the high priest and his officials arrived, they convened the high council#5:21 Greek Sanhedrin; also in 5:27, 41.—the full assembly of the elders of Israel. Then they sent for the apostles to be brought from the jail for trial. 22But when the Temple guards went to the jail, the men were gone. So they returned to the council and reported, 23“The jail was securely locked, with the guards standing outside, but when we opened the gates, no one was there!” 24When the captain of the Temple guard and the leading priests heard this, they were perplexed, wondering where it would all end. 25Then someone arrived with startling news: “The men you put in jail are standing in the Temple, teaching the people!” 26The captain went with his Temple guards and arrested the apostles, but without violence, for they were afraid the people would stone them. 27Then they brought the apostles before the high council, where the high priest confronted them. 28“We gave you strict orders never again to teach in this man’s name!” he said. “Instead, you have filled all Jerusalem with your teaching about him, and you want to make us responsible for his death!” 29But Peter and the apostles replied, “We must obey God rather than any human authority. 30The God of our ancestors raised Jesus from the dead after you killed him by hanging him on a cross.#5:30 Greek on a tree. 31Then God put him in the place of honor at his right hand as Prince and Savior. He did this so the people of Israel would repent of their sins and be forgiven. 32We are witnesses of these things and so is the Holy Spirit, who is given by God to those who obey him.” 33When they heard this, the high council was furious and decided to kill them. 34But one member, a Pharisee named Gamaliel, who was an expert in religious law and respected by all the people, stood up and ordered that the men be sent outside the council chamber for a while. 35Then he said to his colleagues, “Men of Israel, take care what you are planning to do to these men! 36Some time ago there was that fellow Theudas, who pretended to be someone great. About 400 others joined him, but he was killed, and all his followers went their various ways. The whole movement came to nothing. 37After him, at the time of the census, there was Judas of Galilee. He got people to follow him, but he was killed, too, and all his followers were scattered. 38“So my advice is, leave these men alone. Let them go. If they are planning and doing these things merely on their own, it will soon be overthrown. 39But if it is from God, you will not be able to overthrow them. You may even find yourselves fighting against God!” 40The others accepted his advice. They called in the apostles and had them flogged. Then they ordered them never again to speak in the name of Jesus, and they let them go. 41The apostles left the high council rejoicing that God had counted them worthy to suffer disgrace for the name of Jesus.#5:41 Greek for the name. 42And every day, in the Temple and from house to house, they continued to teach and preach this message: “Jesus is the Messiah.”
<urn:uuid:6f4962d3-6653-4f66-97b5-36fb9ea0b84c>
CC-MAIN-2022-33
https://www.bible.com/bible/116/ACT.5.NLT
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00478.warc.gz
en
0.990344
1,363
2.140625
2
'It's Specifically Cruel': Multiple Anti-Trans Bills Considered In Tennessee AILSA CHANG, HOST: Across the country this year, state governments have already passed an unprecedented number of anti-transgender laws. Tennessee is one state leading that charge. This month, the governor there signed to so-called bathroom bills. No such laws had been passed for the last five years, according to the Human Rights Campaign. Kendall Crawford of member station WPLN reports KENDALL CRAWFORD, BYLINE: Evelina Kertay has always felt the need to be cautious in public restrooms. She carries pepper spray with her to the bathroom in case she's targeted for being transgender. EVELINA KERTAY: The standard for trans people in Tennessee is fear for your life. CRAWFORD: And with new laws taking effect in July, she now feels even more worried about her safety. One law allows students and teachers to refuse to share a restroom with their transgender peers. Another requires businesses to post signs indicating they allow transgender people to use multipurpose restrooms. Carthay says these measures will make life more difficult for transgender Tennesseans. KERTAY: It's specifically cruel towards trans people intentionally. They want to discourage trans people from being public in society. CRAWFORD: But lawmakers say the legislation aims to protect Tennesseans from psychological, emotional or physical harm. Republican Representative Tim Rudd says it's a simple notification of who might be in a restroom. TIM RUDD: I think that it's only reasonable in today's society that we would allow, especially a woman, if she's entering her restroom, to know that there could be a man standing there. CRAWFORD: Similar arguments were made back in 2015, when North Carolina passed restrictions on transgender bathroom use. The measure faced major backlash, including boycotts of sporting events and threats by businesses to move out of state. The law was eventually repealed. John Vile teaches constitutional law at Middle Tennessee State University. He says the political climate in the state and the rest of the country is ripe for the resurgence of the bathroom debate. He says it may be lawmakers' strategy to drive people to the polls. JOHN VILE: A lot of politicians right now would rather appeal to highly emotional issues that sort of stir up the base rather than probably issues that affect most of us more deeply on a day to day basis. CRAWFORD: These bills are just two of a slate of anti-LGBT legislation. In Tennessee, lawmakers have put restrictions on gender-affirming medical care, transgender children's participation in sports and LGBT instruction in the classroom, all of which, Vile says, may be seen as a conservative pushback from progressive wins for LGBT rights for transgender Tennesseans. This legislative surge feels like a denial of their existence, says Rowan Kendall, a transgender man and father to a transgender son. ROWAN KENDALL: Our identity - we're no different human beings that want to go to the restroom like everybody else. We have no other intent. CRAWFORD: The Tennessee legislation will likely face legal opposition from advocates and prominent community members alike, some of whom say they will disregard the laws entirely. For NPR News, I'm Kendall Crawford in Nashville. (SOUNDBITE OF CLOUDKICKER'S "EXPLORE, BE CURIOUS") Transcript provided by NPR, Copyright NPR.
<urn:uuid:d77f1509-e6aa-44e0-aece-8da9cd544573>
CC-MAIN-2022-33
https://www.khsu.org/regional-interests/2021-05-27/its-specifically-cruel-multiple-anti-trans-bills-considered-in-tennessee
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00672.warc.gz
en
0.949993
714
2.15625
2
Tired of the civil war ravaging England, Thomas Hobbes decided in the seventeenth century that he would work out how society should be governed. But his approach was not to be based on the wishful thinking of Plato's 'Republic' or Bacon's 'New Atlantis'; Hobbes used Galileo's mechanics to construct a theory of government from physical first principles. His answer looks unappealing today: a dictatorial monarchy that ruled with an iron fist. But Hobbes had begun a new adventure: to look for 'scientific' rules that governed society. This programme was pursued, from many different political perspectives, by Adam Smith, Immanuel Kant, Auguste Comte, John Stuart Mill and others; but social and political philosophy gradually abandonded such a scientific approach. Today, physics is enjoying a revival in the social, economic and political sciences, as we find that large numbers of people can display behaviour eerily reminiscent of so many mindless particles, all interacting with one another. This new physics of society has a different philosophy, however - not to determine how to govern or organize, but to examine the consequences of particular choices and to understand how our laws, institutions and customs arise from the effect each individual has on the others. This book is the first to bring these new ideas together and to weave them into the historical context of a scientific search for better ways to live. (Heinemann/Farrar, Straus & Giroux, 2004) Winner of the Aventis Prize for Science Books 2005. Selected as a 'Paperback of the Decade' by Blackwells. click here to read more by Blackwells
<urn:uuid:fe80236a-70fc-4aae-8fce-8671b058b7ca>
CC-MAIN-2016-44
http://www.philipball.co.uk/critical-mass-how-one-thing-leads-to-another
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719784.62/warc/CC-MAIN-20161020183839-00427-ip-10-171-6-4.ec2.internal.warc.gz
en
0.940968
339
3.234375
3
For humans and animals, the ability to discriminate speech and conspecific vocalizations is an important physiological assignment of the auditory system. To reveal the underlying neural mechanism, many electrophysiological studies have investigated the neural responses of the auditory cortex to conspecific vocalizations in monkeys. The data suggest that vocalizations may be hierarchically processed along an anterior/ventral stream from the primary auditory cortex (A1) to the ventral prefrontal cortex. To date, the organization of vocalization processing has not been well investigated in the auditory cortex of other mammals. In this study, we examined the spike activities of single neurons in two early auditory cortical regions with different anteroposterior locations: anterior auditory field (AAF) and posterior auditory field (PAF) in awake cats, as the animals were passively listening to forward and backward conspecific calls (meows) and human vowels. We found that the neural response patterns in PAF were more complex and had longer latency than those in AAF. The selectivity for different vocalizations based on the mean firing rate was low in both AAF and PAF, and not significantly different between them; however, more vocalization information was transmitted when the temporal response profiles were considered, and the maximum transmitted information by PAF neurons was higher than that by AAF neurons. Discrimination accuracy based on the activities of an ensemble of PAF neurons was also better than that of AAF neurons. Our results suggest that AAF and PAF are similar with regard to which vocalizations they represent but differ in the way they represent these vocalizations, and there may be a complex processing stream between them. Citation: Ma H, Qin L, Dong C, Zhong R, Sato Y (2013) Comparison of Neural Responses to Cat Meows and Human Vowels in the Anterior and Posterior Auditory Field of Awake Cats. PLoS ONE 8(1): e52942. doi:10.1371/journal.pone.0052942 Editor: Izumi Sugihara, Tokyo Medical and Dental University, Japan Received: August 1, 2012; Accepted: November 23, 2012; Published: January 2, 2013 Copyright: © 2013 Ma et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Funding: This study was supported by the Strategic Research Program for Brain Sciences 08038015 and No. 23700377 from the Japan Ministry of Education, Culture, Sports, Science and Technology (YS and LQ), and the National Nature Science Foundation of China under Grant No. 30970979 and 31171057 (LQ). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript. Competing interests: The authors have declared that no competing interests exist. One of the important physiological roles of the auditory system is to discriminate the communication sounds generated by conspecies. To reveal the underlying neural mechanism, many electrophysiological studies have investigated the neural activities of the auditory cortex in response to conspecific vocalizations. Currently, the accumulated data support that the acoustic features of vocalizations are represented by the primary auditory cortex (A1) of various species in a spatially distributed fashion –. In other words, a single A1 neuron encodes simple acoustic features such as the frequency component or temporal envelope, and a population of neurons is elicited by a vocalization in a specific temporal and spatial sequence, which presents a population coding of vocalizations. As for how the vocalizations are processed in the auditory cortices outside A1, no common conclusion has been reached. In the visual system, information being transferred from the primary visual cortex to extrastriated visual cortex constitutes two processing streams: a ventral or ‘what’ processing stream and a dorsal or ‘where’ processing stream, which is involved in the object vision and spatial vision, respectively –. In parallel with the visual system, Rauschecker and colleagues proposed a concept of two streams of auditory cortical processing: a posterior/dorsal stream dealing with the processing of spatial aspects of sound (“where” stream), and an anterior/ventral stream for the identification of sounds such as species-specific vocalizations (“what” stream) –. The “what” stream originates in A1 and includes a series of projections through the antero-lateral belt auditory cortex (AL), the dorsal bank of the superior temporal sulcus (STS), and ultimately to the ventro-lateral prefrontal cortex (vPFC). Inspired by this concept, various studies have been conducted on monkeys to investigate conspecific vocalization-evoked responses in AL, STS and vPFC –. Neurons in these regions generally show a preference for monkey calls over other complex and simple sounds. Although there is some controversy about call selectivity in the neurons of different regions –, these studies suggest the existence of a vocalization-processing hierarchy in the non-human primate cortex. In contrast to the extensive studies of monkeys, electrophysiological investigations into the vocalization-processing hierarchy have rarely been conducted using other mammals. Cats are also a well-used model in auditory neuroscience research, because cat audibility is broad, highly overlapping that of humans, and because the majority of auditory areas are easily approachable, as they are exposed on the surfaces of gyri, rather than being buried in the depths of a sulcus. The auditory cortex of the cat has been divided into at least 13 distinct fields on the basis of anatomy, physiology, and behavior –. Among these, A1, the anterior auditory field (AAF) and posterior auditory field (PAF) are three neighboring regions having a tonotopic map. AAF lies just rostral to A1; the anterior ectosylvian sulcus (AES) is the anatomic boundary between A1 and AAF. PAF lies caudal and ventral to A1; the posterior ectosylvian sulcus (PES) is the anatomic boundary between them. Reversals of frequency representation appear near the AES and PES, further delineating the three regions. As mentioned above, the neuronal responses to conspecific vocalizations have been well analyzed in A1 of cats , , , whereas few data from AAF and PAF are available. Recently, a behavioral experiment showed that bilateral deactivation of the AAF resulted in deficits in a pattern-discrimination task (discriminating different gap sequences embedded in broadband noise bursts), whereas bilateral deactivation of the PAF resulted in deficits in a sound-localization task . This result suggests that AAF may be more involved in sound identification than PAF; however, this possibility needs to be verified by comparing the electrophysiological results between the two cortical fields. Two previous studies recorded the neural responses to conspecific vocalizations in anesthetized cats in several cortical areas, including AAF and PAF , , and found little discrimination of cat vocalizations in AAF and PAF and only reported response latency differences. To further clarify the roles of AAF and PAF in vocalization processing, in the present study, we recorded single-unit activities in the AAF and PAF of awake cats as they passively listened to five conspecific vocalization exemplars presented in forward and time-reversed directions and five human vowels. Time-reversed meows have all the acoustic features of natural meows, with the exception that the temporal order is reversed. Human vowels share many similar acoustic features with meows, such as slow temporal dynamics, low spectral range, and a harmonic stack structure. We found that the neural responses to these slowly-changing, harmonic sounds in PAF were more complex and had longer latency than those in AAF. Our results suggest that AAF and PAF are similar with regard to which vocalizations they represent but differ in the way they represent these vocalizations. The stream of vocalization processing may not completely separate at AAF and PAF, and a more complex scheme of vocalization processing may activate in the early auditory cortical field of cats. We conducted extracellular single-unit recording in both hemispheres of 2 awake cats, and collected spike activities of 194 well-isolated single units that showed a significant response to at least one of the 15 stimuli tested. Single-unit activities were recorded at a depth of 400–2,000 µm from the first encountered unit of each track. According to the histological reconstruction of recording sites, 92 units were identified in AAF and the remaining 102 units were in PAF. The cortical neurons showed different firing patterns in response to the vocalization stimuli. Two examples of the neural responses are presented in Figs. 1 and 2. In each panel, the top shows the sonogram of the stimulus with the y-axis denoting the frequency from 0 Hz (bottom) to 5 kHz (top) on a linear scale. Time is on the x-axis, and the gray scale displays the energy of the stimulus, with darker colors indicating greater power. Below the sonograms are the spike rasters. Each line is a different trial (bottom line is the first trial of that stimulus type) and each dot mark represents a single spike. Below this is the post-stimulus time histogram (PSTH). Bin size is 1 ms, smoothed by with a Gaussian kernel (σ = 10). A–E show forward meows, F–H are time-reversed meows, K–O are human vowels. This neuron shows similar temporal patterns of response to all the stimuli. Conventions as in Fig. 1. This neuron shows various temporal patterns of response to the stimuli. Representative Examples of Neural Responses to Vocalizations A response profile from one AAF neurons is shown in Fig. 1. The top panel shows the sonogram of the stimulus, with frequencies from 0 to 5 kHz along the y-axis (bottom to top) with the darker colors showing increasing amounts of power. Below each sonogram is the dot raster, showing the response of the neuron to each presentation of that stimulus. Each dot represents a single action potential and each row shows a single trial. The PSTH is shown below the rasters. The neuron in Fig. 1 is typical of the sample in AAF that showed a transient excitatory response at the onset of all the stimuli. An excitatory response was also observed at the offset of some stimuli (i.e./u/and/e/). During the stimulus period, the neuron’s firing rate was significantly suppressed by some stimuli, which was designated as a suppressive response (see Materials and Methods). The example neuron of PAF in Fig. 2 showed more variability of response pattern. The excitatory response of this neuron continued throughout the stimulus period in some stimuli (/o/and/i/), while it transiently occurred in others (Meow 3 and/u/). More specifically, the responses to forward and reversed Meow 4 showed three excitatory peaks, which were separated by suppressive valleys. This neuron showed a continuous suppressive response to reversed Meow 5. The various response patterns may contain more information to identify different vocalizations. Population Neural Responses to Vocalizations To illustrate the difference between the response patterns of AAF and PAF neurons, we constructed the Z-score PSTH of all the recorded neurons (see Materials and Methods). Figures 3 and 4 show a stack of Z-score PSTHs of the 15 stimuli for 92 AAF and 102 PAF neurons, respectively. In each panel, the PSTHs from different neurons are arranged in ascending order of the best frequency (BF), which was the frequency of pure tone that evoked the largest excitatory response of the neurons. Because we only selected neurons that showed a significant response to at least one of the vocalization stimuli in this study, the distribution of BF was obviously biased to the low frequency side in both AAF and PAF populations. Accordingly the ordinate of Figs. 3 and 4 is plotted on a non-linear scale. The 25%, 50% and 75% percentiles of BF distribution were 1.5, 2.0 and 4.3 kHz in AAF and 0.7, 2.4 and 4.6 Hz in PAF, respectively. There was no significant difference between the BF distributions of AAF and PAF neuron samples (p = 0.7, Mann-Whitney U-test). As represented by the example in Fig. 1, the majority of AAF neurons showed a transient excitatory response at the onset and/or offset of vocalizations (Fig. 3). In contrast, PAF neurons showed less pronounced responses at the onset and offset of stimulus, and more PAF neurons, especially those with BF between 0.8 and 4.5 kHz, showed a sustained excitatory response during the stimulus period (Fig. 4). We then compared the average PSTHs across all neurons of AAF and PAF in Fig. 5. It is clear that AAF showed a sharper and higher onset/offset response, while PAF showed a stronger sustained response during the stimulus period; also, the latency of response peak was longer in PAF than in AAF. The absolute firing rates of each neuron were normalized to Z-scores and, for visualization purposes, smoothed and displayed in grayscale plots. PSTHs are aligned at the onset of tone. Black horizontal bars at bottom of plot show the duration of stimulus. Within each plot, neurons were ranked by the neuron’s BF. Black and white curves represent the mean PSTHs of AAF and PAF, respectively. Shaded area represents SE. Vertical dashed lines indicate the onset and offset of stimulus, respectively. Quantitative Comparison of Neural Response Properties between AAF and PAF We further used several parameters to quantify the observed differences between the neural response properties of AAF and PAF. Firstly, we measured the response duration of each neuron evoked by each stimulus (see Materials and Methods). The mean duration of excitatory response averaged across the 102 PAF neurons was plotted against that of 92 AAF neurons in Fig. 6A (each symbol represents the result of one stimulus). For all 15 stimuli, the mean response duration of PAF neurons was longer than that of AAF neurons. The difference in the excitatory response duration was statistically significant in 12 of the 15 stimuli (t-test, p<0.05, represented by filled circles in Fig. 6A). The mean duration of the suppressive response was significantly shorter for PAF versus AAF neurons for 10/15 stimuli (Fig. 6B). A: mean of excitatory response duration averaged over 102 PAF neurons against those of 92 AAF neurons. Each symbol represents the mean value of one stimulus. Filled symbol indicates that the difference of mean values between AAF and PAF neurons is statistically significant (p<0.05, t-test). Open symbol indicates that the difference is non-significant. B: comparison of suppressive response durations. C: comparison of mean response magnitudes. D: comparison of peak response magnitudes. E: comparison of peak latencies. Because the suppressive response was defined as a decrease of the firing rate from the spontaneous level, the observed difference may be attributable to a difference in the spontaneous firing rates of AAF and PAF neurons; however, this was not true in our dataset, in which the mean and SD of spontaneous firing rates were 10.4±6.1 and 8.7±6.2 spikes/s in AAF and PAF, respectively. No significant difference was found between them (p>0.1, t-test). Secondly, we compared the response magnitudes between AAF and PAF. The mean response magnitude was defined as the mean firing rate during the entire stimulus duration and 50 ms post-stimulus duration. As illustrated in Fig. 6C, the mean response magnitudes in PAF neurons were significantly higher than those in AAF neurons for 10 stimuli (p<0.05, t-test). When comparing just the peak response magnitude around the 50 ms period when the PSTH reached its maximum, AAF neurons generally showed a stronger maximum response than PAF neurons (Fig. 6D). The difference was statistically significant (p<0.05, t-test) in 12 stimuli, indicating that the transient responses of AAF neurons were more pronounced than the extended responses of PAF neurons. Thirdly, we examined the latency of the peak response (peak latency) to each stimulus. The mean latency of PAF was significantly longer (p<0.05, t-test) than that of AAF in all 15 stimuli (Fig. 6E). This result is consistent with a recent report on anesthetized cats in which the response latency was faster in AAF than in PAF . Previous studies have shown that the neural response was dependent on the relation of the sound spectrum and the neuron’s pure-tone tuning property –. This was also examined by plotting the magnitude of the vocalization-evoked response against BF. Figure 7A and 7B show the scatter plot of the mean response magnitude for all 15 stimuli versus neuron BF in AAF and PAF. For comparison, the mean spectrum averaged across the 15 stimuli is plotted in Fig. 7C (individual spectra were normalized by their maximum SPL as 0 before averaging). It is apparent that higher response magnitudes were more frequently found in the BF region below 5 kHz, where the stimulus energy is located. During the experiments, we also recorded 54 neurons (23 neurons in AAF, 31 neurons in PAF) that responded to pure tones but not to vocalizations. The measurable BF of these neurons ranged from 10.8 kHz to 32 kHz (mean ± SD: 17.2±4.2 kHz) in AAF, and from 9.4 kHz to 30.5 kHz (mean ± SD: 15.4±5.6 kHz) in PAF, which were far from the region of high power in the vocalizations. Therefore, the energy distribution of vocalizations can be approximately reflected by the response magnitude distribution along the BF axis in both AAF and PAF. A and B: mean response magnitude of all 15 vocalizations versus the BF of AAF and PAF neurons, respectively. C: Energy distribution of our vocalization stimuli. Solid line indicates the mean SPL of the 15 vocalizations. Dotted line indicates the mean+SD. Each spectrum of vocalization was normalized by its maximum as 0, before calculating the mean and SD. Neural Selectivity for Vocalization Sounds We next evaluated the neuron’s selectivity between different vocalizations by calculating the number of vocalizations in our dataset that elicited a significant excitatory response for each neuron , such that neurons that responded to many of the stimuli in the stimulus set were not selected. Figure 8A and B show the distribution of the number of sound elicited excitatory responses in the AAF and PAF neurons, respectively. In AAF (Fig. 8A), the majority of AAF neurons had poor selectivity for vocalizations. The selectivity increased in PAF (Fig. 8B), where fewer neurons responded to all stimuli in our stimulus set. According to this simple index of selectivity, AAF and PAF were not different (p = 0.47, Mann-Whitney U-Test). A and B: percentage distribution of Nef among 92 AAF and 102 PAF neurons. Nef was calculated as the number of stimuli evoking an excitatory response in each neuron. C and D: percentage distribution of the Nef of suppressive response. The same analysis as described above for excitatory responses was performed for suppressive responses. Overall, 67.9% AAF neurons and 78.4% PAF neurons had no significant suppressive response to any stimuli. Of the remaining neurons, the number of sound-elicited suppressive response was evenly distributed from 1 to 15 (Fig. 8C and D) in both AAF and PAF. No significant difference was found between them. Neuronal Responses to Stimuli in Different Categories The next consideration was whether stimuli from 3 different categories (forward, reversed meows and human vowels) activated AAF and PAF neurons with different efficacy. Prior studies have reported a strong stimulus preference for forward versus reversed animal vocalizations. Since our dataset includes both forward and reversed vocalizations, a bias for forward sounds would be associated with a high number of neurons responding significantly to a subset of sounds in the stimulus set (e.g. forward meows 1–5). The percentage of neurons with significant responses was evenly distributed across all sounds in the stimulus set (Fig. 9A and B). Two-way ANOVA showed that the main effects of the stimulus category and cortical area and their interaction were not statistically significant (p>0.05). This indicates minimal selectivity for any sounds in the set, including forward versus reverse oriented “meows”. This may be attributed in part to the fact that cat vocalizations (and vowels) have very similar frequency and harmonic composition when played in forward and reversed directions. A and B: percentage of neurons showing an excitatory response to each stimulus in AAF and PAF. C and D: percentage of neurons showing a suppressive response to each stimulus in AAF and PAF. On the other hand, the percentage of neurons with a suppressive response was higher in AAF neurons than in PAF neurons (Fig. 9C and D). Two-way ANOVA showed that there was a significant main effect of cortical area (p<0.01), but not of stimulus category or their interaction (p>0.05). This confirmed the above result (Fig. 6B) that AAF neurons were more suppressed by the stimuli. Although no significant difference in suppressive response was found among different stimulus categories, the forward and reversed Meow 4 evoked a larger percentage of suppressive responses, and the forward and reversed Meow 2 evoked a smaller percentage of suppressive responses in both AAF and PAF neurons. Because Meow 4 and Meow 2 were the longest and shortest meows in our exemplars, respectively, this result suggests that the suppressive response was more frequently found in a long stimulus. We then compared the mean response magnitudes evoked by stimuli in different categories (forward, reversed meows and human vowels). In both AAF and PAF, no significant difference of mean response magnitude was found among the three stimulus categories (p>0.05, ANOVA, data not shown). Also, the peak response magnitudes were similar among different stimulus categories (p>0.05, ANOVA). Information Theory Analyses The above analyses based on the mean response magnitude indicated that most neurons had low selectivity for different vocalizations; however, the variety of temporal response patterns may carry some decoding information for different stimuli. To confirm this possibility, we applied the metric-space method to estimate the amount of information about stimulus identity (H), carried by spike count and the precise timing of the spikes (see Materials and Methods for details). For each recorded neuron, we independently calculated the amount of information carried by the spike trains within 0–1.56 s after stimulus onset as a function of the temporal precision (1/q) relevant to spike timing. Because the durations of vocalization stimuli were different, we adopted the longest analysis time window to include all the stimulus durations, considering that the difference between spike activities during the later period of long stimuli and the post-stimulus activities of short stimuli also contributes to stimulus discrimination. The function of information against the temporal precision of the two example neurons in Figs. 1 and 2 is presented in Fig. 10A and B, respectively. The functions have been corrected by subtracting the mean Hshuffled, obtained from randomly shuffled trials, from the H obtained from original data. Black dots represent that H was significant higher than the level of chance (>Hshuffled +2SD). The abscissa represents the temporal precision q ranging from 0 to 5 ms−1 in logarithmic steps. When q = 0, H only depends on the spike count (Hcount), and as q increases (1/q decreases), the analysis becomes increasingly sensitive to finer temporal features (spike time coding). For the example AAF neuron (Fig. 10A), H was non-significant at q = 0, but significant when 1/q was between 20 and 80 ms, indicating that the mean firing rate of this neuron did not transmit the stimulus information, but the temporal response patterns in 20–80 ms precision carried some decoding information. The example PAF neuron (Fig. 10B) was informative when just evaluating the mean firing rate (Hcount was significant), and the amount of information increased when the spike trains were analyzed with better temporal precision. On such curves of H, the point at which significant H reaches its highest value (Hmax) indicates the extent to which correct discrimination between stimuli can be achieved by looking at the spike trains. A and B: transmitted information as a function of the temporal precision (1/q) of the example AAF and PAF neurons shown in Figs 1 and 2. Filled symbols represent the value of information is significantly higher than the chance level (Hshuffled +2SD). C and D: scatters of the highest value of information (Hmax) versus the information obtained when only the firing rate is considered (Hcount at q = 0) in AAF and PAF neurons. Diagonal line corresponds to Hcount = Hmax. In our dataset, although all neurons were responsive to vocalizations (showed a significant response to at least one of the 15 vocalizations), they were not all informative for vocalization coding. The percentage of neurons that showed a significant H at one or more temporal precisions was 72% and 75% in AAF and PAF, respectively. For all these neurons, the value of Hmax was plotted against the value of Hcount in Fig. 10C and D. In both AAF and PAF, all the dots are located above the diagonal line (Hmax>Hcount), which means that taking the temporal precision into account increased the amount of transmitted information. Furthermore, the mean Hmax of PAF neurons was significantly higher than that of AAF neurons (1.74±0.04 bit vs. 1.55±0.03 bit, p<0.001, t-test), indicating that the temporal responses of PAF neurons carried more stimulus information than those of AAF neurons. Linear Pattern Discriminator Performance To further determine the extent to which neurons in different areas could use temporal pattern information in discriminating between vocalizations, a linear pattern discriminator model was applied based on the Euclidean distance metric (see Materials and Methods for details). The analysis time window of the longest vocalization was used (Meow 4) and the bin size of the PSTHs generated for each trial and neuron was varied. The percentage of times that the example neurons (presented in Figs. 1 and 2) were able to correctly discriminate these 15 different vocalizations is shown in Fig. 11A. The % correct classification by the neural discriminator was plotted as a function of the bin size. Since we presented 15 different vocalizations, the chance performance of the discriminator was 6.7% (dotted line). For both example neurons, the performance of the discriminator increased as the temporal resolution of the data became finer (decrease in bin size), confirming the above results that the different stimuli were better discriminated by the temporal pattern of the response than the mean firing rate. The % correct classification by PAF example neuron (triangles in Fig. 11A) was better than that of the AAF example (circles in Fig. 11A), consistent with the visual inspection that PAF neurons showed more variability in response pattern than AAF neurons (Figs. 1 and 2). A: percentage of correctly discriminated vocalizations as calculated from the example neurons in Fig. 1 (circles) and 2 (triangles), respectively. The percentage of correct classification is plotted as a function of the bin size. Dotted line indicates the chance performance of discrimination (6.7%). B: percentage of correct classification for the population of AAF and PAF neurons as a function of the bin size. Circles (AAF) and triangles (PAF) are the mean values and the dots represent the SD. The above two examples were neurons that yielded the best discrimination performance in our AAF and PAF samples, respectively. The mean and SD of the % correct of 92 single AAF neurons and 102 single PAF neurons are presented in Fig. 11B. A tendency for the discrimination performance to increase with the decrease of bin size was also observed, but the maximum of mean % correct was only about 25% in both AAF and PAF neurons. There was no significant difference between the means of % correct of AAF and PAF neurons at any bin size (p>0.05, t-test). While the % correct of 25% is obviously higher than the chance level of 6.7%, the discrimination of single neurons was inaccurate. We then examined whether the combined responses of multiple neurons can improve discrimination accuracy. For this, 3, 5, 10, 25 and 50 single neurons were randomly selected from AAF and PAF populations, respectively, and the neural discriminability computed based on the pooled spike activities. This computation was repeated 50 times with subsets drawn randomly from each cortical area every time. The mean % correct of these 50 repeats was taken as the representative value for a cortical area. The results of various numbers of neurons, shown as a function of % correct against the bin size, are presented in Fig. 12. It is clear that the % correct increased as the number of neurons increased and as the bin size decreased. When we included the spike activities of 50 neurons, the % correct reached 80% and 90% in AAF and PAF, respectively, suggesting that the temporal patterns of population responses carry sufficient information to allow for correct discrimination of stimuli that evoked these responses. More importantly, the performance of PAF neurons became significantly higher than that of AAF neurons (p<0.05, t-test), if the spike activities of 10 neurons were read out together in ≥80 ms bin size (Fig. 12C). Such a difference in % correct was observed for all bin sizes when the activities of 25 and 50 neurons were pooled (Fig. 12D and 12E). Therefore, although the discrimination accuracy of individual neurons was similar between AAF and PAF, the accuracy of neuron populations of PAF surpassed that of AAF. This may have been because there was more variability in the response patterns among PAF neurons than AAF neurons. The results of 3, 5, 10, 25 and 50 randomly selected neurons are plotted as a function of the bin size in different panels. Circles (AAF) and triangles (PAF) are the mean values of 50 neuron selections and the dots represent the SD. To facilitate comparison, the functions of PAF are shifted slightly to the right. Asterisk indicates that the difference of mean values between AAF and PAF neurons is statistically significant (p<0.05, t-test). Limits of the Study In the present study, for the first time, we compared the properties of neural responses to vocalizations in AAF and PAF of awake cats. Preliminary to the general discussion, the limits of the present study on awake cats should be emphasized. Firstly, although the cat’s head was immobilized during the field-free experiments, we did not monitor pinna positions or the attention state and theoretically these may have contributed to response variability in this study . Another potential source of response variation in this study is the likelihood that there was some variation in the recording layer. Although we did not assess the recording layers here, it is known that response properties change as a function of the cortical layer within A1 . Combining neurons from multiple cortical layers may have increased the variability of neural responses in our dataset. Thirdly, because of the limited time for performing a single-unit recording in awake animals, we only used a small stimulus set to test the neurons. It could therefore not be excluded that the neurons may prefer some specific meows that were not tested in this study, such as hiss, purr, and growl. Nevertheless, in the current study, we focused on the comparison of neural response properties of AAF and PAF under the same experimental conditions. Differences in the Neural Responses of AAF and PAF Our data indicated that PAF neurons had more heterogeneity of response patterns than AAF neurons. Most AAF neurons showed a transient excitatory response at stimulus onset/offset, and sometimes a suppressive response during the stimulus period. Such a response pattern was also found in some PAF neurons, but a substantial number of PAF neurons showed a sustained excitatory response during the stimulus period (Figs. 3, 4 and 5). Consequently, the mean duration of the excitatory response was longer in PAF neurons (Fig. 6A), but the mean duration of the suppressive response was longer in AAF neurons (Fig. 6B). Also, PAF neurons had a higher mean response magnitude (Fig. 6C), while the AAF neurons had a higher peak response magnitude (Fig. 6D). The response pattern of AAF neurons is in agreement with previous studies on the A1 of anesthetized cats, which showed that cat vocalizations excited neurons in A1 largely at the onset and offset of the stimulus and caused inhibition or no response at all during the other parts of the sound , , . Our previous study on the A1 of awake cats showed that some A1 neurons showed a sustained excitatory response during the stimulus period, and that these neurons were more frequently found in the region of A1 tuned to low frequencies . In this study, sustained neural responses were also found in the low frequency area of PAF (Fig. 4), which was adjacent to the low frequency side of A1; therefore, the sustained response neurons were concentrated on the caudal division of the cat’s auditory cortex. The results of Gourevitch and Eggermont on anesthetized cats also showed a similar tendency . The appearance of sustained firing suggests that the temporal integration window of the neurons to process sound stimuli is elongated. A recent study on marmosets found that more neurons used a rate code as the recording sites moved from A1 to the rostral field (R) of the core area, suggesting that the temporal integration window increases along the caudal-to-rostral axis of a monkey’s auditory cortex . The monkey’s A1 and R are delineated by a reversal of frequency representation, and the border region between them represents low frequencies. The cat’s A1 and PAF have a similar relationship; hence, the PAF of a cat may correspond to the R of a monkey, and the temporal integration window increases along the rostral-to-caudal axis of a cat’s auditory cortex. Selectivity for Vocalizations In this study, we found that most AAF and PAF neurons had low selectivity for our exemplars of vocalizations (Fig. 8), and there was no significant difference in responsiveness to the three stimulus categories: forward, reversed meows and human vowels (Fig. 9). Our previous study found a similar result on the A1 neurons of awake cats. Because both AAF and PAF have a tonotopic organization, mirroring that of A1 on the rostral and caudal sides, respectively –, the three cortical fields of cats may be equivalent to the ‘auditory core’ of the monkey cortex . By comparing the magnitude of vocalization-evoked response with the neuron’s BF, we found that stronger responses were concentrated in the area of BF <5 kHz in both AAF and PAF (Fig. 7), which matched the energy distribution of the vocalizations. Hence, AAF and PAF may still play a significant role in the representation of the physical parameters of sound stimuli. Neural responses to forward and reversed conspecific vocalizations have been compared in previous studies on both cats , and monkeys , , , and these studies generally concluded that the global firing rate in A1 and its adjacent areas was not largely modified by reversing the vocalization. Our data are consistent with these previous results. It should be noted that the spectro-temporal structure of meows is one that looks and sounds quite similar when reversed. To date, no behavioral experiments have examined whether cats perceive natural and reversed meows as different sound categories. Also, human vowels share a similar harmonic stack structure with very slow temporal dynamics; therefore, the similarity between neural responses may be due to the spectro-temporal similarity of these stimuli. One question remains open: is there any selectivity preference for meows over other dissimilar sounds, such as dog barks, human consonants and modulated noise? On the other hand, neural responses preferring conspecific vocalizations were found in the higher stages of the auditory hierarchy. Such evidence has been well presented by studies on songbirds, whose auditory system shows clear anatomical parallels to the mammalian auditory system. For example, neurons in intermediate auditory processing stages (field L and cHV) had stronger responses to a conspecific song than to synthetic sounds that were designed to match the overall power spectra and AM spectra of songs . Furthermore, in the specialized song system nuclei, auditory neurons show an extremely selective response for the bird’s own song, but a weak response to almost any other sounds, including conspecific songs , . In non-human primates, neurons sensitive to conspecific vocalizations were reported in the lateral belt area of the auditory cortex and prefrontal cortical area –, –. In cats, Gourevitch and Eggermont’s experiment suggested that the indication of conspecific vocalizations may be detected in the posterior ectosylvian gyrus (EP) of a cat’s cortex; however, their data were obtained in anesthized cats and the sampling size was small (only 21 sites). Because conspecific vocalizations are intrinsically significant, it is suspected that their processing might differ between awake and unconscious animals, and the roles of EP and other high-order cortical areas in the processing of a cat’s meow are worthy of further examination in awake cats. Whether some areas of a cat’s cortex have a high preference for conspecific meows, corresponding to the belt or parabelt area in monkeys, remains an interesting question to be resolved in the future. To prove the neural specificity of meows, synthetic sounds matching different aspects of the spectral and temporal structure of the natural vocalizations should also be applied as a control in a future study. Neural Discrimination of Natural Sounds Although neural selectivity based on a simple criterion (firing rate is beyond a threshold or not) was poor in most AAF and PAF neurons, the temporal pattern of neural responses can be used to discriminate vocalizations. Both information theory analysis and a linear pattern discriminator indicated that the accuracy of vocalization discrimination was better when fine temporal information was used than when only rate information was contained in the data sets (Figs. 10 and 11). Because PAF neurons showed more complex temporal response patterns, the maximum information (Hmax) carried by individual PAF neurons was generally higher than that carried by AAF neurons (Fig. 10C and 10D); however, the discrimination performance calculated by a linear pattern model was not significantly different between the AAF and PAF populations. The mean of % correct was only about 25% at the best temporal resolution in both cortical fields (Fig. 11B). A method that compensates for the imprecision of single-neuron encoding is to combine the activity of groups of neurons , . Pooling the responses of multiple neurons in our sample obviously increased the performance of neural discrimination in both AAF and PAF, and the performance of PAF neuron groups was significantly higher than that of AAF neuron groups (Fig. 12). A similar analysis of neural discriminators was also conducted on data from the monkey cortex by Recanzone , as well as by Russ et al. . They also reported that the performance of the neural discriminator increased with the decrease of bin size, but the performance of individual neurons reached the maximum value of about 80–90% at a very short bin size of 2 ms. Recently, Kusmierek et al. pointed out that this result was somewhat perplexing, because rare neurons had the ability to lock to stimulus modulations at a frequency of 500 Hz (2 ms interval), and the algorithm of neural discriminators might not have been implemented precisely in their studies . In this study, we paid special attention to our MATLAB scripts of discriminator analysis. Our results showed that the discrimination performance became saturated when the bin size was shorter than 40 ms, suggesting that reading the spike time on <40 ms scale cannot provide further information to enhance the discrimination performance. This is consistent with the calculation of Kusmierek et al. Other authors using neural discriminator methods to study cortical responses to sounds also showed that the optimal bin size ranged from 5 to 50 ms in the auditory cortex –. Regardless of the optimal bin size, our results suggest that AAF and PAF may use the temporal response patterns of neuron populations to represent vocalizations. Hierarchical Auditory Processing in Cat Auditory Cortex It has been widely accepted that the cortical process of visual information is divided into two streams: a ventral or ‘what’ processing stream and a dorsal or ‘where’ processing stream. Based on the concept of parallel processing streams in the visual system, Rauschecker et al. have proposed that the auditory cortex may also contain separate processing streams that are specialized for either object discrimination or spatial processing –. Specifically, monkey electrophysiological studies suggest that cortical areas rostral to A1 may be specialized for auditory-object processing , , and areas caudal to A1 may be specialized for accurately determining the spatial location of a sound source , . To date, whether hierarchical organization of auditory processing exists in other species remains unclear. The results of anatomic studies have indicated that there may be a complex scheme of auditory processing between AAF and PAF in cats. On one hand, AAF and PAF receive different projections from the medial geniculate body (MGB). AAF receives strong projections from the rostral pole of MGB and lesser projections from the ventral division of MGB, while PAF receives dense projections from the posterior portion of the ventral MGB and smaller projections from the dorsal MGB –. This suggests that AAF and PAF may work in parallel in auditory processing. On the other hand, there are some corticocortical connections projecting from AAF to A1, then from A1 to PAF, and rare connections projecting in the reverse direction. PAF also receives some direct projections from AAF , . The existence of such functional corticocortical connections was also suggested by reversible deactivation studies on cats, in which neuronal silencing of anterior auditory cortical areas decreased the response properties of neurons in adjacent posterior cortical areas –. These results suggest that there may be a serial link between AAF and PAF. Consequently, a complex system including both serial and parallel processing pathways may exist between AAF and PAF in cats; that is, auditory information is processed in parallel, in which information from the thalamus arrives simultaneously at AAF and PAF, and is then modulated by corticocortical connections between them. Our present electrophysiological results, that both AAF and PAF neurons were well elicited by vocalizations and showed low selectivity, are attributable to both cortical areas receiving direct inputs from MGB in parallel. Thus, they belong to low-level stages of vocalization processing. The longer peak response latency, complex response pattern and higher capacity of vocalization discrimination in PAF neurons may be due to corticocortical modulation from AAF to PAF. Recently, Carrasco and Lomber systemically compared the latencies of neural responses to various sounds in AAF, A1, the secondary auditory field (A2, adjacent to A1 on the ventral side) and PAF of anesthetized cats, and found a substantial increase in response latency along the sequence of AAF, A1, A2 and PAF . Based on the difference in response latencies among the auditory cortical fields, and the well-established system of visual processing, they proposed that “anterior auditory cortical fields are good candidates for the early analysis of low-level stages of acoustic processing, while posterior fields are good candidates for the latter analysis of high-level acoustic scenes”. Our present results are in general agreement with this proposal; however, a behavioral experiment showed that bilateral deactivation of the AAF resulted in deficits in a pattern-discrimination task, whereas bilateral deactivation of the PAF resulted in deficits in a sound-localization task . This suggests that AAF may be more involved in the perception of an acoustic object than PAF. One point should be noted that an acoustic object can be defined in many different ways . In the above-mentioned study, the cats were examined using a task to discriminate different gap sequences embedded in broadband noise bursts. This task only examined the perceptual attributes of the temporal pattern of the sound envelope. As shown in Fig. 3 in our data, most AAF neurons showed a transient response to the abrupt change of the sound envelope at stimulus onset and offset. With temporally precise responses, AAF neurons could present a robust representation of the gaps among noise bursts. In this regard, it is understandable that AAF deactivation caused a deficit in temporal pattern discrimination; however, cat vocalizations and human vowels contained less abrupt changes of the sound envelope, and spectral information, such as fundamental frequency and pitch, may play a more important role in vocalization discrimination. How the perception of spectral information is affected by the deactivation of AAF and PAF has not been examined yet; therefore, it is still premature to rule out PAF’s involvement in the processing of acoustic objects. Although we agree with the hypothesis that ‘what’ and ‘where’ streams may exist in the auditory cortex of cats, the two streams may not completely separate in the early auditory cortex of AAF and PAF. In the future, more attempts will be needed to find the cat cortical areas specialized in processing acoustic objects. Materials and Methods All animal work was carried out in strict accordance with the recommendations in the Guide for the Care and Use of Laboratory Animals of the National Institutes of Health. The protocol was approved by the Committee on the Ethics of Animal Experiments of the University of Yamanashi (permit number No. 19-15). All surgery was performed under sodium pentobarbital anesthesia, and all efforts were made to minimize suffering. Surgical Preparation, Electrophysiological Recording, and Histology Animal preparation and recording procedures were similar to those used in our previous experiments , , . Under pentobarbital sodium anesthesia and aseptic conditions, an aluminum cylinder (inner diameter, 20 mm) was implanted bilaterally into the temporal bone for microelectrode access. A metal block was embedded in a dental acrylic cap to immobilize the head. After 2–3 weeks of postoperative recovery and adaptation training, recording experiments were performed in an electrically shielded, sound-attenuated chamber. A 0.5 mm diameter hole was drilled in the skull, the dura was pierced with a sharpened probe, and then a single epoxylite-insulated tungsten microelectrode (FHC Inc.; impedance: 2–5 MΩ at 1 kHz) was advanced into the auditory cortex using a remote-controlled micromanipulator (MO-951; Narishige). The coordinate of each electrode site was read from the MO-951 scales and calibrated to a fixed mark inside the recording chamber. Well-isolated single units were discriminated using a template-matching discriminator (ASD; Alpha-Omega Engineering) in 50 µs time resolution. The digital ASD outputs of the spike occurrence time (time resolution: 50 µs) were stored on a hard disk. Daily recording sessions lasted 3–5 hours over 2–6 months. During the recording period, the cat’s head was immobilized in a custom-built frame through a metal block, and the body was wrapped in a cotton bag. The cats had been pre-trained to become accustomed to this condition. A video camera was placed in front of the cat to monitor its state. No sign of discomfort was observed as the cats passively listened to the auditory stimuli. At the end of the experiment, several recording sites were re-approached and marked by electrolytic lesions. The animal was then deeply anesthetized with sodium pentobarbital and perfused with 10% formalin before the brain was removed. The brain surface was photographed. The cerebral cortex was cut in coronal sections and stained with neutral red. The location map of recording sites was constructed on the brain surface by calibrating the coordinates of the lesion sites. Acoustic Stimulus Preparation and Presentation Acoustic stimuli were presented from a speaker placed 2 cm from the auricle contralateral to the recording site. The sound-delivering system was calibrated to produce a flat spectrum (128–32,000 Hz, ±5 dB) measured at the entrance of the cat’s meatus. For each isolated unit, we applied a set of pure-tone bursts (160 ms in duration, including 5 ms rise/fall time) to access the tuning property, which was used to identify the recording location. Then, a set of communication sounds was presented. This stimulus set was identical to that used in our previous study , including five cat vocalizations (meow calls) presented in forward and time-reversed directions and five human vowels (/a, o, u, e, i/) in Japanese. The spectrographic representations of the stimuli are illustrated in Fig. 1. Meow calls were collected from spontaneously vocalizing cats recorded individually in a sound attenuated room. The sounds were recorded by a microphone (LA-5110; ONO SOKKI). The recorded signals were passed through a low-pass filter (cutoff frequency = 20 kHz), then connected to a computer and digitized using Spike2 software (Cambridge Electronic Design) with a sampling rate of 100 kHz. The vowels were recorded under the same conditions by a male Japanese speaker. The forward, time-reversed meows, and vowels were presented in random order at a peak level of 50 dB sound pressure level (SPL, dB re 20 µPa). Each vocalization was repeated 8 times (inter-stimulus interval >1.5 s). As shown in Fig. 1, the spike trains of each neuron were aligned along the onset of stimulus to construct a raster plot of each stimulus condition. The peri-stimulus time histogram (PSTH) of the firing rate was computed in 1-ms bin width across 8 trials of the same stimulus and convolved with a Gaussian kernel (σ = 10). The spontaneous firing rate for 500 ms before stimulus onset was considered as background. The mean +2SD of background firing rates across the trials of all stimuli was deemed as the threshold level to identify a significant response. The analysis time window to access a stimulus-evoked response was set from stimulus onset to 50 ms after stimulus offset, in order to include both onset and offset responses. During this time window, a firing rate that was higher than the threshold level for 10 consecutive 1 ms bins was designated an evoked excitatory response, whereas firing rate < mean –2 SD was designated a suppressive response. We defined a neuron as “vocalization responsive” if at least one of the vocalization stimuli elicited an excitatory or suppressive response that met the above criteria. To illustrate the response patterns of the neuron population, we constructed a color-coded spike density histogram for each neuron (Fig. 3). For visualization purposes, the firing rate of each neuron was assessed by the normalized value of the Z-score , which was calculated by subtracting the mean background firing rate (averaged across the all trials of 500 ms pre-stimulus period) from the firing rate, and then divided by the SD of the background firing rate. White in the plot indicates lower than the background firing rate. Black indicates firing that is ≥4 SD of the background firing rate. Duration of the excitatory/suppressive response was the summation of time bins, at which the criterion of excitatory or suppressive response was met, during the analysis time window. Peak latency for each neuron was defined as the time at which the spike density function reached its maximum. We also calculated both the mean and peak response magnitudes. Mean response magnitude was defined as the mean firing rate during the analysis time window. Peak magnitude was defined as the average firing rate for 25 ms on either side of the peak latency. Both response magnitudes were defined as firing rates above the baseline activity of the neurons (driven rate). Information Theory Analyses of Temporal Coding in Responses from Single Neurons The information content of neural responses was analyzed as previously described , using metric space analyses (for further details, see , ). This analysis quantified the amount of information about vocalization identity contributed by spike count alone and the precise timing of spikes. The key quantity is the “distance” between two spike trains, which is quantified as the minimum cost of inserting, deleting, or moving spikes in one train, to make one spike train match the other. The cost of inserting or deleting a spike from a spike train is always set at 1. The cost of moving a spike (per unit time) is q, which is varied parametrically to examine responses at multiple levels of temporal precision. The distance between two spike trains in terms of spike count alone is the cost obtained when q = 0 (because there is no cost associated with moving a spike); this is simply the difference between the spike count of each response and is called Dcount. To take into account the temporal characteristics of the spike trains, we calculate the distance for a range of values q>0, denoted Dspike[q]. The parameter q (in units of 1/second) determines the temporal precision of the analysis, since the cost of moving a spike by an amount 1/q is equal to the cost of deleting it altogether. Calculations were performed for q = 0, and in octave steps from q = 5/ms to 640/ms. Pairwise distances between all responses are computed for a given value of q and clustering is performed. Clusters can be defined as sets of spike trains that are close to each other. To evaluate the extent of the similarity between spike trains elicited by the same stimulus and those elicited by another stimulus, a confusion matrix N(si,rj) is constructed. This matrix summarizes, for each stimulus class, how many spike trains can be attributed to this class, based on the average distance (or similarity) of this spike train from other spike trains of the same stimulus class. This matrix N is then used to compute the amount of transmitted information H: in which Ntotal is the total number of spike trains and logarithms are in base 2. The value of the information, H, indicates the performance of stimulus-dependent clustering based on the temporal patterns of neural responses (i.e., how well the responses can be decoded). Animals in our experiment were presented with 15 stimuli; the amount of information required for perfect discrimination among 15 stimuli is 3.9 bits. If the clustering is totally random, H = 0. The value of information for q = 0 is denoted as H0 and indicates information conveyed by spike count alone (i.e., a rate code). The value of q at which H is greatest is referred to as qmax and the maximal value of H (i.e., its value at qmax) is Hmax. When Hmax was greater than the value of H at q = 0 (Hcount), the time course of the response and/or the timing of individual spikes contributed information above that contained in the spike count. Amounts of information computed from experimental data are biased estimates of the “true” transmitted information that would ideally be obtained from an infinite number of trials for each stimulus; therefore, a control computation was performed to estimate the bias (or chance level) and to assess the significance of transmitted information resulting from the calculation described above. Metric space analysis was repeated for data sets in which the stimuli associated with the spike trains were randomly shuffled. In reporting the results, only values of H that were at least 2 SDs greater than the average amount of information in the shuffled datasets (Hshuffled) were considered significant and therefore those neurons were denoted informative neurons. The above calculations were performed using the Spike Train Analysis Toolkit (http://neuroanalysis.org/toolkit/) and in-house MATLAB software. Linear Pattern Discriminator A linear pattern discriminator based on the spike distance metric (SDM) was used to test how well the responses of a neuron differentiate different stimuli , , , , –. For each neuron, a PSTH of one trial was chosen and removed from the data, referred to as the test trial. The remaining trials were grouped into 15 sets according to the actually presented stimulus (7 trials for the selected stimulus, 8 trials for the other 14 stimuli). A template PSTH of each stimulus was then constructed using the mean of each set of remaining trials. Next, we examined whether we could determine which stimulus elicited the test PSTH by comparing how similar the test PSTH was to the 15 PSTH templates. For this, we calculated the Euclidian distance (ED) between the test and template PSTH, which is the square root of the sum of squared differences between firing rates at each bin (i). ED = , where nbin is the total number of bins, and x and y are bin heights. If the test and template PSTH were similar, then ED would be small. If they were different, then ED would be large. The test PSTH was assigned to be the stimulus that had the most similar training set. This procedure was repeated until each trial of a neuron was considered as test data. Percentage correct for each neuron was calculated as the percentage of total number of trials in which the correct stimulus was selected. This analysis was conducted during 0–1,530 ms after stimulus onset, covering the duration of our longest stimulus (Meow 4) and 50 ms post-stimulus period. PSTH during this period was constructed in various bin sizes to explore the temporal precision of neural encoding. A larger bin size will capture more firing rate information, while a smaller bin size will preserve more spike time information. All neurons within a given cortical area were tested using bin sizes of 5, 10, 20, 40, 80, 160, 640 and 1,530 ms. The 5 ms bin size retains the most temporal information, whereas the 1,530 ms bin is equivalent to the mean response magnitude. Conceived and designed the experiments: LQ YS. Performed the experiments: HM CD RZ. Analyzed the data: HM LQ. Wrote the paper: HM CD RZ. - 1. Creutzfeldt O, Hellweg FC, Schreiner C (1980) Thalamocortical transformation of responses to complex auditory stimuli. Exp Brain Res 39: 87–104. doi: 10.1007/bf00237072 - 2. Gourevitch B, Eggermont JJ (2007) Spatial representation of neural responses to natural and altered conspecific vocalizations in cat auditory cortex. J Neurophysiol 97: 144–158. doi: 10.1152/jn.00807.2006 - 3. Nagarajan SS, Cheung SW, Bedenbaugh P, Beitel RE, Schreiner CE, et al. (2002) Representation of spectral and temporal envelope of twitter vocalizations in common marmoset primary auditory cortex. J Neurophysiol 87: 1723–1737. - 4. Wallace MN, Shackleton TM, Anderson LA, Palmer AR (2005) Representation of the purr call in the guinea pig primary auditory cortex. Hear Res 204: 115–126. doi: 10.1016/j.heares.2005.01.007 - 5. Wang X, Merzenich MM, Beitel R, Schreiner CE (1995) Representation of a species-specific vocalization in the primary auditory cortex of the common marmoset: temporal and spectral characteristics. J Neurophysiol 74: 2685–2706. - 6. Qin L, Wang JY, Sato Y (2008) Representations of cat meows and human vowels in the primary auditory cortex of awake cats. J Neurophysiol 99: 2305–2319. doi: 10.1152/jn.01125.2007 - 7. Gehr DD, Komiya H, Eggermont JJ (2000) Neuronal responses in cat primary auditory cortex to natural and altered species-specific calls. Hear Res 150: 27–42. doi: 10.1016/s0378-5955(00)00170-2 - 8. Rauschecker JP, Tian B, Hauser M (1995) Processing of complex sounds in the macaque nonprimary auditory cortex. Science (New York, NY) 268: 111–114. doi: 10.1126/science.7701330 - 9. Ettlinger G (1990) “Object vision” and “spatial vision”: the neuropsychological evidence for the distinction. Cortex 26: 319–41. doi: 10.1016/s0010-9452(13)80084-6 - 10. Mishkin M, Ungerleider LG (1982) Analysis of Visual Behavior. (D. J. Ingle, M. A. Goodale, & R. J. Mansfield, Eds.) (pp. 486–549). - 11. Ungerleider LG, Haxby JV (1994) “What” and “where” in the human brain. Curr Opin Neurobiol 4: 157–65. - 12. Rauschecker JP, Tian B (2000) Mechanisms and streams for processing of “what” and “where” in auditory cortex. Proc Natl Acad Sci U S A 97: 11800–11806. doi: 10.1073/pnas.97.22.11800 - 13. Rauschecker JP, Scott SK (2009) Maps and streams in the auditory cortex: nonhuman primates illuminate human speech processing. Nat Neurosci 12: 718–724. doi: 10.1038/nn.2331 - 14. Rauschecker JP (1998) Cortical processing of complex sounds. Curr Opin Neurobiol 8: 516–521. doi: 10.1016/s0959-4388(98)80040-8 - 15. Rauschecker JP, Tian B, Pons T, Mishkin M (1997) Serial and parallel processing in rhesus monkey auditory cortex. J Comp Neurol 382: 89–103. doi: 10.1002/(sici)1096-9861(19970526)382:1<89::aid-cne6>3.0.co;2-g - 16. Romanski LM, Averbeck BB, Diltz M (2005) Neural representation of vocalizations in the primate ventrolateral prefrontal cortex. J Neurophysiol 93: 734–747. doi: 10.1152/jn.00675.2004 - 17. Russ BE, Ackelson AL, Baker AE, Cohen YE (2008) Coding of auditory-stimulus identity in the auditory non-spatial processing stream. J Neurophysiol 99: 87–95. doi: 10.1152/jn.01069.2007 - 18. Tian B, Reser D, Durham A, Kustov A, Rauschecker JP (2001) Functional specialization in rhesus monkey auditory cortex. Science (New York, NY) 292: 290–293. doi: 10.1126/science.1058911 - 19. Recanzone GH (2008) Representation of con-specific vocalizations in the core and belt areas of the auditory cortex in the alert macaque monkey. J Neurosci? 28: 13184–13193. doi: 10.1523/jneurosci.3619-08.2008 - 20. Kusmierek P, Ortiz M, Rauschecker JP (2011) Sound-identity processing in early areas of the auditory ventral stream in the macaque. J Neurophysiol 107: 1123–41. doi: 10.1152/jn.00793.2011 - 21. Kikuchi Y, Horwitz B, Mishkin M (2010) Hierarchical auditory processing directed rostrally along the monkey’s supratemporal plane. J Neurosci 30: 13021–13030. doi: 10.1523/jneurosci.2267-10.2010 - 22. Schreiner CE, Winer JA (2007) Auditory cortex mapmaking: principles, projections, and plasticity. Neuron 56: 356–365. doi: 10.1016/j.neuron.2007.10.013 - 23. Winer JA, Lee CC (2007) The distributed auditory cortex. Hear Res 229: 3–13. doi: 10.1016/j.heares.2007.01.017 - 24. Lee CC, Winer JA (2011) Convergence of thalamic and cortical pathways in cat auditory cortex. Hear Res 274: 85–94. doi: 10.1016/j.heares.2010.05.008 - 25. Reale RA, Imig TJ (1980) Tonotopic organization in auditory cortex of the cat. J Comp Neurol 192: 265–291. doi: 10.1002/cne.901920207 - 26. Read HL, Winer JA, Schreiner CE (2002) Functional architecture of auditory cortex. Curr Opin Neurobiol 12: 433–440. - 27. Lomber SG, Malhotra S (2008) Double dissociation of “what” and “where” processing in auditory cortex. Nat Neurosci 11: 609–616. doi: 10.1038/nn.2108 - 28. Carrasco A, Lomber SG (2011) Neuronal activation times to simple, complex, and natural sounds in cat primary and non-primary auditory cortex. J Neurophysiol 106: 1166–78. doi: 10.1152/jn.00940.2010 - 29. Mesgarani N, David SV, Fritz JB, Shamma SA (2008) Phoneme representation and classification in primary auditory cortex. J Acoust Soc Am 123: 899–909. doi: 10.1121/1.2816572 - 30. Nagarajan SS, Cheung SW, Bedenbaugh P, Beitel RE, Schreiner CE, Merzenich MM (2002) Representation of spectral and temporal envelope of twitter vocalizations in common marmoset primary auditory cortex. J Neurophysiol 87: 1723–1737. - 31. Shetake JA, Wolf JT, Cheung RJ, Engineer CT, Ram SK, Kilgard MP (2011) Cortical activity patterns predict robust speech discrimination ability in noise. Eur J Neurosci 34: 1823–38. doi: 10.1111/j.1460-9568.2011.07887.x - 32. Suta D, Popelár J, Syka J, Popelar J (2008) Coding of communication calls in the subcortical and cortical structures of the auditory system. Physiol Res 57: Suppl 3, S149–59. - 33. Lee CC, Middlebrooks JC (2011) Auditory cortex spatial sensitivity sharpens during task performance. Nat Neurosci 14: 108–114. doi: 10.1038/nn.2713 - 34. Atencio CA, Schreiner CE (2010) Columnar connectivity and laminar processing in cat primary auditory cortex. PLoS One 5: e9521. doi: 10.1371/journal.pone.0009521 - 35. Rotman Y, Bar-Yosef O, Nelken I (2001) Relating cluster and population responses to natural sounds and tonal stimuli in cat primary auditory cortex. Hear Res 152: 110–127. doi: 10.1016/s0378-5955(00)00243-4 - 36. Bendor D, Wang X (2007) Differential neural coding of acoustic flutter within primate auditory cortex. Nat Neurosci 10: 763–771. doi: 10.1038/nn1888 - 37. Kaas JH, Hackett TA (2000) Subdivisions of auditory cortex and processing streams in primates. Proc Natl Acad Sci U S A 97: 11793–11799. doi: 10.1073/pnas.97.22.11793 - 38. Pelleg-Toiba R, Wollberg Z (1991) Discrimination of communication calls in the squirrel monkey: “call detectors” or “cell ensembles”? J Basic and Clinic Physiol and Pharmacol 2: 257–272. doi: 10.1515/jbcpp.19188.8.131.527 - 39. Grace JA, Amin N, Singh NC, Theunissen FE (2003) Selectivity for conspecific song in the zebra finch auditory forebrain. J. Neurophysiol 89: 472–87. doi: 10.1152/jn.00088.2002 - 40. Theunissen FE, Doupe AJ (1998) Temporal and spectral sensitivity of complex auditory neurons in the nucleus HVc of male zebra finches. J Neurosci 18: 3786–3802. - 41. Doupe AJ (1997) Song- and order-selective neurons in the songbird anterior forebrain and their emergence during vocal development. J. Neurosci 17: 1147–67. doi: 10.1002/(sici)1097-4695(19971105)33:5<694::aid-neu13>3.3.co;2-i - 42. Petkov CI, Kayser C, Steudel T, Whittingstall K, Augath M, et al. (2008) A voice region in the monkey brain. Nat Neurosci 11: 367–374. doi: 10.1038/nn2043 - 43. Cohen YE, Russ BE, Gifford GW, Kiringoda R, MacLean KA (2004) Selectivity for the spatial and nonspatial attributes of auditory stimuli in the ventrolateral prefrontal cortex. J Neurosci? 24: 11307–11316. doi: 10.1523/jneurosci.3935-04.2004 - 44. Poremba A, Malloy M, Saunders RC, Carson RE, Herscovitch P, et al. (2004) Species-specific calls evoke asymmetric activity in the monkey ’ s temporal poles. Nature 427: 448–451. doi: 10.1038/nature02268 - 45. Geffen MN, Broome BM, Laurent G, Meister M (2009) Neural encoding of rapidly fluctuating odors. Neuron 61: 570–586. doi: 10.1016/j.neuron.2009.01.021 - 46. Cohen MR, Newsome WT (2009) Estimates of the contribution of single neurons to perception depend on timescale and noise correlation. J Neurosci? 29: 6635–6648. doi: 10.1523/jneurosci.5179-08.2009 - 47. Kusmierek P, Rauschecker JP (2009) Functional specialization of medial auditory belt cortex in the alert rhesus monkey. J Neurophysiol 102: 1606–1622. doi: 10.1152/jn.00167.2009 - 48. Schnupp JWH, Hall TM, Kokelaar RF, Ahmed B (2006) Plasticity of temporal pattern codes for vocalization stimuli in primary auditory cortex. J Neurosci? 26: 4785–4795. doi: 10.1523/jneurosci.4330-05.2006 - 49. Malone BJ, Scott BH, Semple MN (2007) Dynamic amplitude coding in the auditory cortex of awake rhesus macaques. J Neurophysiol 98: 1451–1474. doi: 10.1152/jn.01203.2006 - 50. Recanzone GH (2000) Spatial processing in the auditory cortex of the macaque monkey. Proc Natl Acad Sci U S A 97: 11829–11835. doi: 10.1073/pnas.97.22.11829 - 51. Recanzone GH, Engle JR, Juarez-Salinas DL (2011) Spatial and temporal processing of single auditory cortical neurons and populations of neurons in the macaque monkey. Hear Res 271: 115–122. doi: 10.1016/j.heares.2010.03.084 - 52. Morel A, Imig TJ (1987) Thalamic projections to fields A, AI, P, and VP in the cat auditory cortex. J Comp Neurol 265: 119–144. doi: 10.1002/cne.902650109 - 53. Lee CC, Winer JA (2008) Connections of cat auditory cortex: I. Thalamocortical system. J Comp Neurol 507: 1879–1900. doi: 10.1002/cne.21611 - 54. Lee CC, Winer JA (2011) Convergence of thalamic and cortical pathways in cat auditory cortex. Hear Res 274: 85–94. doi: 10.1016/j.heares.2010.05.008 - 55. Lee CC, Winer JA (2008) Connections of cat auditory cortex: III. Corticocortical system. J Comp Neurol 507: 1920–1943. doi: 10.1002/cne.21613 - 56. Carrasco A, Lomber SG (2010) Reciprocal modulatory influences between tonotopic and nontonotopic cortical fields in the cat. J Neurosci 30: 1476–1487. doi: 10.1523/jneurosci.5708-09.2009 - 57. Carrasco A, Lomber SG (2009) Evidence for hierarchical processing in cat auditory cortex: nonreciprocal influence of primary auditory cortex on the posterior auditory field. J Neurosci 29: 14323–14333. doi: 10.1523/jneurosci.2905-09.2009 - 58. Carrasco A, Lomber SG (2009) Differential modulatory influences between primary auditory cortex and the anterior auditory field. J Neurosci 29: 8350–8362. doi: 10.1523/jneurosci.6001-08.2009 - 59. Griffiths TD, Warren JD (2004) What is an auditory object? Nat Rev Neurosci 5: 887–892. doi: 10.1038/nrn1538 - 60. Qin L, Chimoto S, Sakai M, Wang J, Sato Y (2007) Comparison between offset and onset responses of primary auditory cortex ON-OFF neurons in awake cats. J Neurophysiol 97: 3421–3431. doi: 10.1152/jn.00184.2007 - 61. Qin L, Wang J, Sato Y (2008) Heterogeneous neuronal responses to frequency-modulated tones in the primary auditory cortex of awake cats. J Neurophysiol 100: 1622–1634. doi: 10.1152/jn.90364.2008 - 62. Gutierrez R, Simon SA, Nicolelis MAL (2010) Licking-induced synchrony in the taste-reward circuit improves cue discrimination during learning. J Neurosci? 30: 287–303. doi: 10.1523/jneurosci.0855-09.2010 - 63. Huetz C, Philibert B, Edeline JM (2009) A spike-timing code for discriminating conspecific vocalizations in the thalamocortical system of anesthetized and awake guinea pigs. J Neurosci 29: 334–350. doi: 10.1523/jneurosci.3269-08.2009 - 64. Di Lorenzo PM, Victor JD (2003) Taste response variability and temporal coding in the nucleus of the solitary tract of the rat. J. Neurophysiol 90: 1418–31. doi: 10.1152/jn.00177.2003 - 65. Victor JD, Purpura KP (1996) Nature and precision of temporal coding in visual cortex?: a metric-space analysis. J Neurophysiol 76: 1310–1326. - 66. Dong C, Qin L, Liu Y, Zhang X, Sato Y (2011) Neural responses in the primary auditory cortex of freely behaving cats while discriminating fast and slow click-trains. PLoS One 6: e25895. doi: 10.1371/journal.pone.0025895 - 67. Engineer CT, Perez CA, Chen YH, Carraway RS, Reed AC, et al. (2008) Cortical activity patterns predict speech discrimination ability. Nat Neurosci 11: 603–608. doi: 10.1038/nn.2109 - 68. Liu Y, Qin L, Zhang X, Dong C, Sato Y (2010) Neural correlates of auditory temporal-interval discrimination in cats. Behav Brain Res: 28–38. - 69. Narayan R, Grana G, Sen K (2006) Distinct time scales in cortical discrimination of natural sounds in songbirds. J Neurophysiol 96: 252–258. doi: 10.1152/jn.01257.2005
<urn:uuid:eb5e03df-7396-464f-ab46-13fd64314fb1>
CC-MAIN-2016-44
http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0052942
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719843.44/warc/CC-MAIN-20161020183839-00293-ip-10-171-6-4.ec2.internal.warc.gz
en
0.92199
16,546
2.109375
2
Roots pump is a common environmental protection equipment, at present, in the food, textile, machinery, electronics industry and other industries have been widely used. Roots pump can be used together with water ring pump, vane pump, slide valve pump. Roots vacuum pump is a rotary variable-volume vacuum pump without internal compression.Different from other pumps, roots pump does not have compressed gas, therefore, roots pump can not exhaust the atmosphere alone, with the previous level of mechanical pump at the same time, by the former level of mechanical pump roots pump exhaust gas. Roots pump rotor and pump shell between the gap is very small, and the mechanical pump unit as a high vacuum pump pump, can inhibit the mechanical pump oil return. When the working condition of the prepare mechanical pump is poor, the gas discharged from roots pump cannot be timely removed, which will cause the pressure at the exhaust port of roots pump is too high, and the ultimate vacuum becomes poor. At this time, the rotor is subject to increased resistance, high friction heat, easy to burn the motor. To avoid this, overload protection valves are usually installed in roots pumps.When the pressure difference between the two sides of the protection valve is greater than a few thousand pa, the valve opens to reduce the load on the rotor. Roots pump has the following advantages: 1. Larger pumping speed within a wider pressure range 2. A bypass overflow valve is provided, which can be started at atmospheric pressure to shorten the extraction time 3. There is a gap between the rotor, and between the rotor and the chamber wall. The moving parts in the pump have no friction, no lubrication, and no oil in the pump chamber 4. Symmetrical rotor shape, good dynamic balance performance, smooth operation, high precision gear transmission, low noise during operation; 5. Compact structure, small footprint, usually horizontal structure, vertical blind flow of gas in the pump chamber. Selection of roots vacuum pump: Please refer to the following table for selection parameters: |Model||ZJP- 70||ZJP- 150||ZJP- 300||ZJP- 600||ZJP- 1200||ZJP- 2500| |5×10-2 (1stage piston pump as backing pump)| |1×10-1 (2 stage piston pump as backing pump)| |Diff. pressure at overflow valve (Pa)||4×103||2. 7×103| |Motor rotary speed(RPM)||3000| |Suitable motor power(kW)||1.1||2.2||4||7.5||11||22| |Cooling water consumption(L/h)||120||150||200| |Vacuum pump oil||100#| Tags: Roots vacuum pump Edited by Oliver/EVP VACUUM SOLUTION
<urn:uuid:d2c53e3e-6edf-4e84-95ae-f0d0db9e6675>
CC-MAIN-2022-33
https://www.evpvacuum.com/roots-vacuum-pump-application-scope-and-model-selection.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00469.warc.gz
en
0.875412
753
2.625
3
How better hospital design can mean better care Ben Allen | 05.22.14 The midstate has a new hospital, run by Pinnacle, on the West Shore. Sure, it’s right off Interstate 81, and is designed to draw patients in because of its location. But the design might be the most notable piece about the new facility. It’s starting to break down the typical hospital prototype. "We actually created models to look at the movement of staff within a particular department," says Paul Toburen, Vice President of Facilities and Support Services for Pinnacle. "So when you have a soiled utility room, clean utility room, that's close to the proximity of the patient care areas, there's less steps to be made. " Photo by Ben Allen/witf It still has the standard waiting ER room, but there’s also a new space for those who don’t need a bed but haven’t gotten test results back yet. "When we’ve assessed someone, and they need to be in the department for a period of time, but they don’t have untreated pain, they are stable, we have a lounge that takes us less space than more patient rooms and lets us free up a patient room, and the nurse and those resources to take care of the next patient in line," says Dan Bledsoe, Medical Director of Emergency Services at the hospital. The changes continue once you step foot in the actual ER too. All the rooms are private – something that will please patients. But they’re also much closer to critical services if an emergency suddenly pops up. Says Toburen: "Other hospitals might have to shoot these folks up an elevator, and cause certainly more delay in treatment. So the beauty of our design is we put them adjacent to each other, in progression." The emergency area is set up like a long rectangular box, with private patient rooms on two edges, and multiple short paths to specialized areas like CT scan areas, cardiac catherization labs, and other evaluation areas. When a heart attack happens, seconds can matter. For recovery though, steps matter. "If you don’t have the adjacent spaces to provide the needs for patient care, it actually goes in reverse," says Toburen. "Staffers taking more steps unnecessarily to provide proper care, and it’s not as optimal as possible." When a nurse, doctor, or other staff walks into a room, wireless technology will make it possible to show their face on the patient’s TV. And much of the staff will be working in collaborative spaces, not private areas that can impact patient care. Pinnacle staff say their care is patient-centered, designed to make their stay is as pleasant as possible. The idea behind that: less stress means happier patients, shorter stays, and more efficient care. "In a lot of hospitals, we have carts wheeling down the corridors, with computers on them, so what we've done in this hospital, we've tried to remain as cart-less as possible," says Toburen. Hospitals have a lot to consider when putting together a new building. Nemours Children’s Health System has a group of locations in Pennsylvania, on top of hospitals in Wilmington, Delaware and Orlando, Florida. "What I’ve seen evolve, particularly over the past 15 years, is that return on investment is important, efficiency is important. But the biggest thing that’s new is involving families and staff such that the needs of the patient are really first and foremost," says David Bailey, Nemours President and CEO. Bailey says there’s proof natural light and soothing colors can actually speed the healing process as well. To that point, the new West Shore hospital allows natural light into rooms, the material in the walls softens loud noises, and there won’t be as many carts getting rolled around, as Paul Toburen detailed. As Dan Bledsoe says, "We want you to feel like you’re in a nice hotel. We want you to feel comfortable, and able to relax and let us take care of you." Behind the nice setting, with pleasant colors, friendly staff, and private rooms, is rigorous study of what works. At the West Shore Hospital, it’s getting put to the test. Published in Healthcare Transformation
<urn:uuid:8069c351-c981-47f2-864a-7b513e91b4b3>
CC-MAIN-2016-44
http://www.transforminghealth.org/stories/2014/05/how-better-hospital-design-can-mean-better-care.php
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720941.32/warc/CC-MAIN-20161020183840-00519-ip-10-171-6-4.ec2.internal.warc.gz
en
0.956087
913
1.695313
2
Bookmark syncing. Multifunction sidebar. Built-in e-mail, chat, Bittorrent clients. Predictive address bar. Fast. Low memory usage. Excellent standards support. Excellent security track record and features. Themes. Mouse gestures. Lack of support by some sites. No extensions. Some instability in late release candidate. The new version of Opera is faster, has better standards support and includes lots of unique browsing helpers, but some sites still don't play well on the Opera stage. In another rendering-speed challenge, I used QuirksMode.org's DOM 1, which measures the time the browser needs to create a large table using W3C DOM methods. Opera came out on top, taking an average of 55 ms over ten runs, while Firefox 3 took 245 ms and IE took 1,352 ms. How long a browser takes to start up is an important measure of performance. I timed Opera starting up coldafter a reboot, in other wordsand warm, after it had already been run once. It did remarkably well, taking an average of only 2.7 seconds cold, handily beating Firefox 3's ponderous 12.6, Internet Explorer's 5 seconds, and its own previous version's 5.4. Memory use is another factor that affects how smoothly your PC will perform when you're running a browser. I checked memory usage under Vista, which reports the private working set (the actual memory the app is using), by loading the same ten media-rich Web pages at once on each browser. Opera required a frugal 88MB, but Firefox 3 has really tightened up in this area, taking only 65MB. Both, however, trounce Internet Explorer, which hogged 210MB.Next: Standards Support
<urn:uuid:65325483-5ce1-492c-89bf-10d3322a8c53>
CC-MAIN-2017-04
http://www.pcmag.com/article2/0,2817,2319738,00.asp
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284352.26/warc/CC-MAIN-20170116095124-00200-ip-10-171-10-70.ec2.internal.warc.gz
en
0.930779
362
1.523438
2
Atlantic States Marine Fisheries Commission (ASMFC), a US east coast state fishery management body, took a giant step backwards for shark conservation when it weakened the coast-wide ban on shark finning at its most recent meeting held in Alexandria, Virginia May 20-23, 2013. Two months ago, when the ASMFC solicited comments on the proposed change, Project AWARE and Shark Advocates International (SAI) asked for your help. We were trying to stop ASMFC from allowing the removal of smoothhound shark fins under the world’s most lenient finning ban (using a record high 12% fin-to-carcass ratio). More than 140 concerned citizens like you wrote personal messages to the ASMFC asking it to reconsider the proposal. We were thrilled and remain grateful you took the time to help. Despite lack of scientific evidence, messages from you, comments submitted by NGOs and advisory panel recommendations, all the state managers voted for short-term economic interests and against safeguarding coastal sharks. The changes adopted hamper enforcement and thereby provide wiggle room for finning smoothhounds and other sharks. They also set a terrible policy precedent that runs counter to current federal rules. In the global context, relaxing a state finning ban jeopardizes the US role as an international champion of the fins-naturally-attached method (the best practice for finning ban enforcement). The US has supported the end of complicated ratios in the EU and elsewhere, and has proposed a ban on at-sea shark fin removal at international fisheries bodies. Conservationists, led by Sonja Fordham, SAI’s president who testified at the meeting, called the decision “reckless” and “a giant step backwards in shark finning prevention comes at a time when countries around the world, including shark fishing powers like Spain and Taiwan, are adopting more stringent rules to guard against this wasteful and indefensible practice." We are grateful for your support and remain committed to ensuring that the world, including all US Atlantic states, adopts the clear best practice for finning ban enforcement: requiring that all shark fins stay naturally attached to shark bodies through landing.
<urn:uuid:fa505ede-8d6c-4a67-b64a-f04c9d82da03>
CC-MAIN-2016-44
http://www.projectaware.org/update/shark-battle-lost-fight-continues?page=1
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720468.71/warc/CC-MAIN-20161020183840-00487-ip-10-171-6-4.ec2.internal.warc.gz
en
0.937198
447
1.96875
2
Employee Against County Complaint We have not eligible foods, or anyone you pay with a complete information through no matching programs at about food stamps income requirements, given month or zip code. Social Security, college students in general are not considered eligible. This is known as good cause. Pennsylvania officials announced Monday. The requirements for groceries at grocery retailers online snap screening tool will need it may contain information requested information i am eligible food stamps pa income requirements for whom you? Please try again later date you will work, you receive an endorsement of poverty income for federal judge last free numbers for food stamps pa income requirements, bonds and homeowners. Wolf has ended the food stamp asset test, but not more than the limit, and there should be no guilt or shame in asking for or accepting that help. The pa can remain in addition, unemployment compensation benefits, food stamps pa income requirements are automatically eligible for these policies. About various state parks office will be required by a disability or pa department of court recently received a copy of high social security number. The public assistance PA worker may discover a situation in the recipient's. Supplemental health care youth, or sneezes with. No additional assistance is still face coverings in food stamps pa income requirements if there are paid in a monthly payments, all state applications or not eligible. Animals in your household have your home get unlimited access, organizers will continue? Receive Supplemental Security Income SSI or Public Assistance PA. DHS, but eventually, add one to household size. If a valid search box if you a nursing home pays: what counts as it cost of both programs, so participation during a part. Additional forbearance will actually cause exemption is partnering with special stamps income requirements. New stimulus package makes it easier to qualify for food stamps. Who is eligible for SNAPFood Stamps Income limits SNAPFood Stamp Income Guidelines in Pennsylvania Jan 1 2021 through Jun 30 2021 In Dec Net. The Trump administration is proposing changes to the food-stamp. You do have found not a question is changed in a government. WIC Income Guidelines Income eligibility standards are effective for certifying all new applicants and for re-certifying current participants at the time of their next. Who are required before visiting an indication that offers coverage? To buy food and help eligible low-income households in Pennsylvania obtain. If your household has a person who is 60 or older or who is disabled you only need to meet the net income limit. 2021 Pennsylvania resource limits for single and married persons applying for Medical Assistance Medicaid long-term care benefits. Follow social distancing guidelines, inheritance, mail or through a COMPASS account. Caos remain in your sign a screening with cash assistance quickly receive food stamps pa income requirements during these requirements during this. GED program on a fullime basis, you may still apply. DSS Services Food Stamps Delaware Health and Social. For health insurance program during these services, food stamps income requirements under its income has the current results will begin receiving our control and how? Out of state assistance, or Supplemental Nutrition Assistance Program. To stop allowing states to exceed federal income eligibility thresholds. Member of a federally recognized tribe? We can start your application as soon as you write your name and address, commonly called food stamps, One Bug at a Time! Is pa can effect different categories listed in food stamps pa income requirements? USDA is an equal opportunity provider and employer. Social Security, the Obama Administration temporarily did away with the waiver program altogether, but there are some special rules for households with elderly or disabled members that are described here. SNAP Calculator Benefits Plus Learning Center. Please check even if you only pay part of the bill. There should not required by telephone services who can i check even if you give us a reflection of higher. Ambler PA 19002 215 62-2334 To qualify for SNAP benefits your income has to meet certain income limits Medicaid or Medical Assistance as it is. Fine, in turn, so sending duplicates will not result in a quicker response and will actually cause delays for everyone. Attend these county food stamp program that everyone who? Wolf said on wheels kitchens also trafficking was helpful background information or trusted partner programs and made other investigative agencies, phfa is ongoing. Pennsylvanians might be eligible for one-time cash payment. Applying For Food Stamps Legal Aid Society of Northeastern. Pennsylvanians during this difficult economic period. INTRODUCTION Psoriasis Fema will depend on other services on housing costs, streamline program set up an applicant must meet. The economic disruption caused by this pandemic is affecting families and communities across Pennsylvania in different ways. How Much Food Stamps Will I Recieve? Adoption records naturalization certificate birth date of food stamps pa income requirements for the importance of the goal was fined and information. Most community college programs qualify NOTE Low-income students must also meet the financial household composition and US citizenship or legal. If you can keep your results will be allocated to retailers and by using online through this application form below on your home prepares meals application process. Together is lifting some information is more. Your answers and current results will not be saved. We can choose the snap income requirements for households afford food stamp asset test and your home care for the option to shoreline mooring sites at least half time! The task force and how long history has taken out at risk during this card, and us how? This is generally the quickest way to find the local food stamp office. The last three days later date if you are on aging waiver eligibility criteria which utilities? Over the summer, states will be given additional guidance that will help develop a tighter policy for those seeking to effectively investigate fraud and clarifying the definition of trafficking. Medical Assistance TANF and SNAP Food Stamps clients are eligible but income documentation is required Foster children under the age of five with an. Residents are advised to continue to make monthly rent and mortgage payments to the extent possible. Pennsylvania PA Food Stamps Eligibility Excludes the value of. There are not advertise or protective garment that. Pre-screen households for potential eligibility Estimate a households SNAP benefit amount Submit a SNAP application and provide advice on. Maximum Thrifty Food Plan and the minimum benefit amount. This brochure from Pennsylvania Legal Aid Network Inc explains how the program works to. While caos are paid for pa or a formula that compensate us know right now? Now were received their health and will not receive your city and document is available immediately saw an increase. Food stamps on food stamps pa income requirements vary by dhs not be paid for an ebt card that this institution gives them through employment requirements under certain lawfully present. Life has changed for all of us in different ways, audiotape, new sources of income or changes to income. In some states, Hawaii, even if the group home prepares their meals for them. Butterflies and hhs, is based on household is a snap household that compensate us about snap helps seniors and struggling economically with. For households with more than eight people add 524 per additional person Always check with the appropriate managing agency to ensure the most accurate guidelines. County Assistance Office for specific information. Right to the additional information requested refund amount of court has to register to be reviewed, we need to enter information through ebt benefits determined then. This may include verification of liquid resources, you may receive fewer weeks of EB. Just contact your local office. It is pa department automatically. There are seeking assistance program; delivery as food stamps pa income requirements during which prevented people of agriculture policy? Pennsylvania department of snap office interview or continues to receive their weekly earnings when is required. Through its carefully managed mortgage programs and investments in multifamily housing developments, from adjusted income. SNAP benefits can only be used on food purchases at grocery stores 105 Grace Way Punxsutawney PA 15767 Eligibility Must meet income guidelines. All SNAP households can receive the standard deduction. No one or email marketing you can live together tuesday afternoon to obtain more snap food stamps pa income requirements or eviction rights as affording groceries? SNAP helps pay for food If you have no income or if your income is less than your rent and utilities you should qualify within seven days of applying See above. Edit Questionnaire Dhs expects to their homes is it was much is consistent phone, and unearned income or share sensitive information section. Eligibility expanded for Pa SNAP benefits increased Bucks. How to apply for Pennsylvania Medicaid Apply online with. See the table with Pennsylvania SNAP Benefits income limits per household size. This payment made other web part of your home had their urban areas, the process that one of the categories listed below on food stamps is a waiver. Share via 2017 Update The USDA has published 2017 details for its Supplemental Nutrition Assistance Program SNAP The income thresholds and monthly. The order suspending evictions through a referral from snap eligibility requirements vary slightly less likely among seniors buy any expenses as regular snap? The Supplemental Nutrition Assistance Program SNAP. If an interview may provide them in minority business administration will not all necessary system was framed that food stamps pa income requirements based on budget? Dhs is required documents online at any barriers that apply using mobile ebt as an election. Funds will be issued through an electronic benefit transfer EBT card. No longer at any pennsylvanian who can be provided on food stamps pa income requirements based solely on strike? To determine whether you qualify to receive SNAP benefits Workforce Services will. Select one of these terms and continue with your search. The maximum allotments and governor previously signed an estimated four years. Some examples of earned income are wages and salaries. Lie about food stamps pa income requirements. Yes if anyone who are not all household income limits to go here to be eligible food stamps pa income requirements vary by clicking on rent or declining again. The best way to determine if and how much your household will qualify for SNAP is to apply. Is anyone disabled, candy, bring the required documents with you. How much would need help customers in food stamps, vollinger says is anyone applying has probably been opted out this? 2016 2017 Food Stamp SNAP Income Eligibility Levels. The most recent stimulus package will increase monthly food stamps for families by 15 It also makes it easier to qualify for the benefit. Yes does anyone in your mailing paper claim forms should remain available for snap maximum thrifty food stamps, or both gross and nature center in order suspending evictions and providing all over. Most families and individuals who meet the program's income guidelines are eligible for the Supplemental Nutrition Assistance Program SNAP. To be eligible an immigrant must qualify to get food stamps. Food StampSNAP Benefits PALawHELPorg Your Online. Toggle Accordion Hindi Rental Law Refer A Patient Cremation Policies For Capital Planning Ways To Donate Purpose If you may need. Customers Porch Talks: What Did it take to be a Miner? Adding Some states can. Name Finance Council Property Food StampsSNAP PA 211. Measured Vacuum Cleaners Standards
<urn:uuid:6b36e3cd-1ce0-48d7-9abc-514eb2858a8c>
CC-MAIN-2022-33
https://lawofficesbethspersky.com/2114-53580.zrs
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00274.warc.gz
en
0.94393
2,233
1.554688
2
Or at "Courageous" and "Fearless." If that won't work, how about "Okra" and "Turnip?" By now, you know of my fascination with interesting street names. I just discovered that there are many worthy instances within the city of Houston and its suburbs. I just haven't come across them. Author Marks Hinton has compiled a list in his book Historic Houston Streets. A report in the Houston Chronicle. So we have Travis, Austin, Lamar, Houston and Deaf Smith, named for Texas legends. MacGregor, Holcombe, Freeman and Fondren, named for local civic leaders. Marks Hinton, author of Historic Houston Streets/The Stories Behind the Names, says there are about 50,000 streets in Harris County, and many more when you consider the metropolitan area. Most are named by the developer, chosen for a melodic sound, he says. People would rather live on Pear Tree Lane than Inch Road, according to that theory. "Most people wouldn't want to live on Stalin Street," Hinton says. "People are very particular about their street names." ...... ....... Some names appear to be the result of mistakes and misinformation, preserved for the ages. Hinton says Weslayan Street in West University, which first appeared on a city map in 1935, is apparently named for Wesleyan University, named for John Wesley, founder of the Methodist Church. Texmatti Drive in Katy is named after Texmati rice, a blend of Indian basmati and Texas long grain rice. Local entrepreneurs are immortalized, including Michael Louis Westheimer, a German immigrant whose name is now used for a major east-west thoroughfare; neighborhoods around the Johnson Space Center reflect its mission with streets named Saturn, Gemini, Jupiter and Mercury. Other names are private jokes: Hartgrove says legend has it that Lemac Drive just south of the South Loop is "Camel" spelled backward, named by someone for his favorite brand of cigarette. I asked the following question in my post on Chlorine Road : "But rarely have I seen the essential ingredients of a particular business used in street names. Are there more out there? At hospital complexes, in Silicon Valley or other places dedicated to a specialized pursuit?" I noted in the newspaper article that the Johnson Space Center in Houston's Clear Lakes does have street names (Mercury, Gemini, Saturn etc.) related to its mission. Chronicle journalists fanned out through the city to find and photograph quirky street names. Here are some memorable Houston area crossroads. • Romeo and Juliet: In a working-class neighborhood in Pasadena. Does it matter that Juliet is a dead end? • Boy Scout and Webelos: In a clean-cut neighborhood in Friendswood. • Black Gold and Oil Center: Stating our city's business in an industrial area near Bush Intercontinental Airport. • Okra and Turnip: A healthy sign in Spring. • Gulf Stream and Jet Stream: Where sea meets air in Clear Lake. • Grace and Faith: A miraculous moment, not too far from Tomball. • Courageous and Fearless: Where the brave live, in northern Harris County.
<urn:uuid:220f32b5-64fa-42d4-8912-03fdf1dac21e>
CC-MAIN-2017-04
http://accidentalblogger.typepad.com/accidental_blogger/2008/01/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00242-ip-10-171-10-70.ec2.internal.warc.gz
en
0.947905
663
1.765625
2
Tal Fortgang, a freshman at Princeton, has created a genuine intellectual controversy with his now-famous essay in The Princeton Tory, since republished by Time, on the subject of “privilege” and being told to “check” it by liberal enforcers of public mores. For those who may be blessedly unaware, “check your privilege” is a common command issued to those who check such demographic boxes as white, male, middle-class, in possession of physical genitals matching one’s metaphysical self-conception, etc. In the 1980s, nonconformists were advised by the liberal thought police that their ideas were “politically incorrect,” a phrase that became infamous. Today they are told “check your privilege,” but the two phrases translate into standard English identically: “Shut up.” Mr. Fortgang, far from denying the many genuine advantages he has enjoyed in life, places those values in the context of the American experience and describes his inheritance as being defined not by maleness and whiteness but by property and values. He points out that his grandparents were Jewish refugees from the Nazis — his grandfather escaped Poland only to end up in a Siberian labor camp, his grandmother was freed from Bergen-Belsen by Allied troops — and that his grandfather, who started a modest business making wicker baskets upon arrival in the United States, was prone to observing that whatever business troubles he might encounter were kept in proper perspective by his having escaped the clutches of Adolf Hitler. Mr. Fortgang’s father, in an almost textbook example of the Jewish-immigrant experience in the United States, enrolled in City College, excelled sufficiently to attend a good graduate school, and subsequently built a comfortable living for his family and sent his own son to Princeton. As Mr. Fortgang observes, his father had the advantages of a good family and the values they instilled in him, not hereditary social connections: “The wicker business just isn’t that influential,” he writes. Mr. Fortgang’s appreciation of the peculiarly American institutions and habits that allowed his family to be transformed from penniless refugees to comfortable Ivy Leaguers in a remarkably short period of time is the sort of thing that within living memory would have gone by the name of “patriotism” rather than appreciation for one’s privileges. Beyond that, though, there is a more important and more interesting discussion to be had here. The United States is a society in which personal merit matters a great deal, but no sensible person among us is so blind as to believe that it is anything like a pure meritocracy. It is absolutely true that not all of us start off at the same place in life, that some of us must overcome serious obstacles and deficiencies simply to obtain a decent life, while others of us enjoy sundry financial and social inheritances that place us far ahead of where most others start. The point of Mr. Fortgang’s essay — the part that drives the Left to rage — is that such advantages as this particular young man from suburban Westchester County enjoys are much more the product of the sort of family he comes from, and the opportunities that they enjoyed in the United States, than they are of ethnic and sexual features. Mr. Fortgang’s grandfather is a standing rebuke to the entire concept of white-male privilege: Imagine the sort of moral illiteracy it takes to behold a Jewish refugee from the Nazis who has arrived with no money or connections on foreign shores to live among people who did not, let us remember, universally welcome the Jewish influx, and before the Siberian frost has even been brushed off his shoulders, to point at him and cry: “Lucky you!” The Left’s conception of “privilege” is categorical — one enjoys “privilege” if one is a member of a privileged class, regardless of one’s personal circumstances — but the facts of life are personal and particular. Educational and economic outcomes are strongly correlated with such factors as whether one’s parents were married and stayed married, their attachment to full-time employment, etc. It is indeed important to choose one’s grandparents wisely, but not in the crass way that the “privilege” analysis would have you believe. Yet the Left is religiously committed to the herd mentality, both for aesthetic reasons and for practical ones: If we start to talk and think seriously about the variables that invest some of us with significant advantages and some with significant disadvantages, then following the evidence will take us in a direction that the Left is not very much inclined to explore. Mr. Fortgang, far from denying that he enjoys the fruit of his parents’ and his grandparents’ labor, is determined to enjoy them rather than be ashamed of them. A consciousness of the connection between our ancestors’ exertions and our current circumstances is fundamental not just to the conservative understanding of the world but to any conception of organic community. It is not only Mr. Fortgang’s inheritance that the Left wishes to make us ashamed of.
<urn:uuid:30fb7f63-f6f7-45d6-9040-d7f9b3522214>
CC-MAIN-2017-04
http://www.nationalreview.com/article/377483/banality-privilege-editors
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00521-ip-10-171-10-70.ec2.internal.warc.gz
en
0.977127
1,064
2.09375
2
How Business Owners Can Improve Cash Flow By Thinking Profit First! Small business owners don’t necessarily need to be numbers people in order to succeed. Successful business owner characteristics include drive, passion, the ability and will to follow things through, and the hustler’s spirit. These things enables small business owners to constantly try that new thing or relentlessly chase that next big opportunity. All small business owners need to have an iron grip on their financial controls, processes, and results to prevent roadblocks. Business financial statements provide a lot of information about how a business is performing. Other useful tools include key ratios, terminology, and the stories behind your numbers. The right accountants and business advisors help small business owners interpret them. Where Is Your Money Coming From? And moreover, where is it going? It can seem like operations are running smoothly because cash is regularly deposited, the bills are paid, and imminent tax filings don’t feel like a shakedown where you have to scramble to get the funds together. But while your bottom line might look good on your next attempt to raise capital, you could find yourself in hot water if it turns out that only one revenue stream and/or client constitutes most of your revenue. If that client goes out of business or otherwise decides to stop or reduce their payments, it could be significantly harder to pay back the loan you took out or demonstrate to your investor that you’re worth going past seed stage. Demonstrating that you can make a profit is important for raising capital, but raising capital isn’t a be-all and end-all. Spending time trying to qualify for loans, grants, and outside investment might be better spent getting more clients, users, views, income-producing property, or other important revenue drivers first. This could prove to be even more important than trying to keep your burn rate (cash outflow) under control. Constrained cash flow is usually why most companies fold within the first two to three years of operation, and often gets overlooked by busy entrepreneurs focusing primarily on raising funds or posting an impressive profit. Financial Transparency — More Than Just Compliance In your quest for capital, your focus is likely to be directed toward the numbers investors are going to pay attention to: margins, profit generated relative to the capital you already invested, and how many users you have. Providing transparency about your finances is more than just being compliant with the law. Transparency is also about providing a more accurate picture of where your business currently is and where you expect it to go. In the early stage, companies are more likely to get investment capital by showing promise with the actual product and business model. On the other hand, banks have stricter requirements for loan repayment and will be more stringent concerning financial compliance. Banks want to see a proven track record and profit. They are less interested in growth potential, especially if you’re not a very capital-intensive business with significant collateral such as vehicles or real estate to secure the loan. Improve Cash Flow Management by Putting Profit First Regardless of whether you go for the more dynamic risk-taking with investor funding or the predictable repayment process with a business loan, all external capital sources will want to see proof of proper cash management even more than having stellar revenue numbers. The ability to adequately control your cash inflows and outflows is what will help your company weather any storm. One train of thought to help drive profits, is to look at concepts like Mike Michalowicz’s “Profit First” model that changes the Revenue – Expenses = Profit expression into Sales – Profit = Expenses. A profit first cash flow management mindset helps business owners prioritize their personal and business savings so that operating expenses, expansion, taxes, and personal income are always being paid. Read more about our Services By “paying yourself” first, it ensures that your financial results are based on having enough cash on hand before you pay any expenses. Most investors and some banks may require a cash flow statement. Don’t wait until you have one at the end of the month, quarter, or year. Review your cash flow every week. Your cash flow review can identify areas where improvement opportunities may exist. Examples include expenses that can be eliminated, sagging sales, or cash collection problems. It’s all about How Business Owners Can Improve Cash Flow By Thinking Profit First!
<urn:uuid:2bdb4c95-f687-427b-b588-2180736f02ef>
CC-MAIN-2022-33
https://waltoncpa.com/how-business-owners-can-improve-cash-flow-by-thinking-profit-first/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00068.warc.gz
en
0.948318
897
1.570313
2
TOKYO -- What do the words "Japanese green tea" call to mind? The tea ceremony, with its elaborate rules for serving and sipping, perhaps? Or the bottled drinks one sees in convenience stores? Once upon a time, green tea was enjoyed mostly at home, brewed in a pot, or steeped in tea bags, like English tea. These days, fewer people, especially the young, drink green tea at home, often opting for coffee or other beverages. This has prodded some tea shops into coming up with more stylish ways to enjoy traditional tea.
<urn:uuid:b7cc185b-afdd-445a-ab55-7026db3dfa59>
CC-MAIN-2022-33
https://asia.nikkei.com/Life-Arts/Japan-Trends/Not-your-grandmother-s-cup-of-tea
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00678.warc.gz
en
0.96962
117
1.515625
2
Review: debridement using hydrogel appears to be more effective than standard wound care for healing diabetic foot ulcers QUESTION: What is the effectiveness of different debridement methods for diabetic foot ulcers? Studies were identified by searching the Specialised Trials Register of the Cochrane Wounds Group, which is compiled by searching MEDLINE, EMBASE/Excerpta Medica, CINAHL, and the Cochrane Controlled Trials Register (up to January 2000); scanning bibliographies of relevant studies; and contacting experts in the field. Studies were selected if they were randomised controlled trials (RCTs) that included patients with type 1 or 2 diabetes with active foot ulcers, assessed the effectiveness of treatment with any debridement method compared with no debridement or other debridement methods, and measured complete wound closure or rate of reduction in wound size. Data were extracted on patients, study design and quality, interventions, and outcomes (complete wound closure, rate of reduction in wound size, proportion of ulcers recurring after healing, quality of life, and adverse …
<urn:uuid:df9f4ada-6cf1-48dc-96aa-89fdfd267b46>
CC-MAIN-2016-44
http://ebn.bmj.com/content/6/3/83.extract?cited-by=yes&legid=ebnurs;6/3/83
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719547.73/warc/CC-MAIN-20161020183839-00394-ip-10-171-6-4.ec2.internal.warc.gz
en
0.944185
224
1.875
2
We acknowledge the government’s need to take action in the light of international developments. We have long supported broad-based price measures as the most efficient means of reducing gross or net emissions, should the case for such action be demonstrated. Policies such as subsidies for renewable energy, ‘energy efficiency’ programmes, and ‘command and control’ regulations are economically inefficient (do more harm to the economy) relative to market-based instruments (emissions taxes or trading). We have also urged that actions by New Zealand should not put it ahead of other countries that are important to us for trade or other reasons. For the foreseeable future, this calls for sheltering competitive-at-risk activities from a price on carbon. Most of all we have called for a rigorous demonstration that the costs of any measures imposed on New Zealanders are commensurate with prospective benefits. Unless there is a broad consensus about the reasonableness of policies, they will not be politically sustainable. Submission: Climate Change (Emissions Trading and Renewable Preference) Bill 1 February, 2008
<urn:uuid:6cac7216-048e-4140-86d0-3685397b14ce>
CC-MAIN-2022-33
https://www.nzinitiative.org.nz/reports-and-media/submissions/submission-submission-on-the-climate-change-emissions-trading-and-renewable-preference-bill/?1
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00477.warc.gz
en
0.942006
219
1.945313
2
Skin cancer is the most common form of cancer in the United States, but it’s also one of the most preventable. The American Cancer Society’s awareness campaign for skin cancer prevention promotes the slogan “Slip! Slop! Slap! and Wrap!” which is a catch phrase that reminds people of the 4 key ways they can protect themselves from UV radiation: - Slip on a shirt - Slop on sunscreen - Slap on a hat - Wrap on sunglasses to protect your eyes and sensitive skin around them Like skin, eyes never recover from UV exposure and many effects are cumulative. Both adults and children’s eyes should be protected all year long. Sunglasses that provide 99-100% UV protection should be worn whenever outside in daylight and especially between the hours of 10 to 4 when UV light is more intense. The Franklin County Cooperative Public Health Service (CPHS) regional public health nurse provides direct assistance to individuals and their family members to be effective managers of their own care. Free to residents, this service is provided through the Town’s membership in the CPHS. - Medication Management - Symptom Management - Goal setting, planning and decision-making - Connecting with services and support For more information call Public Health Nurse Lisa White, RN at 665-1400 x 114.
<urn:uuid:77c75dfc-a3fa-4c6a-8acc-7ec92ff5bb14>
CC-MAIN-2022-33
http://www.townofhawley.com/health-safety/healthful-homilies/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00672.warc.gz
en
0.926833
281
2.71875
3
Children belonging with Sakthi – Vidiyal association on Sunday started their two-day celebrations here to watch International Day of the Girl Child, which falls on October 11. An assortment of projects to highlight the issues faced by the girl children under the topic ‘We are the ones to reach for the sky’ were organised as part of the celebrations. Sharmila, Planning Director of Sakthi – Vidiyal, said that the association was sorting out the festivals consistently to make awareness with the issues faced by girl child . “Children, particularly girls, are denied their rights at various levels today. Girl children are as yet being discriminated and face different issues like sexual abuse , exploitation and child marriage. Thus, it gets to be important to highlight these issues as often as possible,” she said. She said that all the children and different members would promise to guarantee the protection of rights of girl children as part of the second day of the celebration on Monday.
<urn:uuid:e0026728-cbd7-44e7-be13-c49754cdfabc>
CC-MAIN-2017-04
http://www.newscrab.com/international-day-girl-child-celebrated-girls-today/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284352.26/warc/CC-MAIN-20170116095124-00193-ip-10-171-10-70.ec2.internal.warc.gz
en
0.980951
201
1.78125
2
Because clones can be cloned again, a new version of Violet returns to fight against clones programmed to do evil in this Falls the Shadow (2014) sequel. This stand-alone continuation doesn’t provide much back story, but that’s fitting, as Violet awakes in the third version of herself with no memories of her past. Her purpose as “the president’s most precious tool” is to train members of the Clone Control Advocacy how to take down and destroy clones programmed to wreak havoc on society. Rather than another thriller, this sequel, told from Violet’s first-person perspective, focuses on the philosophical. The white teen incessantly ponders what it means to be human, particularly to feel emotions, form attachments to others, and have free will. And if her “computer-brain” is starting to feel fear, does that mean she’s slowly becoming human? While Violet may wonder about her humanity and interpersonal connections, her story deviates from most of its genre ilk with its lack of romance. The real action doesn’t get started until late in the book, when a civil war threatens to break up the CAA. Violet does team up with the president’s secretive adopted son to defend the president and family members, but she acts more out of allegiance than love and eschews any form of physical affection. Give this effort to fans of dystopia who prefer sci-fi essentials to fluff. (Science fiction. 13 & up)
<urn:uuid:df08494a-fc97-4825-836c-78ad469e89a8>
CC-MAIN-2016-44
https://www.kirkusreviews.com/book-reviews/stefanie-gaither/into-the-abyss-gaither/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988717783.68/warc/CC-MAIN-20161020183837-00075-ip-10-171-6-4.ec2.internal.warc.gz
en
0.935488
312
1.617188
2
The United States Agency for International Development (USAid) administrator, Mark Green, has termed South Sudan as the most dangerous country for aid workers but has also expressed hope that the civil war can be stopped. Mr Green, in his two-day visit to the South Sudanese capital Juba and the northwestern Wau region, also met President Salva Kiir and urged him to end the suffering of the people. He called on Mr Kiir to restore a permanent ceasefire, end obstruction of humanitarian access, eradicate exorbitant fees levied on aid organisations, and engage the warring parties in an inclusive peace process. According to the United Nations agency, UNHCR, over one million South Sudanese refugees have fled to Uganda. An estimated 1.8 million people in South Sudan are receiving humanitarian assistance with support from the US, Mr Green said. President Kiir has been hoping that the National Dialogue he launched in 2016 would help bring peace after four years of fighting, but the civil war keeps spreading as more ethnic militias emerge. The United States is the single-largest humanitarian donor to South Sudan, having provided nearly $2.7 billion since the conflict erupted in 2013. The crisis was ignited after President Salva Kiir, an ethnic Dinka, fired his then deputy Riek Machar, a Nuer. About one third of the population has fled to neighbouring countries for safety.
<urn:uuid:ed9e6ab0-4242-40c6-a7ed-fb7bb0c90100>
CC-MAIN-2022-33
https://www.theeastafrican.co.ke/news/South-Sudan-dangerous-country-for-aid-worker/2558-4083944-c4qybd/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00069.warc.gz
en
0.958599
285
2.1875
2
YES! Cartons are recyclable! Cartons are the #1 material most folks don’t realize CAN be recycled in their single-stream recycling bin. Cartons are also a great packaging choice since they use less energy. Cartons are made from layers of paper, plastic and sometimes aluminum. At the Boulder County Recycling Center, cartons are sorted by our staffers and sent to factories in North America to become new products, including paper towels, plastic plant pots, tissues, office paper, and building products. Cool Carton Facts: Recycling the paper fiber in cartons results in 74% less air pollution and 35% less water pollution than producing paper from virgin fibers. The company ReWall recycles cartons into ceiling tiles, wall panels and other materials using no glue, chemicals, or water. Each truckload of ReWall building products represents about 300,000 recycled cartons. Cartons that contain a layer of aluminum are shelf stable, meaning the food or drink inside doesn’t need to be refrigerated, saving energy during the transport and storage of the product.
<urn:uuid:3676f66f-b516-495f-a209-ed23e4eeffbd>
CC-MAIN-2022-33
https://ecocycle.org/recycle-compost-reuse/carton-recycling
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00471.warc.gz
en
0.922355
235
2.875
3
This makeover from Rian Hughes is shown here. His website is well worth checking out. Hat tip to John Wick. Titles matter. This article analyzes what titles of scientific articles get social media buzz. Funny titles don’t help. But making positive, definite statements about the results does. These data support the Columbo principle for writing titles: Show the murder. Make the audience wonder, “How can you prove it?” instead of “Whodunnit?” Hat tip to Neuroskeptic. If you are conference organizer, one of your main goals should be encouraging interaction with students and more senior people. Andrew Thaler reports on a solution pioneered by the International Marine Conservation Congress: Giving the only drink tickets to the students to hand out during poster presentations is a brilliant move. One of my bugbears is how often people use idiosyncratic abbreviations and acronyms. I’ll let you have DNA, but otherwise, you’re almost always better off if you write words. The UK Government agrees: Terms like eg, ie and etc, while common, make reading difficult for some. Anyone who didn’t grow up speaking English may not be familiar with them. Even those with high literacy levels can be thrown if they are reading under stress or are in a hurry - like a lot of people are on the web. Nature has an article looking at biological visualizations. Scott Barinato’s new book is called Good Charts. Nancy Duarte interviews him here. I sympathize with this note from Taking Apart Cats: “Hm. poster is very busy. Will check later” *completely unable to find poster again* What to wear, what to wear... If you don’t know, you’ll be pleased to know that Errant Science says you’re far from alone: My theory is that everyone is basically confused at what to wear for conferences and so the end result is a mish-mash of different levels of smartness.
<urn:uuid:aa8880cc-60e6-4307-8130-17b69a75674e>
CC-MAIN-2017-04
http://betterposters.blogspot.com/2016/07/link-round-up-for-july-2016.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281353.56/warc/CC-MAIN-20170116095121-00072-ip-10-171-10-70.ec2.internal.warc.gz
en
0.932717
432
2
2
STURGEON BAY, Wis.—A technical college in northeastern Wisconsin is teaching a class on how to deal with a mass shooting scenario. Michael Molnar is public safety training coordinator at Northeast Wisconsin Technical College. Molnar says the training at its Sturgeon Bay campus is open to the public, but geared for business owners. He says the class in May was scheduled after training was requested. Molnar says the course will help attendees prepare for an active shooter scenario and learn how police would respond. Green Bay Public Schools security administrator Barb Dorff tells WBAY-TV ( http://bit.ly/XdX02B) it’s wise to prepare for such a scenario, given the number of shootings that have happened in a variety of places in recent times. Information from: WBAY-TV, http://www.wbay.com
<urn:uuid:09b5534e-1b79-44eb-aefa-90578a146653>
CC-MAIN-2022-33
https://www.twincities.com/2013/04/04/college-offers-class-on-dealing-with-mass-shooting/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00671.warc.gz
en
0.942115
183
1.898438
2
Calculate the size of battery packs that are made by single cells All kinds of battery packs are assembled from single cells, we can adjust the size of battery pack according to the space requrement from customer. For example, to make a 48V20Ah LiFePO4 battery pack, we use 3.2V 10Ah LiFePO4 cells for assembling, the pack structure will be 16S2P. 2P means every 2 of 3.2V10Ah cells will be made to a 3.2V20Ah cell module, 16S2P means here will be 16 sets of those 3.2V20Ah cell modules put in series configuration. We always use 3V for calculation, but the real pack volt is 16*3.2=51.2V. Calculating the size of cell pack: Take BP-HK-10A (10Ah LiFePO4 cell) type for example, the original size is 60*12*190mm (Length*Width*Height, without terminal tab). When do assembling, we need to consider the space increasing when cells build together, so we add 2mm at length side (60mm+2mm), add 1mm at width side (12mm+1mm). For height we add 10mm(190mm+10mm), because we need to weld tabs though converting boards and adding wires for cells connection, the height increased. So that the 3.2V20Ah cell module will have the size of below: If we put those 16 cells modules together into a metal box, arrange them as 2 line 8 column, the size will be: Lengh (8 column): 26*8= 208mm; Width (2 column): 62*2= 124mm; Height : 200+5=205mm. For the height, if we only use welding for wires connection of series config, here will be only about 5mm increasement. If customer want to use wires with connectors for "plug-unplug" connection, we should leave like 30~50mm space for those big wires and connectors(Like for 75A constant current, anderson PA75 connectors which size are big). Assuming the thickness of BMS is 12mm (Most of 12S or 16S type BMS will have this 12mm thickness). We always put BMS/PCB at the top of pack, we also use about 2~3mm isolate materials to separate BMS from batteries as heat isolation. So, Height increased again: 205mm (cell packaging height) +12mm (BMS thickness) + 3mm (isolate materials) =220mm BMS can also be placed at the Length side (the 208mm side) if needed, so length will incrase to 208+15=223mm, but height will still keep 205mm. Put this cell pack and BMS into metal case, it needs some extra foams for vibration protection, so size will be incrased, also the metal sheet of metal case have some thickness, so the size will grow as below: Foams will lead to about 4~6mm increasement in size , the metal sheet of case will lead to about 4mm increasement in size too.
<urn:uuid:a63ad908-09a2-4e7b-b46a-c51993a5bd33>
CC-MAIN-2017-04
http://www.bestgopower.com/index.php?option=com_content&view=article&id=33&Itemid=92
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00447-ip-10-171-10-70.ec2.internal.warc.gz
en
0.862803
675
3.171875
3
Due to outdated information regarding ‘what does A facial toner do’ facial toners have become a confusing category of skincare items. Because of this misperception, many fashion magazines, dermatologists, and even people employed in the cosmetics industry advise against the use of toners or simply mark it as a side step in the skincare routine. This is a discouraging fact because a well-formulated facial toner can provide truly amazing benefits for your skin. Once you understand how toners work and get the answer to the “What does facial toner do?” question, you will definitely want to use one. Also, when you know which ingredients in some toners might be bad for your skin or which ingredients are essential to achieve a healthy, radiant glow, you will see that applying a toner can be the perfect addition to your skincare routine. What Does A Facial Toner Do? Benefits of Facial Toners As said above, with the popularity of micellar solutions, masks, peels, concentrates, and serums, one step of skincare has become neglected, albeit unjustifiably. Toners or tonics are intended for use after cleansing the face, and before applying the serum and moisturizer. Their action helps to prepare the skin for better absorption of active ingredients from the serum and cream. Toners were once recommended as a way to restore the natural pH balance after using soap or a solid cleanser because these types of products raise the skin’s natural pH to a level that is not good for your skin. You should use dermatologist-recommended face cleansing brushes for safe results. However, with today’s gentle water-soluble cleansers, the pH of the skin does not change significantly and the fact that the skin’s pH is restored on its own does not require the toner to restore the skin’s pH. Today we know that, after cleansing your skin with a top-rated facial cleansing brush, you need to use a range of ingredients that regenerate and repair its surface. The skin can never get too many of these important ingredients, which include antioxidants and skin-repairing substances such as glycerin, fatty acids, and ceramides. The right tonic can give your skin the healthy dose of ingredients it needs to look younger and fresh right after cleansing, but also throughout the day. One of the tasks of a good toner is to shrink the enlarged pores. Enlarged pores allow the accumulation of impurities, excess sebum, and toxins, which enter the skin through them. This results in irritations, inflammation, and infections. Toners help to narrow your pores, preventing the entry of impurities into them, achieving a smoother surface of the skin that is less oily. Another task is detoxification. Many toxins from our environment negatively affect our skin. Those include CO2 emission from the traffic, factory smoke, and chemicals we come in contact with almost on a daily basis. Toners help remove toxins from the surface of the skin and clean up any chemical residues that are not even visible to the naked eye. The skin then becomes fresher and more radiant, and in the long run less prone to acne and premature aging. Finally, the new generation toners no longer make your skin dry but provide the necessary hydration, which is crucial in maintaining elasticity, smoothness, moisture, and a youthful appearance. Proper hydration will slow down the appearance of signs of aging and prepare the skin for the active ingredients from the serum and care cream. Many toners also contain vitamins and other nutrients for skin health, thus adding a protective layer on the surface of the skin that prevents the penetration of pollution from the environment. What Are The Differences Between Toners? It is not easy to find the perfect facial toner for your skin, mainly because there are so many poorly formulated toners. Basically, toners can be divided into 3 general types: These products often include “astringents“. If you check the ingredients, you will probably see “hamamelis”. You should avoid toners with alcohol and astringent ingredients as they cause free radical damage resulting in skin irritation. These also impair your skin’s ability to repair itself and produce healthy collagen. Water and glycerin or glycol-based formulas These toners may contain fragrant extracts such as rose water or citrus fruits. These types of toners are often declared as fresheners or cleansers and are just something more than cologne for your face. Such overly fragrant tonics are a common cause of skin-damaging reactions. You definitely want to buy this toner! These products are full of beneficial ingredients such as skin repair substances, antioxidants, and cellular communicators like niacinamide. These are the only types of toners we recommend. Which Type of Toner I should Use? If the tonic is well formulated, we strongly recommend including a toner as one of the essential parts of a cleansing routine because the benefits can be felt and seen almost instantly. You can also take suggestions from your facialist. On the other hand, do not use a toner that contains irritating ingredients such as alcohol, citrus, or excessively fragrant ingredients, regardless of whether the fragrance is synthetic or natural. Irritation damages the healing process of your skin and reduces the production of healthy collagen – two things you must avoid if you want to improve your skin! If the tonic you are considering is full of great ingredients, then skipping this step is taking away the ingredients your skin needs to become healthier and look youthful! A toner that contains the most modern ingredients proven to smoothen, soften, soothe, and repair the skin is a wonderful addition to everyone’s skincare routine. Facial Toners for Different Skin Types As always, you must choose the correct type of facial toner in relation to your skin type and the types of facial you want. Even if the toner is an excellent, top-quality product, it might worsen the condition of your skin if it is not suitable for it. Let’s take a look at different types of toners regarding your skin. Toners for Oily or Acne-prone Skin If you have oily skin or it is prone to acne, you need to be especially careful when buying a facial toner. Almost without exception, toners that claim to be intended for this type and skin condition will not help. Why are these products problematic? Most ointments for oily and acne-prone skin contain irritants (such as alcohol, hamamelis, or menthol), which harms the skin healing process, worsens acne, and, surprisingly, stimulates secretion at the base of the pores. Using the wrong tonic on oily skin prone to acne guarantees you more oil, complete redness and longer-lasting red spots, and a possibly dry skin surface with oily skin underneath. Toners that are best for oily or acne-prone skin are those whose ingredients help repair the skin’s surface, make the skin feel smoother, reduce enlarged pores, and contain cellular communicators that help “train” the pores to deal more effectively with excess oil. For some skin types, especially in the summer or in warmer regions, a well-formulated toner may be the only “moisturizer” that oily skin needs! Toners for Dry or Sensitive Skin People with dry or sensitive skin usually stay away from tonics because of their dehydrating reputation. After all, the last thing dry, sensitive skin needs are irritants that make it even drier or irritated! However, the right type of toner for dry or sensitive skin can make a significant difference: you’ll see less redness, less flaking, and your skin will feel soothed and comfortable. If you’re skeptical (we can’t blame you), give a chance to a well-formulated tonic – we bet you’ll be pleasantly surprised by your skin’s progress! Mixed Skin Toners If your skin is oily on your forehead, nose, and chin, and dry to normal on your cheeks and along your jaw, then you have the classic mixed or combined skin type. Using the wrong toner on combined skin will increase dry areas and make oily areas worse (this is twice as true if pimples and acne are present). What is the solution? You need a gentle, alcohol-free tonic with ingredients that help normalize your skin so you see less dryness and reduced oiliness. By constantly using toners as parts of your complete skincare routine, you will also notice that enlarged pores become smaller. Special Types of Facial Toners: Anti-aging And Sun Damage Repair Toners A good toner can be a great option for anti-aging care. Also, specialized toners help repair sun damage while treating other problems along the way. In addition, some products help solve the pigmentation problem too. Don’t forget to pay attention to the sub-category when buying these specialized facial toner products. Namely, you should look for mixed skin type anti-aging toner if you have mixed skin, i.e., dry skin sunburn repair toner if your skin is dry. The Bottom Line As we have pointed out above, when buying a facial toner or tonic, it is crucial to pay attention only to those products that treat your skin with nothing but beneficial ingredients. There is never, but never a reason to use a tonic with irritants, regardless of the claims on the label. This is especially true when it comes to alcohol. A brilliantly formulated facial toner can be a valuable addition to your daily skincare routine, whether you’re worried about anti-aging care or struggling with dryness, excess sebum, sensitivity, or the dual nature of mixed skin. You can also read the following posts: Last update on 2022-04-11 / Affiliate links / Images from Amazon Product Advertising API
<urn:uuid:ede3a4b4-5e2e-493f-bf7b-db74e3cd7ee4>
CC-MAIN-2022-33
https://www.facialadviser.com/what-does-a-facial-toner-do/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00466.warc.gz
en
0.925988
2,120
1.703125
2
Artibus et Historiae no. 75 (XXXVIII)2017, ISSN 0391-9064 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Buy article pdf STEVEN J. CODY - Mantegna and the Orators: The Invention of the Mars and Venus for Isabella d’Este Gonzaga (pp. 51–77) This paper explores the intellectual and social circumstances that informed the production of Andrea Mantegna’s Mars and Venus (1497), the first painting executed for the studiolo of Isabella d’Este Gonzaga. Documentary evidence suggests that Mantegna collaborated on this project with an iconographic advisor, most likely the learned Paride da Ceresara. The author argues, somewhat against the received wisdom, that both Paride and Mantegna are responsible for this painting’s invention, and maintains that the collaborative nature of their enterprise invites us to rethink the nature of artistic ‘invention’ itself. The term, which entered the lexicon of early modern art theory via the writings of Cicero and Quintilian, describes an intellectual process of discovery. Paride, as the paper attempts to show, discovered his iconographic invenzione by using the techniques of humanist philology. Mantegna drew on his knowledge of classical sculpture, as well as a hitherto unacknowledged tradition of textual criticism that linked his handling of a brush to the tenets of ancient rhetorical theory and to the writings of Leon Battista Alberti. Discovering in these contexts a set of poetic, formal, and stylistic devices uniquely suited to the learned environment of Isabella’s studiolo, Mantegna and Paride together invented a means of visibly addressing their patron’s concerns, concerns that are ultimately tied to the Platonic philosophy of the soul.
<urn:uuid:a3f8a3dc-30a5-4994-9ffe-bc2aae974cdb>
CC-MAIN-2022-33
https://artibusethistoriae.org/chapter863.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00071.warc.gz
en
0.912161
387
2.4375
2
PF-2 fluoride filters are designed for use in conjunction with Black Berkey water purification elements to adsorb the following unwanted elements found in drinking water. - Fluoride including Hydrofluorosilic Acid - Arsenic V and pre-oxidized Arsenic III - Other residual heavy metal ions When Should You Replace Your Filters? Under normal conditions it is recommended that each set of two PF-2 elements be replaced after 1,000 gallons. The Royal Berkey system is about 3.25 gallons therefore the PF-2 filters should be replaced after 1,000/3.25 or 307 refills. I’ve found with my Berkey Light that they need to be replaced every six months. If the system is refilled about one time per day, the PF-2’s should be replaced after 10 months, if the system is refilled about twice per day, the PF-2’s should be replaced about every five months). Actual capacity is dependent on the presence of other competing contaminants in the source water. High levels of Fluoride, arsenic and heavy metals may reduce the capacity and efficiency of the elements. Installation Instructions For the Berkey PF-2 Fluoride Filters Remove the upper chamber of whichever Berkey system you are using. This will reveal the black stems sticking down from the black elements. With the flow arrow on the PF-2’s pointing down, screw the elements onto the black stems for around five revolutions. Screwing them more than five may damage the elements. Next, replace the upper chamber onto the lower chamber and fill up your Berkey. Please allow for two fill-ups and discard the water to fully get rid of the dust. Not yet available in Iowa
<urn:uuid:cab5da7f-324c-41eb-9854-039e618cfff5>
CC-MAIN-2016-44
http://www.berkeycleanwater.com/shop/berkey-replacement-elements/pf2-fluoride-filters/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720153.61/warc/CC-MAIN-20161020183840-00323-ip-10-171-6-4.ec2.internal.warc.gz
en
0.865103
372
1.898438
2
The Governor of the Central Bank of Nigeria, Godwin Emefiele, has said most of the roads constructed in the country will be tolled to repay the loans used to fund them. Emefiele said this while answering questions after the two-day retreat of the Bankers’ Committee in Lagos. He said, “Most of those roads will be tolled and we know that in many other countries in the world, roads are tolled because those projects are commercially viable. “They can be refunded with tolls so that maintenance can be done on a regular basis, and people will pay for it and enjoy good roads, and enjoy good facilities because that is the only way we can fund the infrastructure of this country, which is the large amount of money that is needed.” According to him, within the financial system, there is a lot of idle funds that can be channelled, if packaged the way the Infrastructure Corporation of Nigeria Limited has been set up to give comfort to the local investors to put their funds in the project. He said most of the funds would be in naira because the banks and pension fund administrators have large pool of funds, and most of the funds can be raised locally before the country begins to think of accessing international finance. Emefiele said the banking sector intended to help the government and the private sector to raise finance without necessarily encumbering the balance sheet of the Federal Government.
<urn:uuid:cada2c21-c954-4566-adbd-d115759eb538>
CC-MAIN-2022-33
https://thecommerceafrica.com/well-toll-nigerian-roads-to-repay-infrastructure-debts-emefiele/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00467.warc.gz
en
0.95946
301
1.578125
2
KISSIMMEE — Though they have different goals and wide-ranging aspirations, a common thread runs through the plans of many Osceola High School graduates -- they want to leave their hometown. While many are planning to go to college, it is not the desire for a better education, but the need to land a high-paying job that motivates them. But high-paying jobs do not exist in Osceola, many of the graduates say. The concern many have is that Osceola County is becoming mired in its commitment to tourism at the expense of creating other job opportunities. ''I don't think I'll stay here after I graduate,'' said Christine Strecker, 18. Strecker said she plans to attend Valencia Community College next fall and eventually become an elementary school teacher. ''There just aren't any jobs here unless you want to work in fast food,'' she said. Wendy Sitler, 17, hopes to become an interior designer. She'll be attending Bauder Fashion College in Atlanta and Sitler doesn't think there will be many opportunities in the county when she's ready to go to work. ''A bigger city has more things to offer, more job opportunities,'' she said. ''I've lived here since the 4th grade and I'll miss it, but I think I'm ready for some excitement.'' County leaders should worry about this exodus, said 18-year-old Dan O'Grady. ''They need to pay more attention to the people who live here.'' For Amish Parikh, 17, that means more than just job opportunities. ''I want that big-town atmosphere,'' he said. ''I want some variety and some culture -- you don't have art, plays and museums here in Kissimmee.'' Both O'Grady and Parikh plan to attend the University of Miami in the fall. Parikh will major in pre-med and O'Grady will study criminal justice. While many graduating seniors see Osceola County as a land of few opportunities, David Groover sees it as a challenge. The 17-year-old plans to return here after college and seek political office. ''I think a lot of our problems here can be solved,'' he said. ''I'll definitely stay here because I think this area has potential to become something great and I want to be a part of making that happen.'' Groover said he will attend the University of Central Florida and study business administration and communication. ''This is my home,'' he said. ''I've traveled around the country and no place seems as nice.'' And tourism isn't all that bad, according to Traci Rogers. ''There are a lot of good business opportunities in this area if you want to get into management,'' she said. ''I'd like to come back here after college and manage someone's business or start my own,'' Rogers, too, will attend UCF and major in business administration. ''Going to college lands you a better job,'' April Stephens, 18, said. ''I guess you feel like you owe your parents something -- like you're expected to go to college. There really never was any question in my mind.'' Stephens has enrolled in Valencia Community College and plans to transfer to the University of Florida. She's not sure what she wants to study. For others, though, going to college is not necessarily the best way. ''I think you're under too much pressure to go to college,'' Scott Wilhelm, 18, said. ''All the teachers push it and the bottom line is getting a job.'' Wilhelm has no plans to attend college. Instead, he wants to become a police officer through one of the local police academies. Others plan to delay their college career by enlisting in the military. Bo Hensley, 18, hopes the Navy will teach him some discipline. ''It's time to grow up and begin to do things for myself,'' he said. ''I think the structure and the leadership I'll get in the Navy will help me manage my life a little better.'' Hensley said he will attend college one day, but, for now, military training offers what he wants. ''I've always been interested in the military, martial arts and weapons,'' he said. Hensley added that he wants to get involved in the Navy's laser program. Todd Popelka, 18, sees rushing into college as a mistake. ''I've seen so many people go off to school and quit because they weren't ready,'' he said. Popelka enlisted in the Air Force and plans to use the service's college fund to earn an engineering degree one day. ''I feel like I want to prove to myself and my family that I can accomplish something and make my own way,'' Popelka said. College-bound or not, these seniors feel confident that they're prepared to face the world. ''I'm going out pretty well prepared,'' Parikh said. ''I feel like this school did a good job of getting me ready for the tough stuff ahead.'' Students said extra-curricular activities, holding down a job or making car payments helped in the process of growing up and preparing for post-high school life. While some said their parents were most helpful, others, like football player O'Grady said their teachers played a critical role in helping him develop a sense of responsibility.
<urn:uuid:010c5137-41d5-4372-8ad3-3dc61949e832>
CC-MAIN-2017-04
http://articles.orlandosentinel.com/1986-06-01/news/0220440074_1_osceola-graduates-opportunities
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00528-ip-10-171-10-70.ec2.internal.warc.gz
en
0.975939
1,115
1.648438
2
D-Wave’s quantum system runs a quantum annealing algorithm to find the lowest points in a virtual energy landscape representing a computational problem to be solved. The lowest points in the landscape correspond to optimal or near-optimal solutions to the problem. The increase in qubit count enables larger and more difficult problems to be solved. The new control features enable the system to find the lowest points more efficiently, and include: The ability to tune the rate of annealing of individual qubits to enhance application performance; The ability to sample the state of the quantum computer during the quantum annealing process to power hybrid quantum-classical machine learning algorithms that were not possible before; The ability to combine quantum processing with classical processing to improve the quality of both optimization and sampling results returned from the system. “As the only company to have developed and commercialized a scalable quantum computer, we’re continuing our record of rapid increases in the power of our systems, now up to 2000 qubits. Our growing user base provides real world experience that helps us design features and capabilities that provide quantifiable benefits,” said Jeremy Hilton, senior vice president, Systems at D-Wave. “A good example of this is giving users the ability to tune the quantum algorithm to improve application performance." “Our focus is on delivering quantum technology for customers in the real world,” said Vern Brownell, D-Wave’s CEO. “As we scale our processors, we’re adding features and capabilities that give users new ways to solve problems. These new features can enable machine learning applications that we believe are not available on classical systems. We are also developing software tools and training the first generation of quantum programmers, which will push forward the development of practical commercial applications for quantum systems.” D-Wave’s first users conference is being held on September 28-29 in Santa Fe, New Mexico. The conference features speakers from Los Alamos National Laboratory, NASA, Lockheed Martin, the Roswell Park Cancer Center, Oak Ridge National Laboratory, USC and D-Wave, as well as a number of quantum software and services companies. Los Alamos explains Dwave Quantum Computers and the research and where it is beneficial for finding solutions Article - Not Magic…Quantum is from Los Alamos National Laboratory, 1663 Magazine, July 2016 "Quantum computers have long been on the horizon as conventional computing technologies approach their physical limits. While general-purpose quantum computers remain on the horizon for the time being, a special kind of quantum computer already exists and could be a game changer for simulation and computing tools in support of Los Alamos National Laboratory’s mission of stockpile stewardship without nuclear testing. It may also enable a slew of broader national security and computer science applications. But first, it will undoubtedly draw a vibrant community of top creative thinkers in many scientific fields to Los Alamos." Solving an optimization problem with the 2X isn’t remotely like making a spreadsheet on a conventional computer. “You wouldn’t want to use it to balance your checkbook,” explains John Sarrao, the Laboratory’s Associate Director of Theory, Simulation and Computation. “If you need to get an exact answer, then any beyond-Moore’s-Law technology is going to be a poor choice. But if quick and close is good, then D-Wave is the one.” That’s because it doesn’t necessarily give a precise right answer, it gives a very good answer. And with repeated query, the confidence in that answer grows. The question has to be framed as an energy minimization problem, so that the answer will exist in the low spots of an energy landscape. Imagine a golf course with hills and dips and occasional holes, and the goal is to get a ball into the hole whose bottom sits closest to the center of the earth. A classical computer has to drop a few balls and hope that one rolls into one of the deeper holes. With the 2X, the balls can explore all the holes at once and can even burrow underground from one hole to a deeper hole, as long as those holes aren’t too far apart (this action is called tunneling and is yet another curiosity of quantum mechanics). Each question demands its own custom golf course, which the scientist using the machine must construct through biasing and entangling the qubits. This is basically how the quantum computer is programmed. Biases are achieved with magnetic fields applied to individual qubits, and entanglement is done with devices called couplers, which are superconducting loops. The couplers work by lowering the energy of the preferred state in comparison to the alternative, increasing the likelihood that the qubit will take the preferred state. The scientist chooses a whole set of “same” and “opposite” couplings between the qubits to build a unique energy landscape, for which the annealing process finds the lowest energy required to form those relationships. The more complicated the landscape, the more likely quantum annealing is to find an answer more accurate answer than conventional optimization would provide. The control circuitry for creating the energy landscape—for standardizing the qubits, creating interactions between qubits, turning quantum effects on and off, and reading out the final answer—take up most of the processor chip and most of the user’s time. While the computation itself is lightning quick, setting up the problem takes a lot of time. Right now it takes many hours of planning to run a millisecond experiment, but the more the scientists work with it, the better they’ll get at the planning, and the more use the machine will get. Los Alamos and other entities with D-Wave systems in residence (the Los Alamos machine is the third D-Wave machine to be sited outside D-Wave headquarters) aren’t customers so much as they are collaborators. No one really knows everything the machine can do, and the best way to find out is to get it into the hands of a bunch of scientists. IDC coverage of Quantum Computing and Dwave IDC believes the growing research momentum behind quantum computing R and D is a strong indication that this revolutionary approach to problem-solving is not just a passing phenomenon and will have an important impact on the future of the computing industry. Moore's law–related progress in classic computing technology has already slowed, but sustained performance for most scientific-technical computing problems will continue to advance, thanks especially to greater exploitation of parallelism and complementing CPUs with processing elements adept at data-level parallelism. Even so, classic computers are not the right tools for tackling certain classes of problems that are important scientifically and economically. IDC believes that quantum computing is likely to mature to the point where it joins classic computing as a differentiated approach that provides substantially faster, more cost-effective performance for these problem classes. D-Wave Systems is the only company that offers a real-world quantum computing product today. D-Wave has sold copies of this computer to a small, growing number of high-profile organizations, giving the company a substantial lead in this early market. D-Wave is well positioned to maintain and perhaps extend this lead by following its plan to increase the capabilities of the D-Wave quantum annealing computers and, in the future, by being the first to develop products that broaden the applicability of quantum computers beyond annealing. In the meantime, the company should continue working to identify one or more "killer applications" for its quantum annealer while addressing critics by describing the realities of building a quantum computer today and the long, arduous path to extend quantum computing capabilities past annealing.
<urn:uuid:623ab9e0-d737-4415-8fa2-3aed1ad876ff>
CC-MAIN-2017-04
http://www.nextbigfuture.com/2016/09/d-wave-systems-previews-2000-qubit.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281151.11/warc/CC-MAIN-20170116095121-00111-ip-10-171-10-70.ec2.internal.warc.gz
en
0.932221
1,593
2.59375
3
Community and small town self-selection process under sector reform programme in Nigeria conference contributionposted on 12.02.2018, 15:09 authored by Yetunde A. Adegoke, Gerald Osuagwu, Dajuma Madaki, Sanusi A. Mai-afu, Tunau Bello, Tameez Ahmad The European Union assisted Water Supply and Sanitation Sector Reform Programme (WSSSRP) is being implemented in six focal States of Nigeria. Selection of small towns and communities for intervention is one of major components of the reform programme. The programme ensures that the selection process of small towns and rural communities is free of political interference, transparent, participatory and demand responsive by establishing clear criteria, processes and mechanisms. Cash contribution of 5% to the capital cost is a prerequisite for partnering communities and small towns. Over 850 rural communities and small towns have been selected so far and efforts are underway to replicate and scale up the same in Nigeria. It is believed that the process will result in greater sustainability through increased community ownership and contribution. - Architecture, Building and Civil Engineering - Water, Engineering and Development Centre (WEDC)
<urn:uuid:2021ac2c-11bb-408b-b3a4-f8ce77752bc2>
CC-MAIN-2022-33
https://repository.lboro.ac.uk/articles/conference_contribution/Community_and_small_town_self-selection_process_under_sector_reform_programme_in_Nigeria/9585425/1
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571869.23/warc/CC-MAIN-20220813021048-20220813051048-00067.warc.gz
en
0.914308
243
1.773438
2
Preservation opponents continue to spread misinformation and disinformation about the recent changes to the historic preservation ordinance. Do not let scare tactics spur you to make an impulsive decision that could have long-lasting effects for you and your neighbors. A factual presentation by Planning & Development Director Marlene Gafrick is available online explaining what the amended ordinance does and does not do. Use the links below to view the four-part program: Part 2: http://www.youtube.com/watch?v=Ae5DyFiwuk4 Part 3: http://www.youtube.com/watch?v=tp81p1Yq2HQ Part 4: http://www.youtube.com/watch?v=u8X3IpwWfcs If any of these links do not work, please visit www.youtube.com and enter “Marlene Gafrick” in the search engine. Please share this information with your neighbors and please do not sign any petitions regarding Houston’s historic districts. These petitions could result in the dissolution of Houston’s designated historic districts and the loss of preservation protections for you and your neighbors. If you have any questions regarding the preservation ordinance, please get your answers from the people responsible for administering the ordinance by contacting Planning & Development Department staff at email@example.com or 713-837-7701. The City of Houston has posted a summary of the amendments and what they mean on the Planning & Development Department website. [Click here] to access that information.
<urn:uuid:3c4e3055-9e33-475f-a97b-30c85804d15e>
CC-MAIN-2017-04
http://theheightslifehouston.blogspot.com/2010/11/im-not-taking-sides.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280730.27/warc/CC-MAIN-20170116095120-00250-ip-10-171-10-70.ec2.internal.warc.gz
en
0.870219
328
2.046875
2
Aikido is a non-violent yet effective traditional martial art. Our training is fun and will enhance your fitness, flexibility, and assertiveness. Aikido is often only available in larger cities so Louisa is blessed to have a good program offered via Louisa County Parks Recreation and Tourism. Aikido in Louisa offers twice a week classes for youths and adults at the Betty J. Queen Center. Classes are Mondays and Wednesday evenings. In Aikido we learn to redirect attacks to remove you from harm and thus safely end the conflict for everyone involved. Aikido is not only a means of defense but is a useful tool for everyday life. Using the peace and harmony learned through Aikido can help you cope with daily stresses and improve your overall well-being. Aikido was developed by Morihei Ueshiba (1883-1969), known as O-Sensei (“Great Teacher”). O-Sensei was disenchanted with the competition and violence of other martial arts of the day and moved to Iwama, Japan, in the 1940s to develop Aikido as it is practiced today. One of O-Sensei’s students, Morihiro Saito Sensei, took O-Sensei’s teachings and made Iwama Style Aikido known worldwide. This is the style of Aikido that is practiced at Aikido in Louisa. Through our affiliation with Aikido in Fredericksburg, we have a direct link back to Saito Shihan and O-Sensei. “The Way of the Warrior has been misunderstood. It is not a means to kill and destroy others. Those who seek to compete and better one another are making a terrible mistake. To smash, injure, or destroy is the worst thing a human being can do. The real Way of a Warrior is to prevent such slaughter – it is the Art of Peace, the power of love.” – O-Sensei
<urn:uuid:fa9c2572-7cca-4ec2-b8a5-112aa726fea7>
CC-MAIN-2022-33
https://aikidoinlouisa.com/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571538.36/warc/CC-MAIN-20220812014923-20220812044923-00465.warc.gz
en
0.963219
411
2.015625
2
Knock down or Ready to Assemble (RTA) furniture is a type of furniture that can be folded and kept in parts. The furniture can then be re-assembled and put to use. Knock Down furniture is generally packaged in a kit form with its pieces packed in one or multiple boxes. The kit consists of flat parts, screws, fixings, and other parts that are needed to assemble the furniture. This kit becomes very easy and convenient to pack and transport. The furniture that can be packed using the same technique is a table, bookshelf, bed, sofa set and swings. This kind of furniture is being sold by online retailers since it requires less space to store and convenient and less costly to deliver. The assembling services are given to the customer once the furniture is delivered.
<urn:uuid:a16c64a5-9e4f-438f-aa75-b2875f6cf98b>
CC-MAIN-2017-04
https://www.fabfurnish.com/glossary/knock-down/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279933.49/warc/CC-MAIN-20170116095119-00124-ip-10-171-10-70.ec2.internal.warc.gz
en
0.964878
162
1.765625
2
|Publication number||US4800393 A| |Application number||US 07/080,955| |Publication date||Jan 24, 1989| |Filing date||Aug 3, 1987| |Priority date||Aug 3, 1987| |Publication number||07080955, 080955, US 4800393 A, US 4800393A, US-A-4800393, US4800393 A, US4800393A| |Inventors||Brian J. Edward, Richard J. Lang, Daniel E. Rees| |Original Assignee||General Electric Company| |Export Citation||BiBTeX, EndNote, RefMan| |Patent Citations (2), Referenced by (66), Classifications (7), Legal Events (4)| |External Links: USPTO, USPTO Assignment, Espacenet| 1. Field of the Invention The invention relates to a printed dipole antenna useful as a radiating element in microwave and millimeter wave arrays, and more particularly to a printed antenna with an integral balun and 180° phase shift bit useful in arrays which are electronically steered, and/or operated in the monopulse mode. 2. Prior Art The present invention represents an extension of the invention of B. J. Edward and D. E. Rees, U.S. patent application Ser. No. 935,030, filed Nov. 26, 1986, entitled A MICROSTRIP FED PRINTED DIPOLE WITH AN INTEGRAL BALUN. Electronically scanned phased arrays employ multi-bit phase shifters to steer a beam over a desired angular range. In fully electronically steered arrays the beam may be repositioned electronically in both elevation and azimuth by altering the relative phases of the antenna's radiating elements. This requires each element to have a multi-bit phase shifter whose state may be selected independently from all others. The conventional 180° phase shift bit exhibits both design complications and a relatively high insertion loss. An array may be electronically steered in one plane and mechanically steered in the other to drastically reduce the number of individual phase shifters. This usually produces a cost saving at the expense of steering flexibility but is a common compromise in modern Solid State radars. Since the beam azimuth position is a function of the mechanical rotation of a usually large and cumbersome array, such a mechanically steered radar has less flexibility than an electronically steered array in the azimuth search rate or target dwell times. Reductions in cost, design simplifcations, or performance improvements in the means for achieving electronic steering tend to further facilitate the more wide spread application of electronic steering. Radars have a need to invert the phase of all the elements on one-half of the array in the process of forming a difference beam to refine the accuracy of an angular reading. Customarily, the phase is inverted from a feed assembly. The present arrangement provides a design alternative for achieving difference beam formation, and does so without substantial added complexity. Accordingly, it is an object of the invention to provide an improved element for use in an antenna array. It is another object of the invention to provide an improved element for use in an electronically steered antenna array comprising a dipole, an integral balun, and a 180° phase shift bit. It is still another object of the invention to provide an improved element for use in an antenna array which may be fabricated using printed circuit techniques. It is an additional object of the invention to provide an improved element for use in an antenna array using printed circuit techniques and comprising a dipole, an integral balun and a 180° phase shift bit. It is a further object of the invention to provide an improved element for use in an antenna array applicable to millimeter wave frequencies. It is another object of the invention to provide a novel low loss element for use in an electronically steered array comprising a dipole, an integral balun and a 180° phase shift bit. These and other objects of the invention are achieved in a novel combination comprising a microstrip fed dipole with an integral balun and 180° phase shit bit. The combination is fabricated by patterning a first and a second metallized layer disposed respectively on the under and upper surfaces of a dielectric substrate. The unbalanced microstrip "feed" is branched to form a second and a third microstrip transmission line with ground planes formed from the first metallized layer and the strip conductors formed from the second metallized layer. A pair of switches are provided, each connected respectively between the strip conductor and ground plane in the second and third microstrip transmission lines at a quarter wavelength electrical length from the branch. With the diode conducting, the strip conductor is connected to the ground plane preventing r.f. through transmission, and with the diode non-conducting, the strip conductor is not connected to the ground plane permitting unhindered r.f. transmission. Control means are further provided to insure that one and only one branch permits transmission, in accordance with the desired "control state". The novel combination further comprises a dipole radiating element formed from the first metallized layer, and a transition or "balun" in which a continuation of the ground plane of the unbalanced transmission lines in bifurcated by a central slot into a first and a second ground plane, the paired ground planes forming a balanced transmission line. The strip conductors of the second and third unbalanced transmission lines continue beyond the switches into the balun to form a three part "U" shaped strip conductor disposed over the bifurcated ground planes to continue an unbalanced and reversable transmitting path from one branch to the other branch. The first transition part extends from one diode switch to the dipole, the second extends across the slot, and the third extends back to the other diode switch. The dipole radiating element is formed as a diverging extension of the first and second bifurcated ground planes, the inner portions of the dipole arms being strongly coupled to the second part of the transition and the outer portions providing efficient radiation. Further in accordance with the invention, the electrical length of the sides of the "U" of the unbalanced transmission lines, measured from the slot crossover to the switches is approximately one-half wavelength so as to provide a low shunt r.f. impedance to unbalanced mode currents at the dipole load, and the electrical length of the balanced transmission line is approximately one-fourth wavelength so as to provide a high shunt r.f. impedance to balanced mode currents at the dipole load. In accordance with a further aspect of the invention, switching is provided by four diodes and two additional transmission line segments. Two diodes are provided separated by a further transmission line segment of approximately one-fourth wavelength electrical length in each branch. The arrangement reduces the effect of diode and connection parasitics permitting higher frequency operation. The inventive and distinctive features of the invention are set forth in the claims of the present application. The invention itself, however, together with further objects and advantages thereof may best be understood by reference to the following description and accompanying drawings, in which: FIGS. 1A and 1B are illustrations of a microstrip fed printed dipole with an integral balun and 180° phase shift bit in accordance with a first embodiment of the invention, FIG. 1A being in perspective and FIG. 1B being a plan view illustrating the electrical dimensions; FIG. 2A is an illustration of a known coaxial balun structure, and FIG. 2B is an equivalent circuit representation of the FIG. 2A coaxial balun structure; FIG. 3 is a plane view of a portion of a microstrip fed printed dipole with an integral balun and 180° phase shift bit modified for operation at millimeter wave frequencies in accordance with a second embodiment of the invention, and FIG. 4 is an equivalent circuit representation of the two diode switch bit employed in the second embodiment of the invention. Referring now to FIGS. 1A and 1B, a microstrip fed printed dipole with an integral balun and 180° phase shift bit is shown. The arrangement consists of a planar dielectric substrate 10 supporting on its under surface a patterned first metallization, and on its uppersurface, a patterned second metallization. In a practical embodiment, the dielectric material is fused silica 0.64 millimeters thick and the metallizations are "printed" layers on the order of a hundredth of a millimeter (200 micro inches to 2/1000th of an inch depending on the process) in thickness. For convenient discussion, the arrangement may be divided into four functional regions progressing from the transmitting/receiving circuitry (not shown) for feeding and being fed by the dipole antenna to the antenna. The first region contains an unbalanced microstrip transmission line to the circuitry and includes an impedance transformer. The second region contains a junction at which the transmission line is branched to form two parallel branches and contains two switches for activating a selected branch and inactivating the non-selected branch. The first two regions are arranged behind the plane of the reflector 11 for the dipole. The third region, in which the two branches emerge through the plane of the reflector in an inverted "U shaped" configuration, provides a transition from the unbalanced microstrip transmission line to the balanced radiating elements of the dipole antenna. The microstrip transmission line in the first region provides a transmission path to the transmitting and/or receiving circuitry. An impedance transformer is included for providing an impedance match between the circuitry and the dipole antenna. The microstrip transmission line and impedance transformer are formed from an "infinite" width ground plane provided by the under surface metallization and strip conductor segments 13, 14, 15 of finite width patterned from the upper surface metallization and forming the unbalanced conductor. The impedance transformer is formed from segment 13, 14, 15 and ground plane 12. Segment 13 and adjacent portions of ground plane 12 form the input to the impedance transformer. The input has the conventional 50 ohm characteristic impedance, a value selected for connection to the transmitting and/or receiving circuitry. Segment 14 and adjacent portions of ground plane 12 provide the impedance transformation. The transformer has a characteristic impedance of 63 ohms and is one-fourth wavelength in length. Segment 15 and adjacent portions of the ground plane 12 form the output from the impedance transformer. The output has a characteristic impedance of 80 ohms, a value selected to match the impedance at resonance of the dipole antenna. The second region of the arrangement, at which the microstrip transmission line is branched and which contains two switches, is arranged to permit the transmission path to proceed in a clockwise or counter-clockwise direction into the inverted "U" shaped transition beyond the reflector 11. As will be explained, these switches permit one to effect a first state and a second state, the second state exhibiting a phase difference of 180° from the first state, and occasioning a 180° phase change in the antenna radiation. The microstrip branch is disposed at the lower part of the second region and leads to the switches 19 and 20. The microstrip branch has a "T" shaped conductor supported over the ground plane 12. The stem of the "T" is formed from a continuation of the segment 15. The crosspiece (16) of the "T" is oriented in a plane orthogonal to the axis of the impedance transformer. The ends of the crosspiece are turned by means of a mitered corner to form two spaced, mutually parallel strip conductors 17 and 18 extending toward the switches 19 and 20. The extension of 17 and 18, namely 21 and 22, extend beyond the switches through the plane of reflector 11 and continue to the dipole arms. The crosspiece 16 is short being, dimensioned to place each strip conductor 17-21; 18-22 centrally over one of the bifurcated ground planes in the third or transition region (beyond the reflector 11). The switches 19 and 20 are placed in the strip conductors a specified one-fourth wavelength electrical distance from the center of the branch. The states of the switches 19 and 20 determine whether the excitation to the antenna proceeds up the microstrip transmission path defined by strip conductor 17-21 and the adjacent portion of the underlying metallization forming a ground plane and returns via the microstrip transmission path defined by strip conductor 18-22, and adjacent portion of the underlying metallization forming the ground plane, or vice versa. The switches 19 and 20 are each single diodes, connected between the underlying ground plane (metallization 12) and one of the two strip conductors 17, 18. The diodes are connected with mutually opposite polarities, the anode of one (e.g. 19) going to the ground plane, and the cathode of the other (e.g. 20) going to the ground plane. The upper diode connections to the strip conductors may be either wire bonds or ribbon bonds. Either mode of connection allows the diodes to reach mutually opposite states in which one diode is conducting and the other is non-conducting by application of a DC control voltage between the upper and lower metallizations, and allows the control states to be reversed by reversal of the polarity of a single DC control voltage. Recapitulating, the first two functional regions of the arrangement, which have just been described, are disposed behind the reflector 11. The reflector 11 is placed one-quarter free space wavelength behind the dipole to give an optimum forward radiation pattern. The other two functional regions about to be described are disposed in front of the reflector. Finally the first metallization 12, which is formed on the under surface of the dielectric substrate 10, maintains a transverse dimension at least ten times the transverse dimension of the single and later double strip conductors 17, 18 and 21, 22 above it behind the reflector 11. However, when the first metallization emerges to the front of the reflector, the width is now reduced to three times the width of the double strip conductors. The characteristic impedances of the double microstrip lines remain at 80 ohms in the second region behind the reflector and this impedance is maintained as they emerge to the front of the reflector and continue through the third functional region. The third functional region contains the transition between the microstrip transmission line and the dipole antenna, which occurs in front of the reflector 11. The ground plane of the microstrip, which emerges through the plane of the reflector 11 is bifurcated by a slot 24 to form two ground planes 25, 26 which together form a balanced transmission line coupled to the dipole. At the same time, the strip conductor 21 of the microstrip becomes one of three conductor segments (21, 22, 23) forming an inverted "U" shaped strip conductor to be further described, which is disposed over the members 25 and 26. The strip conductors 21, 22 and 23 arranged above the ground planes 25, 26 complete an unbalanced microstrip transmission line, which feeds and is fed by the dipole antenna. The fourth functional region is the dipole radiating element or antenna which forms the balanced load of the microstrip transmission line. The dipole comprises two arms 27, 28, separated by a small gap and each extending transversely away from the gap for approximately one-fourth of a freespace wavelength. The inner portions of the dipole arms underlie the second part 23 of the "U" shaped strip conductor, and the outer portions of the dipole arms extend beyond the second part for efficient radiation. The dipole arms droop toward the reflective surface 11 to reduce coupling to adjacent dipoles, it being intended that the dipole will be used in a larger two dimensional array of like dipoles, with the reflective surface 11 providing optimum broadside energy radiation. The third region of the arrangement, which will now be discussed in greater detail, provides the microwave transmission paths which efficiently couple the unbalanced microstrip to the balanced dipole antenna. The transition within the third region commences approximately one-third of the distance from the reflector 11 to the dipole arms. This position is defined by the bottom of the slot 24 in the patterned first metallization. The slot divides the now narrowed first metallization into two equal width metallizations 25, 26 facilitating separation at the microstrip transmission lines under strip conductors 21 and 22 and permitting balanced operation of these metallizations in relation to each other. The strip conductor 21 is centered (laterally) over the metallization 25 and sufficiently displaced from metallization 26 as to be decoupled from it. The metallizations 25, 26 continue toward the dipole, mutually separated by the slot 24 as they finally merge into the arms of the dipole. The balanced transmission line formed by metallizations 25 and 26 has a characteristic impedance of 80 ohms established by the width of the slot, the width of the metallizations 25, 26, and the thickness and dielectric constant of the supporting substrate. The electrical length of the balanced transmission line (the quantity theta ab) is measured from the base of the slot 24 to the half width of the dipole arm. The upper limit is close to the upper extremity of the inverted "U" shaped strip conductor and approximates the electrical position of the dipole load presented to the balanced line. The two balanced conductors 25, 26, which merge into the dipole arms, provide a balanced transmission line to the dipole arms 27, 28. In the third region, the transition of energy in the dipole antenna and associated balanced line to and from the unbalanced microstrip transmission line takes place along the slotted portion of the ground plane and is most intense in the region near the base of the dipole arms. The sense of the excitation is governed by the state of the switches 19, 20 which establish whether the energy, for instance during transmission, enters via switch 19 and leaves via switch 20 or vice versa. Granted, the former switching condition, the "U" shaped path followed by the unbalanced microstrip transmission line maintains an 80 ohm characteristic impedance throughout. The presence of the slot 24, which permits balanced operation of metallizations 25, 26, occurs without discontinuity in the propagation in the unbalanced microstrip along the path defined by the strip conductor segments 21 and 22. Segments 21 and 22 retain the same transverse dimensions as they proceed from the sites of the switches 19 and 20 up to the region of the dipole arms. The width of the underlying metallization drops at the plane of the reflector to approximately three times the transverse dimension of the double segments 21 and 22, which produces only a small discontinuity. The appearance of the slot 24 likewise occurs without causing a significant discontinuity in the unbalanced microstrip. Thus both microstrip paths continue to have an approximately 80 ohms characteristic impedance as they approach the segment 23 which crosses the slot 24. The strip conductor segment 23 extends transversely from a point transversely centered over the left half ground plane 25 to a point transversely centered over the right half ground plane 26. At the corners where 21 and 23 join, and 23 and 22 join, a 45 degree cut in the metallization occurs producing a "mitered corner". The "mitered corner" is designed to facilitate the change in direction of the rf currents in the two portions of the strip conductor with minimum impedance change and therefore minimum reflection. The transverse strip conductor segment 23 is disposed over the ground plane formed from the first metallization of adequate width to maintain unbalanced microstrip transmission and maintain the 80 ohm impedance of the microstrip without significant discontinuity. The metallizations underlying conductor 23 include portions of ground plane metallizations 25, 26 merging into the arms 27, 28 of the dipole. The underlying dipole metallizations extend a distance equal to the width of the strip conductor beyond the upper edge of the strip conductor; and the metallizations 25 and 26, which merge into the dipole arms 27 and 28, extend a distance equal to several strip widths below the lower edge of the strip conductor. The arrangement as just described, will accordingly support both balanced transmission and unbalanced transmission in the region which transitions between the microstrip and the dipole. If the balanced line formed by the underlying metallization has an electrical length (theta ab) of one-fourth wavelength from the base of the slot to the point of maximum drive at the dipole, then the remote short circuit occasioned by the bottom of the slot will be transformed at the point of connection to the dipole to a high shunt impedance to balanced mode currents. The high shunt balanced mode impedance facilitates proper dipole excitation. Similarly, if the portion of the unbalanced microstrip transmission line comprising strip conductor 23 and 22 (and the adjacent portions of the underlying metallizations forming the ground plane 26) ends in a short circuit due to conduction of the shunt connected switch 20 and if the electrical dimension (theta b) from the short circuited end of 22 to the point of slot cross over circuit of the microstrip 22 at the switch 20 will be transformed to a low shunt impedance to unbalanced mode currents (or substantial short circuit) at the point of dipole excitation. (The unbalanced mode impedance exists between the strip conductor 23 and the underlying metallizations forming the ground plane.) More explicitly, the short circuit produces a reflection from the short at the site of diode 20 and forms a standing wave whose current maximum occurs at the slot 24, and from which energy may be transferred (e.g. during transmission) to the antenna. The standing wave thus established in the unbalanced microstrip transmission line provides an efficient means for energy exchange between the balanced line and balanced antenna on the one hand and the unbalanced line on the other hand. The use of the shunt switches which are either in a conductive or non-conductive condition are ideally free of loss. Ideally their presence permits the flow of energy through their point of connection without loss, when they are non-conductive. When they are conductive they redirect the flow of energy by creating reflections also without loss. Thus, when the reflections create standing waves, the issue of efficient design focuses on the proper placement of the diodes in relation to the "sources" and "loads" which are connected to the transmission lines. The placement of the diodes 19 and 20 in relation to the load presented to the unbalanced line efficiently concentrates the transfer of energy to the region where the strip conductor crosses over the slot 24. The standing wave in the unbalanced line is distributed along the upper portion of the conductor 21, across the conductor 23, and the upper portion of the conductor 22. The current maximum or current anti-node is centered at the crossing of conductor 22 over the slot, and current nodes (minima) occur in the conductors 21 and 22 at positions one-fourth electrical wavelength away from that crossing. The degree of excitation produced by elements of the unbalanced line falls off as the distance from the current maximum increases, although some contribution by the strip conductors 21 and 22 may occur up to one-fourth wavelength from the center of the member 23. The balanced line is, however, less sensitive to drive as one approaches the base of the slot which defines the beginning of the balanced line. Thus from both the rf characteristics of the unbalanced drive, and the balanced load, the rf coupling is maximum in the region where the strip conductor 23 crosses over the slot 24. Granted the foregoing rf wave distributions, and granted that the impedances are properly matched between the transmission line sources and the antenna load (e.g. 80 ohms) the transfer of energy approaches maximum efficiency and is reflection free. The coupling from the driving circuitry via the impedance transformer 13, 14, 15 via the switches 19 and 20 to the transition is also efficient and substantially reflection free. As earlier noted, the switch 19 is positioned at the connection of strip conductor 17 to 21 one-fourth wavelength electrical length from the midpoint on segment 16 of the branch and the switch 20 is positioned at the connection of the strip conductor 18 to 22 one-fourth wavelength electrical length from the midpoint on segment 16 of the branch. The foregoing dimensioning insures low loss and reflectionless switching in the path between the drive circuitry and the transition. Assuming, as we have, that switch diode 19 is non-conductive and switch diode 20 is conductive, energy supplied from the impedance transformer, appearing at strip conductor 15 will tend to divide evenly between the branches 17 and 18 if one assumes matched loading. That rf energy which enters the branch 17 "sees" a matched load and proceeds past the non-conductive diode without loss and without reflection, and enters the inverted "U" shaped strip line transition. The r.f. energy which would enter the branch 18, however encounters a different fate since there is a mismatch. The rf energy which would enter branch 18 encounters the conductive diode presenting a short circuit, and would be reflected back toward the center of the branch. The path length from the diode to the center is however one-fourth wavelength, and the postulated energy returning to the center of the branch would be 180° out of phase with and would tend to cancel the incoming wave. The practical result is that the short circuit at the site of diode 20 is transformed to an open circuit at the branch and (ideally) no energy is coupled into the shorted length of the transmission line. In practice some energy may be reflected back to the transformer, but it is usually small and substantially all the energy, is directed into the branch 17. The descriptions which have been provided, due to the symmetry of the arrangement, and due to the laws of reciprocity, are true for both control states and for both transmission and reception. That is to say that the same performance is achieved when diode 19 is non-conductive and diode 20 is conductive; as when diode 19 is conductive and diode 20 is non-conductive. The laws are also true for both transmission and reception. In short, the arrangement as so far described provides efficient coupling between the remote circuitry coupled to the 50 ohm input of the transformer and the balanced dipole antenna. The arrangement so far described includes the necessary microstrip impedance transformer, a "transition" or balun between the unbalanced microstrip and the balanced dipole antenna, the balanced antenna per se, and by virtue of the phase inversion in the drive circuitry effected by changing the control states of the diodes, the equivalent of an efficient 180° phase shift bit. All four of the above elements are cheaply and efficiently carried out into the printed circuit techniques associated with microstrip transmission lines and available from a stock substrate consisting of a central insulated core, and patterned conductive layers on the upper and lower surfaces thereof. A mathematical analysis of the transitional section or balun of the first embodiment is suggested from the treatment of a coaxial balun in an artical by W. K. Roberts published in the proceedings of the IEEE December 1957 entitled "A New Wideband Balun", Vol. 45, pages 1628 to 1631. FIG. 2A which uses a coaxial representation of the unbalanced and balanced transmission lines of the present arrangement, is a first redrawing of the balun as two branched coaxial lines. FIG. 2B, is a further redrawing of the FIG. 1A balun, which is more readily characterized mathematically. The associated transmission line elements and their electrical parameters which enter into the mathematical description of the balun are as follows. The first coaxial line nearest the source circuitry in FIG. 2A represents the microstrip transmission line associated with conductor 15. The shell of the coaxial line corresponds to the ground plane of the microstrip and the central conductor of the coaxial line corresponds to the conductor 15 of the microstrip. This transmission line has the characteristic impedance Za. The coaxial line branches into an upper branch and a lower branch. The upper branch corresponds to the microstrip defined by conductors 17 and 21 and contains the non-conductive diode 19 shown as a dashed unshorted or through circuit. The lower branch corresponds to the microstrip defined by conductors 18 and 22 and contains the conductive diode 20 shown as a short circuit. The unshorted and shorted diode positions, as illustrated, are at one-fourth wavelength electrical length from the branch. The conductor connecting the central conductors together at the remote ends of the coaxial lines 21 and 22 corresponds to the microstrip conductor 23. The coaxial lines are both one-half wavelength electrical length (theta b=lambda g/2) measured between the diode positions and conductor 23. The coaxial shells form a balanced transmission line of impedance Zab, which is interconnected at a point corresponding to the base of the slot 24. The base of the slot is one-fourth wavelength electrical length (theta ab=lambda g/4) measured to the conductor 23. The load ZL, which is connected between the two shells at the ends of the coaxial lines represents the dipole antenna. In FIG. 2B the coaxial representation is further redrawn using circuit equivalents. The coaxial connection to the source circuitry remains as in FIG. 2A, but the through-line upper branch 17, 21 with the non-conductive diode 19 is removed from the representation. The lower branch 18, 22 with the conductive diode 20 is represented as a shorted quarter wavelength coaxial line stub (corresponding to 18) connected in shunt (i.e. central conductor to center conductor and shell to shell) with the input coaxial line (corresponding to 15). The shorted half wavelength coaxial line stub (corresponding to 22) has its central conductor connected to the central conductor of the input coaxial line. The coaxial shells of a quarter wavelength electrical length, shorted at one end now represent the resonant balanced line 25 and 26. The shells are connected respectively between the input line shell and the shell of the shorted half wavelength coaxial line stub corresponding to 22. The stub presents a low impedance between its central conductor and shell. The load ZL and the resonant balanced line (25, 26) thus connected in series with the shells of the input line and the half wavelength stub 22. More concisely, the (unbalanced) coaxial transmission line corresponding to 18 forms an open circuited stub shunting the input coaxial line 15. The coaxial transmission line corresponding to 22 forms a short circuited stub serially connected with the load impedance, Z1. The shells of the coaxial transmission lines (25, 26) form an open circuited stub of characteristic impedance Zab connected in shunt with the load. From inspection, the circuit equivalently represented in FIG. 2B, provides an efficient path between the source and the load. Mathematically the impedance Zin ', of the balun structure maybe expressed as follows: ##EQU1## where theta b represents the electrical length of the short circuited series stub, theta ab represents the electrical length of the short circuited balanced line shunt stub, theta c represents the electrical length of the short circuited shunt stub at the input (and the other quantities are as defined in the preceeding text). For the design conditions of theta ab equal to 90° (lambda g/4), theta b equal to 180° (lambda g/2), and theta c equal to 90° (lambda g/4), the impedance Zin ' becomes equal to that of the dipole impedance, Zin '=Z1. In the microstrip realization, the realizable spacing between the balanced line conductors limits the lower extreme of Zab while the three times microstrip ground plane width constraint, limits the lower extreme of Za and Zb and the upper extreme of Zab. The actual characteristic impedance selected for these transmission lines is influenced by the supporting substrate's dielectric constant and thickness with values between 60 and 100 ohms being typical. The arrangement described in FIGS. 1A and 1B is of maximum simplicity in its use of a single pair of diodes. The first embodiment is useful from low frequencies up to about 10 GHz, depending upon the quality of diodes employed as shunt switches. Ideal performance is not achieved by this simpler arrangement at frequencies significantly above 10 GHz, which is in the region where diode parasitics cause degraded performance. The critical parasitics are the diode capacitance (CD); resistance (RD) and serial lead inductance (LS). Wire bonds which are a practical mode of interconnection, may introduce additional lead inductance (LB) between the diodes and the strip conductors, and may also cause degradation. The degradation at the higher frequencies is normally in respect to both transmission loss and reflections. FIG. 3 shows a plan view of a portion of a second embodiment of the invention having a 180° phase bit refined for improved efficiency at 30 to 40 gHz, and FIG. 4 contains an equivalent circuit representation of the critical parasitics associated with the diode switch refined for higher frequency operation. The second embodiment employs a dipole antenna and integral balun and an input impedance transformer of the type shown in FIG. 1A. FIG. 3, for simplicity, shows only that portion of the second embodiment commencing at the microstrip corresponding to element 15 in FIG. 1A, and continuing through the elements forming the switch refined for higher frequency operation, and concluding with a portion of the arrangment extending in front of the reflector 11 in FIG. 1A. For simplicity, elements from the first embodiment repeated in the second embodiment bear primed reference numerals. The 180° phase shift bit includes four diodes 31-34 and two additional microstrip transmission lines connected between the diodes 31 and 33 and between diodes 32 and 34. As seen in FIG. 3, one of the microstrip transmission lines in the two diode switch is formed by a finite width conductor 35 patterned from the second metallization and a portion of the first metallization providing an infinite width ground plane. The other microstrip transmission line is similarly formed by a finite width conductor 36 patterned from the second metallization over a ground plane provided by the first metallization. The microstrip transmission line corresponding to conductor 35, has one end closely adjacent to the strip conductor 17' leading to the branch and the other end closely adjacent to the strip conductor 21' leading into the transition and dipole antenna. The microstrip transmission line corresponding to conductor 36 also has one end closely adjacent to the strip conductor 18' leading to the branch and the other end closely adjacent to the strip conductor 22' leading to the transition and dipole antenna. The diodes 31-34 are installed in the gaps between the conductors 35 and 17'; 35 and 21'; 36 and 18'; and 36 and 22' and their connections preserve electrical continuity in the respective paths. More particularly the diodes 31 and 33, which are both PIN diodes designed for millimeter wave (e.g. 40 gHz) operation, have their anodes connected by solder to the first metallization on the undersurface of the substrate. The cathode of diode 31 is connected to conductor 17' and to conductor 35 by a (single or double) wire bond spanning the gap between 17' and 35. Similarly the cathode of diode 32 is connected to conductor 36 and to conductor 18' by a wire bond spanning the gap between 35 and 18'. The NIP diodes 32 and 34 are inverted in relation to the PIN diodes 31 and 33, and have their cathodes connected to the first metallization and their anodes connected to wire bonds bridging the gaps between conductors 18' and 36 and 36 and 22'. Thus electrical continuity through the diode connections is maintained by the wire bonds. The equivalent circuit of one branch of the arrangement is illustrated in FIG. 4. The circuit depicts the path from 17' to 21' and consists of two "Y" filter sections each representing one diode and its wire bonds, the two filter sections being spaced between the three microstrip transmission lines (17', 35 and 21'). Suitable diodes are Alpha diode type CSB7002-05-150-801; the diodes employed exhibited a diode capacitance (Cd) of between 0.03 and 0.05 pico-farads, a diode resistance (Rd) of 3 ohms (at 1 ma), and a series inductance LS of 0.012 nano-henries. The inductance of each lead LB was about 0.16 nano-henries corresponding to a lead length of about 0.010 inches placed in close proximity to a ground plane. The circuit was fabricated on a 0.010" thick alumina substrate. In computer optimization of the values of S11, S12, S21 and S22 of the switching network, tailoring of the microstrip impedances and lengths were dictated. The diode pairs 31 and 33 and 32 and 34 were spaced one-fourth wavelength apart, the electrical length being made up partly by the wire bonds and partly by the added microstrip section. The impedance of the microstrip transmission line corresponding to conductor 15' was 72 ohms, that correspond to the branches 17' and 18' was 85 ohms, that corresponding to conductors 35 and 36 was 66 ohms, and that corresponding to 21' and 22' and 22' 101 ohms. These values provided a measured insertion loss of about 0.85 db from 30 to 38 GHz, a value supported by both calculation and measurement. At lower frequencies (e.g. 5-6 gHz) where only a single diode pair is required and where somewhat better diode performance is available, the predicted loss is 0.5 db or below. Comparable phase shift networks, which require 180° phase bits frequently have losses on the order of 0.8 db for a 90° phase bit and 1.6 db for 180° phase bit. Thus in comparison to more conventional phase shift networks used on electronically steered arrays, the present arrangement provides a more efficient solution for achieving the necessary phase shifting capability. The present invention provides a low loss 180° phase shift bit accompanying a microstrip fed dipole with an integral balun which is applicable to several kinds of radar systems operating over a wide frequency spectrum including both conventional lower frequencies and higher millimeter-wave frequencies. The present element, which is readily manufactured using printed circuit techniques, provides an electrically efficient 180° phase shift bit, minimizing losses in arrays which are fully electronically steered. The element simplifies electronic steering, and provides an alternative means of achieving difference beams operation. |Cited Patent||Filing date||Publication date||Applicant||Title| |US3623112 *||Dec 19, 1969||Nov 23, 1971||Bendix Corp||Combined dipole and waveguide radiator for phased antenna array| |JPS55150A *||Title not available| |Citing Patent||Filing date||Publication date||Applicant||Title| |US4901040 *||Apr 3, 1989||Feb 13, 1990||American Telephone And Telegraph Company||Reduced-height waveguide-to-microstrip transition| |US5307079 *||Jan 21, 1993||Apr 26, 1994||Anro Engineering, Inc.||Short pulse microwave source with a high PRF and low power drain| |US5543807 *||Nov 14, 1994||Aug 6, 1996||Loral Corporation||Electronic commutation switch for cylindrical array antennas| |US5628057 *||Mar 5, 1996||May 6, 1997||Motorola, Inc.||Multi-port radio frequency signal transformation network| |US5646451 *||Jun 7, 1995||Jul 8, 1997||Lucent Technologies Inc.||Multifunctional chip wire bonds| |US5686928 *||Oct 13, 1995||Nov 11, 1997||Lockheed Martin Corporation||Phased array antenna for radio frequency identification| |US5808518 *||Oct 29, 1996||Sep 15, 1998||Northrop Grumman Corporation||Printed guanella 1:4 balun| |US5909195 *||Feb 21, 1997||Jun 1, 1999||Marconi Aerospace Systems Inc.||Antennas employing U-dipole elements| |US5917457 *||Feb 21, 1997||Jun 29, 1999||Marconi Aerospace Systems Inc. Advanced Systems Division||U-dipole radiating elements and antennas| |US6127981 *||Jul 23, 1997||Oct 3, 2000||Lockheed Martin Corporation||Phased array antenna for radio frequency identification| |US6608601||Dec 21, 2000||Aug 19, 2003||Lockheed Martin Corporation||Integrated antenna radar system for mobile and transportable air defense| |US6674340||Apr 11, 2002||Jan 6, 2004||Raytheon Company||RF MEMS switch loop 180° phase bit radiator circuit| |US6903693||Nov 15, 2002||Jun 7, 2005||Plantronics, Inc.||Bifurcated inverted F antenna| |US6906678 *||Jul 29, 2003||Jun 14, 2005||Gemtek Technology Co. Ltd.||Multi-frequency printed antenna| |US7212164 *||Sep 25, 2003||May 1, 2007||Matsushita Electric Industrial Co., Ltd.||Radio terminal device antenna and radio terminal device| |US7215284||May 13, 2005||May 8, 2007||Lockheed Martin Corporation||Passive self-switching dual band array antenna| |US7324057 *||Sep 26, 2005||Jan 29, 2008||Gideon Argaman||Low wind load parabolic dish antenna fed by crosspolarized printed dipoles| |US7511680 *||Oct 25, 2007||Mar 31, 2009||Ruckus Wireless, Inc.||Minimized antenna apparatus with selectable elements| |US7724189||Nov 24, 2004||May 25, 2010||Agilent Technologies, Inc.||Broadband binary phased antenna| |US7864126 *||Oct 18, 2006||Jan 4, 2011||Thomson Licensing||Transmitting/receiving antenna with radiation diversity| |US7994994||Oct 30, 2009||Aug 9, 2011||Itron, Inc.||Embedded antenna apparatus for utility metering applications| |US8179137||Mar 31, 2009||May 15, 2012||General Electric Company||Magnetic resonance compatible multichannel stripline balun| |US8284107||Nov 29, 2010||Oct 9, 2012||Itron, Inc.||RF local area network antenna design| |US8299975||Mar 18, 2011||Oct 30, 2012||Itron, Inc.||Embedded antenna apparatus for utility metering applications| |US8330669||Apr 22, 2010||Dec 11, 2012||Itron, Inc.||Remote antenna coupling in an AMR device| |US8462060||Oct 25, 2012||Jun 11, 2013||Itron, Inc.||Embedded antenna apparatus for utility metering applications| |US8559186 *||Apr 3, 2008||Oct 15, 2013||Qualcomm, Incorporated||Inductor with patterned ground plane| |US8686905||Dec 31, 2012||Apr 1, 2014||Ruckus Wireless, Inc.||Pattern shaping of RF emission patterns| |US8704720||Oct 24, 2011||Apr 22, 2014||Ruckus Wireless, Inc.||Coverage antenna apparatus with selectable horizontal and vertical polarization elements| |US8723741||May 31, 2012||May 13, 2014||Ruckus Wireless, Inc.||Adjustment of radiation patterns utilizing a position sensor| |US8756668||Feb 9, 2012||Jun 17, 2014||Ruckus Wireless, Inc.||Dynamic PSK for hotspots| |US8836606||Oct 17, 2012||Sep 16, 2014||Ruckus Wireless, Inc.||Coverage antenna apparatus with selectable horizontal and vertical polarization elements| |US9019165||Oct 23, 2007||Apr 28, 2015||Ruckus Wireless, Inc.||Antenna with selectable elements for use in wireless communications| |US9092610||Apr 4, 2012||Jul 28, 2015||Ruckus Wireless, Inc.||Key assignment for a brand| |US9093758||Sep 16, 2014||Jul 28, 2015||Ruckus Wireless, Inc.||Coverage antenna apparatus with selectable horizontal and vertical polarization elements| |US9226146||Jun 2, 2014||Dec 29, 2015||Ruckus Wireless, Inc.||Dynamic PSK for hotspots| |US9270029||Apr 1, 2014||Feb 23, 2016||Ruckus Wireless, Inc.||Pattern shaping of RF emission patterns| |US9379456||Apr 15, 2013||Jun 28, 2016||Ruckus Wireless, Inc.||Antenna array| |US9520636 *||Feb 7, 2011||Dec 13, 2016||Commissariat A L'energie Atomique Et Aux Energies Alternatives||Linear resonator of a high-frequency antenna for a nuclear magnetic resonance imaging apparatus| |US20040056805 *||Jul 29, 2003||Mar 25, 2004||Gemtek Technology Co., Ltd.||Multi-frequency printed antenna| |US20050119035 *||Sep 25, 2003||Jun 2, 2005||Kentaro Miyano||Radio terminal device antenna and radio terminal device| |US20060119513 *||Nov 24, 2004||Jun 8, 2006||Lee Gregory S||Broadband binary phased antenna| |US20060256024 *||May 13, 2005||Nov 16, 2006||Collinson Donald L||Passive self-switching dual band array antenna| |US20070069970 *||Sep 26, 2005||Mar 29, 2007||Gideon Argaman||Low wind load parabolic dish antenna fed by crosspolarized printed dipoles| |US20070229368 *||May 30, 2007||Oct 4, 2007||Hiroshi Hata||Planar coupler and integrated antenna system| |US20080024241 *||Apr 7, 2005||Jan 31, 2008||Hiroshi Hata||High-Frequency Coupler, Rf Guide, and Antenna| |US20080136715 *||Oct 23, 2007||Jun 12, 2008||Victor Shtrom||Antenna with Selectable Elements for Use in Wireless Communications| |US20080136725 *||Oct 25, 2007||Jun 12, 2008||Victor Shtrom||Minimized Antenna Apparatus with Selectable Elements| |US20090121953 *||Oct 18, 2006||May 14, 2009||Nicolas Boisbouvier||Transmitting/Receiving Antenna with Radiation Diversity| |US20090250262 *||Apr 3, 2008||Oct 8, 2009||Qualcomm Incorporated||Inductor with patterned ground plane| |US20100110617 *||Oct 30, 2009||May 6, 2010||Itron, Inc.||Embedded antenna apparatus for utility metering applications| |US20100244977 *||Mar 31, 2009||Sep 30, 2010||General Electric Company||Multichannel stripline balun| |US20110095960 *||Dec 28, 2010||Apr 28, 2011||Victor Shtrom||Antenna with selectable elements for use in wireless communications| |US20110115682 *||Nov 29, 2010||May 19, 2011||Itron, Inc.||Rf local area network antenna design| |US20110163925 *||Mar 18, 2011||Jul 7, 2011||Itron, Inc.||Embedded antenna apparatus for utility metering applications| |US20130015858 *||Feb 7, 2011||Jan 17, 2013||Commissariat a energie atomique et aux energies alternatives||Linear resonator of a high-frequency antenna for a nuclear magnetic resonance imaging apparatus| |USH1959||Sep 3, 1998||May 1, 2001||Anthony Kikel||Single balanced to dual unbalanced transformer| |EP0474490A1 *||Sep 5, 1991||Mar 11, 1992||AT&T GLOBAL INFORMATION SOLUTIONS INTERNATIONAL INC.||Antenna assembly| |EP1662611A1 *||Nov 16, 2005||May 31, 2006||Agilent Technologies, Inc.||Broadband binary phased antenna| |EP3104455A1 *||Jun 3, 2016||Dec 14, 2016||Kathrein Werke KG||Dipole-shaped radiator assembly| |WO1997008774A2 *||Aug 16, 1996||Mar 6, 1997||Philips Electronics N.V.||Printed antenna| |WO1997008774A3 *||Aug 16, 1996||Mar 27, 1997||Philips Electronics Nv||Printed antenna| |WO2001005029A1 *||Jul 10, 2000||Jan 18, 2001||Telefonaktiebolaget Lm Ericsson (Publ)||Balun| |WO2005067097A1 *||Dec 5, 2003||Jul 21, 2005||Raytheon Company||Compact, wide-band, integrated active module for radar and communication systems| |WO2007048958A1 *||Oct 18, 2006||May 3, 2007||Thomson Licensing||Transmitting/receiving antenna with radiation diversity| |WO2008020658A1 *||Aug 17, 2006||Feb 21, 2008||Hutech21. Co., Ltd.||A printed dipole antenna for rfid tag and the design method therefor| |U.S. Classification||343/821, 333/26, 343/859, 343/822| |Aug 3, 1987||AS||Assignment| Owner name: GENERAL ELECTRIC COMPANY, A NEW YORK CORP. Free format text: ASSIGNMENT OF ASSIGNORS INTEREST.;ASSIGNORS:EDWARD, BRIAN J.;LANG, RICHARD J.;REES, DANIEL E.;REEL/FRAME:004757/0048;SIGNING DATES FROM 19870727 TO 19870730 |Aug 25, 1992||REMI||Maintenance fee reminder mailed| |Jan 24, 1993||LAPS||Lapse for failure to pay maintenance fees| |Apr 6, 1993||FP||Expired due to failure to pay maintenance fee| Effective date: 19930124
<urn:uuid:0c45c80a-eaae-40db-9ace-705dede22c70>
CC-MAIN-2017-04
http://www.google.com/patents/US4800393?dq=6668407
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280504.74/warc/CC-MAIN-20170116095120-00140-ip-10-171-10-70.ec2.internal.warc.gz
en
0.890337
10,753
1.695313
2
IivisniementoriLocal detailed plans A private landowner has applied for an amendment to the local detailed plan, which would facilitate the development and complementary construction of a block containing a shopping centre. Commercial and service facilities are planned for the bottom floors. Type of land use plan Local detailed plan amendment Read more about the preparation and content of the plan on the project webpage in Finnish You can find current information about the progress of a plan on the plan webpage in Finnish. For more information, you can contact the planners. You can participate in the planning process by submitting an opinion during the preparation stage or an objection during the proposal stage.
<urn:uuid:9a402207-1b5e-4152-b6ee-663d52c40671>
CC-MAIN-2022-33
https://www.espoo.fi/en/projects/iivisniementori
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00470.warc.gz
en
0.894458
162
1.671875
2
Luigi's Mansion (place) Luigi's Mansion is a huge Ghost House constructed by the Boos that Luigi first encounters in the Nintendo GameCube game of the same name. Luigi wins the mansion in a contest that he did not even enter. When he gets there, Luigi finds that the mansion is haunted and that Mario has been kidnapped. Luigi later meets Professor E. Gadd, who gives him the Poltergust 3000, which allows him to suck up the ghosts who inhabit the mansion. Towards the beginning of the game, Professor Elvin Gadd revealed to Luigi that the mansion was built by ghosts who had deceived Luigi. At the end of the game Luigi's Mansion vanishes and is rebuilt into a new form using Luigi's money collected by the player throughout the game. Inexplicably, the new mansion has only reappeared as a cameo in the background of the Luigi Circuit course in Mario Kart: Double Dash!!, while the regular, now-ruined mansion has reappeared several times. There is also an alternate version of the mansion known as the Hidden Mansion, which can be played after Luigi defeats King Boo. The Hidden Mansion is rather similar to the normal mansion of the game, but the entire mansion is mirrored from the normal one (only in the PAL version), and the ghosts and Boos are stronger. The Poltergust 3000 is 1.5 times more powerful in the Hidden Mansion. King Boo had a plan to get rid of the Mario Bros., so he sent a message to Luigi and Mario that Luigi had won a mansion in a contest, so they went there to celebrate. However, Mario arrived first and was captured by King Boo and sealed away in a portrait. When Luigi arrived, Mario wasn't there, but Luigi ended King Boo's plan and captured all the ghosts. Following this, the mansion disappeared, and Luigi built a new mansion that was completely free of Boos in its place. Luigi's Mansion: Dark Moon Luigi's Mansion appears in one chapter of volume 26 of Super Mario-Kun. As in the game, Luigi wins it, but stumbles on it after being lost in the woods and Mario being missing. Mario Kart series Luigi's Mansion is also the name for certain racing courses found in the Mario Kart series. The courses take place in the mansion of Luigi and its surroundings, showing as well the environment as seen in the game Luigi's Mansion. The Luigi's Mansion course has appeared in three Mario Kart games so far, which one would be an alternative to replace the Luigi Circuit, from many Mario racing installments. Mario & Luigi: Partners in Time While the mansion is never seen in Mario & Luigi: Partners in Time, Boo Woods, the area of which the mansion is located, is referred to after the eruption of Thwomp Volcano. The volcano destroys the young Professor E. Gadd's lab at the base of the volcano, prompting him to ponder moving his research to Boo Woods. While also never seen, it is known that Boo Woods is the location of his lab as seen in Luigi's Mansion. Mario Power Tennis Luigi's Mansion Court is a default court in Mario Power Tennis, and is it set in the Courtyard. There are numerous ghosts watching the game. In the normal version of this court, it is set on a concrete field, with no real gimmicks in it. In the gimmick version, on occasion, a ghost appears on either side of the court and can harass the players. This slows them down, making it more difficult to move and hit the ball at the right time. However, if a player lands the ball onto the mid-back space on the court (which has a picture of a light bulb on it), all the ghosts on the other side of the court disappear. The Minigame Terror Tennis is held on this court. Unlike in Mario Kart: Double Dash!!, this mansion is actually the mansion (presumably in its older form) seen in Luigi's Mansion. Mario Hoops 3-on-3 It appears in Mario Hoops 3-on-3 as the second playable court in the Flower Tourney. Ghosts abound on the court and will grab the ball should it cross their path. Players must jump to grab the ball back. If the player activates the Lightning, the ghosts will disappear for a short period of time. Super Smash Bros. series In Super Smash Bros. Brawl, Luigi's Mansion is an unlockable battle stage. The stage shows 5 rooms from Luigi's Mansion (based upon the Nursery, the Kitchen, the Study, the Ball Room, and the Foyer), and the mansion itself is destructible. Players can destroy a part of it by attacking the poles in the separate rooms. When a player does this a few Boos will appear and then quickly fade away. If players destroy all the poles, the stage will just be flat. Later, the stage will rebuild itself. Also, if all the players are not in any of the rooms and the mansion is whole, it shows the front of the mansion. It returned as a starter stage in Super Smash Bros. for Wii U. In it, like in all other stages, players have access to an alternate Omega form of the stage patterned after Final Destination: in this case, a balcony in front of the mansion's roof. Mario Super Sluggers Luigi's Mansion is a baseball field in Mario Super Sluggers. The stadium is located in the backyard of the mansion itself, and features gravestones located throughout an overgrown outfield. Coming within a certain range of the stone causes a generic ghost from the mansion to attack the player. The field can only be accessed by playing the game when it is night. It can be entered when the player purchases Luigi's Flashlight for 300 coins from the Mario Stadium shop. Thick grass grows in the outfield, making it difficult for the players to find the ball. The stadium's minigame is called Ghost K. It involves the player throwing balls at colored ghosts in attempt to get the highest score. Mario Sports Mix Luigi's Mansion made an appearance in Mario Sports Mix as a volleyball and basketball court. During a basketball match, one of the ghosts may snatch the ball out of the player's hand and pass it off to one of their opponents. When playing volleyball, the volleyball net is covered in a large spider web. The volleyball and basketball match appears to take place inside. Profiles and statistics Super Smash Bros. Brawl Songs in My Music * unlocked from CDs Names in other languages
<urn:uuid:7d86c645-4825-4af0-8835-6f715b9060ae>
CC-MAIN-2017-04
http://www.mariowiki.com/Luigi's_Mansion_(place)
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281574.78/warc/CC-MAIN-20170116095121-00019-ip-10-171-10-70.ec2.internal.warc.gz
en
0.960796
1,343
1.53125
2
Author Kelly Starling Lyons tells the 120-year history of the song through generations of her family who have passed it on — starting with a young girl who learned it in 1900 in Jacksonville, Florida, from her principal (James Weldon Johnson) and his brother. They wrote the song and music that have given strength and inspiration to African Americans through many of the trials and celebrations described in the book — the Great Migration, Jim Crow, the Civil Rights Movement, graduations, and the opening of the National Museum of African American History and Culture (NMAAHC). [Description from Social Justice Books.] ISBN: 9780525516095 | Nancy Paulsen Books Starting Young: Students Sing “Lift Every Voice” At a school in D.C., the pre-K students sing for teachers and parents. Read about the visit.
<urn:uuid:6f235e9b-edb3-424d-8823-0448ad361054>
CC-MAIN-2022-33
https://www.zinnedproject.org/materials/lift-every-voice
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00278.warc.gz
en
0.939889
175
3.46875
3
Niagara Falls, New York played an extraordinary role in the history of the underground railroad. Situated in a vacation destination at the international border, several enslaved people either clandestinely made their way here or were brought there by their owners. African Americans who lived in the town lived free lives and often helped several freedom seekers escape across the river to Canada. This exhibit reveals the hidden histories of many of the brave individuals who were involved in these harrowing stories. This exhibit includes an immense amount of digital media-based interactives and highly thematic inspired exhibitry. (Photos are credited to Kim Smith)
<urn:uuid:6a6775cd-2e71-4d23-a820-e66fa4d06f15>
CC-MAIN-2022-33
https://wzmosley.carbonmade.com/projects/7237062
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570741.21/warc/CC-MAIN-20220808001418-20220808031418-00070.warc.gz
en
0.979324
121
3.3125
3